• JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator

Seaport Security for Law Enforcement Officers





LEO Required




New #


Old #


Compliance with 33 CFR 105.210






Lesson 1-R: Current Security Threats and Patterns

LEO 24.1


1-R     When working in the port environment, demonstrate knowledge of current security threats and patterns.



1.1     Identify why knowledge of current security threats and patterns is important to port




1.2     State the mission of port security.



1.3     Describe the three categories of security threats that lead to crisis events.



1.4     Identify events related to categories of security threats to include Transportation Security

Incidents (TSI) and breaches of security and how to report them.



1.5     Describe the role of situation awareness in preventing and mitigating security incidents.



1.6     Summarize current port security threats and patterns to include, piracy and armed attacks, terrorism, smuggling, stowaways, cargo theft, collateral damage, and internal conspiracy.






Lesson 2-R: Dangerous Substances and Devices

LEO 24.2


2-R     When working in the port environment, recognize and detect dangerous substances and




2.1     Identify characteristics and components of IEDs.



2.2     Describe three methods of delivering IED.



2.3     Recognize and detect indicators of package type, VBIED, and suicide bomb IEDs.



2.4     Identify characteristics of CBRNE.



2.5     Recognize pre-incident indicators of WMD and HazMat.



2.6     Identify types of hazardous materials and certain dangerous cargo (CDC).



2.7     Identify protective measures of time, distance, and shielding for WMD and HazMat




2.8     Identify reporting procedures for IED, WMD and HazMat and other dangerous substances

and devices.






Lesson 3-R: Characteristics and Behavioral Patterns of Persons Likely to Threaten Security

LEO 24.3


3-R     When working in the port environment, recognize characteristics and behavioral patterns of

persons likely to threaten security.



3.1     Discuss the definitions, history, and threat of terrorism.



3.2     Compare and contrast domestic and international terrorism.



3.3     Recognize stages of the terrorist planning cycle and the seven signs of terrorism.



3.4     Summarize various types of weapons, dangerous substances and devices, the damage they

can cause, and their appearance.



3.5     Recognize indicators of and reasons for surveillance.



3.6     Recognize, respond to, and report elicitation.



3.7     Identify suspicious people, behaviors, and activities.






Lesson 4-R: Techniques Used to Circumvent Security Measures

LEO 24.4


4-R     When working in the port environment, demonstrate knowledge of current techniques used to

circumvent security measures.



4.1     Identify areas of critical concern in a port.



4.2     Make observations and provide descriptions of people and vehicles.



4.3     Recognize techniques used to circumvent security measures.



4.4     Identify operational deterrents to surveillance/hardening.




4.5     Evaluate and report indicators of surveillance and suspicious activities.



4.6     Identify Federal regulations and local protocol for reporting surveillance and suspicious







Lesson 5-R: Crowd Management and Control Techniques

LEO 24.5


5-R     When working in the port environment, implement crowd management and control techniques.



5.1     Classify the different types of crowds.



5.2     Identify the characteristics of each crowd type.



5.3     Demonstrate the importance of keeping order.



5.4     Identify crowd control techniques for reducing and avoiding panic in emergency situations.



5.5     Identify effective communicate techniques with a crowd during an emergency.



5.6     Describe techniques used to appropriately evacuate a crowd.



5.7     Manage information and equipment for effective crowd control.






Lesson 6-R: Security-Related Communications

LEO 24.6


6-R     When working in the port environment, demonstrate knowledge and procedures of

security related communications.



6.1     Identify security sensitive information.



6.2     Describe the importance of secure marking, handling, disclosure, and disposing of

Sensitive Security Information (SSI) and confidentiality.



6.3     Describe the different methods of disseminating SSI securely.



6.4     Describe the use of information technology and communications systems in port facility

operations and in maintaining security.



6.5     Describe effective communication skills in radio communication.






Lesson 7-R: Knowledge of Emergency Procedures and Contingency Plans

LEO 24.7


7-R     When working in the port environment, implement emergency procedures and

contingency plans.



7.1     Describe the impact of a crisis/emergency.



7.2     Identify the role of NIMS and ICS in crisis management.



7.3     Describe a structured response to crises/emergencies.



7.4     Describe the components of effective crisis management.



7.5     List preparedness guidelines for crises/emergencies.



7.6     Describe best practices in crisis management.



7.7     Describe how drills are used to enhance crisis management.



7.8     List emergency and crisis response procedures.



7.9     Explain the role of the Central Point of Contact (CPC) in crisis response.






Lesson 8-R: Operation of Security Equipment and Systems

LEO 24.8


8-R     When working in the port environment, implement emergency procedures and

contingency plans.



8.1     Identify the major infrastructure and systems found on a port.



8.2     Identify the types of security infrastructure and systems used on a port.



8.3     Identify security equipment used on a port.






Lesson 9-R: Testing, Calibration, and Maintenance of Security Equipment and Systems

LEO 24.9


9-R     When working in the port environment, perform testing, calibration, and maintenance

of security equipment and systems.



9.1     Inspect and test security equipment and systems.



9.2     Calibrate security equipment and systems.



9.3     Maintain security equipment and systems in accordance with the FSP.



9.4     Report deficiencies as stipulated in the FSP.





LEO 10-R

Lesson 10-R: Inspection, Control, and Monitoring Techniques

LEO 24.10


10-R  When working in the port environment, implement inspection, control, and monitoring







10.1   Define the mission of security personnel in regard to port security threats.



10.2   Define the three MARSEC Levels.



10.3   List physical security best practices used at facilities for access control.



10.4   Identify and validate TWIC and non-TWIC holder IDs at access gates and their

documentation for entry.



10.5   Apply the "Feel, Look, Ask and Give" (FLAG) strategies in checking ID.



10.6   Identify signs of counterfeit, forged, and altered credentials.



10.7   Identify general checks and three basic steps for inspecting vehicles.



10.8   Identify monitoring techniques for restricted areas.



10.9   Describe inspection methods for vessel stores, bunkers and empty containers.



10.10 List five best practices for protecting cargo and containers.





LEO 11-R

Lesson 11-R: Relevant Provisions of the Facility Security Plan

LEO 24.11


11-R  When working in the port environment, implement relevant provisions of the Facility Security




11.1   State the purpose of the Facility Security Plan (FSP).



11.2   State responsibilities of the owner or operator specified in 33CFR105.200.



11.3   State security responsibilities required of the FSO as specified in 33CFR105.205.



11.4   List knowledge required of facility personnel with security duties specified in




11.5   State knowledge required of all other facility personnel specified in 33CFR105.215.



11.6   Note authorized uniformed personnel who may be seen working on a port facility and why

they are there.



11.7   Define the purpose of a Facility Security Assessment (FSA).



11.8   Define vulnerability and give examples of security vulnerabilities to be included in a Facility

Security Assessment (FSA)



11.9   Define risk-based decision making as used in the Facility Security Assessment (FSA)




11.10 Identify the role of drills and exercises in meeting requirements of the FSP.





LEO 12-R

Lesson 12-R: Methods of Screening People, Personal Effects, Baggage, and Cargo

LEO 24.12


12-R  When working in the port environment, implement methods of physical screening of persons,

personal effects, baggage, cargo, and vessel stores.



12.1   State Federal regulations that apply to facility screening.



12.2   Identify requirements for screening areas.



12.3   Describe methods for screening identification and documents verifying access to facilities

and cruise terminals.



12.4   Describe how to perform a visual inspection of a person and their personal effects.



12.5   Describe methods used for screening using walk through and handheld detectors.



12.6   Describe squeeze and head to toe screening methods.



12.7   Identify and verify documents that accompany cargo and containers.



12.8   Identify methods for screening cargo and container seals for signs of tampering.



12.9   Identify components of a container serial number.





LEO 13-R

Lesson 13-R: Understanding MARSEC Level Requirements

LEO 24.13


13-R  When working in the port environment, implement procedures in response to all MARSEC




13.1   Identify security measures for MARSEC Level 1 specified in 33 CFR for access control,

restricted areas, cargo, delivery vessels, and monitoring.



13.2   Identify security measures for MARSEC Level 2 specified in 33 CFR for access control,

restricted areas, cargo, delivery vessels, and monitoring.



13.3   Identify security measures for MARSEC Level 3 specified in 33 CFR for access control,

restricted areas, cargo, delivery vessels, and monitoring.





LEO 14-R

Lesson 14-R: Relevant Aspects of the TWIC Program

LEO 24.14



14-R  When working in the port environment, implement the relevant provisions of the TWIC




14.1   List different requirements for escorted and unescorted access to port facility secure and

restricted areas.



14.2   Identify the features of a Transportation Worker Identification Credential (TWIC).



14.3   Describe relevant aspects of the TWIC program and how to carry them out.



LEO Professional Development

New #


Old #


Module 1.  The Seaport Environment





LEO 1.1-PD

Lesson 1.1-PD:     Port Processes and Activities

LEO 1.1


1.1-PD         Explain the primary processes and activities that occur on a port.



1.1.1      List the activities and processes most commonly executed on a port.



1.1.2      Define what primary processes and activities most commonly occur at each type of port.





LEO 1.2-PD

Lesson 1.2-PD:     Port Facilities and Operational Equipment

LEO 1.2


1.2-PD         Explain the major facilities and operational equipment found on a port.



1.2.1      Identify the facilities most commonly located on a port.



1.2.2      Identify the types of operational equipment most commonly used on a port.





LEO 1.3-PD

Lesson 1.3-PD:     Port Personnel

LEO 1.3


1.3-PD         Explain the roles of the primary stakeholders in the maritime domain and discriminate

between authorized and non-authorized personnel.



1.3.1      Discriminate between authorized and non-authorized security personnel, including

uniforms, vehicles, and forms of identification, involved in port security.



1.3.2      Discriminate between authorized and non-authorized labor, service, and subcontract

personnel involved in daily port operations.





LEO 1.4-PD

Lesson 1.4-PD:     Safety and Security on the Port

LEO 1.4


1.4-PD         Explain the importance of safety and security at seaports.



1.4.1      Describe the safety issues surrounding the facilities and equipment most commonly

used on a port.



1.4.2      Describe the safety issues surrounding major port infrastructure.



1.4.3      Describe safety issues related to the activities and processes most commonly executed

on a port.



1.4.4      Describe security issues surrounding the facilities and equipment most commonly used

at a port.



1.4.5      Describe security issues surrounding major port infrastructure.



1.4.6      Describe security issues related to the activities and processes most commonly executed

at a port.



1.4.7      State that there are different security actions required by the three MARSEC Levels.



1.4.8      Demonstrate awareness of the potential impact of port disruption.









Module 2. Rules and Regulations in Seaport Security





LEO 2.1-PD

Lesson 2.1-PD:     National and International Regulations

LEO 2.1


2.1-PD         Identify current relevant regulations that govern security requirements at a U.S. port or




2.1.1      Identify the regulations that govern international maritime transportation security.



2.1.2      Identify the regulations that govern U.S. maritime transportation security.





LEO 2.2-PD

Lesson 2.2-PD:     Role of Security Organizations on the Port

LEO 2.3


2.2-PD         Summarize the roles of federal, state, and local agencies in seaport security.



2.2.1      Identify roles of the U.S. Coast Guard in establishing and maintaining port and facility

security as specified in international and U.S. regulations.



2.2.2      Identify roles of the U.S. Customs and Border Protection in establishing and maintaining port and facility security as specified in international and U.S. regulations.



2.2.3      Identify roles of state law enforcement in establishing and maintaining port and facility

security as specified in international and U.S. regulations.




2.2.4      Identify roles of local law enforcement in establishing and maintaining port and facility

security as specified in international and U.S. regulations.



2.2.5      Identify roles of port, vessel, and facility security personnel in establishing and

maintaining port and facility security as specified in international and U.S. regulations.









Module 3. Community and Port Relations





LEO 3.1-PD

Lesson 3.1-PD:     The Port and the Community

LEO 3.1


3.1-PD         Incorporate understanding of local community in port security decisions and planning.



3.1.1      Identify the port’s local community stakeholders and their relation to the port.



3.1.2      Incorporate unique characteristics of the port into operational and security planning to

accommodate both public and port security needs.





LEO 3.2-PD

Lesson 3.2-PD:     Effective Communication Strategies

LEO 3.2


3.2-PD         Maintain ongoing communication with local agencies and organizations.



3.2.1      Choose effective communication strategies.



3.2.2      Create strategic community investment in port operations.



3.2.3      Institute channels for sharing security-related information and practices that do not conflict with work of AMSC.





LEO 3.3-PD

Lesson 3.3-PD:     Creating Strategic Port/Community Relationship

LEO 3.3


3.3-PD         Create strategic port/community relationships.



3.3.1      Identify the port’s responsibilities including delivering Maritime Security Awareness

training to the neighborhood/community.



3.3.2      Identify the community’s contributions to the port.



3.3.3      Plan activities that strengthen port/community relationships.









Module 4. Terrorism/Weapons of Mass Destruction





LEO 4.1-PD

Lesson 4.1-PD:     Potential Targets of Terrorism

LEO 4.2


4.1-PD         Describe the unique nature of port as a potential terrorism target.



4.1.1      Describe the unique nature of port as potential terrorist targets.



4.1.2      Describe the critical infrastructure / facilities that can be potential terrorist targets at




4.1.3      Apply concepts learned to identify potential targets of terrorism at the learner’s own




4.1.4      Identify how a WMD may be transported into or out of the port.



4.1.5      Describe the consequences of a terrorist attack at a port including the economic and

psychological impacts.



4.1.6      Demonstrate how to carry out patrols and physical searches in buildings, facilities, and

near vessels





LEO 4.2-PD

Lesson 4.2-PD:     WMD:  Protecting Yourself

LEO 4.6


4.2-PD         Use proper procedures for self-protection during a WMD incident.



4.2.1      Describe three main concepts in protective measures.



4.2.2      Identify the minimum safe distance from a hazardous materials scene.



4.2.3      Describe the four recommended responses to a WMD incident. (RAIN).



4.2.4      Plan and manage procedures to respond to weapons, dangerous substances and










Module 5. Inside Threats





LEO 5.1-PD

Lesson 5.1-PD:     The Nature of Inside Threats

LEO 5.1



5.1-PD         Demonstrate relevant background knowledge on inside threats.



5.1.1      Define “inside threat.”



5.1.2      Distinguish betweeninside” and outside” threats in terms of description, involved

persons, and motives.



5.1.3      List common types (categories) of internal threats.



5.1.4      List the characteristics of internal threats by category.



5.1.5      Describe the nature of potential damage and loss posed by internal threats.



5.1.6      Define “internal conspiracy.”



5.1.7      Compare the potential threat of internal conspiracies as compared to other internal

threat types.





LEO 5.2-PD

Lesson 5.2-PD:     Crime on the Port

LEO 5.2


5.2-PD         Identify inside threats and criminal activities on the port.



5.2.1      Describe the forms of crime that can take place in the seaport environment.



5.2.2      List the range of crimes associated with criminal activities in ports.



5.2.3      Describe basic statistics on criminal activity in ports in terms of types of illegal activities.





LEO 5.3-PD

Lesson 5.3-PD:     Identifying Inside Threats

LEO 5.3


5.3-PD         Work with security staff to identify potential internal threats.



5.3.1      Recognize activities and behaviors consistent with internal threats.



5.3.2      Identify potential internal threat risk areas in current port security setting.



5.3.3      Describe the role of staff and employees in identifying internal threats.



5.3.4      Describe the role and functions of port security staff in regard to internal threats.



5.3.5      Develop trusted and routine communication with port security staff regarding threat






LEO 5.4-PD

Lesson 5.4-PD:     Reporting Inside Threats

LEO 5.4


5.4-PD         Support employee anonymous reporting of potential inside threats.



5.4.1      Describe the importance of anonymity in reporting potential inside threats.



5.4.2      Describe employee’s responsibility in reporting potential irregularities/inside threats to

appropriate personnel.



5.4.3      Describe the elements of a trusting relationship between employees and management

regarding all security concerns.





LEO 5.5-PD

Lesson 5.5-PD:     Responding to Reports of Inside Threats

LEO 5.5


5.5-PD         Describe processes for responding to reports of inside threats and illegal activity.



5.5.1      Describe the steps for a thorough review of submitted reports.



5.5.2      List the characteristics of an efficient and thorough report.





LEO 5.6-PD

Lesson 5.6-PD:     Investigation Methods

LEO 5.6


5.6-PD         Describe common investigative methods for inside threats.



5.6.1       Describe the elements of a good investigation.



5.6.2      State the legal rights of all employees in regard to threat investigations.



5.6.3      State the conditions for which asking for additional investigative help are warranted.









Module 6. Detecting Surveillance and Suspicious Activities





LEO 6.1-PD

Lesson 6.1-PD:     Countering Surveillance

LEO 6.4


6.1-PD         Prevent and counter surveillance.



6.1.1      Identify methods for preventing and countering surveillance.



6.1.2      Operate counter surveillance equipment.









Module 7. Situation Awareness






LEO 7.1-PD

Lesson 7.1-PD:     Identifying Pre-incident Indicators

LEO 7.1


7.1-PD         Identify pre-incident indicators using situation awareness.



7.1.1      Describe the role of situation awareness in preventing and mitigating security incidents.



7.1.2      Identify current security threats and patterns.



7.1.3      Recognize characteristics and behaviors of persons likely to threaten security.



7.1.4      Recognize and detect dangerous substances and devices.



7.1.5      Identify techniques used to circumvent security measures.





LEO 7.2-PD

Lesson 7.2-PD:     Situation Awareness Techniques and Skills

LEO 7.2


7.2-PD         Develop techniques and skills to increase situation awareness.



7.2.1      Identify skills required in looking for perceived threats to security in the port




7.2.2      Identify skills required to improve comprehension and understanding of perceived threats in the port environment.



7.2.3      Discuss the role of anticipation and prediction in situation awareness.





LEO 7.3-PD

Lesson 7.3-PD:     Preparing a Course of Action

LEO 7.3


7.3-PD         Prepare a course of action for various security threats.



7.3.1      Describe how situation awareness is used in formulating a course of action.



7.3.2      Describe the use of native skills in formulating a course of action.





LEO 7.4-PD

Lesson 7.4-PD:     Keys to High Situation Awareness

LEO 7.4


7.4-PD         Maintain situation awareness while on duty.



7.4.1      Demonstrate the role of perception in situation awareness.



7.4.2      List skills to stay alert and mentally focused.



7.4.3      List ways to improve situation awareness.









Module 8. Facility Security Assessment





LEO 8.1-PD

Lesson 8.1-PD:     Legal Requirements for Facility Assessment

LEO 9.1


8.1-PD         Identify Requirements for Conducting an FSA.



8.1.1      State 33 CFR 105 and NVIC 11-02 sections relating to FSA.



8.1.2      State the role of USCG/COTP in an FSA.



8.1.3      Research and analyze historical data for use in the FSA.



8.1.4      Identify potential weaknesses in an FSA.



8.1.5      Identify potential computer tools and job aids for use in an FSA.





LEO 8.2-PD

Lesson 8.2-PD:     Physical Security Elements and Facility Assessment

LEO 9.2


8.2-PD         Identify physical security features, systems, and procedures evaluated for the FSA.



8.2.1      Identify potential security weaknesses of the seaport.



8.2.2      Identify potential security weaknesses in buildings, walls, fences and other structures.



8.2.3      Identify and describe security systems in use at the port.



8.2.4      Identify and describe security procedures and contingency plans in use at the port.



8.2.5      Identify and describe essential utility systems at the port, including water, drainage,

power and communications.





LEO 8.3-PD

Lesson 8.3-PD:     The On-scene Survey and Facility Assessment

LEO 9.3


8.3-PD         Conduct an on-scene survey for the FSA.



8.3.1      Identify the resources and personnel required to conduct the on-scene survey.



8.3.2      Identify elements of an OSS.



8.3.3      List items to be evaluated.





LEO 8.4-PD

Lesson 8.4-PD:     Vulnerabilities and Facility Assessment

LEO 9.4


8.4-PD         Identify vulnerabilities on a port facility for the FSA.



8.4.1      Describe the concept of Risk-Based Decision Making.




8.4.2      Define and identify vulnerabilities.



8.4.3      Use RA/VA methodologies to prioritize vulnerabilities.









Module 9. Risk Mitigation





LEO 9.1-PD

Lesson 9.1-PD:     Measures to Mitigate Vulnerabilities

LEO 10.1


9.1-PD         Develop mitigation measures for each vulnerability.



9.1.1      Define threat, vulnerability, and consequence.



9.1 2      Identify alternative countermeasures for each vulnerability.



9.1.3      Identify benefits and costs for each countermeasure.



9.1.4      Identify mitigation measures based on cost, benefits, effect on commerce, and










Module 10:  Cargo and Container Security





LEO 10.1-PD

Lesson 10.1-PD:   Government Programs for Cargo and Container Security

LEO 11.1


10.1-PD       Identify government programs related to cargo and container security.



10.1.1    Explain the role of CBP as the lead agency in responding to cargo or container incidents.



10.1.2    State the CBP 24-Hour advance Cargo Manifest Declaration Rule.



10.1.3    Describe the role of the National Targeting Center in cargo and container security.



10.1.4    Describe the function of the CBP program C-TPAT.



10.1.5    Describe the function of CBP's Container Security Initiative (CSI).





LEO 10.2-PD

Lesson 10.2-PD:   Regulations for Cargo and Container Security

LEO 11.2


10.2-PD       Identify current legislation related to cargo and container security.



10.2.1    Describe provisions for cargo and container security contained in the 2006 Safe Ports




10.2.2    Describe Federal regulations regarding emergency information on HAZMAT cargos

contained in 49CFR 172.600.





LEO 10.3-PD

Lesson 10.3-PD:   Vulnerabilities of Cargo and Containers

LEO 11.3


10.3-PD       Identify vulnerabilities associated with cargo and containers.



10.3.1    Identify vulnerabilities regarding stowaways on a vessel or in a container.



10.3.2    Identify seaport vulnerabilities associated with contraband in cargo/containers to

include human traffic, narcotics, and currency.



10.3.3    Identify vulnerabilities associated with hazardous cargo/containers.



10.3.4    Identify vulnerabilities associated with biological hazards in cargo/containers to include

illegal shipping of hazardous waste.



10.3.5    Identify seaport vulnerabilities associated with IED/WMD devices contained in




10.3.6    Identify seaport vulnerabilities associated with fraud to include document fraud and

inside threats.



10.3.7    Identify seaport vulnerabilities associated with theft to include direct theft from cargo facilities, hijacking and driver complicit hijacking, theft of an entire container using false paperwork, and pilferage.





LEO 10.4-PD

Lesson 10.4-PD:   Container Inspection

LEO 11.6


10.4-PD       Conduct a basic inspection of a container.



10.4.1    Inspect seals on non-empty containers to verify that they meet or exceed PSA ISO 17712 by using the following methods:  identify an intact and proper seal, identify a damaged seal, identify a missing seal, and identify incorrect seal.



10.4.2    Inspect the container door handle rivet to ensure that it has not been compromised.



10.4.3    Inspect empty containers prior to loading using the 7 point method.



10.4.4    Identify and report suspicious containers, such as: missing or damaged seal, unusual



weight, and altered or unreadable container numbers.



10.4.5    Identify Smart Box shipping containers.









Module 11. Identification and Documentation: Access Control





LEO 11.1-PD

Lesson 11.1-PD:   Access and Traffic Logs

LEO 12.3


11.1-PD       Document the movement of personnel, vehicle, high value property items, HazMat and

controlled substances.



11.1.1    State the documents that shall be available for the movement of personnel, vehicle,

high value property items, HazMat and controlled substance.



11.1.2    Identify the key forms of documentation used.



11.1.3    Fill out electronic logs for property movement.





LEO 11.2-PD

Lesson 11.2-PD:   Electronic Equipment for Monitoring

LEO 12.4


11.2-PD       Monitor access electronically.



11.2.1    Identify electronic equipment for monitoring access.



11.2.2    Review and supervise the process of monitoring access electronically.





LEO 11.3-PD

Lesson 11.3-PD:   Access to Restricted Areas

LEO 12.6


11.3-PD       Control access to facility restricted areas.



11.3.1    Intercept people seeking entry to facility in restricted areas.



11.3.2    Question people in restricted areas.









Module 12. Screening People and Baggage





LEO 12.1-PD

Lesson 12.1-PD:   Screening Baggage and Personal Property

LEO 13.3


12.1-PD       Screen baggage and personal effects.



12.1.1    List the different contents of belongings to be checked between males and females.



12.1.2    Use screening equipment (X-ray machine) to check baggage and carry-on luggage.





LEO 12.2-PD

Lesson 12.2-PD:   Legal Seizure

LEO 13.4


12.2-PD       Conduct seizure legally and according to policy.



12.2.1    Describe legal procedures and policies for seizure, including handling evidence.





LEO 12.3-PD

Lesson 12.3-PD:   People in Restricted Areas

LEO 13.5


12.3-PD       Intercept and question people seeking entry to or within restricted areas.



12.3.1    Search persons and parcels within restricted areas.





LEO 12.4-PD

Lesson 12.4-PD:   Impact of  MARSEC Levels

LEO 13.6


12.4-PD       List the screening measures and procedures at the three security levels.



12.4.1    List the screening measures and procedures at MARSEC 1.



12.4.2    List the screening measures and procedures at MARSEC 2.



12.4.3    List the screening measures and procedures at MARSEC 3.





LEO 12.5-PD

Lesson 12.5-PD:   Supervising Screening of People and Baggage

LEO 13.8


12.5-PD       Supervise screening of people and baggage.



12.5.1    List the operational limitations of screening equipment.



12.5.2    Ensure that screening measures and procedures comply with FSP.









Module 13:  Vehicle Screening and Inspection





LEO 13.1-PD

Lesson 13.1-PD:   Vehicles on the Port

LEO 14.1


13.1-PD       Monitor, control, and report the movement of cleared and uncleared vehicles.




13.1.1    Name the sections of 33 CFR and state and local laws that address vehicle screening and




13.1.2    Identify differences between cleared and uncleared vehicles and escort requirements

for each.



13.1.3    Identify secure and restricted areas and relevant access regulations.



13.1.4   Demonstrate completion of a vehicle access log.



13.1.5    Monitor, control, and report movement of all vehicles within the facility.





LEO 13.2-PD

Lesson 13.2-PD:   Professional Conduct and Vehicle Inspections

LEO 14.2


13.2-PD       Demonstrate effective communication skills while conducting vehicle inspections.



13.2.1    Demonstrate the appropriate communication skills to use with vehicle drivers and






LEO 13.3-PD

Lesson 13.3-PD:   Checking Documentation

LEO 14.3


13.3-PD       Collect and issue all documents that are required for vehicle movement according to

the port and current MARSEC Level.



13.3.1    Identify the appropriate authorization documents required at the three MARSEC Levels.



13.3.2    Determine the authenticity of authorization documents.



13.3.3    Demonstrate the appropriate procedures for collecting documents from vehicle drivers.





LEO 13.4-PD

Lesson 13.4-PD:   Dangerous Substances and Devices in Vehicles

LEO 14.4


13.4-PD       Recognize suspicious and dangerous persons, cargo, items, devices, and hazardous materials.



13.4.1    Indicate the damage that VBIED can cause.



13.4.2    Apply the BATF Explosives Standards as they pertain to various types of vehicles, including explosive capacity, lethal air blast range, and minimum evacuation distance.



13.4.3    Indicate the damage that Chemical and Biological agents can cause when used in VBIED.



13.4.4    Identify indicators of dangerous substances and devices