Stowaways and Piracy Flashcards
How would you advise crew to carry out a stowaway search
Consult the SMS procedures and stowaway search checklist.
Teams of two, given code name and, coded communication method.
Muster crew and conduct a tool box talk
Each team given a checklist for they’re specified area and advised to make a thourough search of the area a tick off the checklist as they go.
Areas to include: accomodation, machinary space, accessible areas below decks, store rooms, lifeboats, garbarge areas, funnel and any other areas where a person could hide.
Once the location has been searched, report in to myself as chief officer so I can check the area off the checklist
On completion, record the stowaway search in the deck log book.
What are the minimum security arrangements to have onboard to prevent stowaways?
Have a formal plan to prevent stowaways.
Use of ship security plan.
Gangway watch, adequate deck watch, lock doors and hatches, security tags on emergency escapes and lifeboat, maintain adequate lighting, tally board, maintain adequate communication
Resonsibility of Master in the event of finding stowaway?
To make every effort to determine immediately the port of embarkation of the stowaway
To take practical steps to establish the identity, including the nationality/citizenship and the right of residence, of the stowaway
To prepare a statement containing all available information relevant to the stowaway for presentation to the appropriate authorities
To notify the existence of a stowaway and any relevant details to the shipowner and appropriate authorities at the port of embarkation, the next port of call and the flag State,
Not to depart from the planned voyage
To ensure that the stowaway is presented to the appropriate authorities at the next port of call in accordance with their requirements
To take appropriate measures to ensure the security, general health, welfare and safety of the stowaway until disembarkation
To ensure that stowaways are not permitted to work on board the ship, except in emergency situations
To ensure that stowaways are treated humanely, consistent with the basic principles.
What is the difference between a refugee and asylum seeker?
The 1951 CONVENTION RELATING TO THE STATUS OF REFUGEES defines a REFUGEE as a person who ‘owing to a well-founded fear of being persecuted for reasons of race, religion, nationality, membership of a particular social group, or political opinion, is outside the country of his [or her] nationality,3 and is unable to or, owing to such fear, is unwilling to avail himself [or herself] of the protection of that country’ (Article 1A(2))
An asylum-seeker is a person who is seeking international protection and whose claim has not yet been finally decided. Not every asylum-seeker will ultimately be recognized as a refugee.
Refugee status is ‘declaratory’—that is, determining refugee status does not make a person a refugee, but rather recognizes that a person is a refugee.
Can you take a refugee or asylum seeker back to their country of origin?
The 1951 REFUGEE CONVENTION prohibits refugees and asylum-seekers from being expelled or returned in any manner whatsoever ‘to the frontiers of territories where [their] life or freedom would be threatened on account of [their] race, religion, nationality, membership of a particular social group or political opinion’ (Article 33(1)).
What should you do if you are asked to provide assistance for the rescue of refugees or asylum seekers at sea?
identify the ship’s equipment and life-saving appliances that may be appropriate for the rescue operation;
determine if any special arrangements, additional equipment or assistance may be required for the rescue operation;
implement any plans and procedures to safeguard the safety and security of the crew and the ship;
inform the ship’s owner/operator and agent at the next intended port of call of the rescue operation.
What would you do if you a rescued person said they were a refugee or asylum seeker and did not want to be disembarked at the destination port for fear of persecution?
The Master should inform the rescued persons concerned that the Master has no authority to hear, consider or determine an asylum request
When would you request the completion of a decleration of security?
.1 the ship is operating at a higher security level than the port facility or another ship it is interfacing with;
.2 there is an agreement on a Declaration of Security between Contracting Governments covering certain international voyages or specific ships on those voyages;
.3 there has been a security threat or a security incident involving the ship or involving the port facility, as applicable;
.4 the ship is at a port which is not required to have and implement an approved port facility security plan; or
.5 the ship is conducting ship to ship activities with another ship not required to have
and implement an approved ship security plan.
What security measures would you take to reduce the risk of a piracy or terrorist attack?
.1 ensuring the performance of all ship security duties;
.2 controlling access to the ship;
.3 controlling the embarkation of persons and their effects;
.4 monitoring restricted areas to ensure that only authorized persons have access;
.5 monitoring of deck areas and areas surrounding the ship;
.6 supervising the handling of cargo and ships stores; and
.7 ensuring that security communication is readily available.
Who needs to approve any changes to the ship security plan?
The nature of the changes to the ship security plan or the security equipment that have been specifically approved by the Administration.
This approval shall be available on board and shall
be presented together with the International Ship Security Certificate (or the Interim International Ship Security Certificate).
If these changes are temporary, once the original approved measures
or equipment are reinstated, this documentation no longer needs to be retained by the ship.
What are some of the systems onboard your ship that are vulnerable to cyber-attack?
Cargo management systems: Digital systems used for the management and control of cargo, including hazardous cargo
Bridge systems: The increasing use of digital, network navigation systems, with interfaces to shoreside networks for update and provision of services, make such systems vulnerable to cyber attacks.
Propulsion and machinery management and power control systems: The use of digital systems to monitor and control onboard machinery, propulsion and steering make such systems vulnerable to cyber attacks.
Access control systems: Digital systems used to support access control to ensure physical security and safety of a ship and its cargo
Passenger servicing and management systems:
Administrative and crew welfare systems:
Communication systems
What may be some of the signs that your cyber-security has been breached?
- unexpected or sudden changes in available disk space or memory
- emails being returned unexpectedly
- unexpected network connectivity difficulties
- frequent system crashes
- abnormal hard drive or processor activity
- unexpected changes to browser, software or user settings, including permissions.
- an unresponsive or slow to respond system
- unexpected password changes or authorised users being locked out of a system
- unexpected errors in programs, including failure to run correctly or programs running unexpectedly
What steps could you take if your vessel had be subject to a cyber-attack?
Refer to the cyber security management plan
Initial assessment: To ensure an appropriate response, it is essential that the response team find out:
• how the incident occurred
• which IT and/or OT systems were affected and how
• the extent to which the commercial and/or operational data is affected
• to what extent any threat to IT and OT remains.
- Recover systems and data:
Following an initial assessment of the cyber incident, IT and OT systems and data should be cleaned, recovered and restored, so far as is possible, to an operational condition by removing threats from the system and restoring software. - Investigate the incident: To understand the causes and consequences of a cyber incident, an investigation should be undertaken by the company, with support from an external expert, if appropriate. The information from an investigation will play a significant role in preventing a potential recurrence.
- Prevent a re-occurrence: Considering the outcome of the investigation mentioned above, actions to address any inadequacies in technical and/or procedural protection measures should be considered, in accordance with the company procedures for implementation of corrective action.
Industry guidance and measures on counter-piracy and anti-armed robbery
When a ship enters a high risk area the Security Level shall be set by the Contracting Government to which the territorial sea comes under, and provisions shall be in place to communicate this security level to the ships and their Administration; any security measures that should be put in place by the ships to protect themselves from danger, in accordance with Part A of the ISPS Code, also including a point of contact in order for the ship to request advice or assistance as necessary, and report any security concerns about other ships in the area, in relation to movements and communications. The Contracting Government should also advise any security measures that the coastal state has decided to put in place, as appropriate. Master can decide to turn of the AIS if concerned, and as a minimum under the guidance of the SSO and CSO the ship will align itself to that procedures detailed in the SSP for the relevant security level
Ships should react to the Security Level set by the Contracting Government, and put in place security measures set out in their SSP as per those outlined previously for Passage of the vessel through areas known to be subject to piracy and/or armed robbery
Use of a Citadel is a last resort to protect the crew should pirates/terrorists board the vessel. This stronghold is essentially the safest part of the ship and should allow safe refuge for the period necessary before assistance arrives. It should there be strong enough to deter the boarders from breaking in, or causing any harm from the outside if possible, It should also allow communications with company and authorities, have sufficient food and water, and also controls to inhibit ships operations if necessary. This is generally inside the accommodation or machinery space as defined by the SSA