• JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator
  • JoomlaWorks Simple Image Rotator

Seaport Security for Facility Security Officers



FSO Required




New #

Compliance with 33 CFR 105.205

Old #





Lesson 1-R: Port Processes and Activities

FSO 1.1


1-R     Explain the primary processes and activities that occur on a port.



1.1     List the activities and processes most commonly executed on a port.



1.2     Define what primary processes and activities most commonly occur at each type of port.






Lesson 2-R: Port Facilities, Equipment, and Infrastructure

FSO 1.2


2-R     Explain the major facilities, equipment, and infrastructure present on a port.



2.1     Identify the facilities most commonly located on a port.



2.2     Identify the types of equipment most commonly used on a port.



2.3     Identify the major infrastructure found on a port.






Lesson 3-R: Safety and Security on the Port

FSO 1.4


3-R     Explain the importance of safety and security at seaports.



3.1     Summarize current threats to the port including, piracy and armed attacks, terrorism,

smuggling, stowaways and refugees, cargo theft and collateral damage.



3.2     State that there are different security actions required by the three MARSEC Levels.



3.3     Describe the potential local, national and international economic impact of various

degrees of port disruption.



3.4     Describe the safety issues surrounding the facilities and equipment most commonly used

on a port.



3.5     Describe security issues surrounding the facilities and equipment most commonly used at

a port.



3.6     Describe the safety issues surrounding major port infrastructure.



3.7     Describe security issues surrounding major port infrastructure.



3.8     Describe safety issues related to the activities and processes most commonly executed on

a port.



3.9     Describe security issues related to the activities and processes most commonly executed at

a port.






Lesson 4-R: National and International Regulations

FSO 2.1


4-R     Identify current relevant regulations that govern security requirements at a U.S. port or




4.1     Identify the regulations that govern international maritime transportation security.



4.2     Identify the regulations that govern U.S. maritime transportation security.






Lesson 5-R: Responsibilities of Port Security Personnel

FSO 2.2


5-R     Summarize required knowledge and responsibilities of seaport and facility personnel regarding




5.1     List responsibilities of the owner or operator specified in 33CFR105.200.



5.2     List qualifications, knowledge/training, and security responsibilities required of the FSO as

specified in 33CFR105.205.



5.3     List knowledge required of facility personnel with security duties specified in




5.4     List knowledge required of all other facility personnel specified in 33CFR105.215.






Lesson 6-R: Role of Security Organizations on the Port

FSO 2.3


6-R     Summarize the role of federal, state, and local agencies in seaport security.




6.1     Identify role of the U.S. Coast Guard in establishing and maintaining port and facility

security as specified in international and U.S. regulations.



6.2     Identify role of the U.S. Customs and Border Protection in establishing and maintaining

port and facility security as specified in international and U.S. regulations.



6.3     Identify role of state law enforcement in establishing and maintaining port and facility

security as specified in international and U.S. regulations.



6.4     Identify role of local law enforcement in establishing and maintaining port and facility

security as specified in international and U.S. regulations.



6.5     Identify role of port, vessel, and facility security personnel in establishing and maintaining

port and facility security as specified in international and U.S. regulations.






Lesson 7-R: MARSEC Security Conditions

FSO 2.4


7-R     Differentiate security conditions specified in 33CFR by MARSEC Level.



7.1     Identify the security conditions for MARSEC Level 1 specified in 33 CFR for access control,

restricted areas, cargo, delivery vessels, and monitoring.



7.2     Identify the security conditions for MARSEC Level 2 specified in 33 CFR for access control,

restricted areas, cargo, delivery vessels, and monitoring.



7.3     Identify the security conditions for MARSEC Level 3 specified in 33 CFR for access control,

restricted areas, cargo, delivery vessels, and monitoring.






Lesson 8-R: Terrorism Today

FSO 4.1


8-R     Describe the nature of terrorism.



8.1     Discuss the definitions, history, and threat of terrorism.



8.2     Compare and contrast domestic and international terrorism.



8.3     List signs of terrorism including surveillance, test of security, acquiring supplies, suspicious

people who don't belong, dry runs/ trial runs, deploying assets or getting into position.



8.4     Summarize the various types of weapons, dangerous substances and devices, the damage

they can cause, and their appearance.



8.5     Recognize pre-incident indicators of terrorist activities.






Lesson 9-R: Identifying and Reporting IEDs

FSO 4.3


9-R     Identify and report IEDs.



9.1     Identify indicators of a potential Improvised Explosive Device (IED) attack.



9.2     Report and accurately describe potential IEDs.





FSO 10-R

Lesson 10-R: Observe and Note Surveillance and Suspicious Activities

FSO 6.2


10-R  Make observations.



10.1   Identify areas of critical concern in a port.



10.2   Observe and provide descriptions of people and vehicles.



10.3   Recognize techniques used to circumvent security measures.



10.4   Identify operational deterrents to surveillance/hardening.





FSO 11-R

Lesson 11-R: Recognizing Security Threats

FSO 7.1


11-R  Identify pre-incident indicators using situation awareness.



11.1   Describe the role of situation awareness in preventing and mitigating security incidents.



11.2   Identify current security threats and patterns.



11.3   Recognize characteristics and behaviors of persons likely to threaten security.



11.4   Recognize and detect dangerous substances and devices.



11.5   Identify techniques used to circumvent security measures.





FSO 12-R

Lesson 12-R: Securing SSI

FSO 8.1


12-R  Ensure the secure handling of Sensitive Security Information (SSI).



12 1   Identify documents and records that may contain sensitive security information (SSI).



12.2   Identify conditions required for someone to handle SSI.



12.3   Ensure that FSP includes measures to address the protection of SSI including document

control, information access control, physical information security, and computer network







12.4   Educate all those who handle SSI about document control, information access control,

physical information security and computer network protection.





FSO 13-R

Lesson 13-R: Facility Security Assessment (FSA): Preliminary Requirements

FSO 9.1


13-R  Identify Requirements for Conducting an FSA.



13.1   State 33 CFR 105 and NVIC 11-02 sections relating to the FSA.



13.2   State the role of USCG/COTP in the FSA.



13.3   Research and analyze historical data for use in the FSA.



13.4   Identify potential weaknesses for the FSA.



13.5   Identify potential computer tools and job aids for use in the FSA.





FSO 14-R

Lesson 14-R: Systems, Procedures, and Contingency Plans

FSO 9.3


14-R  Identify systems and procedures evaluated for the FSA.



14.1   Identify and describe security systems in use at the port.



14.2   Identify and describe security procedures and contingency plans in use at the port.





FSO 15-R

Lesson 15-R: The On-scene Survey (OSS)

FSO 9.5


15-R  Conduct an on-scene survey (OSS).



15.1   Identify the resources and personnel required to conduct the on-scene survey (OSS).



15.2   Identify elements of an OSS.



15.3   List items to be evaluated in an OSS.





FSO 16-R

Lesson 16-R: Vulnerability Assessment

FSO 9.6


16-R  Identify vulnerabilities in port.



16.1   Describe the concept of Risk-Based Decision Making.



16.2   Define and identify vulnerabilities.



16.3   Use RA/VA methodologies to prioritize vulnerabilities.





FSO 17-R

Lesson 17-R: General Requirements of the Facility Security Plan

FSO 11.1


17-R  Ensure that the general requirements of the FSP as specified in 33 CFR Part 105.400 are met.



17.1   State that each port facility (included by 33 CFR 105.105) shall develop and maintain a FSP

approved by the U.S. Coast Guard.



17.2   Describe security measures for protecting the sensitive security information (SSI) in accordance with 49 CFR, Part 1520.



17.3   Identify the security conditions for MARSEC Level 1 specified in 33 CFR Part 105.



17.4   Identify the security conditions for MARSEC Level 2 specified in 33 CFR Part 105.



17 5   Identify the security conditions for MARSEC Level 3 specified in 33 CFR Part 105.





FSO 18-R

Lesson 18-R: Security Procedures

FSO 11.3


18-R  Write the plan for the facility’s security procedures.



18.1   Describe in writing the changes in procedure with each increase in MARSEC Level in

accordance with §105.405(a)(5).



18.2   Describe in writing the facility's procedures for interfacing with vessels in accordance with




18.3   Describe in writing the procedure for communicating a Declaration of Security with an

arriving vessel in accordance with §105.405(a)(7).



18.4   Describe in writing the communication equipment and procedures for facility personnel

with specific security duties in accordance with §105.405(a)(8).



18.5   Describe in writing the security systems and maintenance procedures and schedules for

security equipment in accordance with §105.405(a)(9).



18.6   Describe in writing the facility's security incident procedures in accordance with






FSO 19-R

Lesson 19-R: Amendments

FSO 11.5


19-R  Amend and update the FSP as required.




19.1   State requirements and procedure for amending the FSP and implementing those




19.2   Recognize new legislation that requires amending the FSP.



19.3   Recognize changes in the port, facility, personnel, or vessels that require amending the




19.4   Recognize security vulnerabilities arising from drills.





FSO 20-R

Lesson 20.1-R: Developing the Audit Instrument

FSO 13.1


20-R  Develop a well-designed FSP audit instrument.



20.1   Identify the items that are required to be part of an FSP.



20.2   Identify the items that should be included in an FSP audit instrument.



20.3   Determine the most appropriate questions to ask during an FSP audit.



20.4   Identify a well-designed FSP audit instrument.





FSO 21-R

Lesson 21-R: Conducting the Audit

FSO 13.4


21-R  Conduct an FSP audit.



21.1   Differentiate between the type of audit that is considered internal and the type of audit

that the Coast Guard conducts.



21.2   Identify the purpose of an internal audit.



21.3   Discuss the steps involved in an FSP audit.



21.4   Identify the procedures that are a part of the FSP audit process.





FSO 22-R

Lesson 22-R: Container Inspection

FSO 14.6


22-R  Conduct a basic inspection of a container.



22.1   Inspect seals on non-empty containers to verify that they meet or exceed PSA ISO 17712

by using the following methods:  identify an intact and proper seal, identify a damaged

seal, identify a missing seal, and identify incorrect seal.



22.2   Inspect the container door handle rivet to ensure that it has not been compromised.



22.3   Inspect empty containers prior to loading using the 7 point method.



22.4   Identify and report suspicious containers, such as: missing or damaged seal, unusual

weight, and altered or unreadable container numbers.



22.5   Identify Smart Box shipping containers.





FSO 23-R

Lesson 23-R: Cargo and Container Scanning for WMD

FSO 14.7


23-R  Identify current technological methods for scanning cargo and container contents for potential

WMD devices.



23.1   Identify cargo/container radiation scanning devices, such as: Radiation Portal Monitors

(CBP), personal radiation detectors, and other radiation monitors.



23.2   Identify cargo/container inspection devices, such as: VACIS, X-Ray, Gamma Ray, and other

non-intrusive inspection devices.



23.3   Identify trace detection technologies used in cargo and container inspection.





FSO 24-R

Lesson 24-R: TWIC and Access Control

FSO 15.4


24-R  Monitor control for escorted and unescorted access to port facilities and vessels.



24.1   List different requirements for escorted and unescorted access to port facility secure and

restricted areas.



24.2   Identify the features of a Transportation Worker Identification Credential (TWIC) card.



24.3   Describe relevant aspects of the TWIC program and how to implement them properly.





FSO 25-R

Lesson 25-R: Electronic Monitoring

FSO 15.6


25-R  Monitor access electronically.



25.1   Identify electronic equipment for monitoring access.



25.2   Review and supervise the process of monitoring access electronically.





FSO 26-R

Lesson 26-R: How to Use Physical Security

FSO 15.7


26-R  Use physical security systems to control access to facilities.




26.1   Use fences, lighting, gates and other counter surveillance measures to control access to




26.2   Perform access control using physical security systems.





FSO 27-R

Lesson 27-R: Test, Calibrate, and Maintain Equipment

FSO 16.1


27-R  Test, calibrate, and maintain different types of equipment to specifications in the FSP.



27.1   Test equipment to standards specified in the FSP.



27.2   Calibrate equipment to standards specified in the FSP.



27.3   Maintain equipment to standards specified in the FSP.





FSO 28-R

Lesson 28-R: Screening People

FSO 16.2


28-R  Screen people seeking entry to the facility from landside.



28.1   Set up a safe and practical screening area.



28.2   Check I.D. and document personal data.



28.3   Describe two different screening approaches (squeeze and head-to-toe).



28.4   Use metal detectors and wand for screening.





FSO 29-R

Lesson 29-R: Screening Baggage and Personal Effects

FSO 16.3


29-R  Screen baggage and personal effects.



29.1   List the different contents of belongings to be checked between males and females.



29.2   Use screening equipment (X-ray machine) to check baggage and carry-on luggage.





FSO 30-R

Lesson 30-R: Identify and Report Dangerous Substances and Devices

FSO 16.7


30-R  Identify and report dangerous and/or suspicious substances, items, and devices.



30.1   Identify dangerous and/or suspicious substances, items, and devices, including hazardous material (HazMat) and their threats.



30.2   Report dangerous and/or suspicious substances, items, and devices, including hazardous

material (HazMat).





FSO 31-R

Lesson 31-R: Documenting and Reporting a Breach of Security

FSO 17.1


31-R  Document and report a breach of security.



31.1   Ensure the maintenance of records when there are occurrences that threaten the security.




31.2   Ensure facility recordkeeping requirements, including document retention requirements.



31.3   State the reporting requirements in case of a breach of security.



31.4   Apply specific communication tactics to achieve goals and objectives of report.



31.5   Ensure the recording and reporting of changes in the MARSEC Level to the owner/operator

and the COTP (Sec. 105.205).





FSO 32-R

Lesson 32-R: Performance Oriented Training

FSO 19.1


32-R  Advocate training that leads to on-the-job performance of port personnel.



32.1   Follow statutes, rules, and regulations related to training.



32.2   Describe the role of training in the port security function.



32.3   Use the resources available that produce workplace performance results.



32.4   Provide incentives for continuous performance improvement.





FSO 33-R

Lesson 33-R: Developing Appropriate Training and Performance Delivery Formats

FSO 19.4


33-R  Ensure the selection of training and performance support delivery formats that match

personnel and their expected work results.



33.1   Use appropriate criteria for selecting face-to-face, computer-based, or blended learning




33.2   Plan for integration of training and performance support implementation.



33.3   Plan follow-up activities to reinforce training.





FSO 34-R

Lesson 34-R: Defining Drills

FSO 20.1


34-R  Demonstrate relevant background knowledge on exercises and drills.




34.1   Define “drill.”



34.2   Identify the characteristics of drills.



34.3   List reasons for conducting drills.



34.4   Identify types of drills.



34.5   Discriminate between drills and other emergency preparation exercises.





FSO 35-R

Lesson 35-R: Evaluating Drills

FSO 20.6


35-R  Design drill evaluation.



35.1   Define standards for demonstration of competence (expected responses).



35.2   Generate drill evaluation instrument/plan.





FSO 36-R

Lesson 36-R: The Crisis Management Team

FSO 23.6


36-R  Plan and prepare for crises.



36.1   Develop a crisis communication strategy.



36.2   Develop crisis action plan (EOP).



36.3   Select crisis team personnel.



36.4   Establish a crisis management center (EOC).





FSO 37-R

Lesson 37-R: Designing and Conducting Contingency Plan Procedures

FSO 23.7


37-R  Practice and test contingency plans and crisis procedures.



37.1   List reasons for conducting drills and exercises to practice and test contingency plans and crisis procedures.



37.2   Design, implement and evaluate exercises for different crisis contingencies.



37.3   Design, implement and evaluate exercises that test different components of the crisis action plan.



37.4   Complete After Action Report/Improvement Plan following exercises.





FSO 38-R

Lesson 38-R: Crisis Response

FSO 23.8


38-R  Respond to a crisis.



38.1   List local, state, federal and private agencies responsible for emergency response and their

roles in the incident command system.



38.2   Describe events to expect during a crisis.



38.3   Describe the tasks of the crisis manager during a crisis.



38.4   Given a description of a crisis incident, describe crisis response procedures.



38.5   Describe practices for effective management of crises.



38.6   Implement emergency protocols and procedures.




FSO Professional Development

New #


Old #


Module 1. The Seaport Environment





FSO 1.1-PD

Lesson 1.1-PD:        Port Personnel

FSO 1.3


1.1-PD         Explain the roles of the primary stakeholders in the maritime domain and discriminate

between authorized and non-authorized personnel.



1.1.1      Discriminate between authorized and non-authorized security personnel involved in

port security.



1.1.2      Discriminate between authorized and non-authorized labor, service, and subcontract

personnel involved in daily port operations.









Module 2. Community and Port Relations





FSO 2.1-PD

Lesson 2.1-PD:        The Port and the Community



2.1-PD         Incorporate understanding of local community in port security decisions and planning.

FSO 3.1


2.1.1      Identify the port’s local community stakeholders and their relation to the port.



2.1.2      Incorporate unique characteristics of port into operational and security planning to accommodate both public and port security needs.





FSO 2.2-PD

Lesson 2.2-PD:        Effective Communication Strategies

FSO 3.2


2.2-PD         Maintain ongoing communication with local agencies and organizations.



2.2.1      Choose effective communication strategies.



2.2.2      Create strategic community investment in port operations.



2.2.3      Institute channels for sharing security-related information and practices that do not

conflict with work of the Area Maritime Security Committee (AMSC).





FSO 2.3-PD

Lesson 2.3-PD:        Creating Strategic Port/Community Relationship

FSO 3.3


2.3-PD         Create strategic port/community relationships.



2.3.1      Identify the port’s responsibilities including delivering Maritime Security Awareness

training to the neighborhood/community.



2.3.2      Identify the community’s contributions to the port including reporting

suspicious/dangerous activities, devices and items.



2.3.3      Plan activities that strengthen port/community relationships.









Module 3. Terrorism/Weapons of Mass Destruction





FSO 3.1-PD

Lesson 3.1-PD:        Potential Targets of Terrorism

FSO 4.2


3.1-PD         Describe the unique nature of port as a potential terrorism target.



3.1.1      Describe the unique nature of port as potential terrorist targets.



3.1.2      Describe the critical infrastructure / facilities that can be potential terrorist targets at




3.1.3      Apply concepts learned to identify potential targets of terrorism at the learner’s own




3.1.4      Identify how a WMD may be transported into or out of the port.



3.1.5      Describe the consequences of a terrorist attack at a port including the economic and

psychological impacts.



3.1.6      Demonstrate how to carry out physical searches in buildings, facilities, and near vessels





FSO 3.2-PD

Lesson 3.2-PD:        Identifying WMD Incidents

FSO 4.4


3.2-PD         Identify WMD incidents.



3.2.1      Define the terminology associated with WMD incidents (e.g., BNICE, WMD, CBRNE,







3.2.2      Describe the difference between HazMat and terrorism incidents involving CBRNE.



3.2.3      Recognize pre-incident indicators of a potential WMD attack.



3.2.4      Identify signs and symptoms common to initial victims of a WMD-related incident or




3.2.5      Describe possible motivations of a terrorist using CBRNE.





FSO 3.3-PD

Lesson 3.3-PD:        Reporting WMD

FSO 4.5


3.3-PD         Report WMD incidents.



3.3.1      Summarize the characteristics of WMD incidents.



3.3.2      Report WMD incidents.





FSO 3.4-PD

Lesson 3.4-PD:        WMD: Protecting Yourself

FSO 4.6


3.4-PD         Use proper procedures for self-protection during a WMD incident.



3.4.1      Describe measures for self-protection in a WMD incident including time, distance and




3.4.2      Identify the minimum safe distance from a hazardous materials scene.



3.4.3      Describe the four recommended responses to a WMD incident. (RAIN).



3.4.4      Plan and manage procedures to respond to weapons, dangerous substances and










Module 4. Inside Threats





FSO 4.1-PD

Lesson 4.1-PD:        The Nature of Inside Threats

FSO 5.1


4.1-PD         Demonstrate relevant background knowledge on inside threats.



4.1.1      Define “inside threat.”



4.1.2      Distinguish betweeninside” and outside” threats in terms of description, involved

persons, and motives.



4.1.3      List common types (categories) of internal threats.



4.1.4      List the characteristics of internal threats by category.





FSO 4.2-PD

Lesson 4.2-PD:        Inside Threats and Conspiracies

FSO 5.2


4.2-PD         Describe the relationship between inside threats and potential terrorist activities.



4.2.1      Describe the nature of potential damage and loss posed by internal threats.



4.2.2      Define “internal conspiracy.”



4.2.3      Compare the potential threat of internal conspiracies as compared to other internal

threat types.





FSO 4.3-PD

Lesson 4.3-PD:        Crime on the Port

FSO 5.3


4.3-PD         Describe the relationship between inside threats and criminal activities.



4.3.1      Describe the forms of crime that can take place in the seaport environment.



4.3.2      List the range of crimes associated with criminal activities in ports.



4.3.3      Describe basic statistics on criminal activity in ports in terms of types of illegal activities.





FSO 4.4-PD

Lesson 4.4-PD:        Legislation Related to Inside Threats

FSO 5.4


4.4-PD         Describe the implications of inside threats for port security in relationship to

legislative policies and procedures.



4.4.1      List major legislative policies and procedures regarding inside threats.



4.4.2      Describe the respective responsibilities of first state, then federal, authorities in regards

to inside threats.



4.4.3      List the major stakeholders in the seaport environment along with their respective






FSO 4.5-PD

Lesson 4.5-PD:        Information Sharing and Inside Threats

FSO 5.5


4.5-PD         Describe the relationship between inside threats and information sharing.




4.5.1      Describe the role of intelligence gathering in reducing inside threats.



4.5.2      Describe the importance of information sharing among agencies in dealing with inside






FSO 4.6-PD

Lesson 4.6-PD:        Inside Threat Prevention

FSO 5.6


4.6-PD         Work with security staff to identify potential internal threats.



4.6.1      Recognize activities and behaviors consistent with internal threats.



4.6.2      Identify potential internal threat risk areas in current port security setting.



4.6.3      Describe the role of staff and employees in identifying internal threats.



4.6.4      Describe the role and functions of port security staff in regard to internal threats.



4.6.5      Develop trusted and routine communication with port security staff regarding threat






FSO 4.7-PD

Lesson 4.7-PD:        Communicating With Law Enforcement

FSO 5.7


4.7-PD         Create information-sharing communication channels with law enforcement.



4.7.1      Describe the role of law enforcement agencies in regard to inside threats.



4.7.2      Describe the conditions under which it is appropriate to report a potential inside threat

to law enforcement agencies.



4.7.3      Identify appropriate points of contact within law enforcement agencies.



4.7.4      List the characteristics of a meaningful report to law enforcement agencies.





FSO 4.8-PD

Lesson 4.8-PD:        Anonymous Reporting

FSO 5.8


4.8-PD         Support employee anonymous reporting of potential inside threats.



4.8.1      Describe the importance of anonymity in reporting potential inside threats.



4.8.2      Describe employee’s responsibility in reporting potential irregularities/inside threats to

appropriate personnel.



4.8.3      Build a trusting relationship between employees and management regarding all security




4.8.4      Implement explicit anonymous reporting procedures for employees.





FSO 4.9-PD

Lesson 4.9-PD:        Responding to Reports of Inside Threats

FSO 5.9


4.9-PD         Describe processes for responding to reports of inside threats and illegal activity.



4.9.1      Describe the steps for a thorough review of submitted reports.



4.9.2      List the characteristics of an efficient, but thorough, submitted report.



4.9.3      List the ways in which the anonymity of reporting employees may be safeguarded at all

steps of the review/investigation process.





FSO 4.10-PD

Lesson 4.10-PD:     Investigation Methods

FSO 5.10


4.10-PD       Describe common investigative methods for inside threats.



4.10.1    Describe the elements of effective investigative methods for inside threats.



4.10.2    State the legal rights of all employees in regard to threat investigations.



4.10.3    List all appropriate legal/policy issues surrounding the investigation of inside threats.



4.10.4    Work with appropriate legal authorities as necessary to ensure the legality of all

investigatory actions taken.



4.10.5    State the conditions for which asking for additional investigative help are warranted





FSO 4.11-PD

Lesson 4.11-PD:     Inside Threats Programs

FSO 5.11


4.11-PD       Review current workplace inside threat components (threat detection, reporting, and

investigation) for completeness and quality.



4.11.1    List the components of a comprehensive inside threats program.



4.11.2    Describe process for reviewing current workplace inside threats components.



4.11.3    Review and collect information on current workplace inside threats components.



4.11.4    Determine strengths and weakness, including missing components, of the current

workplace inside threats system.



4.11.5    Identify strategies for addressing workplace gaps and weaknesses in current inside threats system.










Module 5. Detecting and Reporting Surveillance and Suspicious Activities





FSO 5.1-PD

Lesson 5.1-PD:        Detect Surveillance and Suspicious Activities

FSO 6.1


5.1-PD         Detect surveillance and suspicious activities.



5.1.1      Identify current threats to the maritime environment.



5.1.2      Identify characteristics and behaviors of persons likely to threaten security.



5.1.3      Recognize and respond appropriately to elicitation.



5.1.4      Identify reasons for surveillance.



5.1.5      Detect indicators of surveillance.





FSO 5.2-PD

Lesson 5.2-PD:        Evaluate and Report Surveillance and Suspicious Activities

FSO 6.3


5.2-PD         Evaluate and report surveillance and suspicious activities.



5.2.1      Evaluate and report indicators of surveillance and suspicious activities.



5.2.2      Identify local protocol for reporting surveillance and suspicious activities.



5.2.3      Identify Federal agencies where surveillance should be reported and protocol for






FSO 5.3-PD

Lesson 5.3-PD:        Prevention Methods

FSO 6.4


5.3-PD         Develop protocols to prevent and counter surveillance.



5.3.1      Identify methods for preventing and countering surveillance.



5.3.2      Identify counter surveillance equipment.



5.3.3      Identify measures that should be taken before disposing of IT hardware which may contain sensitive information.









Module 6. Situation Awareness





FSO 6.1-PD

Lesson 6.1-PD:        Situation Awareness Techniques and Skills

FSO 7.2


6.1-PD         Discuss techniques and skills for developing situation awareness.



6.1.1      Identify skills required in looking for perceived threats to security in the port




6.1.2      Identify skills required to improve comprehension and understanding of perceived

threats in the port environment.



6.1.3      Discuss the role of anticipation and prediction in situation awareness.





FSO 6.2-PD

Lesson 6.2-PD:        Think Ahead: Planning Your Response to Threats

FSO 7.3


6.2-PD         Prepare an individual course of action for various security threats.



6.2.1      Describe how situation awareness is used in formulating a course of action.



6.2.2      Describe the use of native skills in formulating a course of action.





FSO 6.3-PD

Lesson 6.3-PD:        Keys to High Situation Awareness

FSO 7.4


6.3-PD         Identify barriers in achieving and maintaining high situation awareness.



6.3.1      Demonstrate the role of perception in situation awareness.



6.3.2      Recognize how poor communication affects situation awareness.



6.3.3      List six cues or signs indicating a loss in situational awareness.



6.3.4      List ways to improve situation awareness.









Module 7. Facility Security Assessment





FSO 7.1-PD

Lesson 7.1-PD:        Assessing Security Weaknesses