Vous êtes sur la page 1sur 130

Company and Ship Security Plan

Including

Specific Ship Security Information for

Established:

This document contains Security Sensitive Information and is confidential and proprietary. Release of any information contained herein is prohibited without the express authorization of Blue Marine Management Corp. Company Security Officer (CSO) in collaboration with the Flag Administration.

Record of Revision
Version Revised Date: Revised Part: Reason of Revision

Contents
Section 0 Item Introduction Company Security Policy Definitions Security Responsibilities of Ship, Company, Port Facility, Interacting Ships Relevant Authority and Others Security Organization of the Ship and the Company Particulars of Ship and Company Organization and Responsibilities Personnel training Drills and exercises Records and documentations Response to changes in security level Procedures for interfacing with facilities and other ships Declaration of security Security related communication Ship security alert system and equipment maintenance Security measures for access control Access to the Ship Handling unaccompanied baggage Security measures for restricted area Security measures for handling cargo Security measures for delivery of ship's store, including bunkers Security measures for monitoring ship Procedures against breach of security Audit and Ship Security Plan amendment Ship Security Assessment Report Report of Ship Security Assessment Summary of Ship Security Assessment Background Information Item that is important to protect Possible Vulnerabilities Special consideration st 1 Stage: Identification of possible threat motives and potential security risks for the ship nd 2 Stage: Identification & evaluation of key shipboard operations that is important to protect rd th 3 & 5 Stage: Identification of possible threat scenario to key shipboard operations and asses the likelihood of those occurrences th 4 Stage: On-scene Security Survey Company Security Officer Checklist Ship Security Officer Duties and responsibilities Security duties at each Security Level Form for Declaration of Security Access Point Restricted Area Page
S. 0 - P.1/4 S. 0 - P.1/4 S. 0 - P.3/4 S. 0 - P.4/4 S. 1 - P.1/5 S. 1 - P.2/5 S. 2 - P.1/2 S. 3 - P.1/1 S. 4 - P.1/2 S. 5 - P.1/1 S. 6 - P.1/2 S. 7 - P.1/1 S. 8 - P.1/2 S. 9 - P.1/2 S. 10 - P.1/4 S. 10 - P.4/4 S. 11 - P.1/2 S. 12 - P.1/1 S. 13 - P.1/1 S. 14 - P.1/1 S. 15 - P.1/2 S. 16 - P.1/1 S. 17 - P.1/20 S. 17 - P.2/20 S. 17 - P.3/20 S. 17 - P.4/20 S. 17 - P.4/20 S. 17 - P.4/20 S. 17 - P.6/20 S. 17 - P.8/20 S. 17 - P.10/20

2 3 4 5 6 7 8 9 10

11 12 13 14 15 16 17

Appendix 1 Appendix 2 Appendix 3 Appendix 4 Appendix 5 Appendix 6 Appendix 7

S. 17 - P.12/20 Ap. 1 - P.1/1 Ap. 2 - P.1/1 Ap. 3 - P.1/1 Ap. 4 - P.1/1 Ap. 5 - P.1/2 Ap. 6 - P.1/1 Ap. 7 - P.1/1

Section Appendix 8

Item
Contingency Plan A. Response to hijack cases B. Bomb threat (Intimidation) C. Unidentified Object/Explosive on Shipboard D. Bomb Threat/Damage and Destruction to Port Facility E. Procedures for responding to pirates attack F. Procedures for responding to stowaways cases G. Vessel Under Attack and Being Pursued H. Crew Insubordination I. Discovery of Unauthorized Weapon Evacuation Route Form of Security Incident Report Company Security Policy Contact List of States for Security (Attached C.D.) Information on Company's Special Responsibility given to Master Record of Ship Security Plan Inventory of Dangerous Goods and Materials Monthly Communication Log SSAS Installation/Operation Manual Compliance Certificates of CSO

Page
Ap. 8 - P.1/7 Ap. 8 - P.2/7 Ap. 8 - P.3/7 Ap. 8 - P.4/7

Appendix 9 Appendix 10 Annex 1 Annex 2 Annex 3 Annex 4 Annex 5 Appendix 11 Appendix 12 Appendix 13

Ap. 8 - P.4/7 Ap. 8 - P.5/7 Ap. 8 - P.6/7 Ap. 8 - P.7/7 Ap. 8 - P.7/7 Ap. 9 - P.1/1 Ap. 10 - P.1/2 An. 1 - P.1/1 An. 2 - P.1/31 An. 3 - P.1/1 An. 4 - P.1/3 An. 5 - P.1/1 Ap. 11 - P.1/1 Ap. 12 - P.1/42 Ap. 13 - P.1/2

This SSP consists of the individual sections listed in 104.405, Part 104, 33CFR issued by the USCG.

Section 0 Introduction
1. Company Security Policy
The Company has established the Ship Security Plan to detect security threats and take preventive measures against security incident that may affect safety and security of ships under management of our Company, personnel and property on those ships, in accordance with requirements of SOLAS Chapter XI-2 and ISPS Code (the International Code for the Security of Ships and Port Facilities). This Ship Security Plan has been approved by the Administration (or by Recognized Security Organization).

The master and all crewmembers should give effect to those requirements stipulated in the Ship Security Plan and should be familiar with their duties. They should also undergo necessary training given by the master or ship security officer designated by the company. On behalf of the Company, the undersigned declares as follows.

1) The master has the overriding authority and responsibility to make decisions with respect to the security of the ship; 2) The Company should give necessary support to the ship when requested by the company security officer, the master and the ship security officer with respect to the security of the ship. The above Company Security Policy is entered with the date and signature, and attached to this document as Annex 1. 2. Definitions
2.1 Ship Security Plan (SSP) means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ships stores or the ship from the risks of a security incident. (ISPS-A/2.1.4) Company Security Officer (CSO) means the person designated by the Company for ensuring that a ship security assessment is carried out; that a Ship Security Plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer. (ISPS-A/2.1.7) Ship Security Officer (SSO) means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the Ship Security Plan and for liaison with the company security officer and port facility security officers. (ISPS-A/2.1.6) Port facility is a location, as determined by the Contracting Government or by the Designated Authority, where the ship/port interface takes place. This includes areas such as anchorage, waiting berths and approaches from seaward, as appropriate. (SOLAS XI-2/1.1.9) Ship/port interface means the interactions that occur when a ship is directly and immediately affected by actions involving the movement of persons, goods or the provisions of port services to or from the ship. (SOLAS XI-2/1.1.8)

2.2

2.3

2.4

2.5

2.6

Port Facility Security Officer (PFSO) means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers. (ISPS-A/2.1.8) Designated Authority means the organizations(s) or the administration(s) identified, within the Contracting Government, as responsible for ensuring the implementation of the provisions of this chapter pertaining to port facility security and ship/port interface, from the point of view of the port facility. (SOLAS XI-2/1.1.11) Declaration of Security (DoS) means an agreement reached between a ship and either a port facility or another ship with which it interfaces specifying the security measures each will implement. (SOLAS XI-2 /1.1.15) Security level means the qualification of the degree of risk that a security incident will be attempted or will occur. (SOLAS XI-2 /1.1.14)

2.7

2.8

2.9

2.10 Security level 1 means the level for which minimum appropriate protective security measures should be maintained at all times. (ISPS-A/2.1.9) 2.11 Security level 2 means the level for which appropriate additional protective security measures should be maintained for a period of time as a result of heightened risk of a security incident. (ISPS-A/2.1.10) 2.12 Security level 3 means the level for which further specific protective security measures should be maintained for a limited period of time when a security incident is probable or imminent, although it may not be possible to identify the specific target. (ISPS-A/2.1.11)

3.

Security Responsibilities of Ship, Company, Port Facility, Interacting Ships Relevant Authority and Others Flag Administration Flag Administration should set security levels and ensure the provision of security level information to ships entitled to fly its flag. When changes in security level occur, security level information should be updated as the circumstance dictates. Contracting Government Contracting Government should set security levels and ensure the provision of security level information to port facilities within its territory, to ships operating in its territorial sea and to ships prior to entering a port or whilst in a port within its territory. When changes in security level occur, security level information should be updated as the circumstance dictates. Contact List of Countries for Security is shown on separate Annex 2. Company The Company should ensure that the master has available on board, at all times, information through which officers duly authorized by a Contracting Government can establish:

3.1

3.2

3.3

.1 Who is responsible for appointing the members of the crew or other persons currently employed or engaged on board the ship in any capacity on the business of that ship; .2 Who is responsible for deciding the employment of the ship; and .3 In cases where the ship is employed under the terms of charter party (ies), who are the parties to such charter party (ies). A relevant information of the above items is shown on Annex 3 3.4 Port Facility A port facility is required to act upon the security levels set by the Contracting Government within whose territory it is located. Security measures and procedures should be applied at the port facility in such a manner as to cause a minimum of interference with, or delay to, passengers, ship, ships personnel and visitors, goods and services. Recognized Security Organizations Contracting Governments may authorize a Recognized Security Organization (RSO) to undertake certain security-related activities, including: .1 approval of Ship Security Plans, or amendments thereto, on behalf of the Administration; .2 verification and certification of compliance of ships with the requirement of chapter XI-2 and part A of ISPS Code on behalf of the Administration

3.5

3.6 Ship 3.6.1 A ship is required to act upon the security levels set by Contracting Governments as set out below. 3.6.2 At security level 1, the following activities should be carried out, through appropriate measures, on all ships, taking into account the guidance given in part B of this Code, in order to identify and take preventive measures against security incidents: .1 .2 .3 .4 .5 .6 .7 3.6.3 ensuring the performance of all ship security duties; controlling access to the ship; controlling the embarkation of persons and their effects; monitoring restricted areas to ensure that only authorized persons have access; monitoring of deck areas and areas surrounding the ship; supervising the handling of cargo and ships stores; and ensuring that security communication is readily available.

At security level 2, the additional protective measures, specified in the ship security plan, should be implemented for each activity detailed in section 3.6.2, taking into account the guidance given in part B of this Code. At security level 3, further specific protective measures, specified in the ship security plan, should be implemented for each activity detailed in section 3.6.2, taking into account the guidance given in part B of this Code.

3.6.4

Section 1 Security Organization of the ship and the company


Particulars of Ship and Company

1.1

Particulars of Ship
Flag of Ship:

Name of ship:

Signal letters:

IMO number:

Type of ship:

Service area:

Length (BP):

Breadth:

Gross tonnage:

Net tonnage:

Draught (summer):

Freeboard (summer):

Displacement:

Deadweight:

1.2 Particulars of Company

Name of Company:

Address:

Telephone number:

Fax number:

The following information is given by company to the master in a separate document as shown on Annex 3. The master is to produce this document to an officer who is duly authorized by the Government, when this information is required. 1. Name of responsible person for assignment of crew members 2. Parties concerned with bareboat charter 3. Parties concerned with time charter 4. Parties concerned with voyage charter

Organization and Responsibilities


1.3 Organization Chart relating to shipboard security

Organizational Chart Company and Ship


Chairman

DG/GM Marine & Tech. Dept.

Company Sec. Officer

Marine & Tech. Supt.

Master

SSO / Master

Chief Engineer

Deck Officer / Deck Crew

1.4 Masters Overriding Authority

Catering Crew

Engine Crew

The master has the overriding authority and the responsibility to make decisions which, in his professional judgment, is necessary to maintain the safety and security of the ship. This includes denial of access to persons (except those identified as duly authorized by a Contracting Government) or their effects and refusal to load cargo, including containers or other closed cargo transport units.

If, in the professional judgment of the master, a conflict between any safety and security requirements applicable to the ship arises during its operations, the master should give

effect to those requirements necessary to maintain the safety of the ship. In such cases, the master may implement temporary security measures and should forthwith inform the Administration and, if appropriate, the Contracting Government in whose port the ship is operating or intends to enter. Any such temporary security measures should, to the highest possible degree, be commensurate with the prevailing security level.
1.5 Company Security Officer

1.5.1. Designated CSO in charge of this ship is specified in appendix 1 1.5.2 Duty and responsibility
The duties and responsibilities of the CSO should include, but are not limited to: .1 advising the level of threats likely to be encountered by the ship, using appropriate security assessments and other relevant information; .2 ensuring that ship security assessments are carried out; .3 ensuring the development, the submission for approval, and thereafter the implementation and maintenance of the Ship Security Plan; .4 ensuring that the Ship Security Plan is modified, as appropriate, to correct deficiencies and satisfy the security requirements of the individual ship; .5 arranging for internal audits and reviews of security activities; .6 arranging for the initial and subsequent verifications of the ship by the Administration or the RSO; .7 ensuring that deficiencies and non-conformities identified during internal audits, periodic reviews, security inspections and verifications of compliance are promptly addressed and dealt with; .8 enhancing security awareness and vigilance; .9 ensuring adequate training for personnel responsible for the security of the ship .10 ensuring effective communication and co-operation between the SSO and the relevant PFSO; .11 ensuring consistency between security requirements and safety requirement; .12 ensuring that, if sister-ship or fleet security are used, the plan for each ship reflects the ship- specific information accurately; and .13 ensuring that any alternative or equivalent arrangements approved for a particular ship or group of ships are implemented and maintained.
1.6 Ship Security Officer

1.6.1 Designation Master is the designated Ship Security Officer of the vessel (please refer to Appendix 2).

1.6.2 Duty and Responsibility

The duties and responsibilities of the SSO should include, but are not limited to: .1 undertaking regular security inspections of the ship to ensure that appropriate security measures are maintained; .2 maintaining and supervising the implementation of the Ship Security Plan, including any amendments to the plan; .3 coordinating the security aspects of the handling of cargo and ships stores with other shipboard personnel and with the relevant PFSO; .4 proposing modifications to the Ship Security Plan; .5 reporting to the CSO any deficiencies and non-conformities identified during internal audits, periodic reviews, security inspections and verifications of compliance and implementing any corrective actions; .6 enhancing security awareness and vigilance on board; .7 ensuring that adequate training has been provided to shipboard personnel, as appropriate; .8 reporting all security incidents; .9 coordinating implementation of the Ship Security Plan with the CSO and the relevant PFSO; .10 ensuring that security equipment is properly operated, tested, calibrated and maintained, if any; and .11 verifying the consent of Declaration of Security and to carry it out.

1.6.3 SSO has responsibility to liaise with PFSO. SSO and the master are given authority to exchange Declaration of Security with PFSO. 1.6.4 SSO has responsibility along with the master to liaise with the customs and other law enforcement agencies.
1.7 Other shipboard personnel

1.7.1

Duties and Responsibilities for crewmembers Duties and responsibilities assigned to crewmembers, during this ship at sea or in port, are prescribed in Appendix 3.

1.7.2 Duty and Responsibility for other shipboard personnel All other shipboard personnel should be aware of the current security level the ship is operating at that time. They should report to duty officer of any abnormal condition of security equipment, suspicious person, material or activity.
1.8 Security duties at each Security Level

The Security duties in which the individual member of crew is required to respond at each security level is prescribed in Appendix 4.

Section

Personnel training
2.1 Ship Security Officer (SSO)

SSO should have knowledge of, and receive training, in some or all of the following, as appropriate. CSO is responsible for planning and performing of the SSO training. .1 .2 .3 .4 .5 .6 .7 .8 .9 .10 .11 .12 .13 .14 .15 .16 .17 .18 .19 .20 security administration; relevant international conventions, codes and recommendations; relevant Government legislation and regulations; responsibilities and functions of other security organizations; methodology of ship security assessment; methods of ship security surveys and inspections; ship and port operations and conditions; ship and port facility security measures; emergency preparedness and response and contingency planning; instruction techniques for security training and education, including security measures and procedures; handling sensitive security related information and security related communications; knowledge of current security threats and patterns; recognition and detection of weapons, dangerous substances and devices; recognition, on a non-discriminatory basis, of characteristics and behavioral patterns of persons who are likely to threaten security; techniques used to circumvent security measures; security equipment and systems and their operational limitations; method of conducting audits, inspection, control and monitoring; methods of physical searches and non-intrusive inspections; security drills and exercises, including drills and exercises with port facilities; and assessment of security drills and exercises.

In addition the SSO should have adequate knowledge of, and receive training, in some or all of the following, as appropriate: .1 .2 .3 .4 .5 the layout of the ship; the SSP and related procedures (including scenario-based training on how to respond); crowd management and control techniques; operations of security equipment and systems; and testing, calibration and whilst at sea maintenance of security equipment and systems.

2.2 Security training of Shipboard Personnel Shipboard personnel having specific duties should have sufficient knowledge and ability to perform their assigned duties, including, as appropriate. The training pertaining to these duties should be performed under responsibility of SSO. .1 .2 knowledge of current security threats and patterns; recognition and detection of weapons, dangerous substances and devices;

.3

recognition of characteristics and behavioral patterns of persons who are likely to

threaten security; techniques used to circumvent security measures; crowd management and control techniques; security related communications; knowledge of the emergency procedures and contingency plans; operations of security equipment and systems; testing, calibration and whilst at sea maintenance of security equipment and systems, .10 inspection, control, and monitoring techniques; and .11 methods of physical searches of persons, personal effects, baggage, cargo, and ships stores. 2.3 All other Shipboard Personnel All other shipboard personnel should have sufficient knowledge of and be familiar with relevant provisions of the SSP. The training pertaining to these duties should be performed under responsibility of SSO. .4 .5 .6 .7 .8 .9 .1 .2 .3 .4 the meaning and the consequential requirements of the different security levels; knowledge of the emergency procedures and contingency plans; recognition and detection of weapons, dangerous substances and devices; recognition, on a non-discriminatory basis, of characteristics and behavioral patterns of persons who are likely to threaten security; and .5 techniques used to circumvent security measures.
Note: Supplementary Detailed Plan of Training and Drills Onboard, refer to Annex 4 Item (2) Drills and Exercises.

Section 3

Drills and exercises


3.1 Drills The objective of drills and exercises is to ensure that shipboard personnel are proficient in all assigned security duties at all security levels and the identification of any security related deficiencies, which need to be address. To ensure the effective implementation of the provisions of the Ship Security Plan, drills should be conducted at least once every three months. In addition, in cases where more than 25 percent of the ships personnel has been changed, at any one time, with personnel that has not previously participated in any drill on that ship, within the last 3 months, a drill should be conducted within one week of the change. Security training should take into consideration various emergency situations that may occur depending on type of ship and cargoes. SSO should establish scenario of, at least, the followings, and perform the training: Search of unauthorized visitor on shipboard Search of materials that may cause security threat to ship Search of prohibited article on shipboard Training to deter attackers from approaching to ship Recognition of restricted area

3.2 Exercises CSO should participate, when requested, in exercises which should be carried out at least once each calendar year with no more than 18 months between the exercises. In addition, SSO of at least more than 1 vessel out of the fleet of the company should participate in the above exercise. When CSO participates in an exercise with the Contracting Government other than the Administration of the ships flag state, the CSO should report this matter to the Administration.

In case CSO has the SSO of the ship participate in the exercise, the CSO should dispatch the SSO the scenarios in advance which the organizer will use in the exercise. In case of no scenarios prepared, the CSO should liaise with the organizer to clarify the SSOs role and familiarize those matters to the SSO. In case the master or SSO is requested to participate in the exercise without the knowledge of the CSO, the master or the SSO should not participate at his discretion. The master or SSO should report the fact to the CSO for his advice.

Section 4

Records and Documentation


4.1 Records of the following activities relating to SSP should be written in English and should be kept onboard. The Master (SSO) is responsible for safekeeping the records in Masters cabin. 4.1.1 For at least 2 years or the minimum period specified by the Administration. .1 training, drills and exercises; .2 changes in security level; .3 communications relating to the direct security of the ship such as specific threats to the ship or to port facility the ship is, or has been; .4 internal audits and reviews of security activities; .5 periodic review of the ship security assessment; .6 periodic review of the Ship Security Plan; .7 implementation of any amendments to the plan; and .8 maintenance, calibration and testing of security equipment, if any including testing of the ship security alert system. 4.1.2 For the period of last 10 port calls or the minimum period specified by the Administration. .1 .2 .3 .4 .5 security threats and security incidents breach of security Declaration of Security security level of last 10 port calls and any special or additional measures taken appropriate ship security procedures that were maintained during ship to ship activities Form of record is attached as separate sheet in Annex 4. 4.2 Prior to entering a port, the following security information might be requested to provide to the PSC Officer with the aim of avoiding the need to impose control measures or steps. In this respect, SSO should prepare these information prior to entering a port, and such information should be kept onboard for the period of last 10 port calls or the minimum period specified by the Administration. .1 .2 .3 .4 .5 .6 information contained in the Continuous Synopsis Record location of the ship at the time the report is made expected time of arrival of the ship in port crew list general description of cargo aboard the ship passenger list

4.3 The Ship Security Plan (SSP) contains security sensitive information; and as such copies

of the plan are to be strictly controlled by the Company. A hard copy or Electronic format will be kept in the company offices by the CSO and a hard copy is held on board by the SSO in a secure location that prevents unauthorized access, disclosure, deletion, destruction or amendment. The Master, SSO and CSO should be the only persons with access to the entire plan. Ship's personnel should be made aware of the existence of the plan and their roles in the Security of the ship.

The following information contained in the plan is confidential and shall be designated as Security Sensitive Information: 1. Identification of restricted areas and measures for prevention of unauthorized access. (Appendix 7) 2. Implementation of Security Levels advised by the Flag Administration or the Contracting Government. (Appendix 10 - Annex 4)

3. Contingency procedures in responding to security threats or breaches of security, including stipulation for maintaining critical operations of the sip or ship/port interface. (Appendix 9) 4. Duties of shipboard personnel assigned; with security responsibilities. (Appendix 4) 5. Procedures for the inspection, calibration, testing, and maintenance of On Board Security Equipment, if any.

6. Identification of the locations where the ship security alert system activation points are provided.

7. Procedures, guidance and instructions for the use of ship security alert system, including the testing, activation, de-activation and re-setting to limit false alerts. Procedures to Protect Security Sensitive Information. The following procedures shall be implemented to ensure the security and integrity of Security Sensitive Information. All hard copy SSI shall be held in a security container under lock and key. All electronically transmitted SSI shall be protected by password-enabled files.

Section 5

Response to change in security level


There are 3 of security levels to be set out each responding to the degree of threat. In normal time of peace the ships act upon the security level 1. At security level 1, the following activities should be carried out on all ships, in order to identify and take preventive measures against security incidents: 1. 2. 3. 4. 5. 6. 7. ensuring the performance of all ship security duties; controlling access to the ship; controlling the embarkation of persons and their effects; monitoring restricted areas to ensure that only authorized persons have access; monitoring of deck areas and areas surrounding the ship; supervising the handling of cargo and ships stores; and ensuring that security communication is readily available.

The changes in security level occur when the degree of threat and risk has changed. At security level 2, the additional protective measures should be implemented for each activity detailed in the above paragraph. At security level 3, further specific protective measures should be implemented for each activity detailed in the above paragraph. Prior to entering a port, or whilst in a port within the territory of a Contracting Government that has set security level 2 or 3, the ship acknowledge receipt of this instruction and should confirm to the PFSO the initiation of the implementation of the appropriate measures and procedures as detailed in the SSP, and in the case of security level 3, an instruction issued by the Contracting Government which has set security level. At security level 3, the ship should follow the instruction issued by the organization, which respond to this security incident or its threat. Every security measures to be taken should be such that they would closely coordinate with the activity of those who respond to the incident and with the port facility. The ship should report to the company of the above instruction. The master is always responsible for the safety of ship. Even under security level 3, the master can request explanation or modification of instruction issued by organization who responds to the security incident or its threat, if there is an evidence to believe that implementation of instruction may endanger the safety of ship. The master should report any problems, which may occur when implementing the security measures. In this case, the master should co-ordinate to take appropriate action consulting with PFSO and SSO. If a ship is required by the Administration to set, or is already at, a higher security level than that set for the port it intends to enter or in which it is already located, then the ship should advise, without delay, the competent authority of the Contracting Government within whose territory the port facility is located and the PFSO of the situation.

Section 6

Procedures for interfacing with facilities and other ships


The master should respond to relevant requirements set forth in the Ship Security Plan. Prior to entering a port or whilst in a port within the territory of a Contracting Government, a ship should comply with the requirements for the security level set by that Contracting Government, if such security level is higher than the security level set by the Administration for that ship. 6.1 Arrival in Ports Prior to entering a port, the ship should confirm whether the port is subject to the ISPS Code and holds the Port Facility Security Plan. a. When the port holds Port Facility Security Plan - CSO or SSO should liaise with PFSO and confirm the security level of both sides. - When a Declaration of Security is required by Contracting Government or PFSO, the master should instruct SSO to prepare this Declaration of Security. - When the ship has a higher security level than that of the port facility, the master should inform this fact to Contracting Government and PFSO, and require him to prepare a Declaration of Security to coordinate the appropriate security actions. b. When the port does not hold Port Facility Security Plan - The ship should liaise with the Contracting Government, inform them of the ships security level, and require appropriate security measures. - The ship should request the port to prepare a Declaration of Security. 6.2 Passing through Territorial Sea When the master finds that there is a security threat while the ship is operating in a territorial sea of a coastal state, he should inform this coastal state of the circumstances. When a ship received an advice of security alert from the coastal state while operating in its coastal sea, the master should obey this instruction and put the ship on alert. This instruction could include advice: to alter or delay their intended passage; to navigate on a particular course or proceed to a specific location; on the availability of any personnel or equipment that could be placed on the ship; to co-ordinate the passage, arrival into port or departure from port, to allow escort by patrol craft or aircraft.

6.3 Ship to Ship Interface Prior to commencement of interface with other ship, the master should confirm if other ship holds a Ship Security Plan. a. When other ship holds SSP - CSO or SSO should liaise with SSO of other ship and confirm the security level of both sides - When a Declaration of Security is required by the other ship, the master should instruct SSO to prepare the same

When the security level is higher than that of the other ship, the master should

inform this fact to the other ship and request them to prepare a Declaration of Security in order to determine appropriate security measures between both ships b. When the other ship does not hold SSP - Confirm if other ship has implemented security measures in accordance with other regulations - Request to submit a copy of Security Certificate issued under other regulations - Request the other ship to prepare a Declaration of Security and determine appropriate security measures between both ships - Take a record of measures performed during the interface 6.4 Interface with fixed or floating platforms or a MODU Prior to commencement of interface with a fixed or floating platform or a MODU, the master should confirm if she holds a Ship Security Plan. c. When fixed or floating platform or a MODU holds SSP - CSO or SSO should liaise with SSO of fixed or floating platforms or a MODU and confirm the security level of both sides - When a Declaration of Security is required by fixed or floating platforms or a MODU, the master should instruct SSO to prepare the same - When the security level is higher than that of the fixed or floating platform or a MODU, the master should inform this fact to the fixed or floating platform or a MODU and request there SSO to prepare a Declaration of Security in order to determine appropriate security measures between both ships d. When fixed or floating platform or a MODU does not hold SSP - Confirm if fixed or floating platform or a MODU has implemented security measures in accordance with other regulations - Request to submit a copy of Security Certificate issued under other regulations - Request fixed or floating platform or a MODU to prepare a Declaration of Security and determine appropriate security measures between both ships - Take a record of measures performed during the interface

Section 7

Declaration of security
7.1 Contracting Governments should determine when a Declaration of Security is required by assessing the risk the ship/port interface or ship to ship activity poses to people, property or the environment.
7.2 A ship can request completion of a Declaration of Security when: .1 the ship is operating at a higher security level than the port facility or another ship it is interfacing with; .2 there is an agreement on the Declaration of Security between Contracting Governments covering certain international voyages or specific ships on those voyages; .3 there has been a security threat or a security incident involving the ship or involving the port facility, as applicable; .4 the ship is at a port which is not required to have and implement an approved port facility security plan; or .5 the ship is conducting ship to ship activities with another ship not required to have and to implement an approved Ship Security Plan.

7.3 When the request for completion of Declaration of Security made by a ship is rejected, such fact of rejection should be recorded. 7.4 The Declaration of Security should be completed by: .1 the master or SSO on behalf of the ship; and, if appropriate, .2 the PFSO or if the Contracting Government determines otherwise, by any other body responsible for shore-side security 7.5 The Declaration of Security for last 10 port calls or for the minimum period specified by the Administration should be kept onboard.

7.6 A form of Declaration of Security is shown in Appendix 5.

Section 8

Security related communication


GMDSS is installed on shipboard as communication system. In addition to this, ship has portable transceivers for on board communication. 8.1 Communication on board the ship Communication on shipboard may be made verbally, or by using laud speakers and transceivers. For security related communication, the master should specify the frequency to be used. Details of Communication MH/HF Radio, Inmarsat-C, (Telex/Telephone/Fax) V.H.F. Marine Radio Telephone, VHF FM Two Way Radio Telephone, DSC, Inmarsat B, Handy Phone (Do-co-mo) 8.2 Communication from ship to shore The Contracting Government where the port facility located should give advice on the communication system and its frequency to be used. When such instruction is not given, a ship should communicate by GMDSS. In addition, the ship security alert system is designed to transmit the security alert to the Administration or the Company. When Company receives the security alert, CSO or his deputy staff should communicate to Administration without delay. 8.3 Port Specific Security Communication Prior to entering a port, the Ship should provide the following information to the Port Facility Security Officer with the aim of avoiding the need to impose control measures or steps: .1 Confirmation that the ship possesses a valid International Ship Security Certificate and its issuing authority; .2 Confirmation of the security level at which the ship is currently operating; .3 Confirmation of the security level at which the ship operated in any previous port where it conducted a relevant ship/port interface; .4 Confirmation of any special or additional security measures that were taken by the ship in any previous port where it has conducted a relevant ship/port interface; .5 Confirmation that the appropriate ship security procedures were maintained during any previous relevant ship to ship activity; or .6 Other practical security related information (but not details of the ship security plan). The Ship Security Officer (SSO) should liase at the earliest opportunity with the Port Facility Security Officer (PFSO) of the port facility the ship is intended to visit to establish the security level applying for that ship at the port facility. Having established contact with a ship, the PFSO should advise the ship of any subsequent change in the port facilitys security level and should provide the ship with any relevant security information. While there will be circumstances when an individual ship may be operating at a higher security level than the port facility it is visiting, there will be no circumstances when a ship can have a lower security level than the port facility it is visiting. If a ship has a higher security level than the port facility it intends to use, the SSO should advise the PFSO without delay. The PFSO should undertake an assessment of the particular situation in consultation with the SSO and agree on appropriate security measures with the ship.

Section 9

Ship security alert system and equipment maintenance


9.1 OPERATION Ship Security Alert System, when activated, shall: Initiate and transmit a ship-to-shore alert to a competent authority designated by the administration, which in these circumstances may include the Company, Identifying the ship, its location and indicating that the security of the ship is under the threat or it has been compromised; not send the ship security alert to any other ships; not raise any alarm on-board the ship; and continue the ship security alert until the deactivated and or reset 9.2 LOCATION OF ACTIVATION POINTS Activation points are provided at; 1) Bridge 2) Captain's Cabin 9.3 IMPLEMENTATION AND PROCEDURE OF SHIP SECURITY ALERT SYSTEM 9.3.1 WHEN TO START ACTIVATION The Master or the SSO shall start the activation of the ship security alert system only when he perceive and judged that the security of the ship was under threat or it's been compromised. At the start of activation, pay attention on possible reaction of the receiver to the alert, and give enough considerations on the prospective consequences caused by the alert. To activate the switch, simply lift the clear cover and depress the button, until it clicks and holds. If combined (both wired & wireless) system is implied on the vessel kindly refer to Appendix 12. 9.3.2 TESTING OF SSAS The Master or the SSO, has the responsibility for carrying out test of Ship Security Alert System. Results of such testing shall be evaluated both by CSO and the Master / SSO. The Master or the SSO, should communicated or inform the CSO, prior testing of Ship Security Alert System (SSAS) Ship Security Alert System (SSAS) shall be tested at least once in every three months between Company and Ship. Master or SSO, Should inform the CSO of the intended testing. Results of such testing shall be evaluated both by CSO and Master or SSO. Should there be any deficiency found during the testing, it must be investigated, analyzed and immediate measures should be implemented and verified. After the deactivation of SSAS, the Master or the SSO, should contact the CSO, subsequently the CSO should communicated the Competent Authorities designated by the administration. The CSO shall be responsible for the "resetting" of SSAS and the SSO will be responsible for the Maintenance and adjustments if ever necessary.

9.3.3 TO CANCEL ACTIVATION To cancel the alert, lift the clear cover and depress again button, ensuring that is in "out (raised)" position or the Button Protrude. If combined (both wired & wireless) system is implied on the vessel kindly refer to appendix 12. 9.3.4 TO RESET ACTIVATION To Reset the alert, the CSO can connect by means of Computer going to a particular web address referred on the manual, or utilized Mobile phone that can accommodate the GPRS connectivity pertaining to Mobile Phone Internet Connection. 9.3.5 PREVENTION AND MEASURES OF FALSE ALERTS The alert switch of SSAS is located on a secure and confidential area which the Master or the SSO is the only person permissible to access, and a switch secured with a clear plastic springs intended as a protection for false alert. The alert will only activated as per deliberate intention of the Master/SSO. 9.3.6 PROCEDURE FOR INSPECTION, TESTING, CALIBRATION AND MAINTENANCE Procedure including the interval for inspection, testing, calibration and maintenance, are provided in Makers instruction book. 9.3.7 ENSURING CONTINUED FUNCTIONING OF EQUIPMENT AND ASSESING OF EFFECTIVENESS Procedure needed to assess the continuing effectiveness of SSAS, are provided in Makers instruction book 9.3.8 IDENTIFYING AND RESPONDING TO FAILURE OR MALFUNCTION Procedure for identifying and responding to failure or malfunction, are provided in Maker's instruction book

Section 10 Security measures for access control


10.1 Access to the Ship
.1

Access to the Ship (Access point of the ship is shown in Appendix 6)

Security Level 1 Checking the identity of all persons seeking to board the ship and confirming their reasons for doing so by checking, for example, joining instructions, passenger tickets, boarding passes, work orders etc.; In liaison with the port facility the ship should ensure that designated secure areas are established in which inspections and searching of persons, baggage (including carry on items), personal effects, vehicles and their contents can take place; Segregating checked persons and their personal effects from unchecked persons and their personal effects; Identification of access points that should be secured or attended to prevent unauthorized access; Securing, by locking or other means, access to unattended spaces adjoining areas to which passengers and visitors have access; and Providing security briefings to all ship personnel on possible threats, the procedures for reporting suspicious persons, objects or activities and the need for vigilance.

1.

Security Level 2 Assigning additional personnel to patrol deck areas during silent hours to deter unauthorized access;

1.

Security Level 3 Limiting access to a single, controlled, access point;

.2

2.

Limiting the number of access points to the ship, identifying those to be closed and the means of adequately securing them;

2.

Granting access only to those responding to the security incident or threat thereof;

.3

3.

Deterring waterside access to the ship, including, for example, in liaison with the port facility, provision of boat patrols;

3.

Directions of person

4.

.4

.5

Establishing a restricted area on the shore-side of the ship, in close co-operation with the port facility; 5. Increasing the frequency and detail of searches of persons, personal effects, and vehicles being embarked or loaded onto the ship;
4. 6. 7.

Suspension of embarkation or disembarkation;

5.

Suspension of cargo handling operations, deliveries etc;

.6

Escorting visitors on the ship; Providing additional specific security briefings to all ship personnel on any identified threats, reemphasizing the procedures for reporting suspicious persons, objects, or activities and the stressing the need for increased vigilance; and Preparing for a full or partial search of the ship

6. 7.

Evacuation of the ship; Movement of the ship; and

8.

8.

Carrying out a full or partial search of the ship

10.2

Access Point and Measures to prevent unauthorized access


Security Level 1 Measures Security Level 2 post a guard* keep the ladder clear of water surface*/ keep the ladder clear of wharf* post a guard* secure from inside* close hawse pipe* fit a large rat guard or close by other means* Security Level 3 post a guard* Not in use*/ post a guard*

Access Point Gangway Pilot Ladder Crane or Other Hoisting Equipment Ships Side Port Anchor Cable Mooring Ropes post a look-out personnel* post a look-out personnel*

post a look-out personnel* post a look-out personnel* post a look-out personnel* post a look-out personnel*

Not in use* post a guard* / secure from inside* close hawse pipe*/ post a guard*/ fit a large rat guard or close by other means*/ post a guard*

10.3 Updating of Identification systems SSO should review the Identification system periodically. Where any deficiency found in the Identification system, SSO should report such deficiency and propose the improvement of the Identification system. Where shipboard personnel or shore side personnel tried, or intend to try to abuse the Identification system is found, SSO should report the fact to the PFSO and CSO for consideration of a disciplinary action. Security Level 1 All persons boarding the vessel should be checked properly identified. The SSO should establish the following identification system. 1. Port Watch/Lookout should be checking/confirming all persons embarking to have their Personal I.D. or the ones issued by the Port Facility who wish to board the vessel. NO identification NO ADMITTANCE. 2. Port watch/Lookout should check the authenticity of the I.D. Calling cards or the like is not acceptable as identification. In case calling card is presented, a personal I.D. should be checked in consonance with the calling card. 3. All visitors embarking on board for the purpose of conducting normal vessel's operation, conducting business will be issued with "Ship's Visitor Pass" by the SSO. The Visitor's Pass should be plastic laminated, color coded, and with ship's stamp and signature of the Present Master in order to avoid tampering. The color coding to be arrange are as follows or the ship crew can design whichever is appropriate: a) b) c) d) e) f) Stevedores Ship Agent Surveyors Port Authorities Ship Chandler/Suppliers Others - Blue - Yellow - Red - Orange - Green

4. All Visitors should log/sign their names, and state their purpose of visit in the visitor's logbook.

Security Level 2
1. Following the procedures from "SECURITY LEVEL 1" from Step one to four, but this time the checking will be more extensive. If SSO or ship's crew is in doubt with the presented I.D. of the visitor, or his purpose of visit, he should seek further verification from PFSO, CSO or ship agent. 2. After being fully verified can such personnel be allowed access on board.

Security Level 3 1. Access to the ship by shore personnel is temporarily suspended. The SSO should review the Identification System once every three months and every Master Change. It should be updated taking into accounts the Port Facility requirements. If there is any Visitor's Pass which is already worn out should be replaced with a new one, stamped and signed by the present Master. The SSO can also change or re-shuffle the color coding to avoid being tampered in each port of call. Where any deficiency found in the identification system, SSO should report such deficiency and propose the improvement of the Identification system. Where shipboard personnel or shore side personnel tried, or intend to try to abuse the Identification system is found, SSO should report the fact to the PFSO and CSO for consideration of a disciplinary action. 10.4 Procedures for reporting the attempt of unauthorized access to the authority Those unwilling or unable to establish their identity and/or to confirm the purpose of their visit when requested to do so should be denied access to the ship and their attempt to obtain access should be reported to the SSO. And SSO should report to the CSO, the PFSO and to the national or local authorities with security responsibilities.

10.5 Handling unaccompanied baggage


Passengers, Shipboard Personnel and their Unaccompanied Baggage .1 REFUSE TO ACCEPT unaccompanied Baggage. .1 REFUSE TO ACCEPT unaccompanied Baggage. .1 REFUSAL TO ACCEPT unaccompanied baggage onboard the ship.

Section 11 Security measures for restricted area 11.1 Restricted area


Security Level 1
Restricted Area on the Ship
(Restricted area of this ship is shown in Appendix 7)

Security Level 2
.1 Establishing restricted areas adjacent to access points; .2 Dedicating additional personnel to guard and patrol restricted areas.

Security Level 3
.1 Setting up of additional restricted areas on the ship in proximity to the security incident, or the believed location of the security threat, to which access is denied; and .2 Searching of restricted areas as part of a search of the ship.

.1 Locking or securing access points; .2 Ensure new crew understands Restricted Areas and Vulnerable Points. .3 Using guards or patrols; and .4 Restrict access to the accommodation and Engine Room.

11.2 List of Restricted Area and Measures to prevent unauthorized access All restricted areas should be clearly marked indicating that access to the area is restricted and that unauthorized presence within the area constitutes a breach of security.

Restricted Area

Measures

Bridge / Compass Deck Machinery Space Air-con Unit Room Crew Accommodation Emergency Generator Room Spaces containing security and surveillance equipment and systems Steering Room Battery Room Oxygen Room / Acetylene Room Provision Store / Provision Chamber Galley / Officer & Crew Mess Room Fresh Water Filling Pipe Access Hatches Escape Trunk Fire Station Deck Stores Electrical Room Paint Store Ship's Office / Tally Office Bosun's Store Room

Lock the room* / Patrol Lock the space / Watch Lock the room*/Patrol Lock the accommodation space* / Patrol Lock the room*/Patrol Not Fitted Lock the room*/Patrol Lock the room Lock* / Patrol Lock* / Patrol Lock when not in use* / Patrol Lock* / Patrol Lock* / Patrol Secure from Inside Patrol Lock* / Patrol Lock* / Patrol Lock* / Patrol Lock when not in use* / Patrol Lock* / Patrol

Note: * Delete as Appropriate

Section 12 Security measures for handling cargo 12.1 Handling of Cargo Security Level 1 Handling of Cargo .1 Routine checking of cargo, cargo
transport units and cargo spaces prior to, and during, cargo handling operations;

Security Level 2 .1 Detailed checking of cargo, cargo


transport units and cargo spaces;

Security Level 3 .1 Suspension of the loading or unloading


of cargo; and

.2 Verify the inventory of dangerous goods .2 Intensified checks to ensure that only the
intended cargo is loaded; and hazardous substances carried on board, if any, and their location

.2 Checks to ensure that cargo being loaded


matches the cargo documentation;

.3 Ensuring, in liaison with the port facility,


that cargo to be loaded on board general cargo vessel and bulk vessel are subjected to check or inspect prior to loading, as arranged by the shipper or cargo surveyor.

.3 Increased frequency and detail in checking


of seals or other methods used to prevent tampering

.4 Checking of seals or other methods used


to prevent tampering.

.4 Increasing the frequency and detail of


visual and physical examination;

.5 Visual and physical examination; and

.5 Coordinating enhanced security


measures with the shipper or other responsible party in accordance with an established agreement and procedures

12.2 Control of Dangerous Goods or Hazardous Substances When a ship has space containing dangerous goods or hazardous substances, SSO should complete inventory of them and verify their quantities at regular interval. (See Annex 5 containing inventory of Dangerous Goods and Materials). These spaces should be identified as restricted area, and should follow the procedures of above 11.2.

Section 13 Security measures for delivery of ship's store, including bunkers


13.1 D e l i ve r y of Ships Store
Security Level 1
Delivery of Ships Store

Security Level 2 .1 Intensified and more thorough


checking of stores as to the following: a) Contents are same with stores that were ordered and matches as to the Quantity/Amount/Description b) Package integrity c) Tampering

Security Level 3 .1 All the steps/procedures


carried out in Security Level 1 and 2 including the following: a) Subject ship's tores to more extensive checking. b) Preparation for restriction or suspension of handling of ship's stores. c) Refusal to accept ship's stores on board ship

.1 Checking to ensure stores match


the order prior to being loaded on board; and

.2 Ensuring immediate secure


stowage of ships stores.

.2 Strongly refuse/do not accept stores


which arrived but are not included on the Vessel's order sheet.

.3 All stores to be immediately


stowed and secured.

.4 Coordinate closely with the Port


Facility and those responding to the Security incident or threat there at.

Section 14 Security measures for monitoring ship


14.1 Monitoring the Security of the Ship The ship's deck and access points to the ship should be illuminated during the time of darkness and periods of low visibility when at a port facility, anchorage and while conducting ship/port interface activities. While underway, if necessary, ship should use the maximum lighting available consistent with safe navigation, in accordance to the provision of the international regulation for the prevention of collision at sea in force.
Security Level 1
Monitoring the Security of the Ship

Security Level 2 .1 Increasing the frequency and detail of


security patrols;

Security Level 3 .1 Switching on of all lighting on, or


illuminating the vicinity of, the ship;

.1 The ships personnel should be able to


detect activities beyond the ship, on both the shore side and the waterside;

.2 Coverage should include the area on and


around the ship; .3 Coverage should facilitate personnel identification at access points; and

.2 Increasing the coverage and intensity of


lighting. .3 Assigning additional personnel as security lookouts; and

.2 Assigning additional personnel as


security look-outs.

.3 Preparation for underwater inspection of


the hull of the ship; and

.4 Coverage may be provided through


coordination with the port facility.

.4 Ensuring coordination with waterside


boat patrols, and foot or vehicle patrols on the shore-side, when provided.

.4 Initiation of measures, including the slow


revolution of the ships propellers, if practicable, to deter underwater access to the hull of the ship.

Section 15 Procedures against breach of security


15.1 Security Threats Where there exit security threats, ship may be advised of security level 2 or 3 from the Administration or the Contracting Government where the port facility is located. If the ship is operating at security level 1, and the master or SSO considers that there exist security threats, he should take appropriate actions to mitigate those threats. The master or SSO should also report to the Administration and the Contracting Government of the

15.2 Breach of Security Where there is a breach of security, the master should consider to: 1. 2. 3. 4. 5. 6. 7. a. b. c. d. e. f. activate ship security alert system, issue that all crew stand on emergency station, report to the Contracting Government of the port facility, prepare to abandon ship, prepare leave the port, follow instructions issued by the Contracting Government, follow the Contingency Response Plan in Appendix 8, for: Hijack Bomb Threat Unidentified Object/Explosive on Shipboard Bomb Threat/Damage and Destruction to Port Facility Pirate Stowaway

15.3 Evacuation Procedure in Security Threats and Breach of Security General Instruction The final decision to abandon ship should be made by the master when he believed that this action was imminent after every effort to save the ship had exhausted. Many seamen returned back to ship safely after once abandoned. The master should verify that every measure to save the ship had been taken before abandoning. Nobody should abandon ship until clear instruction is given by the master. It is important to keep the order, accomplish ones duty and maintain perfect control. At Sea Everybody should follow the Muster List for abandon ship.

In Port Everybody should assemble in a place designated, and follow instruction given by PFSO. When there is no such instruction, everybody should take such action considered necessary to minimize damage to human life, properties and environment. For the details of the evacuation route, refer to Appendix 6

15.4 Reporting Procedure of Security Incident When a security incident occurred, SSO should report this incident to the Administration, Contracting Government in which port facility the ship is located and CSO, using a Form specified in Appendix 8.

Section 16 Audit and Ship Security Plan amendment


16.1 Audit An internal audit of the ship should be conducted at least once a year. If Practicable this audit should be made at the same time when as SMS audit is conducted. CSO should nominate an auditor for the internal audit. The auditor should be independent of the duties to be audited.

1. The CSO will organize and conduct an annual security audit of the vessel. 2. Results of the audit will be forwarded to the company and retained for a period of 5 years together with the corrective measures implemented, where any deficiencies found. 3. The audit will be covering all the contents of the SSP and all reports of the SSO for deficiencies and reviews. 4. An immediate audit is also to be conducted if there is any significant security breach, initially concentrating on the reasons for the security breach. 5. The Ship Security Plan to be reviewed by the Company Security Officer (CSO) annually to ensure its continued effectiveness as a result of deficiencies found during audits, drill, exercises and/or security incidents. 6. Major deficiencies to be immediately reported by the SSO to the CSO together with the proposed corrective actions and progress of the proposal until the correct level security preparedness has been achieved.

16.2 Procedure of Periodical Review and Updating of Plan SSO should perform periodic review of the SSP to verify that the same is effectively responding to the current situations. The master should review the SSP at least once a year, together with SMS. Review of SSP should be made in consideration of necessity for improvement of its continuing effectiveness. The objectives of review are to verify that if it has possibility to improve the current procedures or it is still remaining adequate abreast of the times. Procedure should be revised at instruction of the company, or when new equipment is installed. When SSP is used under security level 2 or 3 or responding to the training, all personnel participated in the event should report to SSO of their comments about details and effectiveness of SSP. With regard to the element of the plan for which amendment need be approved by the Administration, the instruction of the Administration should be followed.

Section 17

Ship Security Assessment Report

Ship Security Plan

Ship Security Assessment Report Section 17

Report for Ship Security Assessment


This report shall be protected from unauthorized access or disclosure, and shall be retained by the company. Ships particular Ships name: Flag: Port of registry: Official number: Call sign: IMO number: Gross tonnage: Date of SSA conducted: Date of On-scene security survey conducted: Place of On-scene security survey conducted: From: From: To: To: Conducted by: Ships type: Working language: Crew nationality: Regular service area, if any: Regular ports of call, if any: Class: Class number: Conducted by:

Where the SSA has been conducted by other than the CSO; Name of CSO in charge: Date of SSA reviewed and accepted by CSO: Signature of CSO:

Sec. 17 - Page 1/20

Ship Security Plan

Ship Security Assessment Report Section 17

Summary of Ship Security Assessment


1st Stage Identification of possible threat motives and potential security risks for the ship (A/8.4.3, B/8.2) Identification & evaluation of key shipboard operations that is important to protect (A/8.4.1, A/8.4.2, B/8.3, B/8.6, B/8,7, B/8.8) Identification of possible threat scenario to key shipboard operations and assess the likelihood of those occurrences (A/8.4.3, B/8.9, b/8.10)

2nd Stage

3rd Stage 5th Stage

4th Stage

On-scene Security Survey (A/8.4.4, B/8.5, B/8.14)

Security Assessment has been conducted based on the following elements Elements
1. Navigational area 2. Ships location 3. Navigational speed 4. Cargo 5. Freeboard

Scenario considered
In port Pirates affected areas Drifting Explosives Less than 5 m Passing straight
( )

Passing channel
( )

Passing coastal
( )

Ocean going (

Civil war areas Less than 12 knots Dangerous goods 5 to 10 m

No special remark areas Over 12 knots Radioactive substances Over 10 m No special remark
cargo

Ship Security Plan

Sec. 17-Page 2/20 Ship Security Assessment Report Section 17

Where the SSA has been conducted by the CSO, has the CSO obtained the following background information? Or where the SSA has been conducted by other than the CSO, has the person who conducted the SSA received the following background information from the CSO? Yes No Background Information
1. 2. 3. 4. 5. 6. 7. 8. 9. the general layout of the ship GENERAL ARRANGEMENT PLAN

the location of areas which should have restricted access, such as navigation bridge, machinery spaces of category A and other control stations as defined in SOLAS chapter II-2, etc. GANGWAY. MOORING LINES, CHAIN HAWSE PIPE, SHIP SIDES, CARGO the location and function of each actual or potential access point to the ship CRANES & PROVISION CRANE changes in the tide which may have an impact on the vulnerability or security of the ship the cargo spaces and stowage arrangements the locations where the ships stores and essential maintenance equipment is stored the locations where unaccompanied baggage is stored the emergency and stand-by equipment available to maintain essential services the number of ships personnel, any existing security duties and any existing training requirement practices of the Company

10. existing security and safety equipment for the protection of passengers and ships personnel 11. escape and evacuation routes and assembly stations which have to be maintained to ensure the orderly and safe emergency evacuation of the ship 12. existing agreements with private security companies providing ship/waterside security services (WILL ENTER INTO A CONTRACT IN TIME WHEN NECESSARY) Existing security measures and procedures in effect, including inspection and, control procedures, identification systems, surveillance and monitoring equipment, 13. personnel identification documents and communication, alarms, lighting, access control and other appropriate systems.

Sec. 17-Page 3/20

Ship Security Plan


Has the person who conducted the SSA considered the following items? Yes No Item that is important to protect

Ship Security Assessment Report Section 17


Yes


No

1. 2. 3. 4. 5. 6. 7.

the ships personnel passengers, visitors, vendors, repair technicians, port facility personnel the capacity to maintain safe navigation and emergency response the cargo, particularly dangerous goods or hazardous substances the ships stores the ship security communication equipment and systems, if any the ships security surveillance equipment and systems, if any

(PLAN TO INSTALL CCTV AFTER DELIVERY)

Possible Vulnerabilities
8. 9. conflict between safety and security measures conflicts between shipboard duties and security assignments


Yes


No

10. watch-keeping duties, number of ships personnel, particularly with implications on crew fatigue, alertness and performance 11. any identified security training deficiencies 12. any security equipment and systems, including communication systems

Special consideration
13. particular consideration which is given to the convenience, comfort and personal privacy of the ships personnel and their ability to maintain their effectiveness over long periods

Sec. 17-Page 4/20

Ship Security Plan

Ship Security Assessment Report Section 17


Likelihood Probable

1st stage:

Identification of possible threat motives and potential security risks for the ship
Security risks Unlikely Likely Comment

1.
1.1 1.2 1.3

Political motives
Does it exist political (incl. religious, ideological, ethnical, nationalistic) motives related to your ship (flag, owner, crew) or trade (cargo, passengers, trade area or port)? Does your ship trade in an area with unstable political situation? Add other relevant questions: Cargo (e.g. weapon parts, Norwegian whole, nuclear cargo) and trade area/port (Middle East, U.S.) Countries with elections, demonstrations, civil war, riots (West Africa, Middle East)


Sec. 17 - Page 5/20

2.
2.1 2.2 2.3

Symbolic motives
Can your ship be used as a means to harm symbolic constructions on the trade? Does your ship visit a port where international events take place? Can your ship be used as means to harm important environmental areas? Does your ship itself represent or carry a symbolic value? Does the visibility or the profile of your ship, company or brand represent a motive for unlawful acts? Add other relevant questions: Well known buildings, statues, bridges, etc.(Golden gate, Sydney opera, etc.) Exhibitions, sports, political, etc. (Olympic Games, EXPO, WTO meeting, etc.) Areas for tourism, commercial exploitation of nature (fish farming, beaches, coastal cities, etc.) Ship carries special cargo (e.g. weapons), support operations (oil to war actions, equipment to industry projects), represent attitudes at debate (cruise, natural resources, etc.) Because of your policy (exploitation of labour, political attitudes), the operations you are involved (natural resources, weapons, etc.).

2.4

2.5 2.6

3.
3.1 3.2 3.3 3.4

Economical damages
Does your ship carry special cargo? Is it likely that terror related smuggling take place from ports your ship is visiting? Is it likely that your crew can take part in or embrace terror related smuggling? Is your ship trading in an area known for piracy? Plutonium, equipment for mass destruction, etc. Smuggling of people/goods from Africa to Italy. (Intelligence) Ethnical motives and common cause. See annual Piracy Report (ICC)

Ship Security Plan

Ship Security Assessment Report Section 17


Likelihood Unlikely Probable Comment

Security risks

Likely

3.5 3.6

Does your ship, cargo or passengers represent risk for Hijacking? Add other relevant questions:

Valuable ship, cargo and passengers used for threats and bargaining demands.

4.
4.1

Damage to Society/Industry
Can your ship be used to damage important nodal points for trade or commercial activity? Is the trade your ship represents critical to society? Will an unlawful act against your ship or trade harm the state of the industry? Add other relevant questions: Block ports or canal, collide with bridges or offshore installations, etc. Critical equipment to industry projects (e.g. pipelines, offshore installations, etc.), or for industry production (gold, silver, silicates, etc.) Reduced market due to reduced trust (cruise, passenger transport, etc.)

4.2 4.3 4.4

5.
5.1 5.2

Fear & others


Can your ship be used as a means to escalate consequences and thus create fear in the society? Add other relevant questions: Explosion, collision with construction, ammonia discharge, etc. Because of the consequences that result (numerous fatalities of passengers, discharge of radio actives, etc.)

Sec. 17 - Page 6/20

Ship Security Plan

Ship Security Assessment Report Section 17

2nd stage:

Identification & evaluation of key shipboard operations that is important to protect


Criticality Are security measures in place? Yes No Existing measures, procedures, operations, weakness, limitations

Operations with related systems, areas and personnel Low High

1. ACCESS CONTROL Personnel, passengers, visitors, etc.


1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 Access ladders Access gangways Access ramps Access doors, side scuttles, windows and ports Mooring ropes and anchor chains Cranes and hosting gear Access by ships side (freeboard) Equipment and baggage brought onboard Unaccompanied baggage found onboard Add issues you find relevant:

2. RESTRICTED AREAS ON THE SHIP


2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 Navigation bridge Navigational means (radio, radar, GPS, etc.) Machinery spaces, power supplies, steering rooms Control rooms Galley/pantry Ventilation and air conditioning system Spaces with access to potable water tanks, pumps or manifo Hull, ballast tanks Rudder and propeller Add issues you find relevant:

Sec. 17 - Page 7/20

Ship Security Plan


Are security measures in place? Yes No

Ship Security Assessment Report Section 17


Existing measures, procedures, operations, weakness, limitations

Criticality Operations with related systems, areas and personnel Low High

3. CARGO HANDLING
3.1 3.2 3.3 3.4 Cargo access points (hatches, ports, piping) Cargo storage spaces (incl. access points)
Spaces containing dangerous goods or hazardous substances

Cargo handling equipment Add issues you find relevant:

Sec. 17 - Page 8/20

4. SHIP STORES HANDLING


4.1 4.2 4.3 Access points for delivery to ship Storage spaces Access points to storage spaces Add issues you find relevant:

5. SECURITY MONITORING
5.1 5.2 5.3 5.4 5.5 5.6 Lighting Watch-out (voyage) Security guards and deck watches, including patrols Automatic intrusion detection device Surveillance monitoring Security and surveillance equipment spaces Add issues you find relevant:

6. SAFETY OPERATIONS
6.1 6.2 6.3 6.4 Life boats and life belts Alarms, signals and marking Evacuation routes Fire-fighting system Add issues you find relevant:

3rd stage & 5th stage:

Possible threat scenarios

Ship Security Assessment Report Section 17 Identification of possible threat scenario to key shipboard operations and assess the likelihood of those occurrences rd th Relevant Possible Consequences Likelihood 3 stage 5 stage
Yes No
Moderate 1 High 2 Extreme 3 Unlikely 1 Likely 2 Vulnerability score1 Measures for Mitigation2 New vulnerability score3

Ship Security Plan

1. Damage to, or destruction of, the ship (Bombing, arson, sabotage, vandalism)
1. 1 1. 2 1. 3 1. 4 1. 5 2. 1 2. 2 3. 1 3. 2 3. 3
1

Conceal explosives onboard, initiate with timer or remote device Bring explosives onboard, suicidal/high risk action Place explosives in cargo, initiate with timer or remote device Attach explosives to hull, initiate with timer or remote device Open bow, side or stern ports, cargo hatch to sink or capsize Contaminate drinking water, food or air conditioning Contaminate cargo

3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th

3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th

1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6*

2. Tampering with cargo, essential ship equipment or systems or ship's store

3. Unauthorized access or use including presence of stowaways


Stowaways sneaking onboard, concealment in cargo/service or storage spaces (including containers) Boarding ship at port or during voyage as passenger or crew Boarding ship at port or during voyage as pilot, supplier, surveyor, fake castaway

3rd 5th 3rd 5th 3rd 5th

Note Possible consequences x Likelihood = Vulnerability score Note After verifying the effectiveness of the measures for mitigation at the On-scene security survey, new vulnerability score is to be re-evaluated as 5th stage

Note

A measure must be established for the cases where vulnerability score 4 and above (*: to be deleted as appropriate) 1: Access Control 2: Restricted Area 3: Cargo Handling 4: Ships Store Delivery 5: Unaccompanied Baggage Handling 6: Security Monitoring

Sec. 17 Page 9/20

Ship Security Plan

Ship Security Assessment Report Section 17


Likelihood
Unlikely 1 Likely 2

3rd stage & 5th stage:

Identification of possible threat scenario to key shipboard operations and assess the likelihood of those occurrences
Relevant Possible Consequences
Moderate 1 High 2 Extreme 3

Possible threat scenarios


Yes No

3 stage
Vulnerability score1 Measures for Mitigation2

rd

th

stage

New vulnerability score3

4. Smuggling weapon or equipment, including weapons of mass destruction Conceal weapons/equipment in cargo/service or 4.1 storage spaces (including containers) 4.2 4.3 4.4 Conceal weapon/equipment in crews' luggage Conceal weapons/equipment in passengers' luggage Conceal weapons/equipment in ship supplies

3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th

3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th 3rd 5th

1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6* 1* /2* /3* 4* /5* /6*

5.Use of the ship itself as weapon or as a means to cause damage or destruction 5.1 5.2 5.3 5.4 Crew take control over ship Passengers take control Stowaways/boarded person take control Damage or immobilize critical systems like propulsion, steering etc. in a critical position (near terminal etc.) Take control over ship and hit another ship Take control over ship and hit a land based construction / terminal / chemical plant or similar Take control over ship and hit an offshore installation Take control over ship and hit a rock / provoke grounding

5.5 5.6 5.7 5.8

6. Attacks from seaward 6.1 Pirates/Terrorists take control over ship

3rd 5th

3rd 5th

Ship Security Plan 4th stage: On-scene Security Survey


Checklist for Initial On-scene Security Survey

Ship Security Assessment Report Section 17


Observation (including possible vulnerabilities) Countermeasures to be taken

Yes

No

1.
1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 1.13

ACCESS TO THE SHIP


Does the SSP contain security measures covering the access to the ship? Are access ladders identified and monitored? Are access gangways identified and monitored? Are access ramps identified and monitored? Are access doors, side scuttles, windows, hatches and ports identified and monitored? Are mooring ropes and anchor chains identified and monitored? Are cranes and hoisting gear identified and monitored? Are other access points identified in the SSP? Are identity documents of all persons seeking to board the ship checked? Are there procedures and records available for how to check this? Are the reasons for the people boarding the ship confirmed by checking joining instructions, passenger tickets, boarding passes, work orders etc.? Are the personal effects of passengers controlled? Is the embarkation of crew controlled?

Sec.17 Page 11/20

Ship Security Plan

Ship Security Assessment Report Section 17 Observation (including possible vulnerabilities) Countermeasures to be taken

Checklist for Initial On-scene Security Survey


1.14 1.15 1.16 1.17 1.18 1.19 1.20 1.21 1.22 1.23 1.24 1.25 Are the personal effects of crew controlled? Are there procedures on how to check any other people accessing the ship (e.g. visitors, vendors, repair technicians, port facility personnel etc.) Are designated secure areas established (in coordination with the port facility) where inspections and searching of people, baggage (including carry on items), personal effects, vehicles and their contents can take place? Are vehicles destined to be loaded on board car carriers, ro-ro and other passenger ships searched prior to loading in accordance with the frequency required in the SSP? Are checked persons and their personal effects segregated from unchecked persons and their personal effects? Is the embarking segregated from the disembarking passengers? Are unattended spaces adjoining areas to which passengers and visitors have access secured, by locking or other means? Are security briefings provided to all ship personnel on possible threats, the procedures for reporting suspicious persons, objects or activities and the need for vigilance? Are there procedures for how to raise alarm and to react if unauthorized boarding is detected? Are there procedures for checking with PFSO if identity and purpose checks of people have been performed prior to entering the ship/port interface? Are there procedures for additional measures to take while in port (of another Contracting Government)? Is the ship embarking persons or loading stores or cargo at a port facility or from another ship where either the port facility or the other ship is in violation with or is not required to comply with chapter XI-2 or Part A. Will the ship receive people, stores or cargo unloaded from an aircraft of unknown security status? Are locations and functions of each actual or potential access point to the ship identified? Are evacuation routes and assembly stations defined and maintained?

Yes

No

1.26 1.27 1.28

Sec.17 Page 12/20

Ship Security Plan

Ship Security Assessment Report Section 17

Observation (including possible vulnerabilities) ACCESS TO THE SHIP - RECOMMENDED ADDITIONAL MEASURES FOR SECURITY LEVEL 2

Checklist for Initial On-scene Security Survey

Yes

No

Countermeasures to be taken

1.2.1 1.2.2 1.2.3 1.2.4 1.2.5 1.2.6 1.2.7

Are additional personnel assigned to patrol deck areas during silent hours to deter unauthorized access? Is the number of access points to the ship limited, identifying those to be closed and the means of adequately securing them? Is the access to the ship deterred, including the provision of boat patrols on the waterside of the ship? Is the shore-side of the ship established as a restricted area, in close co-operation with the port facility? Are the frequency and detail of searches of people, personal effects, and vehicles increased? Are visitors to the ship being escorted? Are additional specific security briefings provided to all ship personnel on any identified threats, in order to re-emphasize the procedures for reporting suspicious persons, objects, or activities and stressing the need for increased vigilance?

ACCESS TO THE SHIP - RECOMMENDED ADDITIONAL MEASURES FOR SECURITY LEVEL 3


1.3.1 1.3.2 1.3.3 1.3.4 1.3.5 1.3.6 1.3.7 1.3.8 At security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Is the access to the ship limited to a single, controlled, access point? Are only those responding to the security incident or threat thereof granted access? Have persons on board received directions? Is embarkation or disembarkation suspended? Are cargo handling operations, deliveries etc. suspended? Is evacuation of the ship planned for? Is the movement of the ship reconsidered or terminated?

Sec.17 Page 13/20

Ship Security Plan

Yes
Checklist for Initial On-scene Security Survey 2.
2.1 2.2 2.3 2.4 . 2.5 2.6 2.7 2.8 2.9 2.10 2.11 2.12 2.13 2.14 2.15 2.16

No

Observation (including possible vulnerabilities)

Ship Security Assessment Report Section 17 Countermeasures to be taken

RESTRICTED AREAS
Are restricted areas defined, and, where relevant, clearly marked? Is the ships personnel (Master, SSO, crew) able to identify the restricted areas onboard? Is surveillance equipment, e.g., security alarms, used to monitor the restricted areas? Are guards or patrols used to monitor the restricted areas? Are automatic intrusion detection devices used to alert the ships personnel of unauthorized access? Are there measures to prevent unauthorized persons to access the navigational bridge? Are there measures onboard to prevent unauthorized persons to access the machinery spaces (Category A)? Are there measures onboard to prevent unauthorized persons to access the control stations (defined in ISPS Code, SOLAS Chapter II-2)? Are there measures onboard to prevent unauthorized persons to access spaces containing security and surveillance equipment and systems and their controls and lighting system controls? Are there measures onboard to prevent unauthorized persons to access ventilation and airconditioning systems and other similar spaces? Are there measures onboard to prevent unauthorized persons to access spaces with access to potable water tanks, pumps, or manifolds? Are there measures onboard to prevent unauthorized persons to access spaces containing dangerous goods or hazardous substances? Are there measures onboard to prevent unauthorized persons to access spaces containing cargo pumps and their controls? Are there measures onboard to prevent unauthorized persons to access cargo spaces and spaces containing ships stores? Are there measures onboard to prevent unauthorized persons to access crew accommodation? Are there measures onboard to prevent unauthorized persons to access any other areas as determined by the CSO, through the SSA to which access must be restricted to maintain the security of the ship?

Sec.17 Page 14/20

Ship Security Plan Observation (including possible vulnerabilities)

Ship Security Assessment Report Section 17 Countermeasures to be taken

Checklist for Initial On-scene Security Survey

Yes No

RESTRICTED AREAS - RECOMMENDED ADDITIONAL MEASURES FOR SECURITY LEVEL 2


2.2.1 2.2.2 2.2.3 Are additional restricted areas particularly adjacent to access points identified and monitored? Are surveillance equipment continuously monitored? Are additional personnel dedicated to guard and patrol restricted areas?

RESTRICTED AREAS RECOMMENDED ADDITIONAL MEASURES FOR SECURITY LEVEL 3


. 2.3.1 2.3.2 2.3.3 At security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Are additional restricted areas on the ship set up in proximity to the security incident, or the believed location of the security threat, to which access is denied? Are restricted areas searched as part of the search of the ship?

2.
3.1 3.2 3.3 3.4 3.5 3.6 3.7

HANDLING OF CARGO
Are there routines in place for checking of cargo, cargo transport units and cargo spaces prior to, and during, cargo handling operations? Is there evidence, through records, that the procedures (cargo control) are followed? Is the handling of cargo supervised by the ship personnel (SSO)? Are there procedures for handling of dangerous goods or hazardous substances? Is an updated inventory kept on any dangerous goods or hazardous material carried on board? Are any checks carried out (procedures for) to ensure that cargo being loaded matches the cargo documentation? Is the procedures for cargo checking communicated to PFSO?

Sec.17 Page 15/20

Ship Security Plan

Ship Security Assessment Report Section 17 Observation (including possible vulnerabilities) Countermeasures to be taken

Checklist for Initial On-scene Security Survey


2.2.1 Are there procedures ensuring, in liaison with the port facility, that vehicles to be loaded on board car-carriers, ro-ro and passenger ships are subjected to search prior to loading, in accordance with the frequency required in the SSP? Is checking of seals or other methods used to prevent tampering? Is cargo being checked visually or by examinations? 2.2.3 . 2.3.1 Is scanning or detection equipment, mechanical devices or dogs being used?

Yes

No

2.2.2

3-2 HANDLING OF CARGO RECOMMENDED MEASURES FOR SECURITY LEVEL 2


3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 3.2.6 3.2.7 Are more detailed checking of cargo, cargo transport units, and cargo spaces performed? Are records on the same kept onboard? Are checks intensified to ensure that only the intended cargo is loaded? Is the searching of vehicles to be loaded on car-carriers, ro-ro and passenger ships intensified? Is the frequency increased in checking of seals or other methods used to prevent tampering? Is cargo being checked with increased frequency and detail of visual and physical examination? Is the frequency of the use of scanning/detection equipment, mechanical devices, or dogs increased? Are enhanced security measures coordinated with the shipper or other responsible party in addition to establishing agreement and procedures?

3.3 HANDLING OF CARGO RECOMMENDED MEASURES FOR SECURITY LEVEL 3


3.3.1 3.3.2 3.3.3 At security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Is the loading or unloading of cargo suspended? Is the inventory of dangerous goods and hazardous substances carried on board verified?

Sec.17 Page 16/20

Ship Security Plan

Ship Security Assessment Report Section 17

Checklist for Initial On-scene Security Survey 4.


4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8

Yes

No

Observation (including possible vulnerabilities)

Countermeasures to be taken

SHIPS STORES
Are there procedures in place for supervision of the delivery of ship stores (to prevent acceptance without inspection)? Are there procedures for handling of ships stores to prevent acceptance unless ordered? Is there evidence, through records, that the procedures (ships store control) are followed? Is an updated inventory on any dangerous goods or hazardous material carried on board? Is ships stores and package integrity being checked? For ships regularly using the port facility; are procedures established with the port facility to cover notification and timing of deliveries and their documentation? Are stores checked if matching the order prior to being loaded on board? Is immediate secure stowage of ships stores ensured?

4-2. SHIPS STORE RECOMMENDED ADDITIONAL MEASURES FOR SECURITY LEVEL 2


4.2.1 Are checks exercised prior to receiving stores on board and intensifying inspections?

4-3. SHIPS STORE RECOMMENDED ADDITIONAL MEASURES FOR SECURITY LEVEL 3


4..3.1 At security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Are ships stores more extensively being checked? Is the handling of ships stores restricted or suspended? Does the ship refuse to accept new deliveries of ships stores on board the ship?

4.3.2 . 4.3.3 4.3.4

Sec.17 Page 17/20

Ship Security Plan

Ship Security Assessment Report Section 17

Checklist for Initial On-scene Security Survey 5.


5.1 5.2 5.3 5.4

Yes

No

Observation (including possible vulnerabilities)

Countermeasures to be taken

UNACCOMPANIED BAGGAGE
Are there procedures in place for how to handle and where to store unaccompanied baggage? Is there evidence the procedures are followed? Is any unaccompanied baggage being appropriately screened (100%) and searched (by port or ship), before it is loaded onboard the ship? Are there procedures and measures in place for close cooperation with the port facility to ensure that unaccompanied baggage is handled securely after screening? Is 100% of unaccompanied baggage being x-ray screened?

UNACCOMPANIED BAGGAGE - RECOMMENDED ADDITIONAL MEASURES FOR SECURITY LEVEL 2


5.2.1

UNACCOMPANIED BAGGAGE - RECOMMENDED ADDITIONAL MEASURES FOR SECURITY LEVEL 3


5.3.1 5.3.2 5.3.3 5.3.4 At security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Are such baggage subjecting to more extensive screening, for example x-raying it from at least two different angles? Is the handling of unaccompanied baggage restricted or suspended? Is the ship refusing to accept unaccompanied baggage on board?

6.
6.1 6.2 6.3 6.4 6.5 6.6

MONITORING THE SECURITY OF THE SHIP


Are there procedures for inspection, testing, calibration and maintenance of any security equipment onboard? Are restricted areas being monitored? Are deck areas being monitored? Are surrounding areas being monitored? Is the security communication equipment readily available? Is security information readily available onboard?

Sec.17 Page 18/20

Ship Security Plan

Ship Security Assessment Report Section 17 Observation (including possible vulnerabilities) Countermeasures to be taken

Checklist for Initial On-scene Security Survey

Yes No

6.7 6.8 6.9 6.10 6.11 6.12 6.13 6.14 6.15 6.16 6.2.1 6.2.2 6.2.3 6.2.4 6.2.5

Is an automatic intrusion detection device fitted onboard? If so, does it activate an audible and/or visual alarm at a location that is continuously attended or monitored? Is security equipment installed onboard maintained, working properly, and readily available? Are procedures established to ensure that monitoring equipment will be able to perform continuously, including consideration of the possible effects of weather conditions or of power disruptions? Are the ship's deck and access points illuminated at all times while conducting ship/port interface activities or at a port facility or anchorage? Is the ship using the maximum lighting available while underway, consistent with safe navigation? (Having regard to the provisions of the 1972 COLREGS) Is the lighting sufficient to ensure the ships personnel to be able to detect activities beyond the ship, on both the shore side and the waterside? Is the lighting coverage including the area on and around the ship? Is the lighting coverage facilitating personnel identification at access points? Is the lighting coverage provided through coordination with the port facility? Is the frequency and detail of security patrols increased? Is the coverage and intensity of lighting increased? Is the use of security and surveillance equipment increased? Is additional personnel assigned as security lookouts? Is coordination with waterside boat patrols, and foot or vehicle patrols on the shoreside, ensured when provided?

MONITORING THE SECURITY OF THE SHIP RECOMMENDED MEASURES FOR SECURITY LEVEL 2

Sec.17 Page 19/20

Ship Security Plan

Ship Security Assessment Report Section 17 Countermeasures to be taken

Observation (including possible vulnerabilities) MONITORING THE SECURITY OF THE SHIP RECOMMENDED MEASURES FOR SECURITY LEVEL 3

Checklist for Initial On-scene Security Survey

Yes No

6.3.1 6.3.2 6.3.3 6.3.4 6.3.5 6.3.6 6.3.7

At security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Are all lighting switched on? Is the vicinity of the ship illuminated? Are all on board surveillance equipment capable of recording activities on, or in the vicinity of, the ship? Is the length of time such surveillance equipment can continue to record maximized? Is underwater inspection of the hull of the ship prepared for? Are measures initiated, including the slow revolution of the ships propellers, if practicable, to deter underwater access to the hull of the ship?

7.
7.1 7.2 7.3 7.4 7.5 7.6 7.7

OTHER
Is the ship fitted with a security alert system? Is the security alert system working as intended? (Not raising alarm on board, transmitting information to shore?) Are there at least 2 locations onboard where the alert system could be activated (on the bridge and at least one other location)? Is the alert system protected from inadvertent initiation? Are there procedures for the use of the ship security alert system? Are the locations for the activation of the alert system identified? (Must be kept in a restricted/confidential document) Is there any area that may, if damaged or used for illicit observation, pose a risk to persons, property, or operation onboard the ship, at this port facility?

Sec.17 Page 20/20

APPENDIX

Appendix 1: Company Security Officer


The Company security officer in charge of this ship is given hereunder

Name

Title (in case he has other duties)

COMPANY AUDITOR/TRAINOR

Contact points (Phone number during office hours): (Home - outside office hours) (632)

(63)-2

(Mobile phone)

(63)

(FAX number)

(632)

(E-mail)

com

Date of assignment

Appendix 2: Ship Security Officer Appointed Ship Security Officer of the Vessel: Period Rank Name Signature of the Master

Appendix 3: Security level

Duties and Responsibilities Name of the Port

Duties Monitoring access to ship

Hours 0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs

Person in Charge Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C Duty Officer /Able Seaman A Duty Officer/ Able Seaman B Duty Officer/ Able Seaman C

Control Visitors and Baggage

0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs

Monitoring restricted area

0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs 0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs 0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs

Monitoring Deck area and the vicinity of the ship Monitoring cargo

Monitoring delivery of ship's store

0000-0400 & 1200-1600 hrs 0400-0800 & 1600-2000 hrs 0800-1200 & 2000-2400 hrs

Appendix 4: Security at each Security Level


TEAM Commanding team RANK Master Duty Officer Duty AB OS On Deck Search and Securing C/Officer 2nd Engineer Bosun AB OS NAME SECURITY LEVEL l In command Bridge Watch Look-out Additional Look-out Watchkeeping & monitoring Watchkeeping Locking & Securing Watchkeeping & assist Assist DUTIES AT SEA SECURITY LEVEL ll In command Bridge Watch Look-out Additional Look-out SSO - planning & monitoring Assist as directed by SSO Securing - Double watch Assist - Double watch Assist - Double watch SECURITY LEVEL lll In command Communication Bridge watch - coordinator Look-out & securing Bridge Messenger SSO - planning & monitoring Secure Poop Deck / Steering Secure Forecastle store Secure other Stores on deck Assist Bosun on deck SECURITY LEVEL I In command Port Watch Port Watch Double Watch, if necessary Monitoring / Coordination Port Watch Stand-by for instruction Port Watch DUTIES IN PORT SECURITY LEVEL II In command Port Watch monitoring Port Watch Double Watch Planning & monitoring Port Watch In -charge of securing on deck Port Watch Double Watch CARRYING SECURITY LEVEL III In command communication Port Watch - cargo monitoring Roving on deck Attend gangway / visitors Coordinate with PFSO/authority Secure steering room Secure forecastle and store Secure Deck machinery Secure other Deck store Radio Radio / torch torch torch Radio / torch Torch / tools Torch / tools Torch / tools Torch / tools

Inside Search and Securing

Deck Officer 1st Engineer AB Olr Wpr

Watchkeeping & monitoring Watchkeeping Watchkeeping & assist Watchkeeping & assist Assist

Securing - Watchkeeping Assist as directed by SSO Watchkeeping & assist Watchkeeping & assist Assist - Double watch

Team Leader - secure Life boats Secure Emer. Gen / Battery Rm. Secure Captain's Deck Secure Boat Deck Secure Upper Deck

Port Watch Port Watch Port Watch Port Watch Stand-by for instruction

Port Watch Port Watch Port Watch Port Watch Entrance doors securing

Secure Bridge Nav. Equipment Secure Emer. Gen/Battery rm. Secure inside accommodation Secure inside accommodation Secure inside accommodation

Radio / torch torch / tools torch / tools torch / tools torch / tools

Engine team

C/Engineer 3rd Engineer Olr # 1 Olr

In-charge in Engine room Wacthkeeping & monitoring Locking & securing Watchkeeping & assist

In-charge of securing in E/R Assist as directed by C/E Watchkeeping & assist Watchkeeping & assist

Team Leader - secure E/R Assist as directed by C/E Assist as directed by C/E Assist as directed by C/E

Monitoring / Coordination Port Watch Port Watch Port Watch

In-charge of securing in E/R Port Watch Port Watch Port Watch

Supervision at Engine room Secure Engine Room Secure Engine Room Secure Engine Room

Radio / torch torch /tools torch /tools torch /tools

Catering team

C/Cook Messman

Galley duty / monitoring Galley duty / monitoring

Securing - Double watch Securing - Double watch

Secure galley & Provision Rm. Secure galley & Provision Rm.

Galley duty monitoring Galley duty monitoring

Secure galley & Provision Rm. Assist C/Cook

Secure galley & Provision Rm. Assist C/Cook

torch / tools torch / tools

Appendix 5: Declaration of Security Declaration of Security


Name of Ship: Port of Registry: IMO Number: Name of Port Facility:

This Declaration of Security is valid from.......... until................., for the following activities under the following security levels.

(list the activities with relevant details)

Security level(s) for the ship: Security level(s) for the port facility:

The port facility and ship agree to the following security measures and responsibilities to ensure compliance with the requirements of Part A of the International Code for the Security of Ships and of Port Facilities.
The affixing of the initials of the SSO or PFSO under these columns indicates that the activity will be done, in accordance with relevant approved plan Activity Ensuring the performance of all security duties Monitoring restricted areas to ensure that only authorized personnel have access Controlling access to the port facility Controlling access to the ship Monitoring of the port facility, including berthing areas and areas surrounding the ship Monitoring of the ship, including berthing areas and areas surrounding the ship Handling of cargo Port facility: The Ship:

Delivery of ships stores Handling unaccompanied baggage Controlling the embarkation of persons and their effects Ensuring that security communication is readily available between the ship and port facility

The signatories to this agreement certify that security measures and arrangements for both the port facility and the ship during the specified activities meet the provisions of chapter XI-2 and Part A of Code that will be implemented in accordance with the provisions already stipulated in their approved plan or the specific arrangements agreed to and set out in the attached annex. Dated at On the

Signature The port facility:


(Signature of Port Facility Security Officer)

The ship:
(Signature of Master or Ship Security Officer)

Name and title of person who signed Name: Title: Name: Title:

Contact Details (to be completed as appropriate) (indicate the telephone numbers or the radio channels or frequencies to be used) For the port facility: For the ship:

Port Facility Port facility Security officer

Master Ship Security Officer Company Company Security Officer

Ship Security Plan Contingency Plan Appendix 8

Appendix 8: Contingency Plan

A. Response to hijack cases


1. Action to follow when ship is hijacked Behave as follows when hijackers or terrorists came on board the ship. a) Keep calm and advise all officers and members of crew to keep calm. Do not try to resist armed terrorists unless as a last resort in a clear life threatening situation. b) Ensure the safety of the ship. c) Activate the ship security alert system. d) (when ship is not fitted with the ship security alert system) Broadcast a distress message, if possible. Procedures to transmit alert signal to shore authority or to the company under distress or threatened situation should be prepared beforehand. e) Offer reasonable co-operation. Terrorists are very nervous and aggressive at the incident. Calm behavior of the master and officers may mitigate the strain of terrorists. f) There is danger that a terrorist gets excited. Among the terrorist there exists who has abnormal character, and seeking an excuse for murder. This excuse is intentionally built up by misunderstanding. Abuse of a special privilege or aggression should not be returned. g) Hijackers are unlikely to understand how a particular ship works, its capabilities and limitations and may be suspicious about routine operations. They need be relieved through trust of ships personnel who respond without deception. h) Try to establish what group of terrorists is involved as early as possible. i) Try to increase the number of access points to the vessel, without risk. j) Without suggesting what they may be, seek to establish the hijackers demands and what deadlines have been set for meeting them. k) Assume that the incident will be prolonged. The longer incident drags on, the more likely they are to end without injury to the hostages. Recognize that hostages will feel isolated during the incident, as they will be unaware of steps being taken by the company and/or government authorities on their behalf. This can lead to antagonism against the authorities and sympathy for the terrorists. Every effort will be being made to end the incident with the utmost emphasis on the preservation of life and personal safety of all innocent parties involved. m) Understand that establishment of a reasonable rapport between hostages and captors are likely to reduce the chances of the terrorists acting violently against their hostages. l) n) Be aware that at some stage in the incident a confrontation between the terrorists and outside authorities may occur. Before this confrontation, an opportunity may arise or may be created to pass information about the hijackers, such as their number, descriptions, sex, how they are armed, how they deploy themselves, how they communicate with each other, their cause, nationality, language(s) spoken and understand, their standard of competence and their level of vigilance, and whether any of the hostages have been separately identified as to nationality, religion or occupation (e.g. forces personnel).

Appendix 8 - Page 1/7

Ship Security Plan Contingency Plan Appendix 8

o) Wherever and whenever possible, the hijackers should be encouraged to surrender peacefully and should be discouraged from mistreating either passengers or crew. 2. In the event or in anticipation of military action: a) Do not react to strangely dressed newcomers. b) Do not attract attention to any unusual activity. c) If shooting, or the loud command GET DOWN, is heard immediately lie face down, cover ears, close eyes and slightly open mouth. Do not move until an all clear is given. d) If the loud command STAND STILL is heard then freeze immediately. e) If the location of terrorist bombs or weapons is known, inform a member of the military assault force as soon as possible. f) Do not shelter or hide terrorists g) Do not take photographs of the military assault force. Note that the assault team may treat all people on board, including hostage, as terrorists at the initial stage. For this reason, crewmembers may be handcuffed. It is their standard procedures to ensure the arrest of all hijackers and safety/security of the scene. Following the incident, the master and his crew should avoid talking to the press and other media persons about the methods used to resolve the incidents.

B. Bomb threat (Intimidation)


1. Initial Action When there is threatening of bomb, a person who received telephonic menace shall ask the following questions. When does the bomb explode? Where is the bomb? What shape does it have? What type of bomb? What measure causes it to explode? Have you placed the bomb? By what reason? Where are you calling from? Where is your address? What is your name? Take notes of characteristics of voice you heard calm slow crying stammer deep loud

obscure smattering

Appendix 8 - Page 2/7

Ship Security Plan Contingency Plan Appendix 8

(broken) giggle stressed disguised

accent nasal voice sincere

angry fast exiting with a slip screaming normal

Have you ever heard of the voice, or it resembles somebody? Have you heard a background noise? Take note of the wording spoken correctly When ship is in port, report this telephone to the shore authority. (harbor master, police, fire fighter, etc.) Report this telephone to the company immediately.

2. Subsequent action
Activate the ship security alert system Ring emergency bell. All members of crew stand on emergency station. Organize the search group, and explain them on the bomb threat. Fire hoses set at fire station, and prepare for emergency measure against hull damage. Prepare the unloading plan Prepare the stability calculation

C. Unidentified Object/Explosive on Shipboard


1. Initial Action Activate the ship security alert system, and report to company and agent of nearest port about the description and others of the object accurately appearance, size, color, fittings location found on shipboard Do not put it in water or spray water on it as this could short a control circuit and denote it Do not run in the vicinity of the device Do not use VHF/UHF radios in the vicinity, within 3 m, of the device. Do not handle, touch, shake, open or move suspected explosives or suspected devices. Do not cut, pull or touch wires, switches, fuses or fastenings. Do not step on fuses. Do not pass metallic tools near the suspected device Do not move switches, open hooks or fastenings. Do not smoke nearby. Do not get too near the device to inspect. Do not move the device away from people move people away from the device. Do not come close to the device. 2. Subsequent Action Put sandbags or mattress around the suspected device.

Appendix 8 - Page 3/7

Ship Security Plan Contingency Plan Appendix 8

Clear neighborhood including above and below of the device. (6 planes) Identify restricted area, and instruct the crew to keep away. Keep the doors and openings open, so as to minimize primary damage. Obey instructions given by the company and shore authorities. 3. If a bomb explodes without warning, onboard or near the ship, the master should, Ensure watertight integrity and stability. Render first aid where/if necessary Take fire-fighting precautions Muster personnel to establish number and names of casualties. Inform company, local authorities (in port), and make distress call (at sea) if necessary. port, be prepared to handle inquiries from press and next-of-kin. D. Bomb Threat/Damage and Destruction to Port Facility Activate the ship security alert system. Issue order to stand on emergency station. Report to the Contracting Government of the port facility. Obey instructions given by personnel responding to the threat (PFSO) Prepare to evacuate from the ship/ prepare departure of ship from the port.

E. Procedure for responding to pirates attack


1. Action when encountered with Attackers/Pirates Blow whistle to alert the crew and other ships. Increase ships speed, and change the course to seaside, if possible. Light up the upper deck and ships side, when appropriate, and hit the light to possible attackers, using searchlight, to dazzle them. If pirates/attackers try to endanger the ship, shoot rocket flares. If intruders try to get onboard using a hook, cut the rope of the hook. Activate the ship security alert system. (when ship is not fitted with this system) Give alert to shore authority and other ships in the vicinity. (When the pirate/armed robbers assaulted the ship, transmit the distress signal using the DSC device. GMDSS of INMARSAT is transmitting the pirate information via INMARSAT-C) 2. Action to take when Attackers/Pirates get on shipboard Once the pirate gets on board, the action to take by the master and crew differs depending on the degree how much the attackers take command of the ship. However, the objectives of the master and crew are: to ensure safety of persons on board with the greatest possible effort; to ensure operation of ship by the member of crew; to ensure leaving of attackers from ship as soon as possible.

Appendix 8 - Page 4/7

Ship Security Plan Contingency Plan Appendix 8

In any case, never expose human life to danger by challenging against violence to protect the properties on board. Evacuate in pre-determined safe place, as appropriate, and ensure that all personnel are staying there. Members of crew should pay effort to stay together. Report the circumstances using radio equipment and seek to get help, if possible. When intruder forbids use of radio, crew should pay attention on their ability to monitor the use of radio equipment. Crew should not stay in between the intruders and their boat. Because this would increase the risk of injury or violence. Priority should be given that the intruders may easily leave off alongside the ship.

As a rule, not try to arrest the attackers. This action works to induce violence. When the ship is hijacked by the intruders, liaise with them, if possible, to take command of ships operation and seek to return hostages. However, in many cases, only one option to ensure safety is to accept the requirement of the attackers. 3. Action to take after assault is over Issue pre-determined signal to announce the finish of assault. Ensure safety of personnel and the ship. Call the roll to confirm all members of crew are on board. Inspect if anyone injured. Report to RCC. Ask for medical advice over radio, if needed. F. Procedures for responding to stowaway cases When a stowaway is found, the master shall immediately inspect this person. In order to identify this person, the ship shall collect as much document as possible pertaining to him such as passport, seamens note, ID card, physical check record, letters, etc. In general, a stowaway denies his possession of document, and uses a false name and false nationality. However, in many cases, the stowaways hold their identity paper in secret, near the compartment where they were found. Therefore, the ship should perform a systematic search of document. Most important action at finding of stowaway is to report to the company, immediately, of this fact together with all information available. Also report to the authority and agent where the stowaway came onboard, and to the same of next port

Appendix 8 - Page 5/7

Ship Security Plan Contingency Plan Appendix 8

Refrain from raising uproar for the stowaway. But give him a room and meal. During navigation along coastal water and in port, keep him in calm in locked room, and avoid unnecessary contact of crewmember with him, until further instruction is issued. In general, ships deviation just for disembarkation of the stowaway is not permitted in the charter party. He shall be disembarked only after approval of the company. G. Vessel Under Attack and Being Pursued Communication Procedures: In the event that vessel is under attack and being pursued by suspicious ships, Master should consider provided that Navigational Safety allows "Riding Off" Attackers craft by heavy wheel movements as they approach and increase ship's Speed. The effect of the bow wave wash may deter the attackers and stop pursuing the vessel. However, this kind of maneuvers should not be used in congested or confined waters or close inshore or by ship's constrained by their draft in the confined deep water routes, for example in Singapore straits in Malacca straits. Activate the Security Alert System. (When ship is not fitted with system) Give alert to shore authority and other ships in the vicinity, transmit the distress using the DSC device, GMDSS of INMARSAT, E-mail, Handy Phones, etc. Master should established immediate contact by any means to the following:

The Company / CSO: Tel. No.: Fax. No.:

HANGWOO SHIP MANAGEMENT LIMITED Office: E-mail address:

Report to the International Rescue Coordination Contacts (RCC) of each Coastal State. (Pls. refer to SSP / Annex 2 Contact List of Country for Security; and Records of Incidents and Breaches of Security, Pls. refer to SSP / Annex 4) Report to the nearest Maritime Safety Agency / Coast Guard of Coast Radio Stations. (Pls. refer to Emergency Contact List as per SMS Appendix C, and Ship's Message Format on Appendix D) Contracting government and other relevant authorities and likewise as per Sailing Instructions received from the Charterer/Owner.

Appendix 8 - Page 6/7

Ship Security Plan Contingency Plan Appendix 8

H. Crew Insubordination In the event of crew insubordination on board wherein external intervention can be ruled out and under all probability caused by any of the crew on board, the matter is to be reported immediately to the CSO, PFSO, Port Authorities, Manning Company & Administration for proper guidance. The security actions to be taken under the supervision of the Master/SSO in accordance with actions outlined above as applicable. As an additional precautionary measure, subject crew movements should be closely monitored and limited to their areas of work. The Master/SSO should likewise conduct impartial investigation to determine specifically the root cause of such and to report to all concerned, likewise request/recommend immediate repatriation otherwise, shall request assistance to proper authorities if necessary. I. Discovery of Unauthorized Weapon When unauthorized weapon is discovered on board, report immediately to Master/SSO giving detailed location and description. Inform the CSO/PFSO and all relevant parties. Do not touch, do not attempt to cover and isolate the area. Investigate the crew who found the weapon. Follow instructions from Proper Authorities (Experts). Conduct thorough search to other areas of the ship. Intensify checked to all person intend to board vessel and refuse acceptance except to those authorities concerned, who will conduct investigation and disposal, etc.

Appendix 8 - Page 7/7

Ship Security

Appendix 9: Evacuation Route


(To identify evacuation route of the ship)

Restricted Area Appendix 9

Appendix 9 - Page 1/1

Appendix 10: Security Incident Report

Report of Security Incidents


Date of Security Incidents: Ships Name: Port of Destination: Flag: Master: Ship Security Officer:

Other crew or port facility officer related to the incidents:

Description of port area (in case related):

Summary of the incidents or threats:

Name of attacker (if known)

Appendix 1- -Page 1/2

Type of hazardous substance/equipment/used weapon (e.g. Handgun, explosive, knife):

How are the security measures circumvented?

Details of additional related matters:

Appendix 10 Page 2/2

ANNEX

Annex 1:

Company Security Policy


Company Security Policy

The Company has established the Ship Security Plan to detect security threats and take preventive measures against security incident that may affect safety and security of ships under management of our Company, personnel and property on those ships, in accordance with requirements of SOLAS Chapter XI2 and ISPS Code (the International Code for the Security of Ships and Port Facilities). This Ship Security Plan has been approved by the Administration (or by Recognized Security Organization).

The master and all crewmembers should give effect to those requirements stipulated in the Ship Security Plan and should be familiar with their duties. They should also undergo necessary training given by the master or ship security officer designated by the company. On behalf of the Company, the undersigned declares as follows. 3. The master has the overriding authority and responsibility to make an optimum decisions with respect to the security of the ship; 4. The Company should give necessary support to the ship when requested by the company security officer, the master and the ship security officer with respect to the security of the ship.

Date

HANGWOO SHIP MANAGEMENT LIMITED

Chairman

(Signature)

Annex 1 - Page 1/1

Annex 2 : Contact List of Country for Security


The list provided contains contact point, authorities or persons to be contacted in the event that the vessel requires assistance due to Security threat of the crew and the vessel itself depending on which country the vessel at the time of treat. Prior the vessel calls a certain port, the SSO should collect the contact numbers of Authorities or person that could render assistance in any case of threat to vessel's Security. Such numbers should always readily available near the Inmarsat Telephone Station or Mobile phones. This contact numbers, should be updated by getting beforehand information from the ship's agent prior arrival in a certain port. Note: Attached herewith is the compilation of Contact List as per IMO ISPS database

Annex 2 - Page 1/31

Annex 3:

Information on Companys Special Responsibilities given to Master

The master shall provide information contain in this appendix upon the request by duly authorized officer of the government. Name Parties responsible for appointing shipboard personnel HANG WOO SHIP MANAGEMENT LIMITED Contact Details HANG WOO SHIP MANAGEMENT LIMITED

Parties responsible for deciding bareboat charters

Tel. Nos.: Fax Nos.:

Parties responsible for deciding time charterers

Tel Nos.: Fax Nos.:

Parties responsible for deciding time charterers

Annex 4:

Record of Ship Security Plan (SSP)

This record should be kept on board for at least the minimum period specified by the Administration. Also this record should be protected from unauthorized access or disclosure.

Records for security activities (1) Training


Kind of training Date Duration Description of training Attendants Evaluation by SSO

(2) Drills and exercises


Date of occurrence Date Duration Description of drills and exercises Participants Evaluation by SSO

(3) Incidents and breaches of security


Date of occurrence Time of occurrence Location within the port Location within the ship Description Response

(4) Changes in Maritime Security Levels


New Security Level Notified by: Date of notification received Time of notification received Time of compliance with additional requirements

(5) Maintenance, calibration and testing of security equipment


Security equipment Date Time Description

(6) Security threats


Date of occurrence Date Duration Description of drills and exercises Participants Evaluation by SSO

(7) Annual audits


Date Who conducted? Location Record number

(8) Review of security activities


Date Who conducted? Location Record number

(9) Review of Ship Security Assessment


Date Who conducted? Location Record number

(10) Review of Ship Security Plan


Date of revision Review status Date of receipt Date of implementing

Security Levels and special measures taken for last 10 Port calls
Voy. No. Name of Port Arrival Departure Work Security level Port Ship Special measures taken

Security Levels and special measures taken for ship to ship activities during last 10 Port calls
Voy. No. Name of Port Arrival Departure Work Security level Port Ship Special measures taken

HANG WOO SHIP MANAGEMENT LIMITED PLANS FOR EMERGENCY DRILS / EMERGENCY RESPONSE DRILLS AND OTHER ONBOARD TRAINING
SHIPS NAME YEAR : :
FORM INTERVAL JAN FEB MAR

LEGEND: : PLAN : COMPLETED : JOINT EXERCISE (COMPANY / SHIP)


APR MAY JUN JUL AUG SEP OCT NOV DEC

D. SHIP'S SECURITY DRILLS

1. Bomb Threats (in port/at sea). Sabotage and/or Arson ( by crew/others) Free 2. Hijacking or Armed Boarding Free 3. Tampering cargo or Fuel or Ships Stores or Essential Ship Equipment / System Free 4. Unauthorized Access, incl. Presence of Stowaways (territorial/International waters) Free Drills to be carried out every 5. Smuggling of Weapons or related equipment , incl. Weapons of Mass Destruction Free 3 months 6. Use of the Ship to carry those intending to cause a Security incident. Free 7. Use of the Ship as a Weapon or as a means to Cause Damage or Destruction Free 8. Attacks from seaward while at Berth Free 9. Attacks while at Sea Free NOTE: SECURIT DRILLS TO BE CARRIED OUT WITHIN ONE (1) WEEK MORE THAN 25% OF THE CREW WERE CHANGED

E.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.

SHIP SECURITY TRAINING Current Security Threats and Patterns Recognition and Detection of Weapons, Dangerous Substances and Devices Characteristics and Behavioral Patterns of Persons likely to threated Security Techniques used to Circumvent Security Measures Crowd Management and Control Techniques Security related communications Emergency Procedures and Contingency plans in accordance with the SSP Operation of any Security Equipment / Systems onboard Testing, calibration and maintenance of any Security Equipment / Systems onboard Inspection, Control and Monitoring Techniques (access control) Methods of physical search of persons, personal effects, baggage cargo and ships stores

Free Free Free Free Free Free Free Free Free Free Free

Security training to be carried out every 3 months

F. SHIPS SECURITY FAMILIARIZATION


1. 2. 3. 4. 5. Requirement at different Security Levels as Outlined in the SSP. Emergency Procedures and Contingency Plans in accordance with the SSP. Recognition and Detection of Weapons, Dangerous Substances and Devices Characteristics and Behavioral Patterns of Persons likely to threated Security Techniques used to Circumvent Security Measures Free Free Free Free Free Security familiarization to be carried out every 6 months

REMARKS

ABOVE ALL ITEMS WHEN CARRIED OUT TO BE RECORDED IN THE LOG BOOKS

Annex 4 Item No. 2 Drill and Exercises

Annex 5: Inventory of Dangerous Goods and Materials Voy. No. Kinds Quantity Stowage Inspection Date Person in Charge for Inspection

Monthly Communication Log


M.V. For the Period / From to
, 20 Date:

OOW

Time / Date

Msg. Ref. No.

Addressee / Destination

Land or Class Private Ship or Service Station Msg.

E-mail

Telex

Phone

FAX

Coast Station

Land Line

Others

Noted :

Master

Appendix - 11 / Page 1/1

Installation and Operational Manual

INMARSAT-C MOBILE EARTH STATION SHIP SECURITY ALERT OPTION OPERATION MANUAL
7ZPSC0141

Abbreviation
A AC ACK ACSE ADE AOR AORE AORW ALM ANT ASCII Alternative current Acknowledgement Access Control and Signaling Equipment Above Deck Equipment Atlantic Ocean Region Atlantic Ocean Region East Atlantic Ocean Region West Alarm Antenna American Standard Code for Information Interchange

B BB BBER BCD BDE BER BPS BPSK BS BUZZ Bulletin Board Bulletin Board Error Rate Binary Coded Decimal Below Deck Equipment Bit Error rate Bit per Second Binary Phase Shift Keying Back Space Buzzer

C CCC CCIR CCITT CCU CES CNID COMM CPU CR CSDN CUG CW Channel Control Circuit Comite Consultatif International des Radio communications Comite Consultatif International Telegraphique et Telephonique Central Control Unit Coast Earth Station Closed Network Identification Communication Central Processing Unit Carriage Return Circuit Switched Data Network Close User Group Continues Wave

-A1Appendix 12 - Page 2/42

D dB DC DCE DEC DEL DEM DOS DS DTE Decibels Direct Current Data Circuit Terminating Equipment Decoder Circuit Delete Demodulator Circuit Disk Operating System Data Source Data Terminal Equipment

E EDP EEPROM EGC EIA EIRP EME EOF EXT E/W External Data Port Electrically Erasable and Programmable ROM Enhanced Group Call Electronic Industries Association Equivalent Isotropic ally Radiated Power Externally Mounted Equipment End of File External East/West

F FD FDD FED FTU Floppy Disk Floppy Disk Drive Forward Error Correction Frequency Transfer Unit

G GMDSS GPS Global Maritime Distress Safety Devices Global Positioning System

H HPA HTTP HYB High Power Amplifier Hyper Text Transfer Protocol Hybrid

I IA5 International Alphabet number 5

-A2Appendix 12 - Page 3/42

ID IF IFU IHO IME IMO IMN INFO INMARSAT I/O IOR IP IPDS ISDN ISN ISO ISPS ITA ITU JKL LCD LED LES LMSS LNA LSB LT M MES MHS MID MMSI MMSS MOD MPDS MRCC MRSII

Identify Intermediate Frequency Intermediate Frequency Unit International Hydrographic Office Internally Mounted Equipment International Maritime Organization INMARSAT Mobile Number Information International Maritime Satellite organization Input/ Output Indian Ocean Region Internet Protocol INMARSAT Packet Data Service Integrated Service Digital Network INMARSAT Serial Number International Organization for Standard International Ship and Port Facility Security International Telegraph Alphabet International Telecommunication Union

Liquid Crystal Display Light Emitting Diode Land Earth Station Land Mobile Satellite Service Low Noise Amplifier Least Significant Bit Local Time

Mobile Earth Station Message Handling System Maritime Identification Digits Maritime Mobile Service Identity Maritime Mobile Satellite Service Modulator Mobile Packet Data Service Marine Rescue Co-ordination Centres Minimum Request Sequence Initiation Interval

-A3Appendix 12 - Page 4/42

MSB MSI

Most Significant Bit Marine Safety Information

N NAVAREA NAVTEX MF NCS NMEA NSR N/S Navigational Area Navigation Broadcast Service Network Coordination Station National Marine Electronics Association Network Status Record North/South

O OCC O-QPSK OSB OSC INMARSAT Operations Control Centre Offset Quadrature Phase Shift Keying Option Switch Box Oscillator

P PA PC PEP PIN POR PPP PROM PSDN PSPDN PSTN PSU PVT Power Amplifier Personal Computer Packet Error Probability Packet Error Rate Personal Identification Number Pacific Ocean Region Point to Point Protocol Programmable ROM Packet Switched Data Network Public Switched Telephone Network Power Supply Unit Performance Verification Test

Q QPSK Quadrature Phase Shift Keying

R RAM RCC RDB REC Random Access Memory Rescue Coordination Centre Remote Distress Button Receiving Level -A4Appendix 12 - Page 5/42

ROM RX

Read Only Memory Receive/Receiver

S SAR SB SBC SDM SES SFU SOLAS SSAS SSP Search and Rescue Security Button Security Button Controller System Definition Manual Ship Earth Station Store and Forward Unit Safety of Life At Sea Ship Security Alert System Ship Security Plan

T TCP TDM TDMA TX Transmission Control Protocol Time Division Multiplex TDM Access Transmit/Transmitter

U UDP USB UTC User Datagram Protocol Universal Serial Bus Coordinated Universal Time

V VCXO VFDU Voltage Control Crystal Oscillator Voice/FAX/Data Unit

W WMO World Metrological Organization

XYZ

-A5Appendix 12 - Page 6/42

This page is intentionally blank

CONTENTS
Page

1. Summary of Ship Security Alert System 2. Block diagram and installation place example 3. Appearances and Configuration 4. SSAS operation flow 5. Creating security message 5.1Creating security message for TELEX or FAX 5.2Creating Internet e-mail message 6. Setting up the security alert transmission 6.1Setting up sending the security message to the telex terminal on the terrestrial network 6.2Setting up sending the security message to the facsimile on the terrestrial network 6.3Setting up sending the Internet e-mail via Inmarsat service provider 7. Transmitting security alert 8. Security alert transmission test 9. Security button test

E1 E2 E3 E5 E6 E7 E9 E14 E14 E19 E24 E29 E30 E32

1. Summary of Ship Security Alert System


The latest regulations of SOLAS Chapter XI-2 and International Port and Ship Security (ISPS) code require that International voyage passenger ships and cargo ships over 500G/T must be equipped the Ship Security Alert System.

The Ship Security Alert Option connecting to INMARSAT-C JUE-75A or JUE-75C meets the following requirements for Ship Security Alert System. (1) SOLAS Chap. XI-2 Regulation 2 & 6 (2) ISPS code Part A, 9.4.18 (3) IMO MSC Resolution 136(76)/147(77) (4) IMO MSC/Circ. 1072/1073

2. Block diagram and installation place example

3. Appearances and Configurations

4. SSAS operation flow


Open the hinged cover of the security button.

Press the button and then release the button. The security button is latch type button, the button pressed remains pushed in. You can cancel the security alert transmission without transmitting by pressing the security button again within 30 seconds from initial pressing.

The security alert is sent to the address has been preset in. "Schedule Transmission#1"option in "Setup" dialogue box after 30 seconds from initial pressing. If another address has been setup in the Schedule Transmission#2-#5, the security alert transmission will be stared in order of transmitting setting file#2, #3, #4, and #5 at intervals of 12 minutes

The security alert transmission to the address at interval which setup in transmission setup files (Schedule Transmission #1-#5).

To stop the security alert transmission, press the button again.

If the button pushed in at least a security button, the security alert will not stop.

-E5-

Appendix 12 - Page 13/42

5. Creating security message


JUE-75A/C transmits the following message as the security message under initiating security alert transmission. This section describes how to create user message. <Security message transmitted> 1. 2. The message created by user. The message which are provided in JUE-75A/C, The message is transmitted selected depending on transmitting setting file. *MES NO is ship's IMN (Inmarsat Mobile Number 1). Ship's position is registered at transmitting the security alert.

Message Type 1 Selection conditions: a user creating message file as security message is selected with correctly. Message: SECURITY SECURITY MES NO, 123456789 LAT,N1234.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG

Message Type 2 Selection conditions: a user creating message file as security message has not been selected. Message: NO FILE SECURITY SECURITY MES NO, 123456789 LAT,N1234.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG

Message Type 3 Selection conditions: a user creating message file selected as security message is not exist. Message: FILE 0:SSAS MSG.TLX FILE NOT EXIST SECURITY SECURITY MES NO, 123456789 LAT,N1234.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG

Message Type 4 Selection conditions: The communication between DCE and DTE has failed after initiating the security alert transmission. Message: FILE 0;SSAS MSG.TLX NO CONNECTION SECURITY SECURITY MES NO, 123456789 LAT,N1234.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG

-E6Appendix 12 - Page 14/42

5.1Creating security message for TELEX or FAX


Step 1 Step 2 Press <ESC> key until the screen clear. Highlight the "Edit" function from the menu bar by pressing the right/left arrow keys.

Ready

Rec

:Good-15

Msg print Distress

04-07-01

09:00(UTC)

N35.33 E139.50 Course:120deg Speed:10.0kt Transmit read-out Edit call-Log Transmit Read-out Edit

Updates:07-01 00:00 Esc: Main Menu Nes / les-info receive-Mode egC

:To transmit message :To read out received message :To edit a message or to manipulate files

Step 3

Press <Enter> to obtain "Edit" dialogue box.

Edit
edit Telex file edit Ascii file Delete file reName file Copy file Copy to another diskette Initialize Diskette disKcopy

F10: Previous

Step 4

Select the message format type by pressing the up/down arrow keys, and then press <Enter> "edit Telex file" option should be selected for creating Telex message. "edit Ascii file" option should be selected for FAX message or Internet e-mail message.

ATTENTION
In "edit Telex file" mode; 1. The characters which can be used on the land telex line can be input. So, the following characters and the small letters are rejected in the file: ! @ # $ % ^ & * _ { [ ] } : ; " ~ and ' 2. Created telex file is assigned the extension ".TLX" as file name.

Step 5

Type the filename of the message, and then press<enter>, (File names must be 8 characters or less in length)

-E7-

Appendix 12 - Page 15/42

ATTENTION
The following characters can be used for file name.

0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z

Step 6

Enter your message An example of creating message is shown below.

Ready

Rec

:Good-15

Msg print

04-07-01 Update:07-01 Size: 20

09:00(UTC) 00:00 Esc: Main Menu

N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS.TLX Line:1 Column: 1

THIS IS THE SECURITY ALERT MESSAGE. THIS SHIP IS UNDER EMERGENCY. SHIP NAME: JRC MARU MMSI: 431995000 [End of File]

F1: Insert one F6: Transmit

F2: Ins_Line F7: Quit

F3: Block F8: Save As

F4:Del_Word F9:Save & Quit

F5:Del_Line F10:Others

NOTE
1. The following message is automatically added to your message when initiating security alert. SECURITY SECURITY MES NO, 123456789 LAT,N12 34.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG 2. When you edit message for internet e-mail, check message format to LES provider

you want to send e-mail.

Step 7

To store your message, select "Save & Quit" function by pressing function key 9 < F9>. If "Input Search String" dialogue box is appear, press function key 10 < F10> twice, and then press function key 9 < F9>.

Step 8

Press <ESC> key until the screen clear.

-E8-

Appendix 12 - Page 16/42

5.2. Creating Internet e-mail message


This section describes how to create internet e-mail message via Inmarsat service provider.

NOTE
When you edit message for internet e-mail, check message format to LES service provider you want to send e-mail.

Step 1 Step 2

Press <ESC> key until the screen clear. Highlight the "Edit" function from the menu bar by pressing the right/left arrow keys.

Ready

Rec

:Good-15

Msg print

04-07-01 Updates:07-01

09:00(UTC) 00:00 Esc: Main Menu egC

N35.33 E139.50 Course:120deg Speed:10.0kt Transmit read-out Transmit Read-out Edit Edit call-Log Distress

Nes / les-info receive-Mode

:To transmit message :To read out received message :To edit a message or to manipulate files

Step 3

Press <Enter> to obtain "Edit" dialogue box.

Step 4 Select "edit Ascii file" by pressing the up/down arrow keys, and then press <Enter>,

-E9Appendix 12 - Page 17/42

Step 5

Type the filename of the message, and then press <Enter> (File names must be 8 characters or less in length) e.g. "SSAS" has been typed as the file name.

ATTENTION
The following characters can be used for fine name. 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F,G,H,I,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z

Step 6

Enter your message.

NOTE
The following message is automatically added to your message when initiating security alert SECURITY SECURITY MES NO.123456789 LAT,N12 34.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG, 10.0KT,COG,20DEG

ATTENTION
When you edit message for internet e-mail, check message format to LES provider you want to send e-mail. If the created message could not be sent to the destination by e-mail, the message could be created by the incorrect format.

-E10-

Appendix 12 - Page 18/42

Examples of creating message are shown below. < SERVICE PROVIDER: KDDI >
Special Access Code: 28 LES ID: AOR-W: 003,AOR-E:103,POR:203,IOR:303

Ready

Rec

:Good-15

Msg print

04-07-01 Update:07-01 Size: 20

09:00(UTC) 00:00 Esc: Main Menu

N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1

To:jmarine@m1.jrc.co.jp To:jmarine1@m1.jrc.co.jp Cc:jmarine2@m1.jrc.co.jp subject: Security message <One blank line> This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File] F1: Insert Off F2: Ins_Line F3: Block F4:Del_Word F5:Del_Line

< SERVICE PROVIDER: XANTIC >


Special Access Code: 28 or EMAIL LES ID: AOR-W: 012, AOR-E: 112, POR: 212, IOR: 312

Ready

Rec

:Good-15

Msg print

04-07-01 Update:07-01 Size: 20

09:00(UTC) 00:00 Esc: Main Menu

N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1

To:jmarine@m1.jrc.co.jp To:jmarine1@m1.jrc.co.jp Cc:jmarine2@m1.jrc.co.jp su: Security message


<One blank line>

This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File] F1: Insert Off F2: Ins_Line F3: Block F4:Del_Word F5:Del_Line

-E11Appendix 12 - Page 19/42

< SERVICE PROVIDER: STRATOS >


Special Access Code: 63 or EMAIL LES ID: AOR-W: 002, AOR-E: 102, POR: 202, IOR: 302

Ready

Rec

:Good-15

Msg print

04-07-01 Update:07-01

09:00(UTC) 00:00 Esc: Main Menu

N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1 Size:

20

TO+jmarine@m1.jrc.co.jp TO+jmarine1@m1.jrc.co.jp This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File] F1: Insert Off F6: Transmit F2: Ins_Line F7: Quit F3: Block F8: Save As F4:Del_Word F9:Save & Quit F5:Del_Line F10:Others

< SERVICE PROVIDER: MARLINK >


Special Access Code: 28 LES ID: AOR-W: 004, AOR-E: 104, POR: 204, IOR: 304

Ready

Rec

:Good-15

Msg print

04-07-01 Update:07-01

09:00(UTC) 00:00 Esc: Main Menu

N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1 Size:

20

TO:jmarine@m1.jrc.co.jp CC:jmarine@m1.jrc.co.jp SUB: Security message


<One blank line>

This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File]

F1: Insert Off F6: Transmit

F2: Ins_Line F7: Quit

F3: Block F8: Save As

F4:Del_Word F9:Save & Quit

F5:Del_Line F10:Others

-E12Appendix 12 - Page 20/42

< SERVICE PROVIDER: OTESAT >


Special Access Code: EMAIL LES ID: AOR-W: 021, AOR-E: 120, POR: 221, IOR: 305

Ready

Rec

:Good-15

Msg print

04-07-0 1 Update:07-01

09:00(UTC) 00:00 Esc: Main Menu

N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1 Size:

20

TO:jmarine@m1.jrc.co.jp CC:jmarine@m1.jrc.co.jp This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File]

F1: Insert Off F6: Transmit

F2: Ins_Line F7: Quit

F3: Block F8: Save As

F4:Del_Word F9:Save & Quit

F5:Del_Line F10:Others

< SERVICE PROVIDER: FRANCE TELECOM >


Special Access Code: 29 LES ID: AOR-W: 021, AOR-E: 121, 1POR:221, IOR: 321

Ready

Rec

:Good-15

Msg print

04-07-01 Update:07-01

09:00(UTC) 00:00 Esc: Main Menu

N35.33 E139.50 Course:120deg Speed:10.0kt Editing telex file:SSAS Line:1 Column: 1 Size:

20

To+marine@m1.jrc.co.jp Subj+ SSAS MESSAGE This is SSAS message, SHIP NAME:JRCMARU MMSI:431995000 [End of File]

F1: Insert Off F6: Transmit

F2: Ins_Line F7: Quit

F3: Block F8: Save As

F4:Del_Word F9:Save & Quit

F5:Del_Line F10:Others

Step 7

To store your message, select "Save & Quit" function by pressing function key9< F9>, If "Input Search String" dialogue box is appear, press function key10 <F10> twice, and then press function key9 <F9>

Step 8

Press <ESC> key until the screen clear. -E13Appendix 12 - Page 21/42

6. Setting up the security alert transmission


6.1 Setting up sending the security message to the telex terminal on the terrestrial network

This section describes how to set up for sending the security message to the telex terminal on the terrestrial network. Step 1 Step 2 Press <ESC> until the screen clear. Press <ALT> + <U> to obtain "Set up" dialogue box. Set up
Date & time Date Time log-Out initiation log-In initiation Performance test initiation Scheduled transmission Land id registration for polling Closed network id selection Peripheral Function F10: Previous

Step 3

Select "Scheduled transmission" option by pressing the up/down arrow keys, and then press <Enter>, "Scheduled transmission" dialogue box will be appeared.

F10: Previous

Step 4

Press <Ctrl>+function key10 < F10>, and then "F1: SSAS TEST" will be appeared in bottom of "Scheduled transmission" dialogue box.

-E14Appendix 12 - Page 22/42

Step 5

To setup security alert transmission, select the "Scheduled transmission #1", "Scheduled transmission #2", "Scheduled transmission #3", "Scheduled transmission #4" or "Schedule transmission #5" by pressing the up/down arrow keys and press <Enter>.

ATTENTION
The security message transmission should be configured in order from "Scheduled transmission #1". The MES transmits security alert in order of a young file number of scheduled transmission configuration file.

e.g.
"Scheduled transmission file #1" has been selected for SSAS message transmission setup.

Step 6

Press the down arrow key to choose "requesting Interval", and then press <Enter>. ("Starting date and Time" is not used for security message transmission.)
Enter time interval (01:00 - 23:00) to the security alert transmission, and then press <Enter>. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75A/C will ignore.

Step 7

e.g.
One hour has been entered as interval to transmit the security alert. requesting Interval : 01:00

ATTENTION
1. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75A/C will ignore. 2. When "00:00" has been entered as interval to transmit the security alert, MES will transmit.

-E15Appendix 12 - Page 23/42

Step 8

Press <Enter>, enter LES ID, and then press <Enter>, e.g. KDDI LES has been entered as default LES in each ocean region. IEs : 003 - 103 - 203 - 303

Step 9

(a) (b) (c) (d) (a) LES ID used when MES logs in AOR-W. (b) LES ID used when MES logs in AOR-E. (c) LES ID used when MES logs in POR. (d) LES ID used when MES logs in IOR. Press <Enter>, "Network type" dialogue box will be appeared and then select "TELEX" option by pressing the up/down arrow keys, and then press <Enter>.

Step 10 Press <Enter>, and then enter the country code and subscriber's number of final destination. e.g. "072-0223344" has been entered as Destination code and subscribers number. Destination code & subscriber's number : 072 - 0223344 (a) (a) Telex Country code (b) Subscriber's number Step 11 Press <Enter>, Select "Ia5" by pressing the left/right arrow keys, and then press <Enter>. Character code : Ia5 iTa2 (b)

-E16Appendix 12 - Page 24/42

Step 12 Press <Enter> thrice, and then select "None" by pressing the left/right arrow keys, and then press <Enter>. dS :1 2 Both None

NOTE
"qtH" setup may be set whichever of ON and OFF, because this menu is used to add ship's position information to sending message on usual scheduled transmission. The security message is automatically added also for ON or OFF. Step 13 Press <Enter>, enter the directory number and the name of file created for SSAS message according to the following format: e.g. "SSAS.TLX" has been entered as file name of SSAS message File name :0 : SSAS.TLX (a) (b) (a) Directory number: "0" should be input (b) Message file name

NOTE
Add the extension ".TLX" to file name created by using "edit Telex file" option Step 14 Press <Enter>. Step 15 Press <Enter>, select "oFf" by pressing the left/right arrow keys, press <Enter>. Transmission : oN oFf

If "oN" has been selected, Message will be sent although nobody press the security button.

Step 16 Press <Enter>, select "oN" by pressing the left/right arrow keys, and then press <Enter>. Security Alert : oN oFf

If "oFf" has been selected, Message will NOT be sent although anyone press the security button.

-E17Appendix 12 - Page 25/42

Step 17 Setup is completed, and then press function key 10 <F10> to finish the setup. Step 18 Press function key 10 <F10> or <ESC> to save the setup.

An example of setup of scheduled transmission is shown below.

-E18Appendix 12 - Page 26/42

6.2Setting up sending the security message to the facsimile on the terrestrial network.
This section describes how to set up for sending the security message to the facsimile on the terrestrial network. Step 1 Step 2 Press <ESC> until the screen clear. Press <ALT> + <U> to obtain "Set up" dialogue box.

Step 3

Select "Scheduled transmission" function by pressing the up/down arrow keys, and then press <Enter>. "Scheduled transmission" dialogue box will be appeared.

Step 4

Press <Ctrl> + function key10<F10>, and then "F1: SSAS" will be appeared in the bottom of "Scheduled transmission" dialogue box.

Step 5

To setup SSAS message transmission, select the "Scheduled transmission #1", "Scheduled transmission #2", "Scheduled transmission #3", "Scheduled transmission #4" or "Schedule transmission #5" by pressing the up/down arrow keys and press <Enter>.

ATTENTION
The security alert transmission should be configured in order from "Scheduled transmission #1". The MES transmits the security alert in order of a young file number of scheduled transmission configuration file.

Appendix 12 - Page 27/42

e.g. "Scheduled transmission file #1" has been selected for security alert transmission setup.

Step 6

Press the down arrow key to choose "requesting Interval", and then press <Enter>. ("Starting date and Time" is not used for security alert transmission.)

Step 7

Enter time interval (01:00-23:00) to transmit the security alert, and then press <Enter>. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75C will ignore. e.g. One hour has been entered as interval to transmit the SSAS message. requesting Interval : 01:00

ATTENTION
1. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75C will ignore. 2. When "00:00" has been entered as interval to transmit the security alert, MES will transmit the security alert one time. Step 8 Press <Enter>, enter LES ID, and then press <Enter>. e.g. KDDI LES has been entered as default LES in each ocean region. 1Es : 003 - 103 - 203 - 303 (a) (b) (c) (d)

(a) LES ID used when MES logs in AOR-W. (b) LES ID used when MES logs in AOR-E. (c) LES ID used when MES logs in POR. (d) LES ID used when MES logs in IOR.

-E20Appendix 12 - Page 28/42

Step 9

Press <Enter>, "Network type" dialogue box will be appeared and then select "PSTN" option and by pressing the up/down arrow keys, and then press <Enter>, and then "Modem type" dialogue box will be appeared.

Step 10

Select "others" by pressing the up/down arrow keys, and then press <Enter>, and then "Others" dialogue box will be appeared.

Step 11

Enter "T30", and then press <Enter>.

-E21Appendix 12 - Page 29/42

Step 12

Press <Enter>, and then enter the country code and subscriber's number of final destination. e.g. "081-422459111" has been entered as Destination code and subscriber's number. Destination code & Subscriber's number : 081 - 422459111 (a) (a) Telephone Country Code (b)

Step 13

(b) Subscriber's number Press <Enter>, Select "Ia5" by pressing the left/right arrow keys, and then press <Enter>. Character code : Ia5 Data

Step 14

Press <Enter>, thrice, and then select "None" by pressing the left/right arrow keys, and then press <Enter>. dS :1 2 Both None

NOTE
"qtH" setup may be set whichever of ON and OFF, because this menu is used to add ship's position information to sending message on usual scheduled transmission. The security message is automatically added also for ON or OFF.
Step 15 Press <Enter>, enter the directory number and the name of file created for SSAS message according to the following format: e.g. "SSAS" has been entered as file name of SSAS message File name : 0 (a) (b) Message file name : SSAS (b)

(a) Directory number: "0" should be input

ATTENTION
Add the extension ".TLX" to file name created by using "edit Telex file" option.

Step 16 Step 17

Press <Enter>. Press <Enter>, select "oFf" by pressing the left/right arrow keys, press <Enter>/ Transmission : oN oFf

If "oN" has been selected, Message will be sent although nobody press the security button. Step 18 Press <Enter>, select "oN" by pressing the left/right arrow keys, and then press <Enter>. Security Alert : oN oFf

If "oFf" has been selected, Message will NOT be sent although anyone press the security button.

-E22-

Appendix 12 - Page 30/42

Step 19 Setup is completed, and then press function key10<F10> to finish the setup. Step 20 Press function key10<F10> or <ESC> to save the setup.

An example of setup of scheduled transmission is shown below.

-E23-

Appendix 12 - Page 31/42

6.3

Setting up sending the internet e-mail via Inmarsat service provider

This section describes how to set up for sending the internet e-mail via Inmarsat service provider.

NOTE
When you edit message for internet e-mail, check message format to LES service provider you want to send e-mail.

Step 1 Step 2

Press <ESC> until the screen clear. Press <ALT> + <U> to obtain "Set up" dialogue box.

Step 3

Select "Scheduled transmission" option by pressing the up/down arrow keys, and then press <Enter>. "Scheduled transmission" dialogue box will be appeared.

Step 4

Press <Ctrl> + function key10< F10>, and then "F1:SSAS TESt" will be appeared in the bottom of "Scheduled transmission" dialogue box.

-E24Appendix 12 - Page 32/42

Step 5

To setup SSAS message transmission, select the "Scheduled transmission #1", "Scheduled transmission #2", "Scheduled transmission #3", "Scheduled transmission #4" or "Scheduled transmission #5" by pressing the up/down arrow keys and press <Enter>.

ATTENTION
The SSAS message transmission should be configured in order from "Scheduled transmission #1". The MES transmits the security alert in order of a young file number of scheduled
transmission configuration file. e.g "Scheduled transmission file #1" has been selected for SSAS message transmission setup.

Step 6

Press the down arrow key to choose "requesting Interval", and then press <Enter>. ("Starting date and Time" is not used for SSAS message transmission.)

Step 7

Enter time interval ( 01:00 - 23:00 ) to transmit the SSAS message, and then press <Enter>. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75A/C will ignore. e.g. One hour has been entered as interval to transmit the security alert. requesting Interval :01:00

ATTENTION
1. The minimum setting unit is one hour. If any number (01-59) enter as minute, JUE-75A/C will ignore 2. When "00:00" has been entered as interval to transmit the security alert, MES will transmit
the security alert only one time.

-E25-

Appendix 12 - Page 33/42

Step 8

Press <Enter>, enter LES ID, and then press <Enter>. e.g. KDDI LES has been entered as default LES in each ocean region. IEs (a) (b) (c) (d) :003 - 103 - 203 - 303 (a) (b) (c) (d) LES ID used when MES logs in AOR-W. LES ID used when MES logs in AOR-E. LES ID used when MES logs in POR. LES ID used when MES logs in IOR.

Step 9

Press <Enter>, "Network type" dialogue box will be appeared and then select "Special access" option by pressing the up/down arrow keys, and then press <Enter>.

Step 10 Press <Enter>, and then enter the country code and subscriber's number of final destination. e.g. "28" has been entered as the special access code for KDDI inmarsat-C internet e-mail service. Destination code & subscriber's number (a) Special access code : 28 (a)

NOTE
Check the special access code number for LES you want to send internet e-mail.

Step 11 Press <Enter>, Select "Ia5" by pressing the left/right arrow keys, and then press <Enter>. Character code : Ia5 Data

NOTE
Check character code can be used for LES you want to send internet e-mail.

-E26Appendix 12 - Page 34/42

Step 12 Press <Enter> thrice, and then select "None" by pressing the left/right arrow keys, and then press <Enter>. dS :1 2 Both None

NOTE
"qtH" setup may be set whichever of ON and OFF, because this menu is used to add ship's position information to sending message on usual scheduled transmission. The security message is automatically added also for ON or OFF.

Step 13 Press <Enter>, enter the directory number and the name of file created for SSAS message according to the following format: e.g. "SSAS" has been entered as file name of SSAS message File name :0 : SSAS (a) (b) (a) Directory number: "0" should be input (b) Message file name Step 14 Press <Enter>. Step 15 Press <Enter>, select "oFf" by pressing the left/right arrow keys, press <Enter>. Transmission : oN oFf

If "oN" has been selected, Message will be sent although nobody press the security button.

Step 16 Press <Enter>, select "oN" by pressing the left/right arrow keys, and then press <Enter>. Security Alert : oN oFf

If "oFf" has been selected, Message will NOT be sent although anyone press the security button.

-E27Appendix 12 - Page 35/42

Step 17 Setup is completed, and then press function key 10 <F10> to finish the setup. Step 18 Press function key 10 <F10> or <ESC> to save the setup.

An example of setup of scheduled transmission is shown below.

7. Transmitting security alert


This section describes how to initiate the security alert transmission.

ATTENTION
The communication status indication, Buzzer sounding and message printout for security alert are not executed under transmitting the security message. Step 1 Open the hinged cover of the Security Alert Button.

Cover

Step 2

Push the button.

<Top View>

<Side View>

Ths SSAS message will be transmitted after 30 seconds from the button is pushed in.

NOTE
1. Your creating message and the following message are transmitted to pre-designed destinations. SECURITY SECURITY MES NO, 123456789 LAT,N12 34.56LON,E123 45.56, UTC,07.01.2004 12:34, SOG, 10.0KT,COG,20DEG

ATTENTION
To cancel security alert transmission if you accidentally push the button, push the button again within 30 seconds. When security alert transmission has canceled, the following window will be displayed on DTE screen.
Cancelled Security Alert by No.1 SA button F10:Previous

Step 3

MES transmits SSAS message in order of a young file number of scheduled transmission configuration file.

Step 4

To stop transmission, push button again to pop up the pushed button.

ATTENTION
If you turn on the MES with any security button has been pushed in, the MES resumes the security alert transmission.

-E29Appendix 12 - Page 37/42

8. Security alert transmission test


This section describes how to initiate the security alert transmission test. The test transmission actives with setting up for real security alert transmission. The security message transmitted under test mode is added the following message. * MES NO is ship's IMN (Inmarsat Mobile Number). Ship's position is registered at transmitting the security alert. Message: TEST TEST MES NO, 123456789 LAT,N12 34.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG,10.0KT,COG,20DEG

ATTENTION
Setup the security alert setup menu beforehand transmit security alert test messages.

Step 1 Step 2

Press <ESC> until the screen clear. Press <ALT> + <ALT> to obtain "Set up" dialogue box.

Step 3

Select "Scheduled transmission" opinion by pressing the up/down arrow keys, and then press <Enter>. "Scheduled transmission" dialogue box will be appeared.

-E30Appendix 12 - Page 38/42

Step 4

Press <Ctrl> + function key 10<F10>, and then "F1:SSAS TEST" will be appeared in the bottom of "Scheduled transmission" dialogue box.

Step 5

Press function key 1<F1> to start the security alert transmission test.

NOTE
1. The MES starts transmission with setup of "Scheduled transmission #1" immediately after pressing function key 1 <F1>, If the another setup has been configured, The MES starts transmission with setup of "Scheduled transmission #2" at 12 minutes after pressing function key 1 <F1>, starts transmission with setup of "Scheduled transmission #3" at 24 minutes after pressing function key 1 <F1>, starts transmission with setup of "Scheduled transmission #4" at 36 minutes after pressing function key 1<F1>, and starts transmission with setup of "Scheduled transmission #5" at 48 minutes after pressing function key <F1>. 2. This test mode remains for 1 hour. 3. Your creating message and the following message are transmitted to pre-designed destinations. TEST TEST MES NO, 123456789 LAT,N12 34.56LON,E123 45.56,UTC,07.01.2004 12:34,SOG, 10.0KT,COG,20DEG

Step 6

The test mode is finished after one hour from pressing function key 1 <F1>.

NOTE
The security alert transmission test mode is cancelable if the power switch on the IME to OFF and ON within one hour from pressing function key 1<F1>.

-E31-

Appendix 12 - Page 39/42

9. Security button test


Ths section describes how to initiate the security button test. The test is used to check that the security button activates with correctly. The test is not initiated with real transmission. Step 1 Step 2 Press <ESC> until the screen clear. Press <ALT> + <A> to obtain "Diagnostics" dialogue box.

Step 3

Press <Ctrl> + function key10<F10>, and then "security button Test" will be appeared in the dialogue box.

Step 4

Select "security button Test" option by pressing the up/down arrow keys.

Step 5

Press <Enter>, and then "Security Button test mode" window is appeared.

-E32Appendix 12 - Page 40/42

Step 6

Open the hinged cover of the Security Alert Button.

Cover

Step 7

Push the button. "Security Button Test" status window is appeared. e.g. No.1 Security button has been pushed in.
-------Security Button Test ------Now security button testing . . If real security alert to be sent, Cancel the test mode

Step 8

When the test is passed, the following window is appeared 30 seconds after pushing in the button.
-------Security Button Test ------Security button test succeeded. If real security alert to be sent, Cancel the test mode F10:Previous

Step 9

Push button again to pop up the pushed button, and then press function 10 key <F10>, and then the following window is appeared. If you test another button, repeat from Step 6 to Step 9. If you cancel the security button test, go to Step 10. Security buttons test mode
Security buttons are under test now. Press the security button to test it. if real security alert to be sent, Cancel the test mode F10:Previous

Step 10

To cancel the test mode, press function 10 key <F10>.

ATTENTION
If you turn on the MES with any security button has been pushed in, The MES resumes the security alert transmission.

-E33Appendix 12 - Page 41/42

This page is intentionally blank

Appendix 12 - Page 42/42

Compliance Certificates of CSO