Guideline for performing Ship Security Assessment

Similar documents
The International Ship and Port Facility Security Code A-M CHAUVEL - BUREAU VERITAS - DNS / DCO

Prof. Pietro del Rosso

Record No. Name of Ship. Flag. Name of Company. Date. Place. Checked by. MS-SELF-CHK-SHIP-e (2012.1) 1. Self-Checklist for Shipboard Security System

GUIDANCE ON VOLUNTARY SELF-ASSESSMENT BY ADMINISTRATIONS AND FOR SHIP SECURITY

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES

IMO CONSIDERATION AND ADOPTION OF THE INTERNATIONAL SHIP AND PORT FACILITY SECURITY (ISPS) CODE

PART A. .3 to ensure the early and efficient collection and exchange of security-related information;

Procedural Requirements for ISPS Code Certification

The code of practice for conducting "Ship Security Officer Training Course"

Maritime cybersecurity using ISPS and ISM codes

GUIDANCE RELATING TO THE IMPLEMENTATION OF SOLAS CHAPTER XI-2 AND THE ISPS CODE

IMO GUIDANCE RELATING TO THE IMPLEMENTATION OF SOLAS CHAPTER XI-2 AND THE ISPS CODE

Domestic Shipping. Safety Management System. Company:

REVISION TO THE PRE-ARRIVAL NOTIFICATION OF SECURITY (PANS) GUIDANCE FOR ESTABLISHING SECURITY MEASURES WHEN VESSELS CALL AT NON-ISPS COMPLIANT PORTS

IMO maritime security policy Background paper. Maritime Security Section International Maritime Organization

Isle of Man Regulations implementing the STCW Manila Amendments

SHIP SECURITY (SEC) NOTATION

STATUTORY INSTRUMENT. No. of Merchant Shipping (Safe Ship Management Systems) Regulation ARRANGEMENT OF SECTIONS.

REPUBLIC OF. Marine Notice THE MARSHALL ISLANDS No OFFICE OF THE MARITIME ADMINISTRATOR Rev. 8/06

Commonwealth of Dominica. Office of the Maritime Administrator ALL SHIPOWNERS AND OPERATORS OF MERCHANT VESSELS, AND DOMINICA FLAG STATE INSPECTORS

GUIDELINES ON TRAINING AND CERTIFICATION FOR PORT FACILITY SECURITY OFFICERS

REPUBLIC OF LIBERIA BUREAU OF MARITIME AFFAIRS

Performance Condition When asked by a qualified assessor, On board ship or in an approved training program,

ISM & ISPS pocket checklist

GUIDANCE RELATING TO THE IMPLEMENTATION OF SOLAS CHAPTER XI-2 AND THE ISPS CODE

I"- "Security awareness training Course" The code of practice for conducting PMO P6-W66. approving endorsing. Comment on. Date of.

Safety Management System Manual Guidebook

New Requirements for Security Training for Shipboard Personnel

Regulation of 15 September 1992 No. 693 concerning the Form and Keeping of Log Books for Ships and Mobile Offshore Units

Security Matrix. STCW Regulation (applicable from 1 st of January 2014):

INFORMATION BULLETIN No. 145

THE REPUBLIC OF LIBERIA LIBERIA MARITIME AUTHORITY

IMO MODEL COURSES NEW NEW. SPECIALIZED TRAINING FOR OIL TANKERS (Model course 1.02) (2006 Edition)

Part 0 - Classification and Surveys Classification and Surveys I

PORT ASSESSMENT. Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS

To: Seafarers, Ship Security Officers and Company Security Offices, Deputy Registrars and Other Interested Parties

Handbook for Ship Security System Audit (For Non-Japanese Ships)

Company Security Officer (CSO) Training course brochure

Port Facility Security Officer (PFSO) Training course brochure

2. Isle of Man Merchant Shipping (Medical Stores) Regulations 2001

AMOS SFI. Group System. Product Description

GUIDANCE ON DETENTION AND ACTION TAKEN

Maritime Security Regulations

INTERNATIONAL SHIP AND PORT FACILITY SECURITY CODE

REVIEW OF STCW PASSENGER SHIP-SPECIFIC SAFETY TRAINING. Proposed Amendments to the STCW Convention passenger ship specific safety training

STCW A GUIDE FOR SEAFARERS Taking into account the 2010 Manila amendments

Merchant Shipping (Amendment and Extension) 1 LAWS OF MALAYSIA. Act A1316

War Insurance Conditions for Vessels of 1st January 2006

Former Station 12 and SpecTec. SFI Group System. Product Description

Order on maritime security training on board ships

Mariner Credentialing Program Policy Division CG-CVC-4

ANNEX 5 RESOLUTION MEPC.127(53) Adopted on 22 July 2005 GUIDELINES FOR BALLAST WATER MANAGEMENT AND DEVELOPMENT OF BALLAST WATER MANAGEMENT PLANS (G4)

Statistical Summary Marine Occurrences 2013

A CRITICAL ANALYSIS OF FLAG STATE DUTIES AS LAID DOWN UNDER ARTICLE 94 OF UNCLOS

COMDTPUB P16721 NVIC August 25, Subj: GUIDELINES FOR QUALIFICATION FOR HIGH-SPEED CRAFT TYPE-RATING ENDORSEMENTS

DMA RO Circular no. 007

Checklist for Company Safety Management System

C-TPAT Security Criteria Sea Carriers

ST. VINCENT AND THE GRENADINES

Safety and Environmental Management Manual (SEMM) Index

Procedure Manual. Shipboard Oil Pollution Emergency Plan (SOPEP)

Harbourmaster s Office Operation of Emergency Response Vessels within the Auckland Region. Navigation Safety Operating Requirements 2014

Recovery of Persons from the Water

DEPARTMENT OF MARINE SERVICES AND MERCHANT SHIPPING (ADOMS) Boatmaster s Licenses

Australian Transport Council. National Standard for the Administration of Marine Safety SECTION 4 SURVEYS OF VESSELS

List of courses approved under Maritime Cluster Fund 30% Course Fee Subsidy for non-examinable courses

Recommendations Relating to the Application of Requirements Governing Seafarers Hours of Work and Rest

ADVANCED DIPLOMA OF TRANSPORT & DISTRIBUTION (MARINE ENGINEERING CLASS 2)

MARINE INSURANCE GUIDELINES

IFSMA Paper. As a result of the paper the delegates supported a resolution which is printed below.

RISK MANAGEMENT IN THE NATIONAL SYSTEM A PRACTICAL GUIDE

A.1 Obligations and reporting of the gaining Society. Plans to be Submitted by the Owner to the Gaining Society

Guidance for Reducing Port State Detentions. Pre-Port Arrival Quick Reference

ADOPTION OF THE FINAL ACT AND ANY INSTRUMENTS, RESOLUTIONS AND RECOMMENDATIONS RESULTING FROM THE WORK OF THE CONFERENCE

REGIONAL FERRY SERVICES OPERATOR LICENCE APPLICATION FORM

Guidance on vessel traffic services (VTS) in Danish waters

INTERNATIONAL CONVENTION ON STANDARDS OF TRAINING, CERTIFICATION AND WATCHKEEPING FOR SEAFARERS, 1978 AS AMENDED IN 1995

Conditions of transportation

Regulation of 15 September 1992 No. 704 concerning operating arrangements on Norwegian ships

OPERATIONS SEAFARER CERTIFICATION GUIDANCE NOTE SA MARITIME QUALIFICATIONS CODE. Deck: Personnel Management and Ship Masters Business (Fishing)

Implementing a Ship Energy Efficiency Management Plan (SEEMP) Guidance for shipowners and operators

CLASSIFICATION SOCIETIES - their key role

Protection & Indemnity Insurance 2016/2017 Part 2 final

Certification of seafarers

Emergency Response Plan. at sea also valid in case of Flooding, where applicable

NORWAY. Website. Contact points Flag State. EEA Country. Port State. Coastal State

REPUBLIC OF THE MARSHALL ISLANDS

MERCHANT SHIPPING (TRAINING, CERTIFICATION, MANNING AND WATCHKEEPING) REGULATIONS, 2004 (LI 1790).

ADOPTION OF THE FINAL ACT AND ANY INSTRUMENTS, RESOLUTIONS AND RECOMMENDATIONS RESULTING FROM THE WORK OF THE CONFERENCE

Frequently Asked Questions Regarding ISPS Code Compliance

INTERNATIONAL REGULATIONS FOR HIGH-SPEED CRAFT AN OVERVIEW *

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

ITF CRUISE SHIP SAFETY POLICY

Management of Safety and Environmental Protection (SEP)

Marine Engineer Class 3 (MEC 3)

CREW MANNING OFFICES, PRIVATE RECRUITMENT AND PLACEMENT SERVICES

TITLE 5.1 AND TITLE 5.2 FLAG STATE INSPECTION AND CERTIFICATION AND PORT STATE INSPECTION

1 The purpose of this Code is to provide an international standard for the safe management and operation of ships and for pollution prevention.

Transcription:

Guideline for performing Ship Security ssessment according to the International Code for the Security of Ships and Port Facilities (The ISPS Code) as mandated by SOLS Chapter XI-2 Vessel:.... Operator:. Trading area/ports:..... Responsible for Ship Security ssessment (name/rank):. SS performed, date:... Related Ship Security Plan, date:... Page 1 Version 1 (03-05-22)

LIST OF CONTENT LIST OF CONTENT...2 1. BOUT THIS SHIP SECURITY SSESSMENT GUIDELINE...3 2. THE IMO FRMEWORK...6 2.1 THE MENDMENTS TO THE 1974 SOLS CONVENTION, CHPTER XI...6 2.2 THE INTERNTIONL SHIP ND PORT FCILITY SECURITY (ISPS) CODE...6 2.3 IMO REQUIREMENTS TO THE SS...7 2.4 GLOSSRY...8 2.5 FUTURE REVISIONS...9 2.6 REFERENCES...9 3. THE SHIP SECURITY SSESSMENT PROCESS...10 STEP 1: IDENTIFICTION OF POSSIBLE MOTIVES...11 STEP 2: IDENTIFICTION OF KEY SHIPBORD OPERTIONS...12 STEP 3: IDENTIFICTION OF EXISTING SECURITY MESURES, PROCEDURES, ND OPERTIONS.13 STEP 4: IDENTIFICTION OF POSSIBLE THRET SCENRIOS...14 STEP 5: THRET ND VULNERBILITY (RISK) SSESSMENT...15 STEP 6: DEVELOPMENT OF ONBORD SHIP SECURITY SURVEY CHECKLIST...16 STEP 7: ONBORD SHIP SECURITY SURVEY...17 STEP 8: IDENTIFICTION OF WEKNESSES, REMEDIL CTIONS...18 4. REQUIREMENTS ND RECOMMENDTIONS TO THE SSP...19 PPENDIX IDENTIFICTION OF MOTIVES...22 PPENDIX B KEY SHIPBORD OPERTIONS...25 PPENDIX C THRET SCENRIOS ND SSESSMENT...28 PPENDIX D - SHIP SECURITY SURVEY CHECKLIST...34 PPENDIX E - SUMMRY OF SECURITY MESURES (PRT B, SECTION 9)...48 Page 2 Version 1 (03-05-22)

Ship Security ssessment Guideline bout this Guideline 1. BOUT THIS SHIP SECURITY SSESSMENT GUIDELINE This Ship Security ssessment (SS) Guideline is made to assist owners and operators of ships to carry out security assessments in a rational, standardised and systematic way. It is prepared in accordance with the requirements of Part of International Ship and Port Facility Code ( the ISPS Code, or, the Code ), and taking into account the guidance in Part B. The next Section 2 provides further background on the ISPS Code. This SS Guideline is prepared by also considering the requirements in the USCG Navigation and Vessel Inspection Circular (NVIC) 10-02 Security Guidelines for Vessels. Even though the ISPS Code (IMO - world-wide) and NVIC (USCG - US water) are two different, security regimes, NVIC 10-02 has been developed to assist vessel operators and owners to align with the security requirements under development in IMO at time of publication (October 2002). We are therefore of the opinion that this Guideline meets the NVIC requirements to ship security assessment. (Further, it should be noted that the USCG expects foreign flag vessels to verify compliance with Part B of the ISPS Code, and not merely Part. Eg, the USCG requires that, Verification of compliance could be established by flag administration documents or endorsements that indicate that the Ship Security Certificate was issued based upon full compliance with Part B (from the Federal Register/Vol. 6, No 250/Dec 30, 2002. This Guideline is primarily designed as a self assessment tool for Company and Ship Security Officers and other people responsible for security ashore or onboard. It is divided into 4 Sections, plus appendices (-E) which are provided in a format such that companies can use them for their own vessels: LIST OF CONTENT 1. BOUT THIS SHIP SECURITY SSESSMENT GUIDELINE 2. THE IMO FRMEWORK 2.1 The mendments to the 1974 SOLS Convention, Chapter XI 2.2 The International Ship and Port Facility Security (ISPS) Code 2.3 IMO Requirements to the SS 2.4 Glossary 2.5 Future Revisions 2.6 References 3. THE SHIP SECURITY SSESSMENT PROCESS Step 1: Identification of Possible Motives Step 2: Identification of Key Shipboard Operations Step 3: Identification of Existing Security Measures, Procedures, and Operations Step 4: Identification of Possible Threat Scenarios Step 5: Threat and Vulnerability (Risk) ssessment Step 6: Development of Onboard Ship Security Survey Checklist Step 7: Onboard Ship Security Survey Step 8: Identification of Weaknesses 4. REQUIREMENTS ND RECOMMENDTIONS TO THE SSP PPENDIX - IDENTIFICTION OF MOTIVES PPENDIX B - KEY SHIPBORD OPERTIONS PPENDIX C - THRET SCENRIOS ND SSESSMENT PPENDIX D - SHIP SECURITY SURVEY PPENDIX E - SUMMRY OF SECURITY MESURES (ISPS CODE PRT B) Good to know prior to start of the SS Self-assessement guideline, including development of checklist From SS to SSP Forms etc. for self-assessment Page 3 Version 1 (03-05-22)

Ship Security ssessment Guideline bout this Guideline The vessel owner and operator have the primary responsibility for ensuring the physical security and safety of their vessels. Therefore, in addition to meeting the requirements of the ISPS Code, this SS Guideline is also prepared as a means to promote sound security practices. The Guideline does not, relieve owners or operators of their legal responsibilities neither with respect to the ISPS Code nor to any other parties, such as P&I clubs, crew, etc. The SS is an essential and integral part of the process of developing and updating the Ship Security Plan (SSP). The relation between this SS and the SSP can be illustrated in the following way (see also Section 4): Threat information from Background port material required assessments to conduct SS Identify key shipboard operations SS Decide on corrective security measures SSP Identify existing security measures Prepare SSP (based on the SS) Implementation of SSP Identify threats & vulnerability (risk) Review of SSP (by adm., RSO) Onboard verification Develop and perform ship security survey Possible adjustment of SSP Issuance of ISSC Identify weaknesses in measures, processes pproval of SSP It should further be noted that this Guideline does not provide any guarantee for the approval of the SSP by the Contracting Government or the recognised security organization to which this work has been delegated; it is up to the owner or operator to demonstrate that the proposed security process described in this Guideline is duly documented and meets the requirements of the ISPS Code. ppreciating that every ship is unique in design, operations, cargo, voyage pattern, etc. a ship owner/operator may wish to demonstrate that specific recommended security measures are/are not appropriate for his specific ships. For the same reason of uniqueness, this Guideline provides a method for owners/operators to balance the appropriate security measures by evaluating his ship s: 1. Key shipboard operations 2. Existing security measures. 3. ssessed threats, and, 4. Consequences and/or vulnerabilities (risk). Page 4 Version 1 (03-05-22)

Ship Security ssessment Guideline bout this Guideline Finally, it should be recalled that achieved security is highly dependent on the human element. Vigilance, prevention and response can only be as good as the crew s skills, knowledge, experience and attitude related to security. In addition to guiding you with carrying out a SS, we hope that this Guideline will promote good and sustainable security culture. Page 5 Version 1 (03-05-22)

Ship Security ssessment Guideline The IMO framework 2. THE IMO FRMEWORK 2.1 THE MENDMENTS TO THE 1974 SOLS CONVENTION, CHPTER XI gainst a background of potential threat to maritime shipping and ports, IMO s Diplomatic Conference on Marine Security in December 2002 adopted new regulations to enhance maritime security through amendments to SOLS Chapter XI. Chapter XI has been split into two chapters, where Chapter XI-1, Special measures to enhance maritime safety has been expanded to include additional requirements to Ship Identification Numbers and the carriage of a Continuous Synopsis Record. Chapter XI-2, Special measures to enhance maritime security, addresses the mandatory requirements such as the provision of Ship lert System and refers to the ISPS Code., Only the ISPS Code, and its application for ships (not ports), is dealt with in this document. 2.2 THE INTERNTIONL SHIP ND PORT FCILITY SECURITY (ISPS) CODE Owners and operators of ships have the primary responsibility for ensuring the physical security and safety, indeed of their ships, and the new security measures are centred around a proposed ISPS Code. Part of the ISPS Code will be mandatory, whereas Part B of the ISPS Code has been drafted as a guidance and is recommendatory. The regulations and the ISPS Code will apply to the following ships on international voyages: - ll passenger ships including HSLC ships - ll cargo ships and HSLC above 500 gt - MOU in transit. In addition, the ISPS Code will apply to port facilities serving such ships engaged on international voyages. The Code will take effect from July 1, 2004. n important part of the Code is the way risk is treated: because each ship and each port facility is different, the Contracting Government shall determine and set the appropriate security level (see section 2.1 and 7 of Part, and 1.8 and 4.8 of Part B): - Security Level 1: Normal; the level at which ships and port facilities normally operate. - Security Level 2: Heightened; the level applying for as long as there is a heightened risk of security incident. - Security Level 3: Exceptional; the level applying for the period of time when there is a probable or imminent risk of a security incident. Port & Ship Security Level (1-3) Security Level 1 Security Level 2 Security Level 3 dditional Security Measures Required The security levels create a link between the ship and the port facility since it triggers the implementation of appropriate security measures for the ship and the port facility. Further, it presents a methodology for performing security assessments so that plans and procedures to Page 6 Version 1 (03-05-22)

Ship Security ssessment Guideline The IMO framework react to changing security levels can be established. This SS Guideline provides such a methodology. Ship Security Plan (SSP) shall address the appropriate measures for the ship to move from security level 1 to 2 and from 2 to 3. Security level 1 is the level to which the SS Guideline should be based, but the SSP must specify the additional protective measures to be implemented for the heightened security levels (2 and 3). Further, prior to commencing the SS, the Company Security Officer (CSO) shall ensure that advantage is taken of information available on threat assessment for the voyage pattern and the ports at which the ship is calling. For ships trading between two (or more) fixed ports, these ports must be taken into account in the SS. For ships on the spot market, however, ports of call may be difficult to envisage, and for such situations your company should select typical and representative voyage pattern and ports you want to use in the SS (and the related SSP). This Guideline deals with the part of the ISPS Code which is relevant to the SS process only. Therefore, other requirements and guidance set forth in the Code are not further described here, and we refer to the Code for details about other ship security measures, port facilities and the responsibilities of the Contracting Governments. 2.3 IMO REQUIREMENTS TO THE SS The SS is an essential part of the process of developing and updating the SSP, and the Company Security Officer (CSO) shall ensure that the SS gives answers to the following questions: 2. Which key shipboard operations, systems, areas and personnel to protect? 3.What existing security measures, procedures and operations are in place? 4. How can anybody attack my ship? 1. Does a particular motive exist to attack my ship? 5. What are the likelihood and consequences? Security Officer In the ISPS Code language, Part of the Code stipulates that the SS shall include an onscene security survey where, at least, the following elements are included (see also figure, previous Section 1.1): Page 7 Version 1 (03-05-22)

Ship Security ssessment Guideline The IMO framework 1. Identification of existing security measures, procedures and operations. 2. Identification and evaluation of key ship board operations that are important to protect. 3. Identification of possible threats to the key ship board operations and the likelihood of their occurrence, in order to establish and prioritise security measures. 4. Identification of weaknesses, including human factors in the infrastructure, policies and procedures. Part B of the ISPS Code, gives further guidance as to how a SS shall be carried out. The CSO shall also ensure that the assessment is carried out by competent persons with skills to evaluate the security of the ship. Importantly, the SS shall be documented (electronic format is accepted too), reviewed, accepted, and retained by the Company. 2.4 GLOSSRY To provide a more precise understanding of the ISPS Code and this SS Guideline, the following definitions from Part should be noted (see section 2 of Part ): Ship Security Plan (SSP) means a plan developed to ensure the application of measures onboard the ship designed to protect persons onboard, cargo, cargo transport units, ship s stores, or the ship from the risks of a security incident. Port Facility Security Plan (PFSP) means a plan developed to ensure the application of measures designed to protect the port facility and ships, persons, cargo, cargo transport units, and ship s stores within the port facility from the risk of a security incident. Ship Security Officer (SSO) means the person onboard the ship, accountable to the Master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the SSP and for liaison with the CSO and the PFSO. Company Security Officer (CSO) means the person designated by the Company for ensuring that a Ship Security ssessment (SS) is carried our; that a ship security plan (SSP) is developed, submitted for approval, and thereafter implemented and maintained, and for liaison with the Port Facility Security Officers (PFSO) and the Ship Security Officer (SSO). Port Facility Security Officer (PFSO) means the person designated as responsible for the development, implementation, revision, and maintenance of the PFSP and for liaison with the SSO and the CSO. Declaration of Security (DOS) is an agreement reached between a ship, and either a port facility or another ship with which it interfaces, which provides a means for ensuring that the critical security concerns are properly addressed and security will remain in place throughout the ships s interface with the port facility or the other ship.. Security for the ship is properly addressed by delineating the responsibilities for security arrangements and procedures between a ship and waterfront facility. Page 8 Version 1 (03-05-22)

Ship Security ssessment Guideline The IMO framework Security incident means any deliberate suspicious act threatening the security of the ship (incl. a mobile offshore drilling unit), its crew, passengers, stores and cargo, or a port facility. Security level means the qualification of the degree of risk that a security incident will be attempted or will occur. 2.5 FUTURE REVISIONS It is the responsibility of the user of this Guideline to review the SS process in the light of the current development in maritime security, and to revise the SS, and the SSP, as and when necessary. 2.6 REFERENCES This document is based on the outcome of the Diplomatic Conference on Maritime Security held in London in December 2002 where amendments to the SOLS 74 were adopted. The ISPS Code is included in the two documents SOLS/CONF.5/DC/2 dated 11 December 2002 (Part ) and SOLS/CONF.5/DC/2/dd.1 dated 12 December 2002. It is also based on the USCG s circular, Security Guidelines for Vessels (NVIC 10-02), see Section 1 of this paper. It is further based on the experience and work of people with considerable experience in maritime operations in general and security in particular. Page 9 Version 1 (03-05-22)

Ship Security ssessment Guideline The SS process 3. THE SHIP SECURITY SSESSMENT PROCESS The ship security assessment (SS) process is divided into 8 steps as described below: Initial screening, Step 1-3: Step 1: Identify any particular motives that may exist to threat or harm your ship, persons, cargo, or operations. Step 2: Identify critical operations, activities, and persons that are important to protect. Step 3: Get an overview of security measures in place. This is an in-office screening and not a comprehensive review. Prioritise operations, areas, systems, and personnel for threat assessment, focus on those found most critical and with a low level of protective security measures. Threat assessment, Step 4-5: Step 4: Identify threat scenarios, or security incident scenarios, that reflect the motives and prioritised operations, areas, systems and personnel. If no particular motives are identified, and no prioritization can be made, use a standard list of possible threat scenarios. Step 5: ssess likelihood and potential consequences of the scenarios. Do it roughly and qualitatively. Likelihood may be classified as unlikely and not Step 1: Step 2: Motives Key ship board operations Step 3: Existing security measures Step 4: Step 5: Threat Vulnerability scenarios (risk) likelihood, consequences Step 6: Step 7: Security Ship survey security checklist survey Step 8: Weaknesses Focused Ship Security Plan unlikely, and consequences as moderate, high and extreme. Prioritise scenarios found not unlikely in combination with consequence severity high or extreme. Onboard audit, Step 6-7: Step 6: Develop a ship security survey checklist that reflects the prioritised scenarios, existing measures assumed to be in place, and critical operations. Step 7: Survey your ship with the checklist. Identify measures in place and comment on deficiencies, training needs, safety conflicts, manning constraints, security equipment Identification of needs, Step 8: Step 8: Evaluate identified improvement needs through the ship security survey in terms of required security measures and weaknesses of existing measures.( and of possible remedial actions?) Initial screening Threat assessment Onboard audit Identification of needs Develop SSP fter these 8 steps, the SS is complete. The steps should be documented and is a basis for the development of a SSP. Remember also to document the limitations/assumptions of the SS (trading area, onboard systems, etc.) The remainder of this SS Guideline gives detailed descriptions for each step (1-8) including related checklists and other tools. Page 10 Version 1 (03-05-22)

Ship Security ssessment Guideline Step 1 STEP 1: IDENTIFICTION OF POSSIBLE MOTIVES References: Part of threat identification (Part, 8.4.3) Objective: To trigger a creative process to identify what types of motives for security incidents that do exist, and which motives that are particular for my ship and trade. re there any particular motives for unlawful acts against my ship? Outcome: Prioritised list of relevant motives that may exist. pplication: The identified motives form a basis for the identification of possible threat scenarios (Step 4). What to do: Use proposed worksheet (ppendix ). The worksheet is not complete and it should be used as a guideline only. dd your own questions be creative! Political Economical 11.september Fear Symbolic 1. The worksheet (ppendix ) is divided in five motive categories: a. Political b. Symbolic c. Economical d. Fear, and, e. Other. It is important that you think exclusively on motives, and that you are conscious about the category of the motive. 2. In the end, make an overall assessment and evaluate which motives that should be considered. Keep the outcome from this evaluation of motives fresh in mind when you later on go through Step 4, Identification of possible threat scenarios. But first you should identify key shipboard operations (Step 2) and your existing security measures (Step 3). Page 11 Version 1 (03-05-22)

Ship Security ssessment Guideline Step 2 STEP 2: IDENTIFICTION OF KEY SHIPBORD OPERTIONS References: Part, 8.4.2; Part B, 8.3, 8.6, 8.8 Objective: To identify operations, systems, areas, and personnel critical to protect if subject to a security incident. What operations, systems, areas, and personnel are important to protect to avoid a security incident? Outcome: list of security-critical operations, systems, areas, and personnel onboard. pplication: To prioritise the most critical operations, systems, areas, and personnel to protect with respect to a security incidents. What to do: 1. Obtain and record the information required to conduct the ship security assessment, such as general layout of ship, stowage arrangement plans, etc (ref. Part B, 8.5) 2. Identify critical ship operations where security incidents may take place (e.g., cargo operations, bunkering, repair work, change of crew/passengers, etc.). 3. List systems, physical areas, and personnel that may be targeted and used in security incidents. Which are important to protect? The attached worksheet (ppendix B) gives some initial ideas as to how to structure this activity. The worksheet includes all elements that is recommended to be covered by the ship security plan (Part B, 9.1-9.6). The SFI Group System may also be used to further trigger some ideas. 4. Go through the list, discuss and identify the critical operations, systems, areas, and personnel that may be important to protect to prevent threats or security incidents. The figure below illustrates the main critical operations (as in ppendix B) and systems, areas, operations, and personnel that may be relevant for your vessel (list is not exhaustive your list may look different). 1 2 3 4 5 CRITICL OPERTIONS People accessing the ship Ship navigation and operation Cargo handling Ship stores handling Security monitoring Loading Voyage Discharging/ embarkation Security communication system Emergency response Navigation capacity Security communication system Ship stores Crew, passengers, visitors 6 Emergency response Cargo Theship(hull, propellers, ) Page 12 Version 1 (03-05-22)

Ship Security ssessment Guideline Step 3 STEP 3: IDENTIFICTION OF EXISTING SECURITY MESURES, PROCEDURES, ND OPERTIONS References: Part, 8.4.1; Part B, 8.5, 8.7 (partly 8.14) Objective: Outcome: To identify and describe existing security measures, procedures and operations. List of existing security measures related to critical operations, areas, systems, and personnel. What existing security measures, procedures and operations do I have in place? pplication: To get an overview of existing measures to be used : a. To identify critical operations that may have insufficient security b. Onboard during the ship security survey (Step 7). What to do: This is an office screening of your existing security measures rather than an onboard survey (this you will do later on!). Use ppendix B to help you through: 1. Identify security measures in place for each critical operation, and give some key words for what kind of measures that do exist. 2. Refer to the list for critical operations (Step 2), and prioritise those operations, systems, areas, and personnel found critical with limited/weak security measures in place (the upper-right corner of the right-hand box, see below). The figure illustrates the described process: From identifying key shipboard operations (Step 2), to assessing existing security measures (this Step 3). Operations, systems, areas, and personnel critical to protect if subject to a security incident? (from Step 2) Security measures, procedures in place? (this Step 3) 1... 2... 3... Low High Yes No Comments......... High Critical operations 3 5 1 4 4...... Low 6 2 5... 6......... Security measures in place? Yes No Page 13 Version 1 (03-05-22)

Ship Security ssessment Guideline Step 4 STEP 4: IDENTIFICTION OF POSSIBLE THRET SCENRIOS References: Part, 8.4.3 Part B, 8.9 Objective: To identify the most relevant scenarios for security incidents that reflect critical operations, existing measures, particular motives, and the trade of the ship. How can anybody attack my ship? Outcome: List of relevant security incident scenarios, or threats. pplication: To assess relevant threats of the ship to prioritise the vital few for planning of security measures. The threat scenarios will further be evaluated with respect to vulnerability (Step 5). What to do: Identification of possible security threats is surrounded by uncertainty; hence do not try to do this too detailed. This is a brainstorming type of session, and there is no standard answer. Take into account the specifics of your ship in terms of crew, cargo, trade area, ports, and similar. 1. If no particular motives are identified for your ship (Step 1), use the standard list of possible threat scenarios as mentioned in the ISPS Code, Part B, 8.9. (figure below). 2. If motives do exist (Step 1), however, use a more detailed list of security incident scenarios. ppendix C contains a proposed list for your use. When assessing the possible threats to your ship, use the information identified and assessed in the previous Steps 1-3: a. Motives (Step 1) b. Prioritised, critical operations (Step 2) c. Security measures in place (Step 3). Means, methods Hijacking ISPS Code, Part B, 8.9.2 Others take control over ship Unauthorised access Part B, 8.9.4 Tampering with cargo Part B, 8..3 t berth t anchor t sea Security incidents Use the ship as a weapon Part B, 8.9.7 Damage to or destruction of the ship Part B, 8.9.1 Damage to cargo or passenger onboard Smuggling of weapons Part B, 8.9.5 Use the ship to carry perpetrators Part B, 8.9.6 Page 14 Version 1 (03-05-22)

Ship Security ssessment Guideline Step 5 STEP 5: THRET ND VULNERBILITY (RISK) SSESSMENT References: Part, 8.4.3; Part B, 8.9, 8.10 Objective: To assess ship vulnerability to threats security incident scenarios in terms of likelihood and potential consequences. Do some of the scenarios appear more likely than others and what could the consequences be? Outcome: List of the vital few scenarios implying the highest risk. pplication: To give guidance with respect to operations, areas, systems and personnel that should be evaluated and surveyed to identify whether additional security measures are required. What to do: Use the list of threat scenarios developed (Step 4/ppendix C). Do not try to quantify consequences and likelihood, but indicate if they are low or high : 1. ssess whether some scenarios are more likely than others. Take into account motives, existing measures and critical operations when assessing the likelihood. Likelihood may be categorised in terms of unlikely and not unlikely. 2. ssess potential outcome of the scenarios. consequence categorisation ( moderate, high and extreme ) is provided in ppendix C. 3. Prioritise the scenarios that are not unlikely in combination with consequence severity high and extreme (the two upper-right squares in the right-hand figure, below). Scenarios Consequences Likelihood 1... 2... Not unlikely 1 3 6 4 3... 4... 5... 6... Unlikely 2 5 Moderate High Extreme Consequences Page 15 Version 1 (03-05-22)

Ship Security ssessment Guideline Step 6 STEP 6: DEVELOPMENT OF ONBORD SHIP SECURITY SURVEY CHECKLIST References: Objective: Part, 8.4, Part B, entire section 8 (8.14 in particular) Develop an onboard security survey checklist specific for your ship based on the information gathered through Steps 1-5 and relevant parts of the ISPS Code, Part and B. What should I check onboard my ship and what is the status? Outcome: n onboard ship security survey checklist, to be used in Step 7. pplication: The checklist shall be used to perform, and document, an onboard ship security survey. What to do: Build your ship specific checklist by using ppendix D, the information gathered so far and, most importantly, your own experience related to your ship and your trading area(s). ppendix D is not meant to be a comprehensive checklist but rather a generic guide which will assist you in the work to build a specific checklist for your ship: Ship Security Checklist Ship Security Checklist Ship Security Check item Checklist Yes No Comments Ship Security Check item Checklist Yes No Comments Security management Ship Security Check item Checklist Yes No Comments Security item management Yes No Check Comments 1.. Security item management Yes No Check Comments 1.. Security management 2.. 1.. Security management 2.. 1.. 2.... 1. 2..... 2.................... Physical ssecurity.... Physical ssecurity.. 1.. Physical ssecurity.. 1.. Physical ssecurity.. 1.. Physical security.. 1.... 1...... Generic checklist Tailormade checklist Ship Security Checklist Check item Yes No Comments Security management.. Existing measures.. Scenario related.. ISPS Code related.... 1. Identify operations, areas, systems, and personnel related to the threat scenarios developed in Step 5. 2. Select the most relevant security areas from ppendix D. 3. dd the existing security measures and the gaps identified in Step 3. 4. Identify any additional items to verify onboard according to your own experience. Importantly, ppendix E provides you with an overview over measures recommended by the ISPS Code related to security level 1, 2, and 3. You should also consider this according to what security level you are currently evaluating for. Page 16 Version 1 (03-05-22)

Ship Security ssessment Guideline Step 7 STEP 7: ONBORD SHIP SECURITY SURVEY References: Part 8.3; Part B 8.14 and 8.10 (in particular) Objective: Outcome: To perform, and document, an onboard ship security survey. Confirmation of security measures assumed to be in place, identification of non-existent/ insufficient security measures. What security measures are lacking and what are the weaknesses of the existing? pplication: Security measures identified as non-existent/insufficient create the basis for the SSP. They also define the remedial actions to be taken. The SSP shall be written to include the duties and responsibilities of those onboard and ashore for implementing these security measures at varying security levels. What to do: 1. Perform an onboard assessment of the ship security by using your checklist developed in Step 6. 2. Go through each item on the checklist and make remarks about the weaknesses, such as: a. Conflict between security and safety measures b. Conflicts between shipboard duties and security assignments c. Watch keeping and manning constraints with implications on crew fatigue, alertness, and performance d. Security training deficiencies e. Insufficient, poorly maintained, sub-standard security equipment/systems. Ship Security Survey Checklist Issue to check: 1..... 2. 3. 4. 5. 6. 7. 8. No Yes Comment Existing security measures in place, ok, but: conflict with safety- evacuation Page 17 Version 1 (03-05-22)

Ship Security ssessment Guideline Step 8 STEP 8: IDENTIFICTION OF WEKNESSES, REMEDIL CTIONS References: Part 8.4.4; Part B 8.3, 8.7, 8.8, 8.9, 8.14 Objective: To identify issues for which security improvements may be needed based on the onboard survey. Propose remedial actions. What security improvements are needed to reduce vulnerability and weaknesses? Outcome: list with identified needs for security improvements; outline of proposals for remedial action. pplication: The identified needs form the basis for the Ship Security Plan by having identified what to plan for. What to do: 1. Go through the checklist from the ship security survey and evaluate the areas where remarks have been made. 2. Identify improvement needs per area. 3. Propose remedial actions for the same security gaps. Ship Security Survey Checklist Issues for improvement Issues to check: 1..... 2. 3. 4. 5. 6. 7. 8. No Yes Comment Existing security measures in place, ok, but: conflict safetyevacuation Page 18 Version 1 (03-05-22)

Ship Security ssessment Guideline Requirements and recommendations to the SSP 4. REQUIREMENTS ND RECOMMENDTIONS TO THE SSP This section provides an overview of some important requirements of the ISPS Code to the Ship Security Plan (SSP) and some recommendations as to how to structure the SSP. The SS is, as stated earlier, and essential an integral part of the process of developing and updating the ship security plan (SSP). The SS shall be documented, reviewed, accepted and retained by the Company, and the submission of a SSP, or amendments, for approval shall be accompanied by the documented SS on the basis of which the SSP, or the amendments, has been developed. The ISPS Code, Part and B, section 9, provides detailed requirements to the SSP. There is not only one right way to structure and prepare a good SSP. Based on experience already done with the making and review of SSP s, a few general recommendations should be noted: 1. Start with the SSP requirements in the ISPS Code, Part B in particular. The Code provides comprehensive information to the content of the SSP. 2. Keep it simple and practical (and remember, what s in the SSP, you must follow)! 3. Use a structured, systematic approach. 4. The documented SS process is a very important basis for the SSP the output from the SS process has provided you with a huge amount of information and knowledge, and has significantly raised your security awareness, making it easier to prepare the SSP. So, how should a good SSP look like? s mentioned, every SSP will look different, and the SSP that fits your ship is not necessarily the right one for another ship. This SS Guideline will not go into detail in the making of a high-quality SSP, but a good guidance as to how to structure the SSP can be found by looking at a few external sources. One such guideline can be found in the recommendations to the SSP from the USCG (NVIC 10-02), Vessel Security Plan Outline : 1. Introduction 2. Ship data, drawings 3. Ship organisation/ ship security organisation 3. Company Security Officer (CSO) 4. Ship Security Officer (SSO) 5. Plan documentation 6. Communication and co-ordination with port, waterfront facility, law enforcement, company, the CSO and the SSO 7. Ship Security ssessment Page 19 Version 1 (03-05-22)

Ship Security ssessment Guideline Requirements and recommendations to the SSP 8. Maritime Security Levels and associated measures 9. Security ctions 10. Ensuring the performance of all ship security duties 11. Monitoring restricted areas to ensure that only authorised persons have access 12. Controlling access to the ship 13. Monitoring of deck areas and areas surrounding the ship 14. Controlling the embarkation of persons and their effects 15. Supervising the handling of cargo and ship stores 16. Ensuring that port-specific security communication is readily available 17. Ship/waterfront facility interface 18. Training and drills 19. Contingency Plans & Standard Operating Procedures (SOP s) maintenance The International Chamber of Shipping (www.marisec.org) is also about to develop an outline of an approved SSP. Results from this work will be presented in early-2003. nother source of information can be found by looking at the (preliminary) checklist to a SSP prepared by an RSO (Det Norske Veritas). Remember, it is the RSO who is going to approve your SSP. The following checklist based on the ISPS Code, indeed will most likely be modified in the coming weeks and months as more SSP s are approved, yet it provides a good idea to the required content & structure of an SSP: 1 General 1.1 Introduction 1.2 Ship, port, and trade specific data 1.3 Ship data 2 Ship Security ssessment 2.1 General 2.2 Qualifications 2.3 Expert assistance 2.4 Prerequisites 2.5 Information required 2.6 Threats and vulnerabilities 2.7 Identification of measures 2.8 Examination of access 2.9 Existing security measures 2.10 Potential vulnerabilities 2.11 On-scene security survey 3 SSP Details 3.1 General 3.2 Company statement 3.3 Master s discretion 3.4 Ship organization and communication 3.5 Company Security Officer Page 20 Version 1 (03-05-22)

Ship Security ssessment Guideline Requirements and recommendations to the SSP 3.6 Ship Security Officer 3.7 Qualifications of the SSO 3.8 Shipboard personnel 3.9 Shipboard personnel qualifications 3.10 Training, exercises and drills 3.11 udits 3.12 Periodic review 3.13 Reporting of security incidents 3.14 Interface with port facilities 3.15 Dangerous goods 3.16 Declaration of security 3.17 dministration of SSP 3.18 Security equipment 3.19 Ship security alert system 3.20 Records 3.21 Crewing and charterers 4 Ship Security Measures to be Implemented based no the Security Level 4.1 ccess to the ship (Sections: General, Security Level 1, 2, and 3) 4.2 Restricted areas (General, Security Level 1, 2, and 3) 4.3 Handling of cargo (General, Security Level 1, 2, and 3) 4.4 Delivery of ship stores (General, Security Level 1, 2, and 3) 4.5 Handling of unaccompanied luggage (General, Security Level 1, 2, and 3) 4.6 Monitoring the security of the ship (General, Security Level 1, 2, and 3) 4.7 Differing security levels 4.8 ctivities not covered by the ISPS Code 4.9 Response to security threats 4.10 Response to security actions 4.11 Contigency procedures, evacuation 4.12 DNV (RSO) recommendation 5 Conclusions and Recommendations for further Work [in the certification, plan approval process] Relevant report forms, e.g. on reporting of unlawful acts, should also be included in the SSP. Other RSO s have their own, and probably alternative, checklists to the content of an SSP. It should also be mentioned that the Company is obligated to ensure that the SSP contains a clear statement emphasising the Master s authority. The Master has the overriding authority and responsibility to make decisions with respect to the security of his ship, and to request the assistance of the Company, or of any Contracting Government, as may be necessary. The Company shall ensure that the Company Security Officer, the Master and the Ship Security Officer are given the necessary support to fulfil their duties and responsibilities in accordance with the Code. Page 21 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix PPENDIX IDENTIFICTION OF MOTIVES Motive: Questions to be asked: Example: 1. POLITICL: 1.1 Does it exist political (incl. religious, ideological, Cargo (e.g. weapon parts, Norwegian whale, nuclear ethnical, nationalistic) motives related to your ship cargo) and trade area/port (Middle East, US) (flag, owner, crew) or trade (cargo, passengers, trade area or port)? 1.2 Does your ship trade in an area with unstable political Countries with elections, demonstrations, civil war, situation? riots (West frica, Middle East) 1.3 dd other relevant questions: Motivating factors? Not likely Probable Likely Comment: 2. SYMBOLIC: 2.1 Can your ship be used as a means to harm symbolic constructions on the trade? 2.2 Does your ship visit a port where international events take place? 2.3 Can your ship be used as means to harm important environmental areas? 2.4 Does your ship itself represent or carry a symbolic value? Well known buildings, statues, bridges, etc. (Golden gate, Sidney opera, etc.) Exhibitions, sports, political, etc. (Olympic Games, EXPO, WTO meeting, etc.) reas for tourism, commercial exploitation of nature (fish farming, beaches, coastal cities, etc.) Ship carries special cargo (e.g. weapons), support operations (oil to war actions, equipment to industry projects), represent attitudes at debate (cruise, natural resources, etc.). Page 22 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix 2.5 Does the visibility or the profile of your ship, company or brand represent a motive for unlawful acts? 2.6 dd other relevant questions: Because of your policy (exploitation of labour, political attitudes), the operations you are involved (natural resources, weapons, etc.). 3. ECONOMICL: 3.1 Gain: 3.1.1 Does your ship carry special cargo (economical value, Plutonium, equipment for mass destruction, etc. restricted availability)? 3.1.2 Is it likely that terror related smuggling take place from ports your ship is visiting? Smuggling of people/goods from frica to Italy. (Intelligence) 3.1.3 Is it likely that your crew can take part in or embrace Ethnical motives and common cause. terror related smuggling? 3.1.4 Is your ship trading in an area known for piracy? See nnual Piracy Report (ICC) 3.1.5 Does your ship, cargo or passengers represent risk for Hijacking? Valuable ship, cargo and passengers used for threats and barging demands. 3.1.6 dd other relevant questions: 3.2 Damage to Society/Industry: 3.2.1 Can your ship be used to damage important nodal points for trade or commercial activity? Block ports or canal, collide with bridges or offshore installations, etc. 3.2.2 Is the trade your ship represents critical to society? Critical equipment to industry projects (e.g. pipelines, offshore installations, etc.), or for industry production (gold, silver, silicates, etc.) Page 23 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix 3.2.4 Will an unlawful act against your ship or trade harm the state of the industry? 3.2.5 dd other relevant questions: Reduced market due to reduced trust (cruise, passenger transport, etc.) 3.3 Damage to Company: 3.3.1 Does your ship itself or the cargo represent critical income for your company? 3.3.2 Does your company have any enemies that are capable of committing unlawful acts? 3.3.3 dd other relevant questions: Significant loss because of specialised ship for special cargo, operation, etc. Political groups, business competitors, former employees, etc. 4 FER: 4.1 Can your ship be used as a means to escalate consequences and thus create fear in the society? 4.2 dd other relevant questions: Explosion, collision with construction, ammonia discharge, etc. Because of the consequences that result (numerous fatalities of passengers, discharge of radio actives, etc.) 5 OTHER: 5.1 re there any other motives for use of unlawful acts against your ship? 5.2 dd other relevant questions: Unlawful acts towards your ship will result in media attention. OVERLL SSESSMENT OF MOTIVES - Summarise the check-offs and evaluate which one that should be considered Page 24 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix B PPENDIX B KEY SHIPBORD OPERTIONS ppendix B may be used to, 1. Identify critical shipboard operations, systems, physical areas and personnel that may be subject to security incident (left column, input from Step 2). These should be evaluated in relation to your trading area(s), the ship and operations characteristics, and so on. 2. Existing security measures for the same operations, systems, areas (right column input from Step 3 - includes elements from Part B 9.9-9.49) Operations with related systems, areas and personnel 1. CCESS CONTROL - Personnel, passengers, visitors, etc. 1.1 ccess ladders 1.2 ccess gangways 1.3 ccess ramps 1.4 ccess doors, side scuttles, windows and ports 1.5 Mooring ropes and anchor chains 1.6 Cranes and hosting gear 1.7 ccess by ships side (freeboard) 1.8 Equipment and baggage brought onboard 1.9 Unaccompanied baggage found onboard dd issues you find relevant: From Step 2: From Step 3: Security measures in Criticality place Low High Yes No Comments Page 25 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix B Operations with related systems, areas and personnel 2. RESTRICTED RES ON THE SHIP 2.1 Navigation bridge 2.2 Navigational means (radio, radar, GPS, etc.) 2.3 Machinery spaces, power supplies, steering rooms 2.4 Control rooms 2.5 Galley/pantry 2.6 Ventilation and air conditioning system 2.7 Spaces with access to potable water tanks, pumps or manifold 2.8 Hull, ballast tanks 2.9 Rudder and propeller dd issues you find relevant Security measures in Criticality place Low High Yes No Comments 3. CRGO HNDLING 3.1 Cargo access points (hatches, ports, pipings) 3.2 Cargo storage spaces (incl. access points) 3.3 Spaces containing dangerous goods or hazardous substances 3.4 Cargo handling equipment dd issues you find relevant: Page 26 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix B Operations with related systems, areas and personnel 4. SHIP STORES HNDLING 4.1 ccess points for delivery to ship 4.2 Storage spaces 4.3 ccess points to storage spaces dd issues you find relevant: Security measures in Criticality place Low High Yes No Comments 5. SECURITY MONITORING 5.1 Lighting 5.2 Watch-out (voyage) 5.3 Security guards and deck watches, including patrols 5.4 utomatic intrusion detection advice 5.5 Surveillance monitoring 5.6 Security and surveillance equipment spaces dd issues you find relevant: 6. SFETY OPERTIONS 6.1 Life boats and life belts 6.2 larms, signals and marking 6.3 Evacuation routes 6.4 Fire fighting system dd issues you find relevant: Page 27 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix C PPENDIX C THRET SCENRIOS ND SSESSMENT The SS should consider all possible threats, which may include (ISPS Code Part B, 8.9): 1. Damage to, or destruction of, the ship (bombing, arson, sabotage) 2. Hijacking or seizure of the ship/persons onboard Means, methods Hijacking ISPS Code, Part B, 8.9.2 Others take control over ship Unauthorised access Part B, 8.9.4 Tampering with cargo Part B, 8..3 3. Tampering with cargo, ship equipment, systems ship stores t berth 4. Unauthorised access or use, incl. stowaways t anchor 5. Smuggling of weapons or equipment, weapons of mass destruction t sea 6. Use the ship to carry perpetrators and their personal equipment 7. Use of the ship as weapon or as means to cause damage, destruction Security incidents Use the ship as a weapon Part B, 8.9.7 Damage to or destruction of the ship Part B, 8.9.1 Damage to cargo or passenger onboard Smuggling of weapons Part B, 8.9.5 Use the ship to carry perpetrators Part B, 8.9.6 This list below is not comprehensive but it provides you with a long range of scenario examples. Try to think out of the box, and find scenarios that are relevant for your vessel and your trade. Make comments and evaluate consequences and likelihood on an appropriate level. Consequence categories to be used: Moderate: Little or no loss of life or injuries, minimal economic impact, or some environmental damage. High: Multiple losses of life or injuries, major regional economic impact, long-term damage to a portion of the eco-system Extreme: Numerous loss of life or injuries, major national or long term economic impact, complete destruction of multiple aspects of the eco-system over a larger area Page 28 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix C Threat: 1. Damage to, or destruction of, the ship (bombing, arson, sabotage, vandalism) Hide explosives onboard, initiate with timer/remote From Step 4 From Step 5: Relevant: Possible Consequences - Human, Material, Environment Yes No Moderate High Extreme Likelihood Not likely Not unlikely Comment: Bring explosives onboard, suicidal/high risk action Place explosives in cargo, initiate with timer/remote ttach explosives to hull, initiate with timer/remote Explode ship by external craft, torpedo, mine, etc. Force oil/gas leakage: engine room / cargo tanks Set ship on fire Open bow port, cargo hatch (to sink or capsize) Drain holes, to sink or capsize Cut pipes (water intake) to change trim ctivate pumps to change trim.other Threat: 2. Hijacking or seizure of the ship or of persons on board Relevant: Possible Consequences - Human, Material, Environment Yes No Moderate High Extreme Likelihood Not likely Not unlikely Comment: Crew takes control over ship Passengers take control Page 29 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix C Stowaways/boarded person take control Hijacking through (bomb) threat Hijacking of crew or passengers Unlawful detention of ship / crew or passenger by port authority or state other Threat: 3. Tampering with cargo, essential ship equipment or systems or ship s stores Relevant: Possible Consequences - Human, Material, Environment Yes No Moderate High Extreme Likelihood Not likely Not unlikely Comment: Block critical systems like propulsion, steering etc Contaminate bunker Damage ship systems, navigation, loading, False nav data/guidance (radar, VTS, pilot, chart) Contaminate drinking water or food Release gas onboard Contaminate cargo Destroy lifesaving equipment Destroy ship interiors other Page 30 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix C Threat: 4. Unauthorised access or use including presence of stowaways Relevant: Possible Consequences - Human, Material, Environment Yes No Moderate High Extreme Likelihood Not likely Not unlikely Comment: Stowaways sneaking onboard /hiding in cargo Boarding ship at port or during voyage as passenger or crew Boarding ship at port or during voyage as pilot, supplier, surveyor, fake castaway Unauthorised boarding ship at pilot entrance or STS operations Unauthorised boarding of ship at voyage via vessel/craft/helicopter Unauthorised boarding ship at voyage via shipwrecked (Unauthorised use, see item 5) other Threat: 5. Smuggling weapons or equipment, including weapons of mass destruction Hide goods in cargo Relevant: Possible Consequences - Human, Material, Environment Yes No Moderate High Extreme Likelihood Not likely Not unlikely Comment: Hide goods in crews luggage Hide goods in passengers luggage Hide goods in ship supplies other Page 31 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix C Threat: 6. Use of the ship to carry perpetrators and their personal equipment Relevant: Possible Consequences - Human, Material, Environment Yes No Moderate High Extreme Likelihood Not likely Not unlikely Comment: Stowaways sneaking onboard /hiding in cargo Boarding ship at port or during voyage as passenger or crew Boarding ship at port or during voyage as fake pilot, supplier, surveyor, or similar..other Threat: 7. Use of the ship itself as a weapon or as a means to cause damage or destruction Relevant: Possible Consequences - Human, Material, Environment Yes No Moderate High Extreme Likelihood Not likely Not unlikely Comment: Crew take control over ship Passengers take control Stowaways/boarded person take control Block critical systems like propulsion, steering etc in a critical position (near terminal etc) Given a hijacked situation (item 4): Take control over ship and hit another ship Given a hijacked situation (item 4): Take control over ship and hit a landbased construction / terminal / chemical plant or similar Given a hijacked situation (item 4): Take control over ship and hit an offshore Page 32 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix C installation Given a hijacked situation (item 4): Take control over ship and hit a rock / provoke grounding other Page 33 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix D PPENDIX D - SHIP SECURITY SURVEY CHECKLIST PURPOSE The SS should consider the continuing relevance of the existing security measures and guidance, procedures and operations, under both routine and emergency conditions and should determine security guidance. For practical purposes, and for the design of this checklist, we assume that a Ship Security Plan (SSP) is already in the making and/or onboard. If this is (still) not the case, please do not put too much emphasis on the questions in this checklist that directly refers to the SSP. BBREVITIONS : With direct reference to Part of the ISPS Code SSP: Ship Security Plan SSO: Ship Security Officer CSO: Company Security Officer PFSO: Port Facility Security Officer IS: utomatic Identification System SS: Ship Security ssessment PRT 1 SECURITY MNGEMENT Security Code Ref. SECURITY MESURES YES NO COMMENTS 1. COMPNY SECURITY MNGEMENT & POLICY Is the Master, Ship Security Officer (SSO), and crew familiar with the company s security objective and policy? Is a ship security plan (SSP) kept onboard, including company policy on ship security? Has the SSP been in operation for at least 3 months? Is there a company policy, and related procedures, for the company s balance and handling of safety and security conflicting issues? re adequate resources, including shore based support, provided for the ship to meet the goals of the company security policy? re there procedures for emergency preparedness, response and contingency manning? re there procedures for handling sensitive security related information and communication? Is there any agreement with a private security company? Page 34

Ship Security ssessment Guideline ppendix D 2. COMPNY SECURITY ORGNIZTION Is the company security organization described in an organization chart, including description of the following issues: Interrelations onboard (CSO vs Master responsibility etc), Handling of different types of ship-shore interrelations (company, port facilities, maritime authorities)? re job descriptions, and/or responsibilities and authorities readily available for shipboard personnel? 3. COMPNY SECURITY OFFICER (CSO) Has the company appointed a CSO(s)? Is it identified for which ships the CSO is responsible? re there 24-hour contact details for the CSO available onboard? re the Ship Security Officer and the Master knowledgeable about how to contact the CSO? Is the CSO s duties and responsibilities clearly described in the ship security plan? Does the CSO arrange for internal audits of security activities? Is the CSO promptly addressing deficiencies and nonconformities? Is the CSO s corrective actions documented? Does the CSO provide adequate training for personnel responsible for the security of the ship? Is the CSO ensuring effective communication and co-ordination between the ship security officer and the relevant port facility security officer? Is there evidence that the CSO is working to enhance the security awareness and vigilance onboard? Is the CSO ensuring consistency between security requirements and safety requirements? re the mentioned issues about the CSO described in the company security plan? Does the CSO have knowledge of current security threats and patterns? 4. SHIP SECURITY OFFICER (SSO) Has the ship appointed a SSO? Has this person been acting as SSO for the last 3 months? Is the SSO qualified as a security specialist (e.g., through special training and/or education?) re the SSO s duties and responsibilities, including his reporting lines, clearly described in the SSP? Is there evidence that the SSO is undertaking regular security inspections of the ship? Page 35

Ship Security ssessment Guideline ppendix D inspections of the ship? Is there evidence that the SSO is reporting all security deficiencies, non-conformities, and security incidents? Is there evidence that the corrective actions are implemented? Is there a policy and procedures for how the SSO should handle safety and security conflicting issues? Does the SSO have knowledge of current security threats and patterns? Does the SSO have knowledge on how to recognize and detect weapons, dangerous substances and devices? Does the SSO have knowledge on how to recognize characteristics and behavioral patterns of persons who are likely to threaten security? Does the SSO know techniques used to circumvent security measures? 5. MSTER Is it established in the SSP that the Master has the overall responsibility for the ship s safety and security? Is there evidence that the ship Master is aware of his full responsibilities w.r.t.: The ship s security planning, Ship security implementation and maintenance, The Master s responsibility to request company assistance if necessary, and so on? Has the Master read the SSP? Is there evidence that the Master is performing ship security verification according to company procedures, including the formal verification of different books, including: The SSP, The training record book The deck log Cargo record book, etc Does the Master have full understanding of the SSO s duties versus his/her own duties? The Master has available onboard updated documented information on who appoints the crew, who decided and decides the employment of the crew, and who signed and sings the charter party. Is there evidence that the Master (and the SSO) is providing ongoing motivation of crew with respect to ship security, as described in the SSP? re security related duties delegated to officers under Master s command issued in a clear and simple way, as described in the SSP? 5. SHIP S PERSONNEL Page 36

Ship Security ssessment Guideline ppendix D Is the crew familiar with the content of the company security policy and the related procedures, as described in the SSP? Is there evidence about the crew s awareness in security related issues (e.g., access control of people, cargo control, restricted areas onboard, responsibilities in case of security threats, etc)? Does the crew know who is appointed to the different security duties? Does the crew know how to respond to an attack or threat situation? (e.g. activate alert system?) 6. TRINING & QULIFICTIONS re there procedures for onboard for security training and drills (both for officers and ratings)? Is the security training properly recorded? re needs for security training identified and onboard training programs made for new and existing crew? Have the crew received adequate training in security matters, as described in the SSP? 7. SHIP SECURITY PLN Is the ship security plan available onboard? Is the ship security plan approved by the dministration (RSO, Recognized Security Organization)? re all changes to the security plan approved by the dministration? Is the ship able to move from security level 1 to level 2 by itself without outside assistance? re there procedures described for how to respond to instructions from Contracting Governments on security level 3? Is the security plan property protected from unauthorised access or disclosure? Is there response procedure for fire or other emergency conditions? Does the SSP contain guidance and procedures to: Vessel details Organizational structure of security for the ship? Duties of personnel assigned security responsibility described (CSO, SSO, Master, Officers & Ratings)? Details on the ship s relationships with the company, port facilities, other ships and relevant authorities with security responsibility? Details on the communication systems to other ships and to Page 37

Ship Security ssessment Guideline ppendix D port facilities? Details on basic security measures for Security Level 1? Details on how to upgrade the ship to Security Level 2 without delay? Details on how to respond to instructions from Contracting Government on Security Level 3? Procedures for security actions in case of threats or breaches of security? Procedure on regular review/audits and updating of the SSP? Procedures on reporting security incidents? Procedures for auditing security activities? Procedures to assess security equipment? Is the ship protecting security sensitive information, available either electronically or on paper? 8. SHIP SECURITY SURVEYS, SECURITY UDITS re (internal) security audits performed onboard according to procedures in the SSP? re the internal audits conducted by personnel independent of the activities being audited? 9. SECURITY RECORDS re records of training, drills and exercises kept onboard? re records of reports of security incidents kept onboard? re records of breaches of security kept onboard? re records of changes in security level kept onboard? re records of maintenance, calibration and testing of security measures and related equipment kept onboard? re records of communications relating to the security of the ship are kept onboard? re records of internal audits and reviews of security activities? re records with memos from onboard security meetings are kept onboard? 10. SHIP/SHORE INTERFCE Is the SSO communicating and co-ordinating security issues with the PFSO? Is the ship fitted with a valid Ship Security Certificate? Page 38

Ship Security ssessment Guideline ppendix D Is port specific security information (e.g. threats and their protective measures) readily available? re there procedures for advising the PFSO if the ship has a higher security level than the port? Is the SSO in close liaison with the PFSO to agree on measures to respond to higher security levels? Is there a procedure available for the SSO to prepare a Declaration of Security for the purpose of co-ordination of SSO and PFSO responsibilities? Is there a form available for the SSO to prepare a Declaration of Security? (ISPS code Part B, ppendix 1 is a suggested format) Page 39

Ship Security ssessment Guideline ppendix D PRT 2 - ONBORD SECURITY MESURES Security Code Ref. SECURITY MESURES YES NO COMMENTS 1. CCESS TO THE SHIP Does the SSP contain security measures covering the access to the ship? re access ladders identified and monitored? re access gangways identified and monitored? re access ramps identified and monitored? re access doors, side scuttles, windows, hatches and ports identified and monitored? re mooring ropes and anchor chains identified and monitored? re cranes and hoisting gear identified and monitored? re other access points identified in the SS? re identity documents of all persons seeking to board the ship checked? re there procedures and records available for how to check this? re the reasons for the people boarding the ship confirmed by checking joining instructions, passenger tickets, boarding passes, work orders etc? re the personal effects of passengers controlled? Is the embarkation of crew controlled? re the personal effects of crew controlled? re there procedures on how to check any other people accessing the ship (e.g. visitors, vendors, repair technicians, port facility personnel etc.) re designated secure areas established (in coordination with the port facility) where inspections and searching of people, baggage (including carry on items), personal effects, vehicles and their contents can take place? re vehicles destined to be loaded on board car carriers, ro-ro and other passenger ships searched prior to loading in accordance with the frequency required in the SSP? re checked persons and their personal effects segregated from unchecked persons and their personal effects? May be deleted from Part B in Dec. Is the embarking segregated from the disembarking passengers? re unattended spaces adjoining areas to which passengers and visitors have access secured, by locking or other means? re security briefings provided to all ship personnel on possible threats, the procedures for reporting suspicious persons, objects or activities and the need for vigilance? Page 40

Ship Security ssessment Guideline ppendix D re there procedures for how to raise alarm and to react if unauthorized boarding is detected? re there procedures for checking with PFSO if identity and purpose checks of people have been performed prior to entering the ship/port interface? re there procedures for additional measures to take while in port (of another Contracting Government)? Is the ship embarking persons or loading stores or cargo at a port of from another ship where either the port facility of the other ship is in violation with or is not required to comply with chapter XI-2 or Part. Will the ship receive people, stores or cargo unloaded from an aircraft of unknown security status? re there procedures for checking persons or goods boarding the ship as a result of a rendering assistance at sea? re locations and functions of each actual or potential access point to the ship identified? re evacuation routes and assembly stations defined and maintained? 1. CCESS TO THE SHIP RECOMMENDED DDITIONL MESURES FOR SECURITY LEVEL 2 re additional personnel assigned to patrol deck areas during silent hours to deter unauthorized access? Is the number of access points to the ship limited, identifying those to be closed and the means of adequately securing them? Is the access to the ship deterred, including the provision of boat patrols on the waterside of the ship? Is the shore-side of the ship established as a restricted area, in close co-operation with the port facility? re the frequency and detail of searches of people, personal effects, and vehicles increased? re visitors to the ship being escorted? re additional specific security briefings provided to all ship personnel on any identified threats, in order to re-emphasize the procedures for reporting suspicious persons, objects, or activities and stressing the need for increased vigilance? 1. CCESS TO THE SHIP RECOMMENDED DDITIONL MESURES FOR SECURITY LEVEL 3 t security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Is the access to the ship limited to a single, controlled, access point? re only those responding to the security incident or threat thereof granted access? Page 41

Ship Security ssessment Guideline ppendix D Have persons on board received directions? Is embarkation or disembarkation suspended? re cargo handling operations, deliveries etc. suspended? Is evacuation of the ship planned for? Is the movement of the ship reconsidered or terminated? 2. RESTRICTED RES re restricted areas defined, and, where relevant, clearly marked? Is the ship s personnel (Master, SSO, crew) able to identify the restricted areas onboard? Is surveillance equipment, eg, security alarms, used to monitor the restricted areas? re guards or patrols used to monitor the restricted areas? re automatic intrusion detection devices used to alert the ship s personnel of unauthorized access? re there measures to prevent unauthorized persons to access the navigational bridge? re there measures onboard to prevent unauthorized persons to access the machinery spaces (Category )? re there measures onboard to prevent unauthorized persons to access the control stations (defined in ISPS Code, Chapter II-2)? re there measures onboard to prevent unauthorized persons to access spaces containing security and surveillance equipment and systems and their controls and lighting system controls? re there measures onboard to prevent unauthorized persons to access ventilation and air-conditioning systems and other similar spaces? re there measures onboard to prevent unauthorized persons to access spaces with access to potable water tanks, pumps, or manifolds? re there measures onboard to prevent unauthorized persons to access spaces containing dangerous goods or hazardous substances? re there measures onboard to prevent unauthorized persons to access spaces containing cargo pumps and their controls? re there measures onboard to prevent unauthorized persons to access cargo spaces and spaces containing ship s stores? re there measures onboard to prevent unauthorized persons to access crew accommodation? re there measures onboard to prevent unauthorized persons to access any other areas as determined by the CSO, through the SS to which access must be restricted to maintain the security of the ship? Page 42

Ship Security ssessment Guideline ppendix D 2. RESTRICTED RES RECOMMENDED DDITIONL MESURES FOR SECURITY LEVEL 2 re additional restricted areas particularly adjacent to access points identified and monitored? re surveillance equipment continuously monitored? re additional personnel dedicated to guard and patrol restricted areas? 2. RESTRICTED RES RECOMMENDED DDITIONL MESURES FOR SECURITY LEVEL 3 t security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? re additional restricted areas on the ship set up in proximity to the security incident, or the believed location of the security threat, to which access is denied? re restricted areas searched as part of the search of the ship? 3. HNDLING OF CRGO re there routines in place for checking of cargo, cargo transport units and cargo spaces prior to, and during, cargo handling operations? Is there evidence, through records, that the procedures (cargo control) are followed? Is the handling of cargo supervised by the ship personnel (SSO)? re there procedures for handling of dangerous goods or hazardous substances? Is an updated inventory kept on any dangerous goods or hazardous material carried on board? re any checks carried out (procedures for) to ensure that cargo being loaded matches the cargo documentation? Is the procedures for cargo checking communicated to PFSO? re there procedures ensuring, in liaison with the port facility, that vehicles to be loaded on board car-carriers, ro-ro and passenger ships are subjected to search prior to loading, in accordance with the frequency required in the SSP? Is checking of seals or other methods used to prevent tampering? Is cargo being checked visually or by examinations? Is canning or detection equipment, mechanical devices or dogs being used? 3. HNDLING OF CRGO RECOMMENDED MESURES FOR SECURITY LEVEL 2 Page 43

Ship Security ssessment Guideline ppendix D re more detailed checking of cargo, cargo transport units, and cargo spaces performed? re records on the same kept onboard? re checks intensified to ensure that only the intended cargo is loaded? Is the searching of vehicles to be loaded on car-carriers, ro-ro and passenger ships intensified? Is the frequency increased in checking of seals or other methods used to prevent tampering? Is cargo being checked with increased frequency and detail of visual and physical examination? Is the frequency of the use of scanning/detection equipment, mechanical devices, or dogs increased? re enhanced security measures coordinated with the shipper or other responsible party in addition to establishing agreement and procedures? 3. HNDLING OF CRGO RECOMMENDED MESURES FOR SECURITY LEVEL 3 t security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Is the loading or unloading of cargo suspended? Is the inventory of dangerous goods and hazardous substances carried on board verified? 4. SHIP S STORE re there procedures in place for supervision of the delivery of ship stores (to prevent acceptance without inspection)? re there procedures for handling of ship s stores to prevent acceptance unless ordered? Is there evidence, through records, that the procedures (ship s store control) are followed? Is an updated inventory on any dangerous goods or hazardous material carried on board? Is ship s stores and package integrity being checked? For ships regularly using the port facility; are procedures established with the port facility to cover notification and timing of deliveries and their documentation? re stores checked if matching the order prior to being loaded on board? Is immediate secure stowage of ship s stores ensured? Page 44

Ship Security ssessment Guideline ppendix D 4. SHIP S STORE RECOMMENDED DDITIONL MESURES FOR SECURITY LEVEL 2 re checks exercised prior to receiving stores on board and intensifying inspections? 4. SHIP S STORE RECOMMENDED DDITIONL MESURES FOR SECURITY LEVEL 3 t security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? re ship s stores more extensively being checked? Is the handling of ship s stores restricted or suspended? Does the ship refuse to accept new deliveries of ship s stores on board the ship? 5. UNCCOMPNIED BGGGE re there procedures in place for how to handle and where to store unaccompanied baggage? Is there evidence the procedures are followed? Is any unaccompanied baggage being appropriately screened (100%) and searched (by port or ship), before it is loaded onboard the ship? re there procedures and measures in place for close cooperation with the port facility to ensure that unaccompanied baggage is handled securely after screening? 5. UNCCOMPNIED BGGGE - RECOMMENDED DDITIONL MESURES FOR SECURITY LEVEL 2 Is 100% of unaccompanied baggage being x-ray screened? 5. UNCCOMPNIED BGGGE - RECOMMENDED DDITIONL MESURES FOR SECURITY LEVEL 3 t security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? re such baggage subjecting to more extensive screening, for example x-raying it from at least two different angles? Is the handling of unaccompanied baggage restricted or suspended? Is the ship refusing to accept unaccompanied baggage on board? 6. MONITORING THE SECURITY OF THE SHIP re there procedures for inspection, testing, calibration and maintenance of any security equipment onboard? Page 45

Ship Security ssessment Guideline ppendix D re restricted areas being monitored? (see also item 2) re deck areas being monitored? re surrounding areas being monitored? Is the security communication equipment readily available? Is security information readily available onboard? Is and automatic intrusion detection device fitted onboard? If so, does it activate an audible and/or visual alarm at a location that is continuously attended or monitored? Is security equipment installed onboard maintained, working properly, and readily available? re procedures established to ensure that monitoring equipment will be able to perform continuously, including consideration of the possible effects of weather conditions or of power disruptions? re the ship's deck and access points illuminated at all times while conducting ship/port interface activities or at a port facility or anchorage? Is the ship using the maximum lighting available while underway, consistent with safe navigation? (Having regard to the provisions of the 1972 COLREGS) Is the lighting sufficient to ensure the ship s personnel to be able to detect activities beyond the ship, on both the shore side and the waterside? Is the lighting coverage including the area on and around the ship? Is the lighting coverage facilitating personnel identification at access points? Is the lighting coverage provided through coordination with the port facility? 6. MONITORING THE SECURITY OF THE SHIP RECOMMENDED MESURES FOR SECURITY LEVEL 2 Is the frequency and detail of security patrols increased? Is the coverage and intensity of lighting increased? Is the use of security and surveillance equipment increased? Is additional personnel assigned as security lookouts? Is coordination with waterside boat patrols, and foot or vehicle patrols on the shore-side, ensured when provided? 6. MONITORING THE SECURITY OF THE SHIP RECOMMENDED MESURES FOR SECURITY LEVEL 3 t security level 3, is the ship prepared to respond to and implement any security instructions issued by the Contracting Government that has set the security level 3? Page 46

Ship Security ssessment Guideline ppendix D re all lighting switched on? Is the vicinity of the ship illuminated? re all on board surveillance equipment capable of recording activities on, or in the vicinity of, the ship? Is the length of time such surveillance equipment can continue to record maximized? Is underwater inspection of the hull of the ship prepared for? re measures initiated, including the slow revolution of the ship s propellers, if practicable, to deter underwater access to the hull of the ship? OTHER Is the ship fitted with a security alert system? Is the security alert system working as intended? (Not raising alarm on board, transmitting information to shore?) re there at least 2 locations onboard where the alert system could be activated (on the bridge and at least one other location)? Is the alert system protected from inadvertent initiation? re there procedures for the use of the ship security alert system re the locations for the activation of the alert system identified? (Must be kept in a restricted/confidential document) Is the ship fitted with IS? Is the IS in operation at all times? Is the ship s number permanently marked according to the ISPS code? Is the ship issued with a Continuous Synopsis Record (issued by the dministration) according to SOLS chapter XI, regulation 5? Is the Continuous Synopsis Record updated? Is the history of the changes of the Record available? If firearms are being held onboard, are there procedures/orders for their use? Page 47

Ship Security ssessment Guideline ppendix E PPENDIX E - SUMMRY OF SECURITY MESURES (PRT B, SECTION 9) Measures 1. ccess to the Ship by ship s personnel, passengers, visitors, etc. The SSP should establish the security measures covering all means of access to the ship identified in the SS. This should include any: 1. ccess ladders; 2. access gangways; 3. access ramps; 4. access doors, side scuttles, windows and ports; 5. mooring lines and anchor chains; 6. cranes and hoisting gear, and 7. other access points identified in the SS. Security Level 1 Security Level 2 SecuritySecurity Level 3 t security level 1, the SSP should establish the security measures to control access to the ship, where the following may be applied: 1. checking the identity of all persons seeking to board the ship and confirming their reasons for doing so by checking joining instructions, passenger tickets, boarding passes, work orders etc; 2. in liaison with the port facility the ship should ensure that designated secure areas are established in which inspections and searching of people, baggage (including carry on items), personal effects, vehicles and their contents can take place 3. in liaison with the port facility the ship should ensure that vehicles destined to be loaded on board car carriers, ro-ro and other passenger ships are subjected to search prior to loading, in accordance with the frequency required in the SSP; 4. segregating checked persons and their personal effects from unchecked persons and their personal effects; 6. segregating embarking from disembarking passengers; 7. identification of access points that should be secured or attended to prevent unauthorized access; 8. securing, by locking or other means, access to unattended spaces adjoining areas to which passengers and visitors have access; and 9. providing security briefings to all ship personnel on possible threats, the procedures for reporting suspicious persons, objects or activities and the need for vigilance. t security level 2, the SSP should establish the security measures to be applied to protect against a heightened risk of a security incident to ensure higher vigilance and tighter control, which may include: 1. assigning additional personnel to patrol deck areas during silent hours to deter unauthorised access; 2. limiting the number of access points to the ship, identifying those to be closed and the means of adequately securing them; 3. deterring waterside access to the ship, including, for example, in liaison with the port facility, provision of boat patrols 4. establishing a restricted area on the shore-side of the ship, in close co-operation with the port facility; 5. increasing the frequency and detail of searches of people, personal effects, and vehicles being embarked or loaded onto the ship; 6. escorting visitors on the ship; 7.providing additional specific security briefings to all ship personnel on any identified threats, reemphasising the procedures for reporting suspicious persons, objects, or activities and the stressing the need for increased vigilance; and, 8. carrying out a full or partial search of the ship. t security level 3, the ship should comply with the instructions issued by those responding to the security incident or threat thereof. The SSP should detail the security measures which could be taken by the ship, in close co-operation with those responding and the port facility, which may include: 1. limiting access to a single, controlled, access point; 2. granting access only to those responding to the security incident or threat thereof; 3. directions of persons on board; 4. suspension of embarkation or disembarkation; 5. suspension of cargo handling operations, deliveries etc; 6. evacuation of the ship; 7. movement of the ship; 8. preparing for a full or partial search of the ship. Page 48 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix E 2. Restricted reas on the Ship. Security Level 1 Security Level 2 SecuritySecurity Level 3 The SSP should identify the restricted areas to be established on the ship, specify their extent, times of application the security measures to be taken to control access to them and those to be taken to control activities within them. Restricted areas may include: t security level 1, the SSP should establish the security measures to be applied to restricted areas, which may include: t security level 2, the frequency and intensity of the monitoring of, and control of access to restricted areas should be increased to ensure that only authorized persons have access. The SSP should establish the additional security measures to be applied, which may include: 1. navigation bridge, mach. spaces of category and other control stations as defined in Ch.II-2; 2. spaces containing security and surveillance equipment and systems and their controls and lighting system controls; 3. ventilation and air-conditioning systems and other similar spaces; 4. spaces with access to potable water tanks, pumps, or manifolds; 5. spaces containing dangerous goods or hazardous substances; 6. spaces containing cargo pumps and their controls; 7. cargo spaces and spaces containing ship s stores; 8. crew accommodation; and 9. any other areas as determined by the CSO, through the SS to which access must be restricted to maintain the security of the ship. 3. Handling of Cargo. The security measures relating to cargo handling should: 1. prevent tampering, and 2. prevent cargo that is not meant for carriage from being accepted and stored on board the ship. The security measures should include inventory control procedures at 1. locking or securing access points; 2. using surveillance equipment to monitor the areas; 3. using guards or patrols; and 4. using automatic intrusion detection devices to alert the ship s personnel of unauthorised access. 1. establishing restricted areas adjacent to access points; 2. continuously monitoring surveillance equipment; and 3. dedicating additional personnel to guard and patrol restricted areas. t security level 3, the ship should comply with the instructions issued by those responding to the security incident or threat thereof. The SSP should detail the security measures which could be taken by the ship, in close co-operations with those responding and the port facility, which may include: 1. the setting up of additional restricted areas on the ship in proximity to the security incident, or the believed location of the security threat, to which access is denied; and 2. searching of restricted areas as part of a search of the ship. Security Level 1 Security Level 2 Security Level 3 t security level 1, the SSP should establish the security measures to be applied during cargo handling, which may include: 1. routine checking of cargo, cargo transport units and cargo spaces prior to, and during, cargo handling operations; 2. checks to ensure that cargo being loaded matches the cargo documentation; 3. ensuring, in liaison with the port facility, that t security level 2, the SSP should establish the additional security measures to be applied during cargo handling, which may include: 1. detailed checking of cargo, cargo transport units and cargo spaces; 2. intensified checks to ensure that only the intended cargo is loaded; 3. intensified searching of vehicles to be loaded on car-carriers, ro-ro and passenger ships; and t security level 3, the ship should comply with the instructions issued by those responding to the security incident or threat thereof. The SSP should detail the security measures which could be taken by the ship, in close co-operation with those responding and the port facility, which may include: 1. suspension of the loading or unloading of cargo; and 2. verify the inventory of dangerous goods and Page 49 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix E access points to the ship. Once on board the ship, cargo should be capable of being identified as having been approved for loading onto the ship. In addition, security measures should be developed to ensure that cargo, once on board, is not tampered with. vehicles to be loaded on board car-carriers, ro-ro and passenger ships are subjected to search prior to loading, in accordance with the frequency required in the SSP; and 4. checking of seals or other methods used to prevent tampering. Checking of cargo may be accomplished by the following means: 1. visual and physical examination; and 2. using scanning/detection equipment, mechanical devices, or dogs. 4. increased frequency and detail in checking of seals or other methods used to prevent tampering. Detailed checking of cargo may be accomplished by the following means: 1. increasing the frequency and detail of visual and physical examination; 2. increasing the frequency of the use of scanning/ detection equipment, mech. devices, dogs; and 3. co-ordinating enhanced security measures with the shipper or other party in accordance with an established agreement and procedures. hazardous substances carried on board, if any, and their location. 4. Delivery of Ship s Stores. Security Level 1 Security Level 2 Security Level 3 The security measures relating to the delivery of ship s stores should: 1. ensure checking of ship s stores and package integrity; 2. prevent ship s stores from being accepted without inspection; 3. prevent tampering; and 4. prevent ship s stores from being accepted unless ordered. For ships regularly using the port facility it may be appropriate to establish procedures involving the ship, its suppliers and the port facility covering notification and timing of deliveries and their doc. There should always be some way of confirming that stores presented for delivery are accompanied by evidence that they have been ordered by the ship. 5. Handling Unaccompanied Baggage. The SSP should establish the security measures to be applied to ensure that unaccompanied baggage (i.e. any baggage, including personal effects, which is not with the passenger or ship s personnel member at the point of inspection or search) is identified t security level 1, the SSP should establish the security measures to be applied during delivery of ship s stores, which may include: 1. checking to ensure stores match the order prior to being loaded on board; and 2. ensuring immediate secure stowage of ship s stores. t security level 2, the SSP should establish the additional security measures to be applied during delivery of ship s stores by exercising checks prior to receiving stores on board and intensifying inspections. t security level 3, the ship should comply with the instructions issued by those responding to the security incident or threat thereof. The SSP should detail the security measures which could be taken by the ship, in close co-operation with those responding and the port facility, which may include: 1. subjecting ship s stores to more extensive checking; 2. preparation for restriction or suspension of handling of ship s stores; and 3. refusal to accept ship s stores on board the ship. Security Level 1 Security Level 2 Security Level 3 t security level 1, the SSP should establish the security measures to be applied when handling unaccompanied baggage to ensure that unaccompanied baggage is screened or searched up to and including 100 percent, which may include use of x-ray screening. t security level 2, the SSP should establish the additional security measures to be applied when handling unaccompanied baggage which should include 100 percent x-ray screening of all unaccompanied baggage. t security level 3, the ship should comply with the instructions issued by those responding to the security incident or threat thereof. The SSP should detail the security measures which could be taken by the ship, in close co-operation with those responding and the port facility, which may include: Page 50 Version 1 (03-05-22)

Ship Security ssessment Guideline ppendix E and subjected to appropriate screening, including searching, before it is loaded on board the ship. It is not envisaged that such baggage will be subjected to screening by both the ship and the port facility, and in cases where both are suitably equipped, the responsibility for screening should rest with the port facility. Close co-operation with the port facility is essential and steps should be taken to ensure that unaccompanied baggage is handled securely after screening. 6. Monitoring the Security of the Ship. The ship should have the capability to monitor the ship, the restricted areas on board and areas surrounding the ship. Such monitoring capabilities may include use of: 1. lighting; 2. watch-keepers, security guards and deck watches including patrols, and 3. automatic intrusion detection devices and surveillance equipment. The SSP should establish the procedures and equipment needed at each security level and the means of ensuring that monitoring equipment will be able to perform continually, including consideration of the possible effects of weather conditions or of power disruptions. 1. subjecting such baggage to more extensive screening, for example x-raying it from at least two different angles; 2. preparation for restriction or suspension of handling of unaccompanied baggage; and 3. refusal to accept unaccompanied baggage on board the ship. Security Level 1 Security Level 2 Security Level 3 t security level 1, the SSP should establish the security measures to be applied which may be a combination of lighting, watch keepers, security guards or use of security and surveillance equipment to allow ship s security personnel to observe the ship in general, and barriers and restricted areas in particular. The ship's deck and access points to the ship should be illuminated at all times while conducting ship/port interface activities or at a port facility or anchorage. While underway, when necessary, ships should use the maximum lighting available consistent with safe navigation, having regard to the provisions of the 1972 COLREGS. The following should be considered when establishing the appropriate level and location of lighting: 1. the ship s personnel should be able to detect activities beyond the ship, on both the shore side and the waterside; 2. coverage should include the area on and around the ship; 3. coverage should facilitate personnel identification at access points; and 4. coverage may be provided through co-ordination with the port facility. t security level 2, the SSP should establish the additional security measures to be applied to enhance the monitoring and surveillance capabilities, which may include: 1. increasing the frequency and detail of security patrols; 2. increasing the coverage and intensity of lighting or the use of security and surveillance and equipment; 3. assigning additional personnel as security lookouts; and 4. ensuring co-ordination with waterside boat patrols, and foot or vehicle patrols on the shoreside, when provided. dditional lighting may be necessary to protect against a heightened risk of a security incidents. When necessary, the additional lighting requirements may be accomplished by co-ordinating with the port facility to provide additional shore side lighting. t security level 3, the ship should comply with the instructions issued by those responding to the security incident or threat thereof. The SSP should detail the security measures which could be taken by the ship, in close co-operation with those responding and the port facility, which may include: 1. switching on of all lighting on, or illuminating the vicinity of, the ship; 2. switching on of all on board surveillance equipment capable of recording activities on, or in the vicinity of, the ship; 3. maximising the length of time such surveillance equipment can continue to record; 4. preparation for underwater inspection of the hull of the ship; and 5. initiation of measures, including the slow revolution of the ship s propellers, if practicable, to deter underwater access to the hull of the ship. Page 51 Version 1 (03-05-22)

E-mail: post@rederi.no Tel: +47 22 40 15 00 Fax: +47 22 40 15 15 Postal address: P.O.Box 1452 Vika, NO-0116 Oslo Visiting address: Rådhusgaten 25, NO-0158 Oslo Website: http://www.rederi.no In co-operation with DNV Maritime Solutions