JASVINDERsINGH

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Audio] SECURITY TRAINING MANUAL BasicGuards Training Capt Shahid Anwar ( Retd) – Criminologist M/S TPL SECURITY.

Scene 2 (17s)

[Audio] TABLE OF CONTENTS 1. INTRODUCTION TO SECURITY 2. ACCESS CONTROL 3. EFFECTIVE COMMUNICATIONS 4. ELECTRONIC ALARM SYSTEMS 5. EMERGENCY PLANNING 6. EMPLOYEE DISHONESTY 7. ETHICS 8. FIELD NOTES AND REPORT WRITING 9. FIRE PREVENTION AND DETECTION 10. HAZARDOUS MATERIAL 11. INTERNAL THREATS TO AN ORGANIZATION 12. PATROLLING TECHNIQUES 13. SECURITY PLANNING 14. SAFETY AT WORK 15. SECURITY AND PROTECTION AWARENESS 16. INVESTIGATIONS 17. INDUSTRIAL SECURITY SURVEY 18. SURVEILLANCE 19. TERRORISM AND EXECUTIVE PROTECTION 20. TRAFFIC CONTROL 21. WORKPLACE VIOLENT BEHAVIOR 22. CRIME SCENE PROCESS 23. COMPUTER SECURITY 24. FIRST AID AND SECURITY PERSONNEL.

Scene 3 (2m 9s)

[Audio] 25. WEAPONS OF MASS DESTRUCTION 26. INTERVIEWING PROCEDURES AND TECHNIQUES 27. RISK MANAGEMENT OPERATIONS 28. STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS 29. DRUG ABUSE 30. OBSERVATIONS TECHNIQUES 31. EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH DEVICES 32. CROWD CONTROL AND MANAGEMENT 33. MANAGING OF DISRUPTIVE PERSONS 34. CRISIS INTERVENTION AND PLANNING 35. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN 36. DEFENCE TACTICS AND SAFETY OF SECURITY PERSONNEL 37. APPREHENSION & DETENTION 38. TESTIFYING IN COURTROOM (Note: Review/ update of this manual shall be done for every six months to keep the document dynamic & current.).

Scene 4 (3m 43s)

[Audio] INTRODUCTION TO SECURITY DEFINITION OF SECURITY: "A condition of being protected from harm, injury, danger, losses, criminals, threats, risks, etc." HISTORICAL PERSPECTIVE: From the earliest times humans have recognized the need to protect themselves, their family and their property. Like • Forming small groups and living together. • Maintaining order. • Recognizing the threats • Raising armies and their deployment in territorial boundaries. Planning for security will be done by the following three steps: • Vulnerability analysis • Countermeasures planning and implementation • Through test of its operation Factors considered for security planning: • Crimes and loss incidents • Social environment • Legal system • Loss prevention resources.

Scene 5 (4m 50s)

[Audio] ACCESS CONTROL Access control is the ability to permit or deny Access control programs are instituted to: • Permit or deny entry to or presence in a given place • Increase or reduce the rate or density of movement to, from, or within a defined place. • Protect persons, materials, and information from unauthorized observation or removal. • Prevent injury to people or damage to material. Identity of employees or visitors can be determined by human or a computer: • Security guards • Card reader systems • Biometric readers.

Scene 6 (5m 36s)

[Audio] EFFECTIVE COMMUNICATIONS Communication is process of conveying information from a sender to receiver with the use of a medium in which the communicated information is understood the same way by both sender and receiver..

Scene 7 (5m 52s)

[Audio] There are three general types of communication equipment are used which communicates the audio and visual information by use of wired, radio, and light as medium. ELECTRONIC ALARM SYSTEMS A device which notifies designated people about the impending by way of audible or visual signal. Three general categories of devices are outlined based on what they protect: • Perimeter or point of entry • General area or room.

Scene 8 (6m 24s)

[Audio] • Object The following are the general sensor technologies used in alarm systems: • Passive infrared • Glass break sensors • Electro mechanical • Ultrasonic or microwave • Vibration or shock • Photoelectric • Audio • Capacitance EMERGENCY PLANNING An emergency is a situation which poses immediate risk to health, life, property, and environment. Emergency planning will highlight the types of emergencies which the organization likely to encounter and the emergency management team may have to take counter measures or require them to consider in advance for preventing or minimizing its adverse effects. An emergency plan should accomplish the following: • Define the emergency • Organize a team with specific tasks to complete, before, during, and after an emergency. • Establish a method for using available resources • Provide means to restore normal operations from the emergency situation..

Scene 9 (7m 37s)

[Audio] Planning priorities • Protect life • Prevent or minimize injuries • Reduce the exposure of assets • Optimize the loss control whose exposure cannot be reduced. • Restore the normal operations as quickly as possible. EMPLOYEE DISHONESTY Employee dishonesty is one of the most dangerous and difficult task to detect and identify within any organization. Employee dishonesty starts at: • Accepting bribes • Involving conflicts of interests • Stealing from employers • Breach of fiduciary relationship • Etc. Employee dishonesty starts in any corporation when the following three elements are present: • Opportunity o Lack of controls like policies, procedures, and processes o Inadequate of audits • Pressure o Motivation o Personal financial problems o Drug abuse o Etc. • Rationalization o Environment in the corporation o Present practices.

Scene 10 (8m 50s)

[Audio] ETHICS Ethics are those rules of conduct by which all the security personnel regulate their conduct among themselves with all other persons with whom they deal in their regular performance of duties. Security Personnel Shall: • Perform duties in accordance with the rules and regulations of employer/ client and the law of the land of Govt. of India. • Observe honesty, integrity, truthfulness, and politeness while discharging their duties and responsibilities. • Safeguard the physical assets, information, etc., and exercise due care to prevent it from damage and theft. • Protect the reputation of your employer and client. FIELD NOTES AND REPORT WRITING It is remarkable how quickly how quickly human mind losses a considerable part of its ability to recall the details of events accurately he observed in the past. Hence the field note is the invaluable tool in the hands of investigator. An investigative report is the clear, comprehensive written document of facts presented chronologically regarding a specific assignment and from which the events of the events of the investigation can reconstructed even after lapse of time. A good report must be: • In writing • Told in first person narrative • Objective • Factual • Chronological • Easily understood • Comprehensive • Withstand the test of time • No place for hypothesis or opinion Patrolling: • Foot Patrolling • Mobile Patrolling Why patrolling.

Scene 11 (10m 40s)

[Audio] • Hazards will be identified and reported • Deficiencies in the protection program are highlighted • Check on existing protection program. The field notes include: • Doors, windows, and other openings those are not secure. • Suspicious persons, vehicles, or circumstances. • Disorder or unusual activity. • Hazardous conditions. • Any other special notices. Report writing: Reports can be classified as follows: • Daily. Monthly, Quarterly and yearly reports. • Preliminary reports • Interim reports • Special reports • Final reports Characteristics of report writing • Accurate with relevant information • Timeliness of information • Concise • Relevant.

Scene 12 (11m 46s)

[Audio] FIRE PREVENTION AND DETECTION Ingredients of fire: • Fuel • Oxygen • Heat • Combustion Causes of Fire • Accidental • Natural • Arson -- criminal act Fire detection systems working mechanisms: • Smoke • Gas • Heat Fire inspections help in: • Prevent fire • Compliance to fire regulations and codes • Detects impending dangers • Detects in malfunctioning of equipment • Highlights the areas which requires attention • Highlights the places where portable fire extinguishers are required..

Scene 13 (12m 42s)

[Audio] Duties of fire inspectors should look for: • Adequate lighting in stairways and hallways • Emergency lighting • Accessibility of emergency exits • Availability of proper fire extinguishers • Usability of fire extinguishers • Posting of no smoking signs • Operational and properly placed exit signs • Rubbish accumulations and unsanitary conditions • Obstructed sprinkler heads • Improper storage of hazardous material • Etc. HAZARDOUS MATERIAL Any substance or material that poses an unreasonable risk to health, safety, and property of people, animals, and environment. How it is harmful to people? • Absorption • Inhalation • Ingestion • Injection INTERNAL THREATS TO AN ORGANIZATION In any organization first internal threat starts for people. They are: • Acts of Commission ➢ Thefts and pilferage ➢ Vandalism.

Scene 14 (14m 1s)

[Audio] ➢ Sabotage ➢ Workplace violence ➢ Arson ➢ Bombing ➢ Etc. • Acts of Omission ➢ Violation of safety norms ➢ Careless and reckless handling of operational and process machinery ➢ Routine maintenance of mechanical, electrical, and other equipment. ➢ Etc. PATROLLING TECHNIQUES 1. Know your neighborhood • Familiarize with the area to be patrolled i. Boundaries and adjoining areas ii. Buildings iii. Other installations iv. Etc. 2. Patrol procedures • Purpose of patrolling i. To prevent and discourage crime through visible patrols ii. To report suspicious activity and criminal activity • Be unsystematic in patrol routes. Do not patrol by predesigned set pattern • Know probable critical and trouble spots 3. Observations to be made • Make notes immediately. Do not leave it to the memory • Be accurate in report writing 4. Reporting • Information regarding suspicious objects, places, safety and persons. • Information on urgent matters should be reported immediately • Do not leave your suspicion unreported • Patrol reports must be submitted in each patrol immediately after completion.

Scene 15 (15m 52s)

[Audio] SECURITY PLANNING 1. Identification of assets, threats, risks, vulnerabilities as well as such as operational issues, culture and cost. 2. Countermeasures are to be prepared to mitigate the vulnerabilities. 3. Implementation of selected countermeasures 4. Ensuring that the effectiveness of countermeasures does not deteriorate and that the solutions are adjusted to meet the ever changing needs of security. SAFETY AT WORK A Condition of being safe and protection by activities of environment. Safety can be ensured by regulating and controlling: • Human factors • Ergonomics • Stress at work • Diseases and conditions • First aid • Dangerous substances • Fire prevention • Electrical safety • Construction and contractor activities • Etc. SECURITY AND PROTECTION AWARENESS Security awareness is a state of mind when you are conscious of an existing security program and its relevance to your behavior as well as the effect of your behavior on reducing the security risks. Purpose of awareness: • Understanding the relationship between the security and successful operations • Know one's obligations under the security program • Perceive the connection between the security program objectives and selected security measures. • Be familiar with the sources of help and procedures under security program. • Compliance. Principles of training • I hear – I forget • I see – I remember.

Scene 16 (17m 50s)

[Audio] • I do – I never forget INVESTIGATIONS An investigation is a process of gathering information which is not publicly available and verify the truthfulness and accuracy of information gathered or obtained. Types of investigations: • Criminal and non criminal investigations • Covert or overt investigations • Reactive or proactive investigations The above investigations may fall into the following categories: • Incident investigations • Administrative enquiries • Background, financial, and lifestyle investigations Approach to investigations can be done in: • Constructive way • Reconstructive way The most important traits of investigators are; • Observation skills • Communication skills • Trustworthiness • Persistence • Ability to deal effectively with people • Self-motivating and Self-starting • Ability to multitask • Professional demeanor • Flexibility • Patience The qualities of an investigation: • Objectivity – • Thoroughness – Checking all leads and checking key leads more than once to ensure consistency • Relevancy – information gathered should be the subject of the investigation • Accuracy – • Timeliness – Ability to complete investigation on time. Documentation of investigation: • Report writing o Initial report.

Scene 17 (19m 43s)

[Audio] o Progress report o Special report o Final report • Elements of the report: o Administrative information o Summary o Narrative o Conclusion o Enclosures INDUSTRIAL SECURITY SURVEY Security survey is a critical and onsite examination to ascertain • present security status • identify deficiencies or excesses • determine the protection needed • Prepare recommendations to improve overall security of the organization. Uses of security survey • Establishment of policies and procedures • Protect against the internal and external theft • Develop access control procedures • Provide control over movement and identification of employees, visitors on company premises. • Review the selection, training, and deployment of security personnel • Assists in establishment of emergency and disaster plans • Identify the internal resources available and needed for the establishment of security program • Etc. SURVEILLANCE Surveillance is the monitoring of behavior of people, objects, or processes for conformity to expected or desired norms or desired norms for security and proper control..

Scene 18 (21m 10s)

[Audio] Ways of conducting surveillance properly: • Covert or overt surveillance • CCTV connected to recording systems and monitoring • Wiretapping or bugging but with a warrant and legally While doing surveillance, consider the following: • Always maintain a log of all the activities • Know the law of the land • Maintenances of confidentiality, means release of information on need to know basis • Cost of surveillance Surveillance is the visual monitoring of a location or individual to determine what activities or conduct is occurring. This visual monitoring is accompanied by a log, record of what is occurring within the surveillance area. This surveillance may be: • Stationary • Moving • Or combination of both. With an objective of detecting: • Commission of crime • Serious policy violation • Gathering intelligence • Preventing a crime • Etc. Surveillance can be done by: • Human eye.

Scene 19 (22m 29s)

[Audio] • By means of electronic and mechanical hardware. TERRORISM AND EXECUTIVE PROTECTION TERRORISM EXECUTIVE PROTECTION Executive protection is also called as VIP protection. Executive protection is service designed to protect • Guard entertainers • Wealthy persons • Top executives of any business groups • Top government executives • Threatened political leaders • Leaders of Government • Any individual whose personal security is endangered • Etc. Qualities of security personnel involved in VIP protection • Intelligence • Prompt and quick reaction • Good observation skills Executive protection includes protection at: • Residence • Transit • Office and at other destination TRAFFIC CONTROL • Identification of common space and private space • Identification of visitors, packages, and mail control • Sign in sheets and visitor passes are issued • Entrances to the complex: specific doors • Separate vehicle and truck entrances • Speed bumps, signs of access control, and parking lots • Designated parking for visitors, handicapped, employees, and trucks • Use of CCTV to take pictures of violators of traffic. WORKPLACE VIOLENT BEHAVIOR Workplace violence is violence or threat of violence against worker. It can range from threats and verbal abuse to physical assaults and homicide. Warning Signs:.

Scene 20 (24m 30s)

[Audio] 1. Threatening statements to kill/ harm self or other 2. Violent, reckless, or anti-social behavior 3. Drug abuse 4. Serious stress in their life 5. Confrontational, angry, easily provoked, unpredictable behavior 6. Fascination for fire arms Measures to be taken to prevent or reduce the workplace violence are: 1. Provide safety education 2. Provide secure working environment 3. Develop policies and procedures to address workplace violence 4. Encourage employees to report and record all incidents 5. Provide proper medical treatment after the incident 6. Investigate all incidents of threats CRIME SCENE PROCESS What constitutes crime scene? • Crime is the area where crime has been committed, the immediate area surrounding the scene. • A crime scene can be extended from the actual area in which the crime has occurred to any area where the suspect flees to or leaves the evidence. • Area where the evidence has been found Duties of security personnel at the crime scene: • Five first-aid to the victim if there is an injury • Protection crime scene to preserve the integrity of evidence and prevent it from contamination. • Shall not allow any individual to enter into the crime scene • Notifying the supervisor about the incident • Vehicle shall be allowed to parked away from the scene of crime • Document all the actions taken observations made at crime scene • Media shall not be allowed to cross the boundaries of crime scene • Photographing the crime scene for further investigations • Do not unnecessarily touch anything • Get names of all present at the scene COMPUTER SECURITY.

Scene 21 (26m 57s)

[Audio] Use of computers in present world for the processing and storage of information has become inevitable for its ease of access, storage, modify, copying, retrieving, etc. Since the information is the lifeblood of any business security of computers, equipment and its storage media requires attention. Potential threats for computer: • Acts of human error or failure • Compromises to information security • Deliberate acts of software attacks • Deliberate acts of sabotage or vandalism • Deliberate acts of theft • Technical and hardware failure • Forces of nature Best practices of computer security: • Physical security measures • Software controls • Hardware controls • Legal controls • Procedural controls • Etc. FIRST AID AND SECURITY PERSONNEL First aid is an initial or preliminary care given to an injured or sick person until professional treatment is accessed. First aid is an important and useful skill. Timely First aid can result in: • Preservation life • Prevention or mitigation of disability • Helps in recovery • Promotion of safety awareness • Identifying the safety concerns • Assistance in early rehabilitation.

Scene 22 (28m 34s)

[Audio] Basic principles of first aid: • Use of an adhesive bandage • Applying direct pressure on bleed • Cardiopulmonary resuscitation • Artificial respiration.

Scene 23 (28m 51s)

[Audio] • Snake bite and first aid. WEAPONS OF MASS DESTRUCTION Any weapon, explosive, incendiary device designed and manufactured to cause death, bodily injury through the release of toxic or poisonous chemicals, decease organism, radiation, at a level dangerous to human life and environment. Examples of weapons of mass destruction: 1. Nuclear weapons 2. Chemical weapons 3. Biological pathogens 4. Toxic chemicals 5. Biological toxins 6. Radioisotopes. INTERVIEWING PROCEDURES AND TECHNIQUES Interviewing is the conversation or questioning by an investigator with a witness or a suspect who has or believed to have information relevant to the subject matter of investigation. Key reasons for conducting interview: • To gather information to establish the facts • To verify information received from other sources • To identify additional witnesses • To identify persons responsible for the events or incidents • To secure additional evidence • To develop background information on the specifics of the event or offence • To eliminate suspects • To discover details of other offences Techniques of interviewing: • Establish a good rapport • Maintain a eye contact • Do not jump to conclusions.

Scene 24 (30m 40s)

[Audio] • Listen attentively • Be perceptive about every movement • As open ended questions that can't be answered with yes or no • Use silence to solicit a response to an interview • Have interviewee offer chronology of events • Test the veracity of interviewees responses by asking questions which you know answers • Discuss the seriousness or gravity of the incident • Request the interviewee to repeat his/her version of the events. • When appropriate, confront interviewee with information that you have gathered • Maintain control. Stages of Interview: • Approach: Starts with Greeting • Warm up: Establishing rapport • Start: Actual interview asking the witness or suspect to tell everything. • Direct Questioning: to clarify or reconcile inconsistencies and other queries • Ending: Completing the interviewing by summarizing and expressing sincere gratitude. RISK MANAGEMENT OPERATIONS Operational risk is the potential losses associated with operations or work. These risks and losses or vary from business to business, place to place, etc. The countermeasures are to be devised as per appropriateness and risk indicators. These losses may cause from: • Internal Causes o People o Processes o Systems • External causes The management of these risks is based on following tow basic factors: • Frequency of occurrence • Impact on business.

Scene 25 (32m 34s)

[Audio] The processes of management of risks are divided into following categories: • Risk identification • Risk assessment • Risk treatment o Risk avoidance o Risk mitigation o Risk sharing and transfer o Risk acceptance • Risk monitoring STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS Strike is concerted refusal by employees to continue working, in an attempt to force an employer to meet certain demands. Types of strikes: • Economic strike: dispute over wages and working conditions • Unfair labor practices strike: contention over unfair labor practices on the part of the employer Potential Dangers: • Violence • Damage Handling of strikes: • Pre strike planning • Strike operations • Post strike analysis and Evaluation Lockout is a work stoppage in which an employer prevents employees from working. Reason for lockout: • Financial losses • Inability of employer to continue the business • Prolonged refusal by employees to continue working by participating in strike and related activities. DRUG ABUSE Drug is substance by its chemical nature alters the structure or function of a living organism. Drug is any chemical substance that alters mood, perception or consciousness. If this drug is used for other than designated purposes will lead to apparent injury of self or society..

Scene 26 (34m 23s)

[Audio] Common Signs of drug abuse: • Changes in attendance and discipline • Changes in normal capabilities-work habits, efficiency, etc. • Poor physical appearance • Wearing sunglasses at inappropriate times to hide dilated or constricted pupils • Constantly wearing long-sleeve shirts to hide needle marks • Associating with known drug users • Stealing • Constant running nose or sniffing • Etc. Types of Drugs: • Narcotics – Natural and synthetic opiates • Depressants – induce sleep, relieve stress and allay anxiety • Sedatives - induce sleep, relieve stress and allay anxiety • Stimulants – reverse the effects of mental and physical fatigue • Hallucinogens – creates dream images and hallucinations. Prevention of drug abuse at workplace: • Having a written down policy • Awareness programs • Drug screening • Investigations reports of drug abuse • Employee assistance programs • Enforcing disciplinary action • Behavioral monitoring of suspected people • Etc. OBSERVATIONS TECHNIQUES The following observation techniques are required for security personnel, which will be useful for investigations, crime scene search, patrolling etc. • Patience • Alertness • Good Memory • Attention • Habit of observing details not generalities • Developing accurate sense of time, distance, speed, direction, age, etc..

Scene 27 (36m 24s)

[Audio] • Ability to distinguish between colors, tones, shades, shapes, etc. • Ability to visualize events • Ability to listen carefully and interpret sounds accurately • Ability to identify smells • Ability to recollect and visualize the past events • Ability to distinguish between various textures. EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH DEVICES An explosive is a material that produces sudden expansion of material usually accompanied by the production heat, pressure, and noise upon initiation. Explosives can be categorized as: • Low Explosives • High Explosives Low Explosives: Low explosive usually is a mixture of combustion material. The examples of low explosives normally are: • Gun powder • Yellow phosphorous • Mixture of Aluminum chloride andiron oxide • Potassium permanganate and glycerin • Potassium chlorate and sugar ignited by sulfuric acid • Pyro techniques • Illumination devices • Etc. High Explosives:.

Scene 28 (37m 50s)

[Audio] High explosives are normally employed in mining, demolition, and military warheads. These explosives are divided as follows: • Primary explosives These explosive are extremely sensitive to mechanical shock, friction, and heat, to which they will respond by burning rapidly or detonation. • Secondary explosives These explosives are relatively insensitive to shock, friction, and heat. They require a booster to cause an explosion. Examples of high explosives are: o Dynamite o TNT o RDX o PETN o HMX o Picric acid o Gun cotton o Fulminates • Tertiary explosives Explosive devices: The mechanisms for explosive devices are of two types: • Standard Mechanism – used by military operations personnel for war purposes • Improvised Mechanism – used by insurgents, terrorists, antisocial elements for the purpose of disturbance of peace process, personal gain, etc. IED: Stands for Improvised Explosive Device Components of IED: 1. Switch 2. Main explosive 3. Battery Detection Equipment: 1. Ion mobility spectrometry 2. X ray equipment 3. Fire arms and Explosive detector dog squads.

Scene 29 (39m 41s)

[Audio] The following procedures are to be followed in case of suspicious explosives are found in premises: 1. Do not touch or move the object further 2. Inform your supervisor/security officer about suspicious object 3. Restrict all access to the area 4. Turn off all Radio equipment, mobile phones, etc. 5. Place the placards or other signs indicating suspicious object 6. Evacuate the area 7. If the object is present in a room, open all doors and windows. 8. Do not allow any one to handle the object until the authorized bomb squad arrives. CROWD CONTROL AND MANAGEMENT Controlling of crowd is an important function of security. The planning to control crowd are based on the understanding of following points to take necessary measures. 1. Cultural issues 2. Political issues 3. Psychology of the crowd 4. Past experiences 5. Presence and possibility of terrorists and insurgents influence on area 6. Kind of VIPs are visiting the site 7. Access to weapons and other destructive material.

Scene 30 (41m 26s)

[Audio] 8. Etc. Preparations for crowd control issues: 1. Compartmentalization of the area 2. Vehicle parking 3. Fire brigade 4. Safety and Ambulance services 5. Sufficient no. of security personnel 6. Screening at entrances and emergency exits 7. Sign boards 8. Protection of VIPs, executives, etc. 9. Etc. MANAGING OF DISRUPTIVE PERSONS Handling of disruptive behavior quires training, awareness and experience on such incidents. Causes of disruptive behavior of employees at workplace: 1. Domestic and family issues carried to work spot 2. Drug abuse 3. Economical problems 4. Work environment 5. Religious, cultural, psychological issues 6. Absence of appropriate policies, code of conduct, and ethics. 7. Etc. Planning for prevention and handling of disruptive persons 1. Having clear policy on employee acceptable behavior, code of conduct, ethics, etc. 2. pre hire employee background screening 3. Employee assistance programs 4. Initiating investigations and taking appropriate disciplinary actions 5. Behavioral monitoring of employees by their supervisors 6. Proper reporting system of incidents 7. Training of security personnel in handling of disruptive persons 8. Safety of other employees 9. Security screening at entrances and other protection measures, etc. CRISIS INTERVENTION AND PLANNING Crisis means any kind of emergency which stops and obstructs work & operations of your employer and the client..

Scene 31 (44m 15s)

[Audio] This crisis may be of two types: 1. Natural 2. Human induced – Intentional 3. Human induced – accidental Planning for crisis can be done in three ways: 1. Pre-event • All measures of detection, prevention, and protection of assets. • If natural emergencies measures to optimize the loss control 2. During • Prevention of life • Attending the injured • Crowd control • Safe evacuation • Providing easy access to emergency vehicles • Protection of property from damage etc. 3. After • Restoration of normalcy • Aids in investigations • Etc. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN Crime prevention through environmental design is a concept of planning and designing area and built environment to reduce the incidence and fear of crime by implementing the following four concepts from planning stage to building construction stage. The concepts are: 1. Natural Surveillance – allowing movements of outsiders and intruders easily observable without any obstructions. 2. Territorial Reinforcement – developing a sense of territorial control by separating the private and public spaces, construction of fences, gateway procedures, etc. 3. Natural Access Control – Creating perception risk, easy detection, High probability of being caught, etc. 4. Target Hardening – installation of protection systems against possible intrusions by adversaries. DEFENCE TACTICS AND SAFETY OF SECURITY PERSONNEL.

Scene 32 (46m 26s)

[Audio] Security personnel are at times may confront with people who act and use aggressive tactics to accomplish their mission and achieve their objective. The following incidents where security personnel can use the defense tactics: 1. Conflict resolution 2. Obstruction of aggressive person from injuring co-employees and damaging the property. 3. Apprehension and detention of criminals 4. Weaponry awareness 5. Etc. The use of defense tactics requires the knowledge of local law section & clauses which address rights of private defense and exceptions. Defense tactics are: 1. Awareness of surroundings and recognition of harmful situations 2. Reduce the chances of incidence 3. Avoid the potentially harmful situation 4. Self defense techniques 5. Do not risk personal safety 6. Neutralizing the adversary 7. Etc. APPREHENSION & DETENTION Security may come across a situation where they have to apprehend and detain criminals till the arrival of local police. This requires knowledge on local law which addresses it and the duties, responsibilities of citizens and security personnel under such circumstances..

Scene 33 (48m 11s)

[Audio] The main points to be remembered while apprehending and detaining any suspect are: 1. Shall not use excessive physical force 2. Use of physical force ceases immediately persons under suspicion surrenders or on neutralizing. TESTIFYING IN COURTROOM At times security personnel will be called to court to depose witness statement in front of magistrates and judges. The following steps to be followed and points to be remembered while attending the court. 1. Go through the case file and refresh your knowledge on case. 2. Attire of security personnel should be professional 3. Do not talk with any defense lawyers and witnesses 4. Answer to the questions. Do not answer more than what you hare asked for. 5. Should be attentive and polite in courtroom while answering the questions. 6. Be watchful of bribery tactics 7. Etc..