Professional Documents
Culture Documents
Module 4 - 4.1 - Surveillance and Patrol Techniques: Specific Duties of A Security Guard
Module 4 - 4.1 - Surveillance and Patrol Techniques: Specific Duties of A Security Guard
Module 4 - 4.1 - Surveillance and Patrol Techniques: Specific Duties of A Security Guard
1) Static
2) Patrol
Static duties are those duties that a Security guard does in one place usually at a
fixed post or location (e.g., building lobby entrances or gatehouses)
Patrol duties enable a guard to become aware of any problems that may happen
in a client (whether that may be an individual’s property OR a company’s
property) and guards develop solutions to prevent such problems from
happening.
The skills needed to accomplish the tasks (mentioned above) are varied, however
there are certain common skills:
Protecting buildings and grounds including all contents, occupants, and visitors.
Enforcing rules and regulations related to security in and around the site.
Directing both foot and vehicular traffic in and around the site.
Being familiar with all special and general orders relevant to the site.
Supervising and enforcing all systems designed to monitor or identify personnel and
vehicles entering the site or sectors within the site.
Conducting inspections of packages and vehicles as required.
Controlling access of people, product, and vehicles onto the site, exiting the site and
within the site.
Conducting and reviewing safety inspections of all areas of the site.
Maintaining the orderly operation of the site relative to its on-going safe operation.
Recording and reporting all relevant information pertaining to the security of
people, products, and vehicles to the security supervisor or, where so designated,
the client’s representative.
Post orders:
The post order (or site order) is a document that delegates the task of security
from the property owner to the Security Guard. The delegated authority includes
the functions the Guard needs to do AND the methods to be used while
performing these functions. Post orders contain procedures, directives or
instructions that are likely to be altered, deleted, or reviewed as required.
OPENING LETTER: should provide authority from the property management and
provide a few details about the purpose and scope of objectives of the orders.
(d) SECURITY FORCE OPERATIONS: should include a schedule of the hours that
each Security Guard is to work, the location of each post should be shown in this
section as well as a brief description of the duties expected of each Security
Guard.
(e) REPORTS: should indicate what type of report is required at the end of each
shift, as well as acknowledging reports submitted by Security Guards regarding
such matters as building security.
(f) RESTRICTED AREAS: Post orders will usually contain policies or provisions on all
restricted areas within a facility. Some of these areas will be restricted to
employees only. Documents and photographs should be kept on hand and
checked prior to allowing individuals to enter restricted areas.
High visibility patrols focus on making the Guard more visible to the people
around them. By increasing the physical security presence of the guard on site,
we effectively deter many illicit activities simply by increasing the likelihood that
the offender will be identified and apprehended for his or her crimes.
Fixed Post:
The fixed post is usually located at a point where both pedestrians and vehicles
can be checked before they are allowed to enter or leave a facility. Other duties
for a fixed post may include the following: guarding a vulnerable point, control of
access, surveillance of some apparatus or certain installations, and identification
control.
Patrol Post
If a Security Guard is assigned to a patrol, he or she will be required to perform
the patrol of the designated area and return to the post when finished. This is
known as “double duty”. To carry out this type of patrol, the guard must move
about normally, following a prescribed frequency, covering the points to be
checked. The guard must give a detailed report of these rounds, drawing
attention to abnormal events and actions noted in each round tour.
Vehicle Patrol
This type of patrol is for areas that are to big to be covered on foot. The vehicles
are usually equipped with radios or mobile telephones and commonly are in
constant communication with the dispatcher. Precise instructions are given about
the type of patrol required. The patrols will often include parking lots, storage
yards, perimeter fence lines, outer perimeters and areas that are impractical to
patrol on foot. When on vehicle patrol, guards may be required to transport, in
emergencies, sick or injured persons to First-Aid stations and/or hospitals.
The first time that a patrol is made, security may focus on breaches of the
property by an intruder; the second time, to make sure that the safety equipment
on machinery in the area is functioning properly; the third time, to check again for
intruders and breaches of the work site, and so on.
Foot Patrol
“An alert guard on foot patrol has a better chance to prevent crime and make
apprehensions at the scene of crimes in progress than do motorized patrol
guards.”
Foot patrol is the most common method of patrol in the security industry. It is
normally utilized where it is not possible to provide the same protective coverage
through other methods such as motorized patrol or electronic surveillance.
Virtually all the senses of the Security Guard (sight, hearing, smell, and touch)
may conceivably be used during foot patrol.
Advantages:
Is highly visible.
Makes more person-to-person contact and therefore has a greater
opportunity to improve security via community relations.
Because the patrol guard knows more people on the beat, there are
more opportunities to develop sources of information.
Greater familiarity with the physical characteristics of the beat, such as
places for offenders to hide and danger zones.
Knowledge of patterns and characteristics of an area may help to
anticipate an incident before it becomes more difficult to control.
All senses may be used.
Ability to access smaller spaces such as stairwells.
Vehicular Patrol
Patrol from a vehicle, (bicycle, motorbike, car etc.,). This enables a Security Guard
to conduct his or her duties by undertaking a more brief visual check of the area
he or she is assigned to protect.
Advantages:
Motor patrol is highly visible.
Larger areas can be covered in a shorter period of time.
Speed in responding to other areas of the site increased.
Additional equipment may be carried.
Protection from foul weather – rain, snow, extreme temperature.
Surveillance:
Access and egress (entry and exit) of the site readily controlled.
Difficult for individuals to enter the premises and physically attack the
guard.
Guard station or highly visible camera placement acts to deter would-be
perpetrators.
Lower number of guards required to contain the area.
Access control mechanisms control the entry and exit of people onto the property
or into specific areas of the property. There are many devices available for use as
access control mechanisms including card readers, touch keys, ID cards, badges,
and fingerprint ID.
Personnel recognition – This is often used at small sites. You let in only people
who you recognize.
ID systems – Many government offices use this method. All employees show you
an ID card before entering. You check each ID card carefully.
Things to look for are:
a coloured photo and physical description of the holder;
the full name and signature of the holder;
the company’s name and an issuing authority’s signature;
an expiry date;
a serial number (for the card itself or an employee number).
At Medium access sites a security guard does not always control access.
Employees Let themselves in and out. There are many ways this can occur
1) Keys
2) Touch keypads
3) ID card tags
4) Proximity cards
5) Biometric identification
6) Radio Frequency Identification
7) Keys and Locking Systems
8) Timed Locks
9) Ticket Machines
1) Secret
- Unauthorized disclosure would endanger national security, cause serious
injuries to the interest or prestige of the nation or any government activity
thereof, or would be of great advantage to a foreign nation.
2) Confidential
- Unauthorized disclosure would be prejudicial to the interest or prestige of
the nation or any government activity, or be of an advantage to a foreign
power, individual personal files may be accorded the protection of this
classification.
3) Top Secret
- Unauthorized disclosure would cause exceptionally grave damage to the
nation.
4) Restricted
- Should not be published or communicated to anyone except for official
purposes. In industry, similar classifications are used to identify information
and material that must be kept from competitors and the public.
Computer crime
Computer crime refers to stealing or damaging computer information. When this
occurs watch for:
Employees who are angry at the company or who have been recently
fired.
Private information such as pass codes that have been left out in an area
where they can easily be seen.
People using computers that belong to someone else.
Someone who works at home a lot and comes into work at odd hours or
at times when you don’t expect them.
Employees who arrive early or leave late but don’t seem to do much
company work during these times.
Employees who talk too freely about things that should be kept
confidential.
Computer security
Protecting computers and the programs they contain is a unique challenge. With
every technological change improving computers and the services they provide,
there are new dangers to be faced. These dangers include:
Theft of computers.
Theft or piracy of software.
Industrial espionage (theft of ideas or products).
Mischief or damage to computers.
4.4 – Crowd Control
There are various psychological factors that cause crowds of people to go from peaceful to
disorderly (caused by a snowball affect). This snowball affect is caused by certain psychological
factors:
1) Security
2) Suggestion
3) Novelty
4) Loss of Identity
5) Release of emotionsi
- Weather conditions
5) BE FLEXIBLE
- Protect pedestrians, paying special attention to children and those with
physical or mental challenges such as vision or hearing impairment.
SCENE MANAGEMENT:
In the above list for point number 5, you want to record as much information as
possible including:
name, address, and workplace of each driver.
time, date, and exact location of the accident.
registration numbers, makes and years of vehicles.
driver’s insurance company details.
names of witnesses. You should also get contact information and a
statement if they will provide one to you.
description of accident and damage.
diagram showing where the vehicles and/or pedestrians were coming
from and where they hit each other.
details of any injuries and what action was taken.
any conditions that may have contributed to the accident such as an
emergency, weather, road conditions, construction, etc.
any unusual or strange things that are said by either party in the
accident. These could be very important for further investigation.
any observations that you make of the scene. For example, did a beer
can fall out when the driver got out of the vehicle? Be very careful to
record only what you observe and not what you think is happening.
Do not jump to conclusions or speculate on what you see.
pictures of the scene and evidence. This may be important for
investigations.
The most dangerous time of the day from a security standpoint is during shift
handover. Keep the following in mind during changeovers:
1) Take your time
2) Sign or initial everything your read
3) Take Inventory
4) Test Equipment
5) Begin your report
6) Check your keys
7) Never take your eyes away from your duties
8) Sign in
Crime is about having the opportunity and availability to commit the offence. By
focusing diligently on efforts during shift changeover, we can ensure that there
are no deficiencies in perimeter security.
4.7 - Drug effects
Security Guards may encounter individuals under the influence of drugs or
alcohol. They need to be aware of the signs of substance abuse as well as the
impact of different drugs on human behaviour (e.g., suspect going through
withdrawal) to deal with these individuals in a manner that will you and the
suspect safe.
Alcohol addiction and drug addiction have some similarities to them; however,
alcohol addiction is a serious disorder.
Another issue is to note the widespread of drugs and their interactions with
psychological addiction. People suffering from Bulimia, Anorexia, or other eating
disorders may turn to these pills as a form of weight loss.
Alcoholism
People who are heavily addicted to alcohol, may turn to alcohol to be a relaxant.
All over the country, treatment centers for alcoholics have sprung up, and much
good is being done by organiztions such as Alcoholics Anonymous (A.A.).
When handling these situations use mature judgement rather than blind application!
Drug addiction
There are 1 of 2 reasons people take drugs: either it is prescribed to them by a
doctor to help cure a psychological disorder OR the drugs create a pleasurable
effect. (Heroin vs. Tylenol for example) Mildly addictive drugs such as Codeine
(Pain killer), together with drugs like cocaine and marijuana and weed, are
commonly known as “Hard” and Soft Drugs. People who are addicted to hard
drugs over time build a tolerance to them. If there need are not met they will face
withdrawal symptoms.
The laws provide heavy penalties for those convicted of illegal use, possession, or
sale of drugs. The need for these laws is since the use of drugs is likely to lead first
to habituation, then to tolerance, and finally to dependence.
1) Habituation
- The tendency to become mentally dependent upon a drug so that a person
believes he cannot get along without it. However, no physical symptoms or ill
effects result when he/she can no longer have the drug.
2) Tolerance
- The fact that larger and larger amounts of the drug must be taken to produce the desired
mental/physical effect.
3) Dependance
- A state when the body has become so dependent upon the drug that when
the drug is withdrawn the person suffers agonies and there are symptoms
such as vomiting and profuse sweating. When dependence is severe, sudden
withdrawal of the drug may even result in death.
There are essentially three categories of drugs commonly dealt with by security
personnel while working: Narcotic Drugs, Psychotropic Drugs, and Inhalants and
Alternative Substances.
Narcotics
This kind of drug includes several illicit types of drugs that have an addictive
quality in them, such as: cannabis, meth, opium, heroin, cocaine, nicotine, and
morphine (not limited to these).
Psychotropic substances
Inhalants are Inhalants are substances that give off poisonous vapors that can be
inhaled such as organic solvents (cleaning products, adhesives, nail polish
removers), fuels (in many cases these are used for medical purposes, such as a
dentist using nitrous oxide on patients requiring surgery).
MDMA/Ecstasy
MDMA is taken orally, usually in a tablet or a capsule. When ecstasy is taken by
mouth, the effects manifest in about 30-45 minutes. MDMA’s effect last
approximately 3 to 6 hours.
MDMA can be extremely dangerous in high doses. It can cause a marked increase
in body temperature (malignant hyperthermia) leading to the muscle breakdown
and kidney and cardiovascular system failure reported in some fatal cases at
raves. MDMA use may also lead to heart attacks, strokes, and seizures in some
users. The characteristics and warning signs of an overdose include:
Treatment:
If you are with someone who is overdosing on drugs and/or alcohol, and they
start to experience a bad trip or become nervous, anxious and panicky, take them
away from the lights and noise and sit with them in a quieter area. Chat to them,
calm them down and give them support. If things are getting worse send a friend
to get help. First Aid treatment is necessary in the case of an overdose. Follow
these steps: