Untitled document Untitled document Untitled document



Seaport Security for Facility Security Officers

FSO Required


Compliance with 33 CFR 105.205


Module 1. The Seaport Environment

Lesson 1.1: Port Processes and Activities

1.1 Explain the primary processes and activities that occur on a port.

1.1.1 List the activities and processes most commonly executed on a port.

1.1.2 Define what primary processes and activities most commonly occur at each type of port.

Lesson 1.2: Port Facilities, Equipment, and Infrastructure

1.2 Explain the major facilities, equipment, and infrastructure present on a port.

1.2.1 Identify the facilities most commonly located on a port.

1.2.2 Identify the types of equipment most commonly used on a port.

1.2.3 Identify the major infrastructure found on a port.

Lesson 1.4: Safety and Security on the Port

1.4 Explain the importance of safety and security at seaports.

1.4.1 Summarize current threats to the port including, piracy and armed attacks, terrorism, smuggling, stowaways and refugees, cargo theft and collateral damage.

1.4.2 State that there are different security actions required by the three MARSEC Levels.

1.4.3 Describe the potential local, national and international economic impact of various degrees of port disruption.

1.4.4 Describe the safety issues surrounding the facilities and equipment most commonly used on a port.

1.4.5 Describe security issues surrounding the facilities and equipment most commonly used at a port.

1.4.6 Describe the safety issues surrounding major port infrastructure.

1.4.7 Describe security issues surrounding major port infrastructure.

1.4.8 Describe safety issues related to the activities and processes most commonly executed on a port.

1.4.9 Describe security issues related to the activities and processes most commonly executed at a port.



Module 2. Regulations


Lesson 2.1: National and International Regulations

2.1 Identify current relevant regulations that govern security requirements at a U.S. port or facility.

2.1.1 Identify the regulations that govern international maritime transportation security.

2.1.2 Identify the regulations that govern U.S. maritime transportation security.

Lesson 2.2: Responsibilities of Port Security Personnel

2.2 Summarize required knowledge and responsibilities of seaport and facility personnel regarding security.

2.2.1 List responsibilities of the owner or operator specified in 33CFR105.200.

2.2.2 List knowledge and responsibilities required of the FSO as specified in 33CFR105.205.

2.2.3 List knowledge required of facility personnel with security duties specified in 33CFR105.210.

2.2.4 List knowledge required of all other facility personnel specified in 33CFR105.215.

Lesson 2.3: Role of Security Organizations on the Port

2.3 Summarize the roles of federal, state, and local agencies in seaport security.

2.3.1 Identify roles of the U.S. Coast Guard in establishing and maintaining port and facility security as specified in international and U.S. regulations.

2.3.2 Identify roles of the U.S. Customs and Border Protection in establishing and maintaining port and facility security as specified in international and U.S. regulations.

2.3.3 Identify roles of state law enforcement in establishing and maintaining port and facility security as specified in international and U.S. regulations.

2.3.4 Identify roles of local law enforcement in establishing and maintaining port and facility security as specified in international and U.S. regulations.

2.3.5 Identify roles of port, vessel, and facility security personnel in establishing and maintaining port and facility security as specified in international and U.S. regulations.

Lesson 2.4: MARSEC Security Conditions

2.4 Differentiate security conditions specified in 33CFR by MARSEC Level.

2.4.1 Identify the security conditions for MARSEC Level 1 specified in 33 CFR.

2.4.2 Identify the security conditions for MARSEC Level 2 specified in 33 CFR.

2.4.3 Identify the security conditions for MARSEC Level 3 specified in 33 CFR.



Module 4. Terrorism/Weapons of Mass Destruction

Lesson 4.1: Terrorism Today

4.1 Describe the nature of terrorism.

4.1.1 Discuss the definitions, history, and threat of terrorism.

4.1.2 Compare and contrast domestic and international terrorism.

4.1.3 List signs of terrorism including surveillance, test of security, acquiring supplies, suspicious people who don't belong, dry runs/ trial runs, deploying assets or getting into position.

4.1.4 Summarize the various types of weapons, dangerous substances and devices, the damage they can cause, and their appearance.

4.1.5 Recognize pre-incident indicators of terrorist activities.

Lesson 4.3: Identifying and Reporting IEDs

4.3 Identify and report IEDs.

4.3.1 Identify indicators of a potential Improvised Explosive Device (IED) attack.

4.3.2 Report and accurately describe potential IEDs.



Module 6. Detecting and Reporting Surveillance and Suspicious Activities


Lesson 6.2: Observe and Note Surveillance and Suspicious Activities

6.2 Make observations.

6.2.1 Identify areas of critical concern in a port.

6.2.2 Observe and provide descriptions of people and vehicles.

6.2.3 Recognize techniques used to circumvent security measures.

6.2.4 Identify operational deterrents to surveillance/hardening.



Module 7. Situation Awareness


Lesson 7.1: Recognizing Security Threats

7.1 Identify pre-incident indicators using situation awareness.

7.1.1 Describe the role of situation awareness in preventing and mitigating security incidents.

7.1.2 Identify current security threats and patterns.

7.1.3 Recognize characteristics and behaviors of persons likely to threaten security.

7.1.4 Recognize and detect dangerous substances and devices.

7.1.5 Identify techniques used to circumvent security measures.



Module 8. Sensitive Security Information (SSI)


Lesson 8.1: Securing SSI

8.1 Ensure the secure handling of Sensitive Security Information (SSI).

8.1 1 Identify documents and records that may contain sensitive information.

8.1.2 Identify conditions required for someone to handle SSI.

8.1.3 Ensure that FSP include measures to address the protection of SSI including document control, information access control, physical information security and computer network protection.

8.1.4 Educate all those who handle SSI about document control, information access control, physical information security and computer network protection.



Module 9. Facility Security Assessment


Lesson 9.1: Preliminary Requirements

9.1 Identify Requirements for Conducting an FSA.

9.1.1 Understand 33 CFR 105 and NVIC 11-02 sections relating to FSA.

9.1.2 Understand role of USCG/COTP in FSA.

9.1.3 Research and analyze historical data.

9.1.4 Identify potential weaknesses in an FSA.

9.1.5 Identify potential computer tools and job aids for use in FSA.

Lesson 9.3: Systems, Procedures, and Contingency Plans

9.3 Identify systems and procedures evaluated for the FSA.

9.3.1 Identify and describe security systems in use at the port.

9.3.2 Identify and describe security procedures and contingency plans in use at the port.

Lesson 9.5: The On-scene Survey

9.5 Conduct an on-scene survey.

9.5.1 Identify the resources and personnel required to conduct the on-scene survey.

9.5.2 Identify elements of an OSS.

9.5.3 List items to be evaluated.

Lesson 9.6: Vulnerability Assessment

9.6 Identify vulnerabilities in port.

9.6.1 Understand concept of Risk-Based Decision Making.

9.6.2 Define and identify vulnerabilities.

9.6.3 Use RA/VA methodologies to prioritize vulnerabilities.



Module 11. Facility Security Plan Development


Lesson 11.1: General Requirements

11.1 Ensure that the general requirements of the FSP as specified in 33 CFR Part 105.400 are met.

11.1.1 State that each port facility (included by 33 CFR 105.105) shall develop and maintain a FSP approved by the U.S. Coast Guard.

11.1.2 Describe security measures for protecting the sensitive security information (SSI) in accordance with 49 CFR, Part 1520.

11.1.3 Identify the security conditions for MARSEC Level 1 specified in 33 CFR.

11.1.4 Identify the security conditions for MARSEC Level 2 specified in 33 CFR.

11.1 5 Identify the security conditions for MARSEC Level 3 specified in 33 CFR.

Lesson 11.3: Security Procedures

11.3 Write the plan for the facility’s security procedures.

11.3.1 Describe in writing the changes in procedure with each increase in MARSEC Level. §105.405(a)(5).

11.3.2 Describe in writing the facility's procedures for interfacing with vessels. §105.405(a)(6).

11.3.3 Describe in writing the procedure for communicating a Declaration of Security with an arriving vessel. §105.405(a)(7).

11.3.4 Describe in writing the communication equipment and procedures for facility personnel with specific security duties. §105.405(a)(8).

11.3.5 Describe in writing the security systems and maintenance procedures and schedules for security equipment. §105.405(a)(9).

11.3.6 Describe in writing the facility's security incident procedures §105.405(a)(15).

Lesson 11.5: Amendments

11.5 Amend and update the FSP as required.

11.5.1 State requirements and procedure for amending the FSP and implementing those amendments.

11.5.2 Recognize new legislation that requires amending the FSP.

11.5.3 Recognize changes in the port, facility, personnel, or vessels that require amending the FSP.

11.5.4 Recognize security vulnerabilities arising from drills.



Module 13. Auditing Facility Security Plans


Lesson 13.1: Developing the Audit Instrument

13.1 Develop a well-designed FSP audit instrument.

13.1.1 Identify the items that are required to be part of an FSP.

13.1.2 Identify the items that should be included in an FSP audit instrument.

13.1.3 Determine the most appropriate questions to ask during an FSP audit.

13.1.4 Identify a well-designed FSP audit instrument.

Lesson 13.4: Conducting the Audit

13.4 Conduct an FSP audit.

13.4.1 Name the procedures that are part of an FSP audit.

13.4.2 Identify the procedures that are a part of the FSP audit process.

13.4.3 Identify the purpose of an internal audit.

13.4.4 Differentiate between the type of audit that is considered internal and the type of audit that the Coast Guard conducts.



Module 14: Cargo and Container Security


Lesson 14.6: Container Inspection

14.6 Conduct a basic inspection of a container.

14.6.1 Inspect seals on non-empty containers to verify that they meet or exceed PSA ISO 17712 by using the following methods: identify an intact and proper seal, identify a damaged seal, identify a missing seal, and identify incorrect seal.

14.6.2 Inspect the container door handle rivet to ensure that it has not been compromised.

14.6.3 Inspect empty containers prior to loading using the 7 point method.

14.6.4 Identify and report suspicious containers, such as: missing or damaged seal, unusual weight, and altered or unreadable container numbers.

14.6.5 Identify Smart Box shipping containers.

Lesson 14.7: Cargo and Container Scanning for WMD

14.7 Identify current technological methods for scanning cargo and container contents for potential WMD devices.

14.7.1 Identify cargo/container radiation scanning devices, such as: Radiation Portal Monitors (CBP), personal radiation detectors, and other radiation monitors.

14.7.2 Identify cargo/container inspection devices, such as: VACIS, X-Ray, Gamma Ray, and other non-intrusive inspection devices.

14.7.3 Identify trace detection technologies used in cargo and container inspection.



Module 15. Identification and Documentation: Access Control


Lesson 15.4: TWIC and Access Control

15.4 Monitor control for escorted and unescorted access to port facilities and vessels.

15.4.1 List different requirements for escorted and unescorted access to port facility secure area.

15.4.2 Identify the features of a Transportation Worker Identification Credential (TWIC) card.

15.4.3 Describe relevant aspects of the TWIC program properly.

Lesson 15.6: Electronic Monitoring

15.6 Monitor access electronically.

15.6.1 Identify electronic equipment for monitoring access.

15.6.2 Review and supervise the process of monitoring access electronically.

Lesson 15.7: How to Use Physical Security

15.7 Use physical security systems to control access to facilities.

15.7.1 Use fences, lighting, gates and other counter surveillance measures to control access to facilities.

15.7.2 Perform access control using physical security systems.



Module 16. Screening People and Baggage


Lesson 16.1: Test and Maintain Screening Equipment

16.1 Test, calibrate, and maintain different types of screening equipment.

16.1.1 Test screening equipment.

16.1.2 Calibrate screening equipment.

16.1.3 Maintain screening equipment.

Lesson 16.2: Screening People

16.2 Screen people seeking entry to the facility from landside.

16.2.1 Set up a safe and practical screening area.

16.2.2 Check I.D. and document personal data.

16.2.3 Describe two different screening approaches (squeeze and head-to-toe).

16.2.4 Use metal detectors and wand for screening.

Lesson 16.3: Screening People and Personal Property

16.3 Screen baggage and personal effects.

16.3.1 List the different contents of belongings to be checked between males and females.

16.3.2 Use screening equipment (X-ray machine) to check baggage and carry-on luggage.

Lesson 16.7: Identify and Report HazMat

16.7 Identify and report dangerous and/or suspicious substances, items, and devices.

16.7.1 Identify dangerous and/or suspicious substances, items, and devices, including hazardous material (HazMat) and their threats.

16.7.2 Report dangerous and/or suspicious substances, items, and devices, including hazardous material (HazMat).



Module 17. Recording and Reporting Equipment and Systems


Lesson 17.1: Documenting and Reporting a Breach of Security

17.1 Document and report a breach of security.

17.1.1 Ensure the maintenance of records when there are occurrences that threaten the security. (Sec.105.205)

17.1.2 Ensure facility recordkeeping requirements, including document retention requirements.

17.1.3 State the reporting requirements in case of a breach of security.

17.1.4 Apply specific communication tactics to achieve goals and objectives of report.

17.1.5 Ensure the recording and reporting of changes in the MARSEC Level to the owner/operator and the COTP (Sec. 105.205).



Module 19. Effective Security Training


Lesson 19.1: Performance Oriented Training

19.1 Advocate training that leads to on-the-job performance of port personnel.

19.1.1 Follow statutes, rules, and regulations related to training.

19.1.2 Describe the role of training in the port security function.

19.1.3 Use the resources available that produce workplace performance results.

19.1.4 Provide incentives for continuous performance improvement.

Lesson 19.4: Developing Appropriate Training and Performance Delivery Formats

19.4 Ensure the selection of training and performance support delivery formats that match personnel and their expected work results.

19.4.1 Use appropriate criteria for selecting face-to-face, computer-based, or blended learning formats.

19.4.2 Plan for integration of training and performance support implementation.

19.4.3 Plan follow-up activities to reinforce training.



Module 20. Performance Drill Design


Lesson 20.1: Defining Drills

20.1 Demonstrate relevant background knowledge on exercises and drills.

20.1.1 Define “drill.”

20.1.2 Identify the characteristics of drill exercises.

20.1.3 List reasons for conducting a drill exercise.

20.1.4 Identify types of drills.

20.1.5 Discriminate between drills and other emergency preparation exercises.

Lesson 20.6: Evaluating Drills

20.6 Design drill evaluation.

20.6.1 Define standards for demonstration of competence (expected responses).

20.6.2 Generate drill evaluation instrument/plan.



Module 23: Crisis Management


Lesson 23.6: The Crisis Management Team

23.6 Plan and prepare for crises.

23.6.1 Develop crisis communication plan.

23.6.2 Develop crisis action plan.

23.6.3 Select crisis team personnel.

23.6.4 Establish a crisis management center.

Lesson 23.7: Designing and Conducting Contingency Plan Procedures

23.7 Practice and test contingency plans and crisis procedures.

23.7.1 List reasons for conducting drills and exercises to practice and test contingency plans and crisis procedures.

23.7.2 Design, implement and evaluate exercises for different crisis contingencies.

23.7.3 Design, implement and evaluate exercises that test different components of the crisis action plan.

23.7.4 Complete after action report process for exercise.

Lesson 23.8: Crisis Response

23.8 Respond to a crisis.

23.8.1 List local, state, federal and private agencies responsible for emergency response and their roles in the incident command system.

23.8.2 Describe events to expect during a crisis.

23.8.3 Describe the tasks of the crisis manager during a crisis.

23.8.4 Given a description of a crisis incident, describe crisis response procedures.

23.8.5 Describe practices for effective management of crises.

23.8.6 Implement emergency protocols and procedures.


FSO Professional Development


Module 1. The Seaport Environment


Lesson 1.3: Port Personnel

1.3 Explain the roles of the primary stakeholders in the maritime domain and discriminate between authorized and non-authorized personnel.

1.3.1 Discriminate between authorized and non-authorized security personnel involved in port security.

1.3.2 Discriminate between authorized and non-authorized labor, service, and subcontract personnel involved in daily port operations.



Module 3. Community and Port Relations


Lesson 3.1: The Port and the Community

3.1 Incorporate understanding of local community in port security decisions and planning.

3.1.1 Identify the port’s local community stakeholders and their relation to the port.

3.1.2 Incorporate unique characteristics of port into operational and security planning to accommodate both public and port security needs.

Lesson 3.2: Effective Communication Strategies

3.2 Maintain ongoing communication with local agencies and organizations.

3.2.1 Choose effective communication strategies.

3.2.2 Create strategic community investment in port operations.

3.2.3 Institute channels for sharing security-related information and practices that do not conflict with work of AMSC.

Lesson 3.3: Creating Strategic Port/Community Relationship

3.3 Create strategic port/community relationships.

3.3.1 Identify the port’s responsibilities including delivering Maritime Security Awareness training to the neighborhood/community.

3.3.2 Identify the community’s contributions to the port including reporting suspicious/dangerous activities, devices and items.

3.3.3 Plan activities that strengthen port/community relationships.



Module 4. Terrorism/Weapons of Mass Destruction


Lesson 4.2: Potential Targets of Terrorism

4.2 Describe the unique nature of port as a potential terrorism target.

4.2.1 Describe the unique nature of port as potential terrorist targets.

4.2.2 Describe the critical infrastructure / facilities that can be potential terrorist targets at port.

4.2.3 Apply concepts learned to identify potential targets of terrorism at the learner’s own port.

4.2.4 Identify how a WMD may be transported into or out of the port.

4.2.5 Describe the consequences of a terrorist attack at a port including the economic and psychological impacts.

4.2.6 Demonstrate how to carry out physical searches in buildings, facilities, and near vessels

Lesson 4.4: Identifying WMD

4.4 Identify and report WMD incidents.

4.4.1 Define the terminology associated with WMD incidents (e.g., BNICE, WMD, CBRNE, Cyber-terrorism).

4.4.2 Describe the difference between HAZMAT and terrorism incidents involving CBRNE.

4.4.3 Recognize pre-incident indicators of a potential WMD attack.

4.4.4 Identify signs and symptoms common to initial victims of a WMD-related incident or event.

4.4.5 Describe possible motivations of a terrorist using CBRNE.

Lesson 4.5: Reporting WMD

4.5 Report WMD incidents.

4.5.1 Summarize the characteristics of WMD incidents.

4.5.2 Report WMD incidents.

Lesson 4.6: WMD: Protecting Yourself

4.6 Use proper procedures for self-protection during a WMD incident.

4.6.1 Describe measures for self-protection in a WMD incident including time, distance and shielding.

4.6.2 Identify the minimum safe distance from a hazardous materials scene.

4.6.3 Describe the four recommended responses to a WMD incident. (RAIN).

4.6.4 Plan and manage procedures to respond to weapons, dangerous substances and devices.



Module 5. Inside Threats


Lesson 5.1: The Nature of Inside Threats

5.1 Demonstrate relevant background knowledge on inside threats.

5.1.1 Define “inside threat.”

5.1.2 Distinguish between “inside” and “outside” threats in terms of description, involved persons, and motives.

5.1.3 List common types (categories) of internal threats.

5.1.4 List the characteristics of internal threats by category.

Lesson 5.2: Inside Threats and Terrorism

5.2 Describe the relationship between inside threats and potential terrorist activities.

5.2.1 Describe the nature of potential damage and loss posed by internal threats.

5.2.2 Define “internal conspiracy.”

5.2.3 Compare the potential threat of internal conspiracies as compared to other internal threat types.

Lesson 5.3: Crime on the Port

5.3 Describe the relationship between inside threats and criminal activities.

5.3.1 Describe the forms of crime that can take place in the seaport environment.

5.3.2 List the range of crimes associated with criminal activities in ports.

5.3.3 Describe basic statistics on criminal activity in ports in terms of types of illegal activities.

Lesson 5.4: Legislation Related to Inside Threats

5.4 Describe the implications of inside threats for port security in relationship to legislative policies and procedures.

5.4.1 List major legislative policies and procedures regarding inside threats.

5.4.2 Describe the respective responsibilities of first state, then federal, authorities in regards to inside threats.

5.4.3 List the major stakeholders in the seaport environment along with their respective concerns.

Lesson 5.5: Information Sharing

5.5 Describe the relationship between inside threats and information sharing.

5.5.1 Describe the role of intelligence gathering in reducing inside threats.

5.5.2 Describe the importance of information sharing between agencies in dealing with inside threats.

Lesson 5.6: Inside Threat Prevention

5.6 Work with security staff to identify potential internal threats.

5.6.1 Recognize activities and behaviors consistent with internal threats.

5.6.2 Identify potential internal threat risk areas in current port security setting.

5.6.3 Describe the role of staff and employees in identifying internal threats.

5.6.4 Describe the role and functions of port security staff in regard to internal threats.

5.6.5 Develop trusted and routine communication with port security staff regarding threat issues.

Lesson 5.7: Communicating With Law Enforcement

5.7 Create information-sharing communication channels with law enforcement.

5.7.1 Describe the role of law enforcement agencies in regards to inside threats.

5.7.2 Describe the conditions under which it is appropriate to report a potential inside threat to law enforcement agencies.

5.7.3 Identify appropriate points of contact within law enforcement agencies.

5.7.4 List the characteristics of a meaningful report to law enforcement agencies.

Lesson 5.8: Anonymous Reporting

5.8 Support employee anonymous reporting of potential inside threats.

5.8.1 Describe the importance of anonymity in reporting potential inside threats.

5.8.2 Describe employee’s responsibility in reporting potential irregularities/inside threats to appropriate personnel.

5.8.3 Build a trusting relationship between employees and management regarding all security concerns.

5.8.4 Implement explicit anonymous reporting procedures for employees.

5.8.5 Publicize anonymous inside threat reporting processes to all employees on a regular basis.

5.8.6 Describe the role of incentives in reporting potential inside threats.

Lesson 5.9: Responding to Reports

5.9 Describe processes for responding to reports of inside threats and illegal activity.

5.9.1 Describe the steps for a thorough review of submitted reports.

5.9.2 List the characteristics of an efficient, but thorough, submitted report.

5.9.3 List the ways in which the anonymity of reporting employees may be safeguarded at all steps of the review/investigation process.

Lesson 5.10: Investigation Methods

5.10 Describe common investigative methods for inside threats.

5.10.1 Know