13
Group Maritime Security Guard Online Training Package Accompanying Handbook

Maritime Security Guard Online Training Package ... · Maritime Security Guard Online Training Package Accompanying Handbook. 2 ... and detonator . ... commercial or even homemade

Embed Size (px)

Citation preview

Group

Group

Maritime Security Guard Online Training Package

Accompanying Handbook

2

Table of conTenTsIntroduction..................................................................................................................................................3

Part one - Understanding Relevant Issues in the Maritime security environment............4

objectives................................................................................................................................4

Understanding Maritime security Regulations.........................................................4

Definition of Terrorism.........................................................................................................4

Maritime security alert levels.........................................................................................4

Reporting Maritime crime................................................................................................4

7 stage Terrorism attack cycle........................................................................................5

Types of Improvised explosive Devices (IeD’s)..........................................................5

Post Incident Recovery......................................................................................................5

Part Two - levels of alertness...............................................................................................................7

Introduction...........................................................................................................................7

objectives...............................................................................................................................7

The awareness levels.........................................................................................................7

The levels................................................................................................................................7

Part Three - Understanding Maritime security Regulations......................................................9

objectives...............................................................................................................................9

Your Role as a Maritime security Guard..................................................................... 4

Maritime security Zones.................................................................................................. 4

screening and clearing .................................................................... .............................. 4

Maritime security Identification card (MsIc ..............................................................4

Powers of Maritime security Guards .............................................................................4

execuritng a lawful Detention ..................................................................... .................4

Weapons in Maritime security Zones ..................................................................... ...4

Maritime security Incidents ..................................................................... ......................4

security Measures and Procedures ..................................................................... .........4

3

Welcome to the auctoritas Group Maritime security Guard Training Package. This booket has been designed to accompany our comprehensive online training package for Maritime security Guards.

This booklet covers the three different sections to the training package and includes the learning objectives for each section and an outline of the major headings. There is also a notes page following each section for you to use.

We encourage you to follow the links within the training package to obtain more information relevant to employment as a Maritime security Guard.

InTRoDUcTIon

4

objectives• To understand the Risk associated with operating in the Maritime environment• Understanding Terrorism, organised crime• Defining Terrorism• awareness levels

Understanding Maritime Security Regulations• The australian Government implemented a range of security protocols to

protect maritime transport and offshore facilities from terrorism and unlawful interference.

• Under this regime all security regulated ports, port facilities, offshore facilities, port and offshore service providers and regulated australian vessels undertake security risk assessments and implement security plans to address identified risks. This includes, but is not limited to:

• Measures that need to be in place at different security levels.• The powers and responsibilities of officials reporting incidents and events.• Measures for screening and clearing, weapons and prohibited items.• The Maritime security Identification card (MsIc) scheme, and enforcement

of the Maritime Transport and offshore facilities security act 2003 and Regulations.

Definition of TerrorismIn australia, what constitutes an act of terrorism is defined in commonwealth

legislation. The criminal code act 1995 states that a terrorist act means an action or threat of action where the action causes certain defined forms of harm or interference and the action is done or the threat is made with the intention of advancing a political, religious or ideological cause.

The criminal code makes it an offence if a person commits a terrorist act, provides or receives training connected with terrorist acts, possesses a thing connected with terrorist acts, collects or makes documents likely to facilitate terrorist acts, or does any act in preparation for or planning of terrorist acts. The penalty for engaging in a terrorist act is life imprisonment.

Maritime Security Alert Levels Level One – normal Level Two – Heightened risk of a security incident based on credible informationLevel Three – specific threat based on credible information that a security incident is probable or imminent.

Reporting Maritime CrimeReporting maritime crime is an essential part of a robust security regime just as important as physical barriers and alarms incident reports allow security organisations to review port and infrastructure vulnerability.

PaRT one:UnDeRsTanDInG ReleVanT IssUes In THe MaRITIMe secURITY enVIRonMenT.

5

7 Stage Terrorism Attack Cycle

Types of Improvised Expolsive Devices (IED’s)

• Vehicle Borne (VBIED)

• Person Borne (PBIED)

• Boat Borne (BBIED)

IED come in all manner of guises and can be almost anything with any type of material and detonator . They are simple designs that require relatively low skill to produce. The primary use of the device is to cause death or injury by using explosives alone or in combination with shrapnel, chemical, biological, or radiological material.

IEDs can be made in varying sizes and delivery methods.

IEDs can utilise military, commercial or even homemade explosives.

Each IED is unique in design and composition, as the maker has to “improvise with

the materials available for use.

IEDs are generally difficult to detect and are designed to fit in with the environment that they are placed. The more sophisticated the IED the more difficult they are to detect

Post Incident Recovery• In the event of an incident , go to designated evacuation point.  Do not move

seriously injured persons unless they are in obvious, immediate danger (building collapse, fire, etc.).

• Do not use matches or lighters. sparks might trigger explosions.• Where possible avoid the use of electrical devices such as mobile telephones

and hand radios. electrical sparks or signals could trigger other bombs.• after the initial incident remain alert , as there can be a second event that can

cause as much damage as the first so remain vigilant, if possible the following actions should be taken;

• since one event can be followed by another, stay alert. There may be more danger yet to come.

• for protection, consider finding some cover or protection from debris and remain there for at least 60 seconds.

• stay away from windows, or other infrastructure that is likely to be broken due to the explosion, shockwave or shattered by the lead debris from the explosion.

• Most areas that maritime security guards work in will have an emergency Management Plan (eMP). This plan can be activated for a range of situations . 

• become familiar with your responsibility should an incident occur. It’s too late to ask questions after the incident has commenced.

• follow the direction of emergency services as and when they arrive.

6

NOTES:

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

7

IntroductionDuring this part of the training we will discuss how you will be affected by your ability to maintain higher levels of alertness on prolonged security operations.

People who practice situational awareness can often spot this planning process as it unfolds and then take appropriate steps to avoid the dangerous situation or prevent it from happening altogether. because of this, situational awareness is one of the key building blocks of effective personal security — and when exercised by large numbers of people, it can also be an important facet of national security.

ObjectivesUnderstand the five levels of alertness

The Awareness levelsTuned out is similar to;

• Driving in a familiar environment.

• being engrossed in a song on the radio or thinking about what you will be doing that day.

• Increasingly, mobile phone calls and texting are also causing people to tune out .

• Have you ever arrived in your car somewhere without even really thinking about your drive there?

Engrossed Awareness is similar to;

• Driving in hazardous road conditions.

• You need to practice this level of awareness when you are driving on icy or

slushy roads.• When you are driving in such an environment, you need to keep two hands

on the wheel at all times and have your attention totally focused on the road and the other drivers.

Spent Alertness is similar to;

what happens when you literally freeze at the wheel and cannot respond to stimuli, either because you have fallen asleep, or, at the other end of the spectrum, because you are petrified from panic.

Comfortable Awareness is similar to;

• Defensive driving.

• you are relaxed but you are also watching the other cars on the road and are looking well ahead for potential road hazards.

• When you receive an adrenaline rush,

• similar to when a car that you are watching doesn’t stop at the stop sign and pulls out right in front of you.

The levelsfinding the right level is primarily dictated by the situation.

Trying to maintain too high a level will ultimately result in a lower level of alertness in the long run

Too low a level and you become ineffective in your ability to see the early signs of a situation developing

Regular changes of alert status is common and you may not even be aware of the change, but know you are aware of the different levels you should be able to identify if you are on a too high alert level or too low.

PaRT TWo: leVels of aleRTness

8

NOTES:

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

9

PaRT THRee: UnDeRsTanDInG MaRITIMe secURITY ReGUlaTIons

objectives• Understanding your obligations under MoTfsa• Responsibilities of Maritime security Identification card holders• Defining Maritime security Zones• Roles and Responsibilities of Maritime security Guards• official Powers of Maritime security Guards under the act

Your Role as a Maritime Security GuardPrimary operational functions of an MsG include:• comply with Port/facility soP’s• access control• ccTV surveillance• safety compliance• legislative compliance• Public Relations• emergency coordination

Maritime Security ZonesMaritime security Zones are defined areas within a regulated Port that are identified as part of the Port risk assessment that have the potential to interface with security regulated vessels. Types of Zones:• landside Restricted Zones• cleared Zones• Waterside Restricted Zones• ship security Zones• offshore facility security Zones

• on board security Zones

Screening and Clearing once a cleared Zone is established the Port facility operator is responsible to ensure that persons boarding a security regulated passenger ship have been screened and cleared at the time they board the ship; or are screened and cleared immediately after they board the ship. This includes baggage.

There are a variety of persons exempt from being screened at different MaRsec levels. Those persons are identified within the presentation and you should have an understanding of who they are.

Maritime Security Identification Card (MSIC) an MsIc is a nationally consistent identification card which is issued to identify a person who has been the subject of a background check. It shows that the holder has met the minimum security requirements and needs to work unescorted or unmonitored in a maritime security zone.The MsIc is not an access card and the relevant authority at each port or facility still controls access to its maritime security zones. MsIcs are valid for up to four years, with a background check required every two years. Those requiring an MsIc may apply for a four year or two year MsIc.Who needs an MSICa person has an operational need to hold an MsIc if his or her occupation or business interests require, or will require, him or her to have unmonitored access to a maritime security zone at least once a year.Displaying your MSICan MsIc must always be properly displayed when the holder is in a relevant secure area. an MsIc is properly displayed if:

10

• It’s attached to a person’s outer clothing• at or above waist height• at the front or side of his or her body or on a band around the holder’s upper

arm• With the whole front of the MsIc clearly visiblea person is not properly displaying the MsIc if the whole of the front of the MsIc is not clearly visible at all times when it is being worn.If someone has an invalid MsIc, incorrectly displays or misuses an MsIc, then they may be fined or prosecuted.

Powers of Maritime Security GuardsUnder the act, Maritime security Guards have the following powers:• Power to physically restrain persons.• Power to require production of ID.• Power to request information.• Power to request a person to leave a Maritime security Zone.• Power to remove vehicles from maritime security zones.• Power to remove vessels from maritime security zones.REMEMBER: If time permits you should always seek advice from your supervisor or the Pfso before exercising the above powers.

Executing a Lawful Detentioneach state and territory have common law requirements in regard to the lawful arrest of a person by non law enforcement persons.It is recommended that you become familiar with the requirements of the law within your state or territory. as a general rule an arrest will only be lawful if the arrestor has a power to arrest and the arrest is lawfully executed. Three things should be considered before any arrest is undertaken:• Reasonable suspicion that a crime or criminal activity is likely or has taken place.• The use of force in making an arrest.• The reasons as to why you are detaining the person.

Weapons in Maritime Security ZonesDefinitionsProhibited itemsThe definition of a prohibited item under the act is, • an imitation or replica of a firearm;• an imitation or replica of a bomb, grenade, rocket, missile or mine. Weapons• bombs and grenades live rockets or missiles • flame throwers.• crossbows or other similar devices.• electromagnetic weapons.• acoustic or light emitting anti personnel devices.• Rocket launchers, recoilless rifles, antitank rifles, bazookas or

rocket-propelled-grenade-type launchersUnless you are an exempt person it is an offence to carry a weapon in a maritime security zone

Maritime Security IncidentsA maritime security incident occurs if• a threat of unlawful interference with maritime transport or offshore facilities is

made and the threat is, or is likely to be, a terrorist act. • It causes serious harm that is physical harm to a person; or causes serious

damage to property; • It causes a person’s death; or endangers a person’s life, other than the life of the

person taking the action• It creates a serious risk to the health and safety of the public or a section of the

public• The action is done or the threat is made with the intention of advancing a

political, religious or ideological cause• The action is done or the threat is made with the intention of: coercing, or

influencing by intimidation, the government of the commonwealth or a state, Territory or foreign country, or of part of a state, Territory or foreign country.

11

• If it is intimidating the public or a section of the public. 

Other maritime security events include:• Unauthorised or attempted unauthorised access to a maritime or offshore

facility or ship, including a maritime or ship security zone.• failure of a screening point.• Theft of a security identity card.• Damage to security equipment (eg. ccTV unit or signage) through sabotage or

vandalism;

Who must report a maritime transport security incident? • Port operators• ship masters• ship operators• Port facility operators• offshore facility operators• Maritime security inspectors• Duly authorised officers• Maritime security guards• screening officersa maritime transport or offshore facility security incident must be reported as soon as possible after becoming aware of its occurrence.

a Maritime security Incident Report must include:• To whom the report relates the date and time of the incident• The location of the incident• If the incident involved a ship• Information regarding the ship including: name, type, size, flag, IMo number,

Issc number, and type of cargo;• If the incident involved a building or other infrastructure• Information sufficient to identify the building or other infrastructure, such as the

building number, or other identifier

• The nature of the incident• If the incident involved any other Maritime Industry Participants• Details of the parties involved;

after an incident has occurred always ensure you:• fill in an incident report form.• Use the company or facility report form where available.• Use the oTs standard report form if no other form has been provided.• always ensure the information is passed on to an appropriate person.

Security Measures and Procedures• security Measures and procedures will vary depending on the facility you are

working at.• always ensure you have read and understand the procedures that are in place at

each facility you work at.• Remember security measures will change at different security level.• always make yourself aware of the safety requirements and emergency

procedures at the facilities you work at.

12

NOTES:

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Po box 260 Moonah, Tasmania, 7009 P (03) 6275 2747 F (03) 6275 2617 E [email protected] w w w.auc tgroup.com.au

13

M T O F S A / R E G S /

GUIDANCE NOTES

REQUIREMENT COMPLIANCE COMMENTS

Yes no Ref1 Reg 3.35 contact details for key personnel – current and accurate x Updated in the sPc security portal

2 section 42 MTofsa

MsP ref 1.1

This section must outline who has authorised the Maritime

security Plan on behalf of the Port facility operator. It may

also include the organisations’ security policy.

x 2.2 authorised by ceo

Question missing pages 24 and 25 (missing in

electronic copy also)

Missing pages are a typo

3 Reg 3.95

MsP ref 1.2

Regulation 3.95 requires that the Port operator ensure the

maritime security plan is protected against unauthorised

access, amendment and disclosure.

This section must be used to explain how the port operator

will protect their security plan from unauthorised disclosure.

It should refer to the security classification of the document

for internal purposes and to specific procedures to be taken

to prevent unauthorised access, amendment and disclosure

of the document

x 2.3 2.3.1 security policy and procedures ask for documents

supporting documents sighted on portal 36

documents in total

2.3.2 Pfso need evidence of authority for document

protection

supporting document is updated direct to portal

updated 22nd october confirmed by oTs

3 cont MsP ref 1.3 Document control

sets out measures for document control and the allocation

of version numbers

x Version / revision document control issue change listed

in MsP Ref 2.4, a nsW requirement

need to see sPc security register for document control

Waiting

4 MsP ref 3.0 This section should describe what operations are covered in

the plan.

Reference to the Map of the security Regulated Port is

required.

x

x

3.1.2 check berth reference identified in 3.4.1 pg 10

Po box 260 Moonah, Tasmania, 7009 P (03) 6275 2747 F (03) 6275 2617 E [email protected] w w w.auc tgroup.com.au

Group

Hugh EaglingDirector

P 0417 389 959

E [email protected]

Glen BourkeDirector

P 0408 019 924

E [email protected]

Mark ThomassonDirector

P 0401 338 999

E [email protected]

Anthony Meijerconsultant

P 0408 405 471

E [email protected]

Dr Al Griskaitis consultant

P 0414 182 456

E [email protected]

Jamie Whiteheadconsultant

P 0435 894 500

E [email protected]

DIRECTORS SPECIALIST CONSULTANTS