日本財団 図書館


3 Vulnerability Assessments
 
3.1
Guidelines for vulnerability assessments of ships, mobile offshore drilling units [and offshore facilities]
 
3.2
Guidelines for the vulnerability assessments of port facilities [and fixed and floating platforms]
 
[to be further developed]
 
Annex 1 of MSC/Circ.443, reproduced below, refers:
 
1 General
 
1.1
In order to prepare security plans, an initial comprehensive security survey should be undertaken to assess the effectiveness of security measures and procedures for the prevention of unlawful acts and determine the vulnerability of the port facility or the ship, or both, to such acts.
 
1.2
The results of this security survey should be used to determine the security measures necessary to counter the threat both at the port facility and on board ships taking into consideration local conditions.
 
1.3
The level of security may vary from port to port, from ship to ship and from time to time. Liaison between security officers is important to ensure the best utilization of ship and shore resources.
 
1.4
The survey should determine what needs to be protected, what security measures are already in effect, and what additional security measures and procedures are required.
 
1.5
The security survey should be periodically reviewed and the security plans updated as necessary.
 
2 Port facility security survey
 
2.1
The port facility security survey may be divided into two parts, the initial preliminary assessment and an on-scene security survey.
 
2.1.1
Preliminary assessment
 
2.1.1.1
Prior to commencing the survey the port facility security officer should obtain current information on the assessment of threat for the locality and should be knowledgeable about the port facility and type of ships calling at the port. He should study previous reports on similar security needs and know the general layout and nature of the operations conducted.
 
2.1.1.2
The port facility security officer should meet with appropriate representatives of the port facility, of the operator, or of both of them, to discuss the purpose and methodology of the survey.
 
2.1.1.3
The port facility security officer should obtain and record the information required to conduct a vulnerability assessment, including:
 
.1 the general layout of the port facility and terminal including topography, building locations, etc.;
 
.2 areas and structures in the vicinity of the port facility such as, fuel storage depots, bridges, locks, etc.;
 
.3 the degree of dependence on essential services, such as electric power, communications, etc.;
 
.4 stand-by equipment to assure continuity of essential services;
 
.5 locations and functions of each actual or potential access point;
 
.6 numerical strength, reliability and function of staff, permanent labour and casual labour forces;
 
.7 the details of existing security measures and procedures, including inspection, control and monitoring procedures, identification documents, access control procedures, fencing, lighting, fire hazards, storm drains, etc.;
 
.8 the equipment in use for protection of passengers, crews and port facility personnel;
 
.9 all vehicle traffic or services which enter the port facility; and
 
.10 availability of other personnel in an emergency.
 
2.1.1.4
In harbour terminals handling passengers traveling on regular routes there will have to be a specific area designated for operations related to that type of traffic and in which the following features will need to be identified and defined:
 
i. The perimeter boundary of the whole area in which passenger traffic is handled.
 
ii. The various sub-areas for carrying out the different activities involved in the general handling of passenger traffic.
 
iii. The nature of the external perimeter locks around the area,
 
iv. The access and communicating doors between the perimeter area and its exterior.
 
v. The buildings and fixed installations for the provision of services within the Maritime Station and its sub areas.
 
vi. An area for communal use by the general public and its access points.
 
vii. A restricted access area for the exclusive use of passengers who have been authorized to-embark, and its access points.
 
viii. Installations providing access to the ship.
 
ix. Pre-embarkation parking areas, for the exclusive use of passengers and vehicles who have been authorized to embark, as well as access points to those areas.
 
x. Parking areas set up for the exclusive use of goods vehicles and their drivers, as well as for vehicles to be loaded and transported as goods,
 
xi. Designated routes for the embarkation and disembarkation of passengers and vehicles.
 
xii. The areas set up for the checking of passengers and vehicles during embarkation and disembarkation.
 
xiii. The docks and areas of water specifically set up for the berthing of passenger ships.
 
2.1.2
On-scene security survey
 
2.1.2.1
The port facility security officer should examine and evaluate the methods and procedures used to control access to ships and restricted areas in the port facility, including:
 
.1 inspection, control and monitoring of persons and carry-on articles;
 
.2 inspection, control and monitoring of cargo, ship stores, and baggage; and
 
.3 safeguarding cargo, ship stores and baggage held in storage within the port facility.
 
2.1.2.2
The port facility security officer should examine each identified point of access to ships and restricted areas in the port facility and evaluate its potential for use by individuals who might be engaged in unlawful acts. This includes persons having legitimate access as well as those who seek to obtain unauthorized entry.
 
2.1.2.3
The port facility security officer should examine and evaluate existing security measures, procedures and operations under both emergency and routine conditions, including:
 
.1 established safety procedures;
 
.2 restrictions or limitations on vehicle access to the port facility;
 
.3 access of fire and emergency vehicles to restricted areas and availability of parking and marshalling areas;
 
.4 the level of supervision of personnel;
 
.5 the frequency and effectiveness of patrols by security personnel;
 
.6 the security key control system;
 
.7 security communications, systems and procedures; and
 
.8 security barriers and lighting.
 
3 Ship security survey
 
3.1
The ship security survey may be divided into two parts, the initial preliminary assessment and an on-scene security survey.
 
3.1.1
Preliminary assessment
 
3.1.1.1
Prior to commencing the ship security survey, the company security officer should take advantage of such information as is available to him on the assessment of threat for the ports at which the ship will call or at which passengers embark or disembark and about the port facilities and their security measures. He should study previous reports on similar security needs.
 
3.1.1.2
Where feasible, the company security officer should meet with appropriate persons on the ship and in the port facilities to discuss the purpose and methodology to the survey.
 
3.1.1.3
The company security officer should obtain and record the information required to conduct a vulnerability assessment, including:
 
.1 the general layout of the ship;
 
.2 the location of areas which should have restricted access, such as bridge,engine-room, radio-room etc.;
 
.3 the location and function of each actual or potential access point to the ship;
 
.4 the open deck arrangement including the height of the deck above the water;
 
.5 the emergency and stand-by equipment available to maintain essential services;
 
.6 numerical strength, reliability and security duties of the ship's crew;
 
.7 existing security and safety equipment for protection of passengers and crew; and
 
.8 existing security measures and procedures in effect, including inspection, control and monitoring equipment, personnel identification documents and communication, alarm, lighting, access control and other appropriate systems.
 
3.1.2
On-scene security survey
 
3.1.2.1
The company security officer should examine and evaluate the methods and procedures used to control access to ships, including:
 
.1 inspection, control and monitoring of persons and carry-on articles; and
 
.2 inspection, control and monitoring of cargo, ship's stores and baggage.
 
3.1.2.2
The company security officer should examine each identified point of access, including open weather decks, and evaluate its potential for use by individuals who might be engaged in unlawful acts. This includes individuals having legitimate access as well as those who seek to obtain unauthorized entry.
 
3.1.2.3
The company security officer should examine and evaluate existing security measures, procedures and operations, under both emergency and routine conditions, including:
 
.1 established security procedures;
 
.2 response procedures to fire or other emergency conditions;
 
.3 the level of supervision of the ship's crew, vendors, repair technicians, dock workers, etc.;
 
.4 the frequency and effectiveness of security patrols;
 
.5 the security key control system;
 
.6 security communications systems and procedures; and
 
.7 security doors, barriers and lighting.
 
4 Periodic security inspections
 
Security inspections should be undertaken on a periodic basis to permit a review and updating of the initial comprehensive security survey and possible modification of the port facility and ship security plans.
 
5 Report
 
5.1
From the information obtained during the survey assessment and inspection, the respective security officer should assess the vulnerability of the port facility, ship, or both.
 
5.2
The report should contain, as appropriate, recommendations for new or revised security measures and procedures.
 
5.3
The report will form the basis for development or revision of security plans, should be confidential and have limited distribution.
 
4 Company security officer and appropriate staff
 
4.1
General
 
4.2
Guidelines for training of the company security officer
 
4.3
Guidelines for training of appropriate staff
 
[to be further developed]







日本財団図書館は、日本財団が運営しています。

  • 日本財団 THE NIPPON FOUNDATION