APEC Manual of Maritime Security Drills and Exercises for Port Facilities

Drill / D4-01
Category / Emergency Response
Type / Security measures compromised
Subject / Security surveillance equipment malfunction
Security Level / 1 or 2

INTRODUCTION

  1. Perimeter security is the first line of defence against intruders. The measures may include physical barrier such as fencing and barb wires, and secondary measures such as surveillance cameras, motion sensors, thermal sensors, vibration sensors (for fences), magnetic sensors (for doors and windows) and perimeter patrols. Failure in any of these means can compromise the security of the port facility. As such, security staff must be ready to take the necessary measure to minimize the chance for compromise.

AIM

  1. To enhance the proficiency of port facility security staff in responding to emergency situations.

OBJECTIVES

  1. Security staff will be required to detect failure of the equipment within the time limit as specified in the PFSP.
  1. Security staff will be required to respond to failure of the equipment according to procedure in the PFSP.

DESIRED OUTCOMES

  1. On completion of the drill, Port Facility security staff will be able to:

·  Detect failures in surveillance equipment.

·  Perform the appropriate checks to verify the failure.

·  Report the failure and track the rectification process.

RESOURCES

Personnel

  1. Control Team

·  Chief Controller – Can be the PFSO

·  Technicians from the surveillance equipment supplier

  1. Players
  2. Port Facility security staff.
  1. Safety Officer – The appointment of a safety officer for this drill should be considered especially if staff has to proceed at height or deal with electrical system to check the status of the equipment.

Material

  1. Surveillance system

·  This particular drills uses the surveillance camera and a motion detector but can be replaced by any suitable surveillance equipment that are available at the port facility.

·  The Chief Controller will determine which surveillance systems would be involved in the drill. He will consult with the suppliers to establish how to simulate a defect in the surveillance system so that a failure alarm would be activated that security staff would be able to respond to.

  1. Communication

·  For players – The existing communication infrastructure will be used.

·  For Controllers – Mobile phone as preferred means with walkie-talkie as back up.

  1. Others

·  Refreshment or meals – if required

·  Room for briefing and debriefing with computer, projector, screen and chairs

·  Stationery for note taking

Budget

  1. Funding may be needed for the following:

·  Hiring of the staff of the security equipment supplier

·  Refreshments for debrief.

·  Reimbursement of expenses incurred by controllers or staff, if any.

SCHEDULE OF EVENTS

  1. Refer to Drill Announcement (or if there are changes, an updated Schedule can be posted here)

SCENARIO

  1. The security surveillance system is an important tool in defending a Port Facility against security threats. However, the system has been experiencing some malfunctions recently and security staff has been reminded to be extra vigilant in monitoring the systems in order to detect any malfunctions promptly.

TASKS

  1. For Controllers:
  1. Due to the recent malfunctions, the presence of the technicians for the security equipment should not come as a surprise to the security staff. The technicians should simulate the malfunctions without being detected by the security staff. It would be ideal if this can be done remotely, otherwise, the technician may have to do it on the actual equipment but have to be certain that this malfunction can be detected by the security staff.
  1. The drill begins with one security surveillance system (for example, surveillance camera) experiencing a technical malfunction. The Chief Controller will initiate the malfunction simulation with the advice or assistance of the equipment suppliers. Mid-way through the security staff response to the first malfunction, the Chief Controller may activate the second equipment malfunction (eg, motion sensor, if available).
  1. Controllers should take note of how long security staff takes to become aware of the malfunction.
  1. The Chief Controller will conduct the drill in accordance with the events listed in the Master Events List.
  1. The Chief Controller should position himself at a suitable location to discreetly observe the proceedings.
  1. The Safety Officer should follow the security staff as they carry the drills and especially during the checking of the sensors.
  1. For Players. This drill will require security staff to respond to two surveillance system malfunctions that will be initiated by the controllers as technical defects. Upon detection of the malfunction alarm, security staff is expected to act in accordance with the equipment operating instructions and Port Facility Security Plan.

MASTER EVENTS LIST

The timing of the drill is not critical. Expected response column is just a guide and should be substituted with existing standard operating procedure of port facility.

S/N / Time / Event / From / To / Means of Delivery / Expected Response / Remarks
Date: / DD/MM/YYYY
001 / 0900 / All participants in position
002 / 0905 / Drill commence / Chief Controller / All participants / Walkie Talkie / None / “Drill Start”
003 / 0925 / Malfunction in surveillance camera / Controller - Technician / Security Staff / Remotely disable equipment / Notice malfunction, verify and seek technical assistance
004 / 1015 / Malfunction in motion sensor / Controller - Technician / Security Staff
005 / 1100 / Drill completed / Chief Controller / All participants / Walkie Talkie / Dispersal of personnel/ equipment / “Drill End”

TERMINATION

  1. The drill may be terminated under any one of the following conditions:
  2. When all “malfunctioning” surveillance equipment has been detected. The time of detections must be noted.

OR

  1. At a pre-determined time after the commencement of the drill, if the “malfunctions” were not detected,

OR

  1. Upon the Chief Controller’s instruction.

Volume 2 D4-01 Pg 4