You are on page 1of 15

FUNDAMENTALS OF INDUSTRIAL SECURITY

BY
Terry Andy Odisu, MSc, mIISSN, mASIS
08030720991
Meaning of Security: It refers to freedom from fear, threat, danger or anxiety. A
state of being protected. Precautions taken to guard against crime. Security is a
condition of safety and the measures taken to ensure this condition.

PHYSICAL SECURITY: Measures taken to safeguard personnel from harm and to


protect property from loss. They are
 Deterrence
 Intrusion detection
 Security guards
 Access control
Physical security focuses on the concept of 5 Ds
 Deter – barriers to discourage intruders
 Deny - barriers to prevent an attempt
 Delay – barriers to increase intruder’s effort
 Detect- equipment to reveal intruder’s presence
 Defend- measures put in place to respond to intrusion

ROLES OF A SECURITY OFFICER


 Engaging regularly in dialogue with the executives of the host community so
that issues affecting the community could be resolved amicably without
disruption of company operations.
 Gathering intelligence ( security information) from the locals and cascading
same to appropriate authority for action
 Training the guards regularly on what to do while on duty in their respective
beats
 Arranging escorts for VIPs
 Liaising with Government Security Agencies: NPF, Army.
 Reporting Security situation to CSO or security manager on daily basis
 Interfacing between company staff and Govt Security Forces
 Investigating and writing reports on crimes committed in the facility
 Conducting Risk Assessment periodically and addressing loopholes.
 Ensuring that access control policies are religiously complied with
 Visiting the guards regularly to ensure that they don’t leave their beats
DUTIES OF A SECURITY MANAGER
1) To provide effective leadership to the security teams in the base office and field
operations. 2) Prepare the annual security budget and work on monthly, quarterly
reviews of budget performance for the department. 3) Serve as a focal point for
any investigation relating to company security matters. 4) Initiate and sustain good
working relationships with GSF and host community leaders. 5) Identify actual and
potential threats to staff & their families and address them. 6) Ensure that all
security staff are trained appropriately on all levels of security procedures.

ACCESS CONTROL
It is a security measure put in place to monitor the movement of persons and
materials (company property) at the gate. Staff are required to wear ID cards while
entering the premises. Visitors are processed in by contacting the hosts before
granting access and their names logged on the Visitors Notebook. On their way out,
they sign out. The same procedure applies to vendors on business visits. Materials
are allowed out of the premises if they are covered by a gate pass duly signed by
authorized persons. Waybills of materials brought in by vendors are recorded on a
haulage notebook by security men at the gate. The boots of vehicles exiting the
premises are searched by security men. The reason for access control is to prevent
people who have no business in the premises from entry. It also prevents theft of
company or staff property

SURVEILLANCE
It is the keeping of watchful eyes on people suspected of being capable of
committing crimes in any security environment. It is a proactive measure that
forewarns us. A property can also be placed on surveillance to prevent thieves from
getting closer to it. For example, If your MD or GM is travelling with his family, his
house would be visited regularly by security operatives to checkmate burglary or
breaking and entering till the family returns.

HOW TO RECRUIT INFORMANT


Visit a popular restaurant or a joint in your company host community. While
drinking or eating, buy drinks for the men that are around. Listen to their
conversation. Take note of the man who can positively betray his community. Call
him to a corner when you are about leaving. Ask of his name and exchange phone
numbers. Always call him and ask of his family. Invite him to the restaurant where
you first met him and buy him drink and food. When leaving, give him money for
snacks for his kids. After some days send him a top up for his phone. Invite him for
a lunch inside your apartment. He would now see you as a very caring friend. After
some days, lie to him that you heard that his community has arranged to invade
your company premises. He would say nothing like that is being planned. Then ask
him to tell you anytime he hears any information concerning his community and
your company. He would oblige you. You have succeeded in recruiting him as
informant. If he sees a stolen item from your company, he would alert you too.
Never directly ask any person to be your informant to avoid incessant financial
demands and fake information. The recruitment is done subtly
INTELLIGENCE GATHERING
It is the art of sourcing for security information that would help to prevent a
security incident or prevent the commission of a crime. It is a proactive measure
but it also helps in identifying the author of a crime. Intelligence can be gathered
by mingling with the residents of an area where a crime has been committed. It can
be in the beer parlour, restaurant, café, football field etc. Some operatives can even
act as labourers in a community where a very serious crime such as murder has
taken place. By so doing, they can get information on who committed the crime.
Intelligence can also be gotten from an informant.
TYPES & METHOD OF INTELLIGENCE GATHERING (TRADECRAFT)
 HUMINT: human intelligence gathered from a person in a public place such
as beer parlour or during patrol.
 GEO INT: geo spatial intelligence gathered from satellite, aerial photography
 OSINT: open source intelligence gathered from open sources, e.g.,
information about a crime that is in public domain.
 SIGINT: signal intelligence gathered from interception of signals.
 TECHINT: technical intelligence gathered from analysis of weapons &
equipment used by the enemy
 FININT: financial intelligence gathered from analysis of monetary
transactions of suspected criminals. EFCC does this with the BVN
REASONS FOR INTELLIGENCE
It provides useful information to people who need it. This information can help in
preventing the commission of crime. It provides insights that would help decision
makers or security managers to take action. It provides warning: intelligence exists
to prevent surprise such as unexpected attack on company staff, invasion of
company premises or blockage. It helps to identify the author of a crime.
CRIME INVESTIGATION
It is a reactive security action which involves all the activities carried out by a
security officer with a view to identifying the author(s) of a crime. The action
includes arrest, interrogation, visiting scene of crime, searching home of suspect
and referring case to NPF. An interim or preliminary report is thereafter written
and submitted to company management while awaiting that of the police. To
establish a case of theft, three conditions must be met : there must be ownership,
that is, a staff of the company must come forward to say the item in question
belongs to the company ; there must be value, that is, a staff of the company must
state the cost of the item in question ; there must be asportation, that is, the item
in question must have left the precinct of the company premises and recovered
outside the exit gate of the company or recovered at the home of the suspect. If a
suspect is caught with a company property within the premises, a case of theft
cannot be legally established. But the suspect can be sacked with the excuse of
“services no longer required” rather than dismissal.
The first persons to be interrogated when a crime is reported are the complainant
and witness while the next person is the suspect. This must be done separately.
The reason is for the investigator to be armed with some facts before facing the
suspect.
SECURITY RISK ASSESSMENT
It is the identification of vulnerabilities or loopholes that make a premises more
prone to attack or make an attack to be successful and the need to address them
by taking proactive steps. Examples of loopholes/ vulnerabilities or threats are:
 Poor illumination : blackout gives cover to hoodlums to operate
 Poor manpower deployment: posting one security guard to a large beat on
night duty
 Lack of citadel fence or short fence without barbed razor
 Keeping handy items such as caterpillar parts and expensive items such as
electric cables very close to the fence
 Meagre salary for security guards is a serious issue as this could make them
to be security risk in any organization. If security operatives are unhappy and
disgruntled, they can be easily compromised. This is a big threat to an
organization.
In safety, risk assessment is concerned with the identification of hazards or things
that can cause accident or injury to staff or damage to company assets.
SECURITY RISK ASSESSMENT PROCEDURE FOR ASSETS PROTECTION
 Threats Identification – patterns, trends
 Probability of occurrence
 Exposure/vulnerability- staff and company property
 Potential business impact
 Mitigation measures
OIL FIELD RISKS/THREATS:
 Illegal Bunkery
 Site Invasion/Blockage
 Kidnapping for Ransom
 Militant Attack/Bombing
 Pipeline Vandalism
 Community Unrest
RISK ANALYSIS
Risk analysis is a process that determines which security controls are appropriate
and cost effective. There are two types of Risk Analysis: Quantitative and
Qualitative.
QUANTITATIVE RISK ANALYSIS
This approach employs two fundamental elements: the probability of an event
occurring and the likely loss should it occur. Potential loss x probability = Annual
Loss Expectancy (ALE)
QUALITATIVE RISK ANALYSIS
This is the most widely used approach. Only estimated potential loss is used. This
approach makes use of elements such as:
 Threats – things that can go wrong or that can attack the system, e,g ,
fire or fraud
 Vulnerabilities – these are things that make a system more prone to
attack or make an attack more likely to have some success or impact.
For example, for fire, a vulnerability is the presence of petrol.
SECURITY SURVEY: Closely related to Risk Assessment is the concept of Security
Survey. It refers to an audit of existing security structures to ascertain their
integrity. This is aimed at identifying gaps in the system and addressing them

SECURITY PLAN
It is a document outlining all the security operations and activities in a production
facility or even in a residential area.
 It ensures that security is an integral part of the business by providing an
enabling or conducive working environment to achieve business objectives.
 It provides Management with an overview of security activities in specific
projects.
 It coordinates all security processes in the production assets within the host
community.
 It serves as a reference point for monitoring performance and evaluation.
 It defines resource requirements in terms of equipment, manpower and
budgeting.
 It provides Management with security information for timely decision
making.
 It is concerned with the provision of a safe working environment for staff
and contractors and protection of company property from damage and theft.

VOLUNTARY PRINCIPLES ON SECURITY IN HOST COMMUNITY


These principles were collectively developed by the US, UK, Norway and
Netherland governments for firms operating in the extractive sector to guide them
in maintaining the safety and security of their operations within a framework that
ensures the sanctity of human rights. They are –
 Recognition of the need to dialogue with host community and contribute to
their welfare.
 Prevention of conflict where possible.
 Using force only when life is threatened.
 Deployment of security must be appropriate and proportional to the risk
envisaged.
GUIDELINES FOR GSF ( SOLDIERS, POLICEMEN)
 Operating strictly within the laws of the country and the authority given to
them by the security agency they represent.
 Using force as a last resort and in accordance with international
humanitarian law.
 Reporting any incident involving the use of gun to a facility security
supervisor and submitting a written report within 24hrs of the incident.
 No use of fire arms against any person engaged in civil protest or peaceful
demonstration.
RESPONSIBILITIES OF GSF
 Respecting and protecting human dignity and human rights of all persons.
 Respecting safety regulations especially the 12 life -saving rules.
 Preventing crimes such as theft, armed robbery, kidnapping or any act of
terrorism and ensuring security of company personnel and property.
 To assist in preventing unauthorized access into company premises.
 To report any security incident promptly to the Facility Security
Supervisor ( FSS)

IMPROVISED EXPLOSIVE DEVICE ( IED )

It is also known as a roadside bomb or a homemade bomb constructed and


deployed in ways other than in conventional military action meant to cause
destruction of lives and property by terrorists who are not fit to live among
human beings. It is delivered or emplaced in the following ways:

 VBIED – Vehicle Borne IED is placed in a parked or a moving vehicle.


 SBIED - Suicide Borne IED is tied to a suicide bomber.
 Rubbish bins, trash cans are also used in emplacing IED
 IED could also be emplaced in drainages and culverts.
 Dead animals are also used in delivering IED.

BOMB PREVENTION TIPS
 Disallowing people with bags from entering the premises.
 Suspicious looking packages, paper bags left alone be scrutinized.
 Avoid opening heavily sealed envelope with wire string.
 No ID card, no entry be strictly enforced.
 All visitors must be processed before granting access.
TERRORIST GROUPS
Boko Haram in Nigeria. Islamic State in Iraq & Syria.
Aqaeda in Afghanistan & Pakistan. Taliban in Afghanistan.
Hezbollah in Lebanon. Alshabab in Somalia.
FARC Rebels in Columbia. Hamas in Palestine

TRAVEL, RESIDENTIAL AND OFFICE SECURITY

TRAVEL SECURITY
 Verify the security situation in the intended location
 Avoid routes known to have recent incidents of armed communal
conflict or other forms of hostility, armed robbery or kidnapping.
 Assist at accident scenes if it is safe to do so.
 Travel only by day time
 Don’t drive under the influence of drug or alcohol or when very tired.
 Ensure your car is in good condition.
 Lock all doors and wind up the windows when on the road.
 Don’t shop behind the wheels – buying bush meat of fish on the
highway is dangerous.
 Don’t give ride to strange persons.
 Don’t expose valuables in your car.
 Don’t stop at police checkpoint if there is no marked police vehicle.
 If travelling on a highway, don’t use AC except you are not alone in the
car to prevent sleep.
 If you notice a vehicle trailing you, run to a public place such as a police
station, army barrack, church, market or a bank. Don’t run to your
house or your friend’s house.
RESIDENTIAL SECURITY
 Watch out for the unusual during power outage.
 Cut down overgrown shrubs around your homes.
 Raise alarm when your neighbor is under attack to scare the hoodlums
away. It could be your turn tomorrow.
 If hoodlums break into your home, avoid eye to eye contact, just
cooperate.
 Recruit domestic staff that have reliable guarantors.
 Don’t keep large sum of money at home, but if it is so necessary, hide
it in the kitchen.
 Always lock your gate.
 Expensive women clothes and jewelries be kept in a basin while
disused and worn out clothes be kept in a box. Thieves would likely go
with the box when they come.
 Always have credit on your phone before going to bed and NEVER
switch off your phone.
 Get some phone numbers of police in your area as well as Vigilante
numbers.
 When hoodlums are at your gate, pretend as if you are calling the
police, this could scare them away.
 Don’t use generator beyond 10pm. It is not a status symbol to use gen
throughout the night. If your neighbour under attack raises alarm,
nobody would hear.
 Be nice to your domestic staff, but don’t let them know your financial
status.
 Don’t install your water tank tower close to the fence.
OFFICE SECURITY
 Lock your office if you are leaving.
 Don’t leave visitors unattended to in your office.
 Don’t keep money and other expensive personal effects in your office.
 Remain in the office when the cleaner is doing his or her job.
 Ensure that all occupants in a shared office adhere to all the above tips.
KIDNAPPING
 If you are kidnapped, don’t resist, just cooperate
 Don’t negotiate on your behalf. Don’t make any promise to the kidnappers.
 If you are negotiating on behalf of any person, ensure there is proof of life
(POL) by demanding to speak with the hostage to avoid paying a ransom on
a dead victim.

SECURITY MANAGEMENT AND CORPORATE SECURITY


Security management refers to the identification of an organization’s assets
including employees, buildings, machines etc, followed by the development and
implementation of policies and procedures for protecting these assets. An
organization uses procedures such as risk assessment, risk analysis and security
survey to identify threats and system vulnerabilities and implement effective
controls.
Corporate security is the identification and effective mitigation, at an early stage,
of an infraction that may threaten the resilience and continued survival of an
organization. Such infraction could be fraudulent act or unsafe act. It is a corporate
function that oversees and manages the close coordination of all functions within
the company that are concerned with security and safety.
CORE ELEMENTS OF CORPORATE SECURITY
 Personal security
 Physical security
 Information security
 Crime prevention and detection
 Fraud deterrence
 Investigation
 Risk assessment and mitigation
 Crisis management
 Environmental safety and health
 Business continuity planning ( Contingency plan)

CONTINGENCY MEASURE AND EMERGENCY RESPONSE

Contingency measure refers to Plan B. An arrangement put in place to ensure


the continuity of business even in an emergency or a disaster. An
arrangement that mitigates the effect of an unforeseen event. For example,
if a chief executive officer in Benin-City is billed to attend a meeting in
Victoria Island, Lagos at 1pm with DPR officials, while booking for the first
flight, there should be an arrangement for armed escort and a serviceable
SUV. If on getting to the airport, flight is cancelled due to foggy weather, the
CEO can now go by land. Time spent on contingency planning equals to time
saved when a disaster occurs.

An emergency is a sudden, unexpected situation that may cause injury, loss


of life, damage to property which requires immediate attention and remedial
action.

EMERGENCY SCENARIOS AND RESPONSE


 Medical Emergency is an injury or illness that is acute and poses risk
to a person’s life. The victim is to be given first aid by a competent first
aider and thereafter taken to the nearest hospital.
 Fire Emergency is a sudden and unexpected fire which poses an
immediate risk to lives and property and requires urgent attention.
Raise alarm, evacuate people from the building to a mustering point
and fight the fire with extinguisher if it is safe to do so. The state fire
service or a private fire service would be contacted for assistance.
Security men would disallow non firefighters from entering the
premises as the fire is being fought.
 Criminal Activity refers to the intentional commission of heinous
crimes such as armed robbery, kidnapping, rape that jeopardize lives.
GSF to be contacted immediately.
 Violent protest by aggrieved workers, students and secret cult rivalry
can put lives at risk. The GSF to be contacted to restore order. Force
will be used only if lives are obviously threatened as stipulated by the
Voluntary Principles on security.
 Bomb Threat is a threat to detonate an explosive to cause death and
destruction of property. This threat is always through phone. The
receiver of the threat must keep the caller on the phone for a long
time. Any of the GSF would be contacted immediately.
 Suicide Threat is a threat to take one’s own life in a company premises.
Those who attempted this used communication mast. If this happens,
fire fighters as well as GSF to be alerted immediately.
EXECUTIVE PROTECTION
This is also known as Close Protection. It refers to security and risk mitigation
measures taken to ensure the safety of VIPs exposed to elevated personal risk
because of their employment, high profile status, net worth and social affiliations.
Protective measures may include home security systems, body guards, armoured
vehicles, mail screening, private jet travel and other precautions. Executive
protection may also provide security for immediate and extended family members
to prevent kidnapping for ransom. It is a specialized field within the private security
industry. Professionals specialize in first aid, marksmanship and evasive driving.

TYPES OF EXECUTIVE PROTECTION


1. High threat executive protection for dignitaries on international trips
2. Corporate executive protection for high net worth corporate officers
3. Celebrity close protection

ROLES OF PORT FACILITY SECURITY OFFICER (PFSO)


 Conducting a comprehensive security survey of the port facility
 Ensuring the development and maintenance of the port facility security plan
 Undertaking regular security inspections of the port facility to ensure the
continuation of appropriate security measures
 Enhancing security awareness and vigilance of the port facility personnel
 Reporting to the relevant authorities and maintaining records of occurrence
that threatens the security of the port facility

PORT FACILITY SECURITY PLAN: It is to establish:


 Measures designed to prevent weapons or any dangerous substance from
entering the port facility
 Measures designed to prevent unauthorized access to the port facility
 Procedure for responding to security threats or breaches of security
 Procedure for responding to any security instruction the govt may give
 Procedure for evacuation in case of security emergency
 Duties of port facility personnel assigned security responsibilities
 Procedure for reporting security incidents

LPG TANKER PARK


 Tanker not to be parked end to end
 Parking area not to be located beneath power lines
 Parking area to be fenced from the public
 All sources of ignition to be isolated from the parking area
 Parking area to be cleared of all rubbish and combustible materials
 Appropriate fire extinguishing apparatus to be provided for parking area
 Parking of trucks to be so arranged that they will not impede firefighting
access
 The park must be well illuminated

TANKER PARK SUPERVISORY ROLES


 Regular survey to identify areas of improvement for the park to minimize
safety incidents
 Ensure that the highest safety standards are met and implemented
 Ensure that there is no horse play and unruly behaviour in the park
 Ensure that cigars, matches, firelights, GSM phones are not brought into the
park
 Ensure that trucks are parked in the prescribed order
 Conducting a comprehensive security survey and risk assessment of the park
to ensure the sustenance of appropriate security and safety measures
 Enhancing security awareness and vigilance at the park
 Reporting to the relevant authority any incident that threatens the safety of
the park
CAUSES OF EXPLOSION
 Pump seal failure
 Flange leakage
 Connecting pipework crack or fracture
 Hose leakage
 Relief valve leakage
 Boiling Liquid Expanding Vapour Explosion ( BLEVE )

You might also like