ISPS
Summary
TLDRThis informative video script addresses the critical issue of maritime security, detailing the International Ship and Port Facility Security (ISPS) Code, which mandates measures to protect ships and ports from piracy and terrorism. It outlines the roles of various security officers, the importance of ship security plans, and the implementation of security levels to manage threats. The script also covers the use of Automatic Identification Systems (AIS), security alert systems, and the continuous synopsis record for tracking ship history, emphasizing the need for crew training and drills to ensure preparedness against potential attacks.
Takeaways
- 🛳 The script discusses the importance of ship security in an age of frequent pirate and terrorist attacks.
- 🗓 On October 7th, 1986, the Achille Lauro hijacking incident highlighted the need for stronger security measures in the maritime industry.
- 📜 The International Ship and Port Facility Security (ISPS) Code was introduced as a response to such threats, mandating security plans for most ships and port facilities.
- 🔒 The ISPS Code requires ships to have an approved ship security plan with specific sections and guidelines to address different security levels.
- 📡 An Automatic Identification System (AIS) is crucial for monitoring ship traffic and detecting threats, as per SOLAS convention requirements.
- 🚨 Ship personnel must be able to alert authorities discreetly during a terrorist attack using a ship security alert system.
- 🔖 Ships are required to display identification numbers visibly on the hull or superstructure and internally as part of security measures.
- 📝 The Continuous Synopsis Record (CSR) provides an onboard history of the ship and must be updated with any changes.
- 🛡 The role of Company Security Officers (CSO) is to conduct regular security assessments to ensure the ship security plan remains current and effective.
- 🛂 The International Ship Security Certificate verifies compliance with the ISPS Code and is issued by flag state authorities.
- 📋 The Ship Security Plan outlines detailed procedures for preventing and responding to security threats at different security levels and includes restricted area listings.
- 🔄 Training and drills are essential for ship personnel to perform their security duties effectively, with drills conducted at least quarterly or upon significant crew changes.
Q & A
What was the Achille Lauro incident and what prompted the IMO to issue advice on anti-piracy and hijacking?
-The Achille Lauro was hijacked by Palestinian extremists on October 7th, 1986, while sailing off the coast of Egypt. The hijackers took passengers and crew hostage, changed the ship's course, and demanded the release of Palestinians held in Israel. This incident, along with the murder of a disabled traveler and the subsequent negotiations, led to the IMO issuing advice on anti-piracy and hijacking to protect ships and their crews.
What significant event on September 11th, 2001, influenced the IMO and the US Coast Guard to implement new security measures?
-The terrorist attacks on the Twin Towers on September 11th, 2001, prompted the IMO and the US Coast Guard to implement new security measures by making contracting governments and companies responsible for the implementation of new regulations.
What is the International Ship and Port Facility Security (ISPS) Code, and which types of ships does it apply to?
-The International Ship and Port Facility Security (ISPS) Code is a set of mandatory regulations for most ships, including all passenger ships, cargo ships, and high-speed crafts of 500 gross tonnage and upwards engaged in international voyages. It also includes mobile offshore drilling units and port facilities serving such ships.
What is the purpose of the Automatic Identification System (AIS) and what information does it transmit?
-The Automatic Identification System (AIS) is a device that transmits information about a ship, such as call sign, ship's name, speed, course, and destination, and receives the same from other ships. It is also received by coast stations and is an important tool for coastal states to monitor ship traffic and detect possible threats.
What is the Ship Security Alert System and how should it be activated in case of a terrorist attack?
-The Ship Security Alert System is a system that must be capable of being activated from the bridge and from one other location on the ship. It should not indicate on board that an alarm has been raised and should continue to transmit the ship security alert until deactivated. The transmission must be sent to a competent authority ashore, not to other ships in the vicinity.
What is the role of the Company Security Officer (CSO) in maintaining the ship security plan?
-The Company Security Officer (CSO) is responsible for developing, maintaining, and enforcing the ship security plan. They advise on potential threats, ensure security assessments are carried out, and that the plan satisfies the security requirements of the individual ship. They also strengthen security awareness and ensure adequate training for ship personnel.
What is the Ship Security Plan and what does it include?
-The Ship Security Plan is a document that states detailed procedures for the prevention and response to security threats, including different procedures for different security levels. It includes a list of restricted areas, responses to potential threats, and procedures for key shipboard operations.
What are the three defined security levels according to the ISPS Code and what do they signify?
-The three defined security levels are: Security Level 1 (normal risk), which requires minimum appropriate security measures; Security Level 2 (increasing risk), which requires additional security measures; and Security Level 3 (incident imminent), which requires specific security measures when a security incident is probable or imminent.
What is a Declaration of Security and when is it needed?
-A Declaration of Security is an agreement between a ship and a port facility or another ship, specifying the security measures each will implement. It is needed when the ship and the port facility are at different security levels, often in the form of a checklist.
What are the responsibilities of the Ship Security Officer on board a ship?
-The Ship Security Officer is responsible for the security of the ship, including the implementation, maintenance, and supervision of the ship security plan. Their duties involve performing security inspections, proposing modifications to the plan, enhancing security awareness, ensuring proper training, and maintaining security equipment.
What basic precautions should be taken when a ship is about to enter an area known for terrorist or pirate activity?
-Basic precautions include transiting these areas during daylight, maintaining maximum safe speed, posting extra lookouts, increasing radar surveillance, having fire hoses pressurized and ready, and ensuring the crew is alert and prepared to defend the ship.
Outlines
Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.
Upgrade durchführenMindmap
Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.
Upgrade durchführenKeywords
Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.
Upgrade durchführenHighlights
Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.
Upgrade durchführenTranscripts
Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.
Upgrade durchführenWeitere ähnliche Videos ansehen
who is the Company Security Officer (CSO) in a shipping comapny? - latest-www.maritimeplatform.com
SOLAS - What is SOLAS 1974? - SOLAS Convention
Syllabus of CyberSecurity & Ethical Hacking🎭
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Attacks on Mobile/Cell Phones | Organisational Security Policies in Mobile Computing Era | AKTU
Brute Force Attack
5.0 / 5 (0 votes)