36 min read

Best Management Practice BMP5 Anti Piracy Measures


Featured Image

Best management practices 5 (BMP5) is the fifth version of a set of guidelines intended to deter piracy and enhance maritime security primarily aimed at operations in the Red Sea, Gulf of Aden, Indian Ocean and Arabian Sea.

Here we will look at the what is, and is not, covered by the guide.


BMP5

Maritime Security

Maritime Learn Series

BMP5, standing for the fifth edition of Best Management Practices, is a set of guidelines aimed at bolstering maritime security and deterring piracy within the regions of the Red Sea, Gulf of Aden, Indian Ocean, and Arabian Sea​1​. These practices have been collaboratively produced by shipping organizations, often with the backing of military entities, to equip ship operators, Masters, and mariners with the necessary knowledge to prepare for and respond to external threats to safety​2​.

The main objectives of BMP5 include aiding ships in voyage planning and in the identification, avoidance, deterrence, delay, and reporting of pirate attacks​1​. It outlines updated risk or threat assessments, planning strategies, reporting procedures, and mitigation processes. Additionally, it delineates transit corridors, offers explicit advice on employing Private Maritime Security Contractors, and updates self-protective measures, further enhancing the maritime security framework​3​.

BMP5 supersedes its predecessor, BMP4, which was primarily focused on "Protection against Somalia Based Piracy." Unlike BMP4, BMP5 adopts a broader approach by addressing piracy and maritime security concerns in a wider geographical scope, thus not restricting its focus solely to Somali-based threats​4​.

This document has been hailed for supplying the maritime sector with crucial guidance to combat physical security threats posed by piracy, particularly in the Indian Ocean. Despite its contributions, BMP5 is acknowledged to have certain shortcomings, mainly due to rapidly evolving threats amidst a sensitive geo-political backdrop within the Persian Gulf region​5​.

Why Adopt the Best Management Practices ?

Adopting BMP5 (Best Management Practices to Deter Piracy and Enhance Maritime Security) is crucial for multiple reasons in the maritime domain, especially within piracy-prone regions such as the Red Sea, Gulf of Aden, Indian Ocean, and Arabian Sea.

BMP5 front cover small
Enhanced Security:
BMP5 provides a structured framework to enhance maritime security by offering practical guidelines on how to deter, detect, and delay piracy attacks, thereby contributing to the safety and security of both the vessel and its crew.


Risk Assessment and Mitigation:
It assists in the thorough assessment and mitigation of risks associated with piracy and other maritime security threats. Through updated risk assessment, planning, and mitigation processes, BMP5 helps in better understanding and addressing the evolving threats in these maritime regions​1​.

Download BMP5

Effective Response to Threats:
By aiding in the timely detection and reporting of piracy attacks, BMP5 enables a more effective response to such threats, thereby potentially preventing loss of life, injury, or significant financial loss.


Broad Geographical Scope:
Unlike its predecessor BMP4, which was focused on Somalia-based piracy, BMP5 has a broader geographical scope, addressing maritime security concerns across a wider area. This is crucial given the changing dynamics of piracy and maritime security threats, allowing for a more comprehensive approach to maritime security​2​.

Guidance on Utilizing Private Security:
BMP5 provides clear advice on the use of Private Maritime Security Contractors, which can be an essential resource in enhancing the security posture of vessels traversing piracy-prone regions​.

Industry Collaboration:
The collaborative nature of BMP5, where shipping organizations work together with the support of military entities, promotes a unified and coherent approach to tackling piracy and enhancing maritime security​​.

Adaptability to Evolving Threats:
Although BMP5 has some acknowledged shortcomings due to rapidly evolving threats, its existence reflects an industry-wide commitment to adapt and respond to changing maritime security dynamics, making it a vital tool in the ongoing efforts to combat piracy and enhance security​​.

By adhering to BMP5, maritime entities are better positioned to navigate the complex security challenges within piracy-prone regions, ensuring a safer and more secure maritime environment.

How does BMP5 fit in with GCPG ?

The Global Counter Piracy Guidance (GCPG1) aims to provide comprehensive support for companies and mariners in understanding and combating piracy. Both BMP5 and GCPG1 share the common goal of enhancing maritime security, but they differ in their approach. While BMP5 focuses on specific regions and offers detailed guidance on planning and mitigating piracy risks, GCPG1 takes a global perspective and provides general guidance applicable worldwide. These two documents complement each other perfectly, with BMP5 offering a more intricate approach in its designated regions, while GCPG1 presents broader, global anti-piracy guidance.

Fundamental Requirements of BMP5

The fundamental requirements of BMP5 (Best Management Practices to Deter Piracy and Enhance Maritime Security) are as follows:

Understand the Threat:
Maritime threats are dynamic and ever-changing.
Obtaining up-to-date threat information is essential for accurate risk assessment and informed decision-making.


Conduct Risk Assessments:
Companies are advised to perform comprehensive risk assessments.
The goal is to identify appropriate ship protection measures based on the assessed risks.


Implement Ship Protection Measures:
Measures to harden the ship, making it less vulnerable to threats.
It's crucial to brief and train the crew on these measures and the potential threats they might face.

Enhanced lookout: This involves maintaining a vigilant watch for potential threats.
Adherence to guidance provided by the Flag State and military entities is also emphasized.


Report:
Ships are encouraged to report to UKMTO (United Kingdom Maritime Trade Operations) and register with MSCHOA (Maritime Security Centre – Horn of Africa).
Any incidents or suspicious activities should be promptly reported.
In the event of an attack, ships are advised to send out a distress signal immediately.


Cooperate:
Cooperation with other shipping entities and military forces is essential.
After an incident, ships should work with law enforcement agencies to preserve evidence.
Engaging with welfare providers ensures the well-being and support of the crew.


In essence, BMP5 provides a structured approach to deter piracy and enhance maritime security. By understanding the threat landscape, assessing risks, implementing protective measures, reporting incidents, and fostering cooperation, ships can operate more safely in potentially hazardous waters.


Fundamental requirements of BMP

 

What risks does adoption of BMP 5 address and mitigate ?

BMP5 addresses and aims to mitigate various maritime security threats faced by seafarers operating ships in the Red Sea, the Gulf of Aden, the Indian Ocean, and the Arabian Sea. Here are the risks addressed by BMP5:

Piracy: While piracy-specific Best Management Practices (BMP), international navies, and capacity building ashore have helped suppress piracy, Somali piracy has not been eradicated and remains a significant threat.

Targeting by Extremist Groups: Regional instability has introduced threats from extremist groups that may deliberately target ships.

Collateral Damage from Regional Conflict: Ships might inadvertently get caught in conflicts in the region, leading to collateral damage.

Differences in Attack Methods: Attacks carried out by extremists might differ from traditional piracy methods. For instance, extremists might be more determined in their attacks, potentially willing to risk their lives.

Hostage Situations and Violence: Some pirates have subjected hostages to violence and other ill-treatment. Periods of captivity for some hijacked seafarers have lasted for several years.

Intent to Damage Ships and Endanger Life: Some attacks have shown a clear intent not just to hijack but to cause significant damage to ships and endanger the lives of those on board.
Use of new security threats including, anti-ship missiles, sea mines and water-Borne Improvised Explosive Devices (WBIED).


BMP5 provides guidance to help ships plan their voyages to detect, avoid, deter, delay, and report these threats. The practices and measures recommended in BMP5 have been proven to make a significant difference in the safety of seafarers operating in these regions.

Types of Maritime Security Threats

Current threats to maritime security and shipping from belligerent external forces can come in the following categories:

Threat from Maritime Piracy

Piracy is just one form of maritime criminality. Read much more about the different types pirate activity here.  

  • Pirates typically operate in Pirate Action Groups (PAG) using various boat configurations, including small high-speed open boats or skiffs.
  • PAG boat configurations can include skiffs only, open whalers carrying significant fuel and towing attack skiffs, and motherships (which can range from merchant ships to fishing vessels and dhows).
  • Motherships enable pirates to operate over larger areas and are less affected by weather. They often carry pirates, stores, fuel, and attack skiffs.
  • Pirates may use small arms fire and Rocket Propelled Grenades (RPGs) to intimidate ship masters to reduce speed or stop, facilitating boarding.
  • The bridge and accommodation are usually the primary targets for these weapons.
  • Once onboard, pirates typically head to the bridge to take control

Piracy Intent 

The motives of pirates vary based on multiple contributing factors; Somali pirates typically aim to seize control of the ship and detain the crew for ransom. As negotiations progress, the customary practice is to keep the crew on board, ensuring both the safety of the crew and the preservation of the ship. On certain occasions, seafarers have been separated based on their nationality and taken ashore. While it is in the pirates' best interest to keep their captives alive, instances of intimidation and torture have unfortunately occurred. Notably, West African piracy follows a distinct pattern, differing from the practices of Somali pirates.

Piracy Weaponry

Small arms fire (SAF) and Rocket Propelled Grenades (RPGs). 

Pirates employ a formidable arsenal consisting of small arms fire (SAF) and Rocket Propelled Grenades (RPGs) to instill fear in ship Masters, compelling them to reduce speed or come to a complete halt, thereby granting the pirates easy access to board. The primary targets of these weapons are the bridge and accommodation areas. Employing a range of tactics, pirates utilize long, lightweight ladders, knotted climbing ropes, or long hooked poles to scale the ship's sides. Once successfully onboard, their objective is to swiftly navigate towards the bridge in an attempt to seize control of the entire vessel. It is at this critical juncture that they demand the ship to slow down or stop completely, enabling their fellow pirates to join the assault. Although pirate attacks can occur at any hour, a wealth of experience has indicated that dawn and dusk are prime times for such nefarious activities.

Threat from Anti-Ship Missiles 

In the event or warning of a missile attack, military advice should be followed. If no warning is received, there might be no time for mitigation beyond a PA warning to the crew if a missile is spotted. Merchant ships are unlikely to be the intended target, but they should be aware of their surroundings and keep clear of naval and associated ships.

  • Long range, accurate and powerful weapons and have been used against military ships.

  • Their use against merchant ships associated with regional conflict cannot be discounted.

  • Other ships may be hit if the missile controller targets the wrong ship or the missile homes in on an unintended target. 

Remember:

  • Stay informed about geo-political tensions

  • React to heightened tensions 

 

Threat from Water Borne IED (WBIED)

In the early stages of an attack, it might be challenging to differentiate between a piracy or WBIED attack. Initial actions should be similar to those for a piracy attack approach. Military threat assessments may indicate areas where one type of attack is more likely.

  • WBIED attacks have been used against warships and merchant ships in the southern Red Sea/BAM/western area of the Gulf of Aden.  

  • Incidents have highlighted attacks by different groups operating in the region:  

  • WBIED used in regional conflicts have been aimed at harming those associated with the conflict. These boats have been unmanned and operated remotely.  

  • WBIED used by extremists on manned vessels have been aimed at merchant ships.  

  • An attack involving a WBIED is likely to involve one or more speed boats operated by a number of individuals approaching and firing both small arms and RPGs. Masters should recognise the intent of these attacks is to cause damage and not necessarily to board the ship. Mitigation measures to prevent the speed boat making contact with the ship’s hull are limited.  

WBIED image 1

 

Threat from Sea Mines

Sea mines have been used to deter and deny access to key ports. These mines are usually tethered or anchored but may break free from moorings and drift into shipping lanes. Transiting merchant ships are not usually the target and it is recommended ships use the established routes such as the MSTC when passing through the identified areas.  

  • Ships should avoid all published or identified mine danger areas and maintain close liaison with military authorities.

  • If operating close to mine danger areas, ships should be aware that tethered mines might break free and drift into shipping lanes. Ships should manoeuvre clear of floating objects, and the forward area of the ship should be kept clear of the crew. Effective lookouts are essential.

What does the BMP NOT cover ?

The guidance given in BMP provide an essential tool-set that form a foundation of security for ships and operators.  Like all tools, the skills required to get the most out of them are learnt over time and enhanced with knowledge and experience.

  • The essence of the planning process is having the most relevant and up to date security information from which to launch the voyage plan in a high risk areas.

  • The formal bounds of internationally recognised risk areas may not be up to date.

  • Perception is often different from truth

  • Risks appetites vary from one organisation or owner to another- what is yours?

The consequences of not adopting effective security measures can be severe.Kidnappers-560x416

Hostages are frequently subjected to violence, ill treatment and periods of captivity that can last for several years. Other attacks have demonstrated an intent to damage ships and endanger life.

 

Dryad Insight - Our Experts say...

BMP5 has provided the maritime security environment with much needed guidance to combat physical security threats posed by piracy in the Indian Ocean. The document is a collaboration by consensus and inevitably it has shortcomings; mainly resulting from a rapidly evolving threats as seen through the sensitive Geo-political situation within the Persian Gulf and Gulf of Oman as well as across the Cyber domain.  These regional variations and constant evolution's of threat streams makes it increasingly hard for industry best practise to maintain relevance.

 

[BMP5]...inevitably it has shortcomings; mainly resulting from a rapidly evolving threats as seen through the sensitive Geo-political situation within the Persian Gulf and Gulf of Oman as well as across the Cyber domain....

Ship operators and ship owners are strongly advised to build on the BMP5 foundations by ensuring that their situational awareness of the Threat is constantly maintained with marine operations risk assessments.

  • Every transit of a High Risk Area has unique characteristics that should be measured against the current threat picture as close to the time of transit as possible. 

  • Additional SPM or procedures may be required in the form of additional equipment and/or personnel as a means of further reducing the risk of attack.

  • Vessels should consider the utility of all SPM and select methods for their specific efficacy in mitigating the risks defined within the risk assessment process. 

  • Companies should ensure that threat advice is taken from impartial intelligence providers and avoid the use of threat reporting from entities artificially invested in high risk scenarios. 

  • Companies should ensure that measures that are being employed are done so after full consideration of both their efficacy and an understanding of secondary / unintended risk as a result of deployment. 



 

Security Planning 

Risk Assessment

The output of the risk assessment helps to develop the ship’s voyage plan and ship security plan.  

  • Voyage or Transit Risk Assessment

  • Considerations beyond BMP5

  • Cyber Threats are also physical threats

  • Planning Process

Voyage/ Transit Risk Assessment 

A maritime transit risk assessment is a thorough analysis and subsequent mitigation of physical security threats that may be faced by the vessel and crew. This should include:

  • Regular review of the threat and risk assessments

  • Review of the Ship Security Assessment (SSA), Ship Security Plan (SSP) and Vessel

  • Hardening Plan (VHP).

  • Guidance to the Master about the recommended route, updated plans and requirements for group transits and national convoys.

  • Company mandated Ship Protection Measures (SPM).

  • Due diligence of Private Maritime Security Companies (PMSCs) for the possible use of PCASP.

  • Companies should consider the placement of hidden position transmitting devices as one of the first actions of hijackers is to disable all visible communication and tracking devices and aerials.

  • Review of company manning requirements. Consider disembarking of non-essential crew.

  • Crew training plans

  • Information security

 

The Next Learn Article on this subject....

99 min read
Best Management Practice BMP5 Anti Piracy Measures

Best management practices 5 (BMP5) is the fifth version of a set of guidelines intended to deter piracy and enhance...

45 min read
Guidance for when ships come under attack BMP

There are some fundamentals to that form the basis of a good response to an attack by illegal forces such as pirates or...

21 min read
Guidance on Ship Protection Measures against crime

BMP5 provides Ship Protection Measures (SPM) based on real-life experience of piracy attack and incidents of maritime...