You are on page 1of 33

FAMOUS SEURITY

SECURITY
TRAINING
MANUAL Basic Guards
Training

Maj® Sharjeel
M/S FAMOUS SECURITY CO. (PVT.) LTD.
TABLE OF CONTENTS

1. INTRODUCTION TO SECURITY
2. ACCESS CONTROL
3. EFFECTIVE COMMUNICATIONS
4. ELECTRONIC ALARM SYSTEMS
5. EMERGENCY PLANNING
6. EMPLOYEE DISHONESTY
7. ETHICS
8. FIELD NOTES AND REPORT WRITING
9. FIRE PREVENTION AND DETECTION
10. HAZARDOUS MATERIAL
11. INTERNAL THREATS TO AN ORGANIZATION
12. PATROLLING TECHNIQUES
13. SECURITY PLANNING
14. SAFETY AT WORK
15. SECURITY AND PROTECTION AWARENESS
16. INVESTIGATIONS
17. INDUSTRIAL SECURITY SURVEY
18. SURVEILLANCE
19. TERRORISM AND EXECUTIVE PROTECTION
20. TRAFFIC CONTROL
21. WORKPLACE VIOLENT BEHAVIOR
22. CRIME SCENE PROCESS
23. COMPUTER SECURITY
24. FIRST AID AND SECURITY PERSONNEL
25. WEAPONS OF MASS DESTRUCTION
26. INTERVIEWING PROCEDURES AND TECHNIQUES
27. RISK MANAGEMENT OPERATIONS
28. STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS
29. DRUG ABUSE
30. OBSERVATIONS TECHNIQUES
31. EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH DEVICES
32. CROWD CONTROL AND MANAGEMENT
33. MANAGING OF DISRUPTIVE PERSONS
34. CRISIS INTERVENTION AND PLANNING
35. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
36. DEFENCE TACTICS AND SAFETY OF SECURITY
PERSONNEL
37. APPREHENSION & DETENTION
38. TESTIFYING IN COURTROOM

(Note: Review/update of this manual shall be done for every six months
to keep the document dynamic & current.)
INTRODUCTION TO SECURITY
DEFINITION OF SECURITY:

“A condition of being protected from harm, injury, danger, losses,


criminals, threats, risks, etc.”

HISTORICAL PERSPECTIVE:
From the earliest times humans have recognized the need to protect
themselves, their family and their property. Like
 Forming small groups and living together.
 Maintaining order.
 Recognizing the threats
 Raising armies and their deployment in territorial boundaries.
Planning for security will be done by the following three steps:
 Vulnerability analysis
 Countermeasures planning and implementation
 Through test of its operation
Factors considered for security planning:
 Crimes and loss incidents
 Social environment
 Legal system
 Loss prevention resources

ACCESS CONTROL
Access control is the ability to permit or deny
Access control programs are instituted to:
 Permit or deny entry to or presence in a given place
 Increase or reduce the rate or density of movement to, from, or
within a defined place.
 Protect persons, materials, and information from unauthorized
observation or removal.
 Prevent injury to people or damage to material.
Identity of employees or visitors can be determined by human or a
computer:
 Security guards
 Card reader systems
 Biometric readers
EFFECTIVE COMMUNICATIONS

Communication is process of conveying information from a sender to


receiver with the use of a medium in which the communicated
information is understood the same way by both sender and receiver.
There are three general types of communication equipment are used
which communicates the audio and visual information by use of wired,
radio, and light as medium.

ELECTRONIC ALARM SYSTEMS

A device which notifies designated people about the impending by way


of audible or visual signal.
Three general categories of devices are outlined based on what they
protect:
 Perimeter or point of entry
 General area or room
 Object
The following are the general sensor technologies used in alarm
systems:
 Passive infrared
 Glass break sensors
 Electro mechanical
 Ultrasonic or microwave
 Vibration or shock
 Photoelectric
 Audio
 Capacitance

EMERGENCY PLANNING

An emergency is a situation which poses immediate risk to health, life,


property, and environment.
Emergency planning will highlight the types of emergencies which the
organization likely to encounter and the emergency management team
may have to take counter measures or require them to consider in
advance for preventing or minimizing its adverse effects.

An emergency plan should accomplish the following:


 Define the emergency
 Organize a team with specific tasks to complete, before, during,
and after an emergency.
 Establish a method for using available resources
 Provide means to restore normal operations from the emergency
situation.
Planning priorities
 Protect life
 Prevent or minimize injuries
 Reduce the exposure of assets
 Optimize the loss control whose exposure cannot be reduced.
 Restore the normal operations as quickly as possible.
EMPLOYEE DISHONESTY

Employee dishonesty is one of the most dangerous and difficult task to


detect and identify within any organization.
Employee dishonesty starts at:
 Accepting bribes
 Involving conflicts of interests
 Stealing from employers
 Breach of fiduciary relationship
 Etc.
Employee dishonesty starts in any corporation when the following three
elements are present:
 Opportunity
o Lack of controls like policies, procedures, and processes
o Inadequate of audits

 Pressure
o Motivation
o Personal financial problems
o Drug abuse
o Etc.
 Rationalization
o Environment in the corporation
o Present practices
ETHICS
Ethics are those rules of conduct by which all the security personnel
regulate their conduct among themselves with all other persons with
whom they deal in their regular performance of duties.
Security Personnel Shall:
 Perform duties in accordance with the rules and regulations of
employer/client and the law of the land of Govt. of India.
 Observe honesty, integrity, truthfulness, and politeness while
discharging their duties and responsibilities.
 Safeguard the physical assets, information, etc., and exercise due
care to prevent it from damage and theft.
 Protect the reputation of your employer and client.

FIELD NOTES AND REPORT WRITING

It is remarkable how quickly how quickly human mind losses a


considerable part of its ability to recall the details of events accurately
he observed in the past. Hence the field note is the invaluable tool in the
hands of investigator.
An investigative report is the clear, comprehensive written document of
facts presented chronologically regarding a specific assignment and from
which the events of the events of the investigation can reconstructed
even after lapse of time.
A good report must be:
 In writing
 Told in first person narrative
 Objective
 Factual
 Chronological
 Easily understood
 Comprehensive
 Withstand the test of time
 No place for hypothesis or opinion
Patrolling:
 Foot Patrolling
 Mobile Patrolling
Why patrolling
 Hazards will be identified and reported
 Deficiencies in the protection program are highlighted
 Check on existing protection program.
The field notes include:
 Doors, windows, and other openings those are not secure.
 Suspicious persons, vehicles, or circumstances.
 Disorder or unusual activity.
 Hazardous conditions.
 Any other special notices.
Report writing:
Reports can be classified as follows:
 Daily. Monthly, Quarterly and yearly reports.
 Preliminary reports
 Interim reports
 Special reports
 Final reports
Characteristics of report writing
 Accurate with relevant information
 Timeliness of information
 Concise
 Relevant

FIRE PREVENTION AND DETECTION


Ingredients of fire:
 Fuel
 Oxygen
 Heat
 Combustion

Causes of Fire
 Accidental
 Natural
 Arson -- criminal act
Fire detection systems working mechanisms:
 Smoke
 Gas
 Heat
Fire inspections help in:
 Prevent fire
 Compliance to fire regulations and codes
 Detects impending dangers
 Detects in malfunctioning of equipment
 Highlights the areas which requires attention
 Highlights the places where portable fire extinguishers are
required.
Duties of fire inspectors should look for:
 Adequate lighting in stairways and hallways
 Emergency lighting
 Accessibility of emergency exits
 Availability of proper fire extinguishers
 Usability of fire extinguishers
 Posting of no smoking signs
 Operational and properly placed exit signs
 Rubbish accumulations and unsanitary conditions
 Obstructed sprinkler heads
 Improper storage of hazardous material
 Etc.
HAZARDOUS MATERIAL
Any substance or material that poses an unreasonable risk to health,
safety, and property of people, animals, and environment.
How it is harmful to people?
 Absorption
 Inhalation
 Ingestion
 Injection
INTERNAL THREATS TO AN ORGANIZATION
In any organization first internal threat starts for people. They are:
 Acts of Commission
 Thefts and pilferage
 Vandalism
 Sabotage
 Workplace violence
 Arson
 Bombing
 Etc.
 Acts of Omission
 Violation of safety norms
 Careless and reckless handling of operational and process
machinery
 Routine maintenance of mechanical, electrical, and other
equipment.
 Etc.
PATROLLING TECHNIQUES
1. Know your neighborhood
 Familiarize with the area to be patrolled
i. Boundaries and adjoining areas
ii. Buildings
iii. Other installations
iv. Etc.
2. Patrol procedures
 Purpose of patrolling
i. To prevent and discourage crime through visible
patrols
ii. To report suspicious activity and criminal activity
 Be unsystematic in patrol routes. Do not patrol by
predesigned set pattern
 Know probable critical and trouble spots
3. Observations to be made
 Make notes immediately. Do not leave it to the memory
 Be accurate in report writing
4. Reporting
 Information regarding suspicious objects, places, safety and
persons.
 Information on urgent matters should be reported
immediately
 Do not leave your suspicion unreported
 Patrol reports must be submitted in each patrol
immediately after completion
SECURITY PLANNING
1. Identification of assets, threats, risks, vulnerabilities as well as
such as operational issues, culture and cost.
2. Countermeasures are to be prepared to mitigate the
vulnerabilities.
3. Implementation of selected countermeasures
4. Ensuring that the effectiveness of countermeasures does not
deteriorate and that the solutions are adjusted to meet the ever
changing needs of security.
SAFETY AT WORK
A Condition of being safe and protection by activities of environment.
Safety can be ensured by regulating and controlling:
 Human factors
 Ergonomics
 Stress at work
 Diseases and conditions
 First aid
 Dangerous substances
 Fire prevention
 Electrical safety
 Construction and contractor activities
 Etc.
SECURITY AND PROTECTION AWARENESS
Security awareness is a state of mind when you are conscious of an
existing security program and its relevance to your behavior as well as
the effect of your behavior on reducing the security risks.
Purpose of awareness:
 Understanding the relationship between the security and
successful operations
 Know one’s obligations under the security program
 Perceive the connection between the security program objectives
and selected security measures.
 Be familiar with the sources of help and procedures under security
program.
 Compliance.
Principles of training
 I hear – I forget
 I see – I remember
 I do – I never forget
INVESTIGATIONS
An investigation is a process of gathering information which is not
publicly available and verify the truthfulness and accuracy of information
gathered or obtained.
Types of investigations:
 Criminal and non criminal investigations
 Covert or overt investigations
 Reactive or proactive investigations
The above investigations may fall into the following categories:
 Incident investigations
 Administrative enquiries
 Background, financial, and lifestyle investigations
Approach to investigations can be done in:
 Constructive way
 Reconstructive way
The most important traits of investigators are;
 Observation skills
 Communication skills
 Trustworthiness
 Persistence
 Ability to deal effectively with people
 Self-motivating and Self-starting
 Ability to multitask
 Professional demeanor
 Flexibility
 Patience
The qualities of an investigation:
 Objectivity –
 Thoroughness – Checking all leads and checking key leads more
than once to ensure consistency
 Relevancy – information gathered should be the subject of the
investigation
 Accuracy –
 Timeliness – Ability to complete investigation on time.
Documentation of investigation:
 Report writing
o Initial report
o Progress report
o Special report
o Final report
 Elements of the report:
o Administrative information
o Summary
o Narrative
o Conclusion
o Enclosures
INDUSTRIAL SECURITY SURVEY
Security survey is a critical and onsite examination to ascertain
 present security status
 identify deficiencies or excesses
 determine the protection needed
 Prepare recommendations to improve overall security of the
organization.

Uses of security survey


 Establishment of policies and procedures
 Protect against the internal and external theft
 Develop access control procedures
 Provide control over movement and identification of employees,
visitors on company premises.
 Review the selection, training, and deployment of security
personnel
 Assists in establishment of emergency and disaster plans
 Identify the internal resources available and needed for the
establishment of security program
 Etc.
SURVEILLANCE
Surveillance is the monitoring of behavior of people, objects, or
processes for conformity to expected or desired norms or desired norms
for security and proper control.

Ways of conducting
surveillance properly:
 Covert or overt surveillance
 CCTV connected to recording systems and monitoring
 Wiretapping or bugging but with a warrant and legally
While doing surveillance, consider the following:
 Always maintain a log of all the activities
 Know the law of the land
 Maintenances of confidentiality, means release of information on
need to know basis
 Cost of surveillance
Surveillance is the visual monitoring of a location or individual to
determine what activities or conduct is occurring.
This visual monitoring is accompanied by a log, record of what is
occurring within the surveillance area.
This surveillance may be:
 Stationary
 Moving
 Or combination of both.
With an objective of detecting:
 Commission of crime
 Serious policy violation
 Gathering intelligence
 Preventing a crime
 Etc.
Surveillance can be done by:
 Human eye
 By means of electronic and mechanical hardware.
TERRORISM AND EXECUTIVE PROTECTION
TERRORISM
EXECUTIVE PROTECTION
Executive protection is also called as VIP protection.
Executive protection is service designed to protect
 Guard entertainers
 Wealthy persons
 Top executives of any business groups
 Top government executives
 Threatened political leaders
 Leaders of Government
 Any individual whose personal security is endangered
 Etc.
Qualities of security personnel involved in VIP protection
 Intelligence
 Prompt and quick reaction
 Good observation skills
Executive protection includes protection at:
 Residence
 Transit
 Office and at other destination
TRAFFIC CONTROL
 Identification of common space and private space
 Identification of visitors, packages, and mail control
 Sign in sheets and visitor passes are issued
 Entrances to the complex: specific doors
 Separate vehicle and truck entrances
 Speed bumps, signs of access control, and parking lots
 Designated parking for visitors, handicapped, employees, and
trucks
 Use of CCTV to take pictures of violators of traffic.
WORKPLACE VIOLENT BEHAVIOR
Workplace violence is violence or threat of violence against worker. It
can range from threats and verbal abuse to physical assaults and
homicide.
Warning Signs:
1. Threatening statements to kill/harm self or other
2. Violent, reckless, or anti-social behavior
3. Drug abuse
4. Serious stress in their life
5. Confrontational, angry, easily provoked, unpredictable behavior
6. Fascination for fire arms
Measures to be taken to prevent or reduce the workplace violence are:
1. Provide safety education
2. Provide secure working environment
3. Develop policies and procedures to address workplace violence
4. Encourage employees to report and record all incidents
5. Provide proper medical treatment after the incident
6. Investigate all incidents of threats

CRIME SCENE PROCESS


What constitutes crime scene?
 Crime is the area where crime has been committed, the
immediate area surrounding the scene.
 A crime scene can be extended from the actual area in which the
crime has occurred to any area where the suspect flees to or
leaves the evidence.
 Area where the evidence has been found
Duties of security personnel at the crime scene:
 Five first-aid to the victim if there is an injury
 Protection crime scene to preserve the integrity of evidence and
prevent it from contamination.
 Shall not allow any individual to enter into the crime scene
 Notifying the supervisor about the incident
 Vehicle shall be allowed to parked away from the scene of crime
 Document all the actions taken observations made at crime scene
 Media shall not be allowed to cross the boundaries of crime scene
 Photographing the crime scene for further investigations
 Do not unnecessarily touch anything
 Get names of all present at the scene
COMPUTER SECURITY
Use of computers in present world for the processing and storage of
information has become inevitable for its ease of access, storage,
modify, copying, retrieving, etc. Since the information is the lifeblood of
any business security of computers, equipment and its storage media
requires attention.
Potential threats for computer:
 Acts of human error or failure
 Compromises to information security
 Deliberate acts of software attacks
 Deliberate acts of sabotage or vandalism
 Deliberate acts of theft
 Technical and hardware failure
 Forces of nature
Best practices of computer security:
 Physical security measures
 Software controls
 Hardware controls
 Legal controls
 Procedural controls
 Etc.
FIRST AID AND SECURITY PERSONNEL
First aid is an initial or preliminary care given to an injured or sick person
until professional treatment is accessed.
First aid is an important and useful skill. Timely First aid can result in:
 Preservation life
 Prevention or mitigation of disability
 Helps in recovery
 Promotion of safety awareness
 Identifying the safety concerns
 Assistance in early rehabilitation

Basic principles of first aid:


 Use of an adhesive bandage
 Applying direct pressure on bleed
 Cardiopulmonary resuscitation
 Artificial respiration

 Snake bite and first aid.

WEAPONS OF MASS DESTRUCTION

Any weapon, explosive, incendiary device designed and manufactured to


cause death, bodily injury through the release of toxic or poisonous
chemicals, decease organism, radiation, at a level dangerous to human
life and environment.

Examples of weapons of mass destruction:


1. Nuclear weapons
2. Chemical weapons
3. Biological pathogens
4. Toxic chemicals
5. Biological toxins
6. Radioisotopes.

INTERVIEWING PROCEDURES AND TECHNIQUES


Interviewing is the conversation or questioning by an investigator with a
witness or a suspect who has or believed to have information relevant to
the subject matter of investigation.
Key reasons for conducting interview:
 To gather information to establish the facts
 To verify information received from other sources
 To identify additional witnesses
 To identify persons responsible for the events or incidents
 To secure additional evidence
 To develop background information on the specifics of the event
or offence
 To eliminate suspects
 To discover details of other offences

Techniques of interviewing:
 Establish a good rapport
 Maintain a eye contact
 Do not jump to conclusions
 Listen attentively
 Be perceptive about every movement
 As open ended questions that can’t be answered with yes or no
 Use silence to solicit a response to an interview
 Have interviewee offer chronology of events
 Test the veracity of interviewees responses by asking questions
which you know answers
 Discuss the seriousness or gravity of the incident
 Request the interviewee to repeat his/her version of the events.
 When appropriate, confront interviewee with information that
you have gathered
 Maintain control.

Stages of Interview:
 Approach: Starts with Greeting
 Warm up: Establishing rapport
 Start: Actual interview asking the witness or suspect to tell
everything.
 Direct Questioning: to clarify or reconcile inconsistencies and
other queries
 Ending: Completing the interviewing by summarizing and
expressing sincere gratitude.
RISK MANAGEMENT OPERATIONS
Operational risk is the potential losses associated with operations or
work. These risks and losses or vary from business to business, place to
place, etc. The countermeasures are to be devised as per
appropriateness and risk indicators.
These losses may cause from:
 Internal Causes
o People
o Processes
o Systems
 External causes
The management of these risks is based on following tow basic factors:
 Frequency of occurrence
 Impact on business
The processes of management of risks are divided into following
categories:
 Risk identification
 Risk assessment
 Risk treatment
o Risk avoidance
o Risk mitigation
o Risk sharing and transfer
o Risk acceptance
 Risk monitoring

STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS


Strike is concerted refusal by employees to continue working, in an
attempt to force an employer to meet certain demands.
Types of strikes:
 Economic strike: dispute over wages and working conditions
 Unfair labor practices strike: contention over unfair labor practices
on the part of the employer
Potential Dangers:
 Violence
 Damage
Handling of strikes:
 Pre strike planning
 Strike operations
 Post strike analysis and Evaluation
Lockout is a work stoppage in which an employer prevents employees
from working.
Reason for lockout:
 Financial losses
 Inability of employer to continue the business
 Prolonged refusal by employees to continue working by
participating in strike and related activities.
DRUG ABUSE
Drug is substance by its chemical nature alters the structure or function
of a living organism. Drug is any chemical substance that alters mood,
perception or consciousness. If this drug is used for other than
designated purposes will lead to apparent injury of self or society.
Common Signs of drug abuse:
 Changes in attendance and discipline
 Changes in normal capabilities-work habits, efficiency, etc.
 Poor physical appearance
 Wearing sunglasses at inappropriate times to hide dilated or
constricted pupils
 Constantly wearing long-sleeve shirts to hide needle marks
 Associating with known drug users
 Stealing
 Constant running nose or sniffing
 Etc.
Types of Drugs:
 Narcotics – Natural and synthetic opiates
 Depressants – induce sleep, relieve stress and allay anxiety
 Sedatives - induce sleep, relieve stress and allay anxiety
 Stimulants – reverse the effects of mental and physical fatigue
 Hallucinogens – creates dream images and hallucinations.
Prevention of drug abuse at workplace:
 Having a written down policy
 Awareness programs
 Drug screening
 Investigations reports of drug abuse
 Employee assistance programs
 Enforcing disciplinary action
 Behavioral monitoring of suspected people
 Etc.
OBSERVATIONS TECHNIQUES
The following observation techniques are required for security
personnel, which will be useful for investigations, crime scene search,
patrolling etc.
 Patience
 Alertness
 Good Memory
 Attention
 Habit of observing details not generalities
 Developing accurate sense of time, distance, speed, direction, age,
etc.
 Ability to distinguish between colors, tones, shades, shapes, etc.
 Ability to visualize events
 Ability to listen carefully and interpret sounds accurately
 Ability to identify smells
 Ability to recollect and visualize the past events
 Ability to distinguish between various textures.
EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH DEVICES

An explosive is a material that produces sudden expansion of material


usually accompanied by the production heat, pressure, and noise upon
initiation.
Explosives can be categorized as:
 Low Explosives
 High Explosives
Low Explosives:
Low explosive usually is a mixture of combustion material. The examples
of low explosives normally are:
 Gun powder
 Yellow phosphorous
 Mixture of Aluminum chloride andiron oxide
 Potassium permanganate and glycerin
 Potassium chlorate and sugar ignited by sulfuric acid
 Pyro techniques
 Illumination devices
 Etc.

High Explosives:

High explosives are normally employed in mining, demolition, and


military warheads. These explosives are divided as follows:
 Primary explosives
These explosive are extremely sensitive to mechanical shock,
friction, and heat, to which they will respond by burning rapidly or
detonation.
 Secondary explosives
These explosives are relatively insensitive to shock, friction, and
heat. They require a booster to cause an explosion. Examples of high
explosives are:
o Dynamite
o TNT
o RDX
o PETN
o HMX
o Picric acid
o Gun cotton
o Fulminates
 Tertiary explosives
Explosive devices:
The mechanisms for explosive devices are of two types:
 Standard Mechanism – used by military operations personnel for
war purposes
 Improvised Mechanism – used by insurgents, terrorists, antisocial
elements for the purpose of disturbance of peace process,
personal gain, etc.
IED: Stands for Improvised Explosive Device
Components of IED:
1. Switch
2. Main explosive
3. Battery
Detection Equipment:
1. Ion mobility spectrometry
2. X ray equipment
3. Fire arms and Explosive detector dog squads
The following procedures are to be followed in case of suspicious
explosives are found in premises:
1. Do not touch or move the object further
2. Inform your supervisor/security officer about suspicious object
3. Restrict all access to the area
4. Turn off all Radio equipment, mobile phones, etc.
5. Place the placards or other signs indicating suspicious object
6. Evacuate the area
7. If the object is present in a room, open all doors and windows.
8. Do not allow any one to handle the object until the authorized
bomb squad arrives.
CROWD CONTROL AND MANAGEMENT
Controlling of crowd is an important function of security. The planning to
control crowd are based on the understanding of following points to
take necessary measures.
1. Cultural issues
2. Political issues
3. Psychology of the crowd
4. Past experiences
5. Presence and possibility of terrorists and insurgents influence on
area
6. Kind of VIPs are visiting the site
7. Access to weapons and other destructive material
8. Etc.
Preparations for crowd control issues:
1. Compartmentalization of the area
2. Vehicle parking
3. Fire brigade
4. Safety and Ambulance services
5. Sufficient no. of security personnel
6. Screening at entrances and emergency exits
7. Sign boards
8. Protection of VIPs, executives, etc.
9. Etc.
MANAGING OF DISRUPTIVE PERSONS
Handling of disruptive behavior quires training, awareness and
experience on such incidents.
Causes of disruptive behavior of employees at workplace:
1. Domestic and family issues carried to work spot
2. Drug abuse
3. Economical problems
4. Work environment
5. Religious, cultural, psychological issues
6. Absence of appropriate policies, code of conduct, and ethics.
7. Etc.
Planning for prevention and handling of disruptive persons
1. Having clear policy on employee acceptable behavior, code of
conduct, ethics, etc.
2. pre hire employee background screening
3. Employee assistance programs
4. Initiating investigations and taking appropriate disciplinary actions
5. Behavioral monitoring of employees by their supervisors
6. Proper reporting system of incidents
7. Training of security personnel in handling of disruptive persons
8. Safety of other employees
9. Security screening at entrances and other protection measures,
etc.
CRISIS INTERVENTION AND PLANNING

Crisis means any kind of emergency which stops and obstructs work &
operations of your employer and the client.
This crisis may be of two types:
1. Natural
2. Human induced – Intentional
3. Human induced – accidental
Planning for crisis can be done in three ways:
1. Pre-event
 All measures of detection, prevention, and protection of
assets.
 If natural emergencies measures to optimize the loss
control
2. During
 Prevention of life
 Attending the injured
 Crowd control
 Safe evacuation
 Providing easy access to emergency vehicles
 Protection of property from damage etc.
3. After
 Restoration of normalcy
 Aids in investigations
 Etc.
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
Crime prevention through environmental design is a concept of
planning and designing area and built environment to reduce the
incidence and fear of crime by implementing the following four
concepts from planning stage to building construction stage. The
concepts are:
1. Natural Surveillance – allowing movements of outsiders and
intruders easily observable without any obstructions.
2. Territorial Reinforcement – developing a sense of territorial
control by separating the private and public spaces, construction
of fences, gateway procedures, etc.
3. Natural Access Control – Creating perception risk, easy detection,
High probability of being caught, etc.
4. Target Hardening – installation of protection systems against
possible intrusions by adversaries.
DEFENCE TACTICS AND SAFETY OF SECURITY PERSONNEL

Security personnel are at times may confront with people who act and
use aggressive tactics to accomplish their mission and achieve their
objective. The following incidents where security personnel can use the
defense tactics:
1. Conflict resolution
2. Obstruction of aggressive person from injuring co-employees and
damaging the property.
3. Apprehension and detention of criminals
4. Weaponry awareness
5. Etc.
The use of defense tactics requires the knowledge of local law section &
clauses which address rights of private defense and exceptions.
Defense tactics are:
1. Awareness of surroundings and recognition of harmful situations
2. Reduce the chances of incidence
3. Avoid the potentially harmful situation
4. Self defense techniques
5. Do not risk personal safety
6. Neutralizing the adversary
7. Etc.

APPREHENSION & DETENTION

Security may come across a situation where they have to apprehend and
detain criminals till the arrival of local police.
This requires knowledge on local law which addresses it and the duties,
responsibilities of citizens and security personnel under such
circumstances.
The main points to be remembered while apprehending and detaining
any suspect are:
1. Shall not use excessive physical force
2. Use of physical force ceases immediately persons under suspicion
surrenders or on neutralizing.
TESTIFYING IN COURTROOM

At times security personnel will be called to court to depose witness


statement in front of magistrates and judges.
The following steps to be followed and points to be remembered while
attending the court.
1. Go through the case file and refresh your knowledge on case.
2. Attire of security personnel should be professional
3. Do not talk with any defense lawyers and witnesses
4. Answer to the questions. Do not answer more than what you hare
asked for.
5. Should be attentive and polite in courtroom while answering the
questions.
6. Be watchful of bribery tactics
7. Etc.

You might also like