Professional Documents
Culture Documents
Validated CBLM
Validated CBLM
You may already have some or most of the knowledge and skills
covered in this learner's guide because you have:
been working for some time
already completed training in this area.
At the end of this module is a Learner’s Diary. Use this diary to record
important dates, jobs undertaken and other workplace events that will
assist you in providing further details to your trainer or assessor. A Record
of Achievement is also provided for your trainer to complete once you
complete the module.
This module was prepared to help you achieve the required competency
in Observing and Monitoring People. This will be the source of information
for you to acquire knowledge and skills in this particular trade
Talk to your trainer and agree on how you will both organize the
Training of this unit. Read through the module carefully. It is divided
into sections, which cover all the skills, and knowledge you need to
successfully complete this module.
Work through all the information and complete the activities in each
section. Read information sheets and complete the self-check.
Suggested references are included to supplement the materials
provided in this module.
Most probably your trainer will also be your supervisor or manager.
He/she is there to support you and show you the correct way to do
things.
Your trainer will tell you about the important things you need to
consider when you are completing activities and it is important that
you listen and take notes.
You will be given plenty of opportunity to ask questions and practice
on the job. Make sure you practice your new skills during regular
work shifts. This way you will improve both your speed and memory
and also your confidence.
Talk to more experience workmates and ask for their guidance.
Use the self-check questions at the end of each section to test your
own progress.
When you are ready, ask your trainer to watch you perform the
activities outlined in this module.
As you work through the activities, ask for written feedback on your
progress. Your trainer keeps feedback/ pre-assessment reports for
this reason. When you have successfully completed each element, ask
your trainer to mark on the reports that you are ready for assessment.
When you have completed this module (or several modules), and feel
confident that you have had sufficient practice, your trainer will
arrange an appointment with registered assessor to assess you. The
results of your assessment will be recorded in your competency
Achievement Record.
INTRODUCTION:
LEARNING OUTCOMES:
ASSESSMENT CRITERIA:
ASSESSMENT CRITERIA:
ASSESSMENT CRITERIA:
3.1 Unattended items are monitored and checked to establish whether they
pose a security threat.
3.2 Area is cordoned off and police notified where unattended items are
under suspicion.
3.3 Individuals or groups behaving in a suspicious and/or unusual manner
are identified and monitored according to agreed assignment
instructions.
3.4 Suspicious incidents are recorded using video surveillance tapes and/or
photographic evidence of persons, or other means as determined in
assignment instructions.
ASSESSMENT CRITERIA:
4.1 Commitment of an offense or behavior which constitutes an offense is
identified based on witness accounts or other information.
4.2 Proof of commitment of the offense is obtained to ensure proper
response.
4.3 Level of appropriate response is identified in accordance with applicable
laws pertaining to the surveillance operation.
4.4 Help of colleagues is enlisted in the operation as required.
4.5 Relevant authorities are notified if required
CONTENTS:
Writing materials
References
Handouts
METHODOLOGIES:
Lecture
Demonstration
Hands-on
ASSESSMENT METHODS:
Written test
Practical test
Observation
Oral questioning
Learning Objective:
After reading this information, you should be able to know the
meaning of surveillance and identify the different types of surveillance.
Types of surveillance
1. Computer surveillance
2. Telephones
The official and unofficial tapping of telephone lines. Mobile phones
are also commonly used to collect location data. The geographical location of
a mobile phone (and thus the person carrying it) can be determined easily
(whether it is being used or not), using a technique known as
multilateration to calculate the differences in time for a signal to travel from
the cell phone to each of several cell towers near the owner of the phone.
3. Surveillance cameras
5. Biometric surveillance
6. Aerial surveillance
8. Corporate surveillance
Corporate surveillance is the monitoring of a person or group's
behavior by a corporation. The data collected is most often used for
marketing purposes or sold to other corporations, but is also regularly
shared with government agencies. It can be used as a form of business
intelligence, which enables the corporation to better tailor their products
and/or services to be desirable by their customers.
9. Human operatives
Organizations that have enemies who wish to gather information
about the groups' members or activities face the issue of infiltration. In
addition to operatives' infiltrating an organization, the surveilling party may
exert pressure on certain members of the target organization to act
as informants (i.e., to disclose the information they hold on the organization
and its members)
As more people use faxes and e-mail the significance of surveilling the
postal system is decreasing, in favor of Internet and telephone surveillance.
But interception of post is still an available option for law enforcement and
intelligence agencies, in certain circumstances.
Learning Objective:
After reading this information, you should be able to define video
surveillance, differentiate the types of surveillance camera and know the
steps in preparing for a surveillance work.
Video surveillance is defined as the use of one or more cameras for the
purpose of monitoring an area or facility, in the interest of observation or
safety. Commonly, video surveillance is thought of as the tiny cameras
hidden in corners of shopping malls and supermarkets, but it's important to
realize that surveillance cameras are also used in the observation of
experiments and for public safety as well. It is used in order to survey areas
for security purposes. Usually these surveillance cameras are used in
shopping stores, fast food restaurants, convenience stores, airports, casinos,
military instillations and banks. They are there to document anything which
goes on in different areas within a control room mainly to guard and secure
sensitive areas.
Video cameras are either analogue or digital, which means that they
work on the basis of sending analogue or digital signals to a storage device
such as a video tape recorder or desktop computer or laptop computer.
Analogue
Digital
These cameras do not require a video capture card because they work
using a digital signal which can be saved directly to a computer.
Network
IP cameras or network cameras are analogue or digital video cameras,
plus an embedded video server having an IP address, capable of streaming
the video (and sometimes, even audio).
These cameras can be purchased in any high street shop and can take
excellent pictures in most situations. These cameras can be plugged into
the USB port of any computer (most of them now have USB capability) and
pictures can be taken of any camera scene. All that is necessary is for the
camera to be mounted on a wall bracket and pointed in the desired
direction.
Surveillance preparation:
a. CCTV
b. Still camera
c. Video camera
d. Floor plan or map
e. Pad and pencil
f. Two way radio (portable)
g. binoculars
Learning Objective:
WHAT IS CCTV?
1. Camera
The camera is the element which captures the image and transmits
the picture back to a monitor.
2. Lens
The camera needs a lens to be able to focus on the subject. There are
a wide variety of lenses to suit different applications.
3. Monitor unit
The monitor is the receiver unit which converts the captured image
into a picture, allowing you to see it.
Types of Images
CCTV cameras generally take both black and white or color video
images. In addition, many CCTV cameras even have night vision capabilities
that allow a CCTV camera to view and record low light images using special
technology.
Two main ways to record video images that CCTV cameras capture
Analogue tape
There are two types of DVRs (Digital Video Recorders). They are either stand
alone devices or hard drives that are connected to a computer system. DVRs
work similar to VCRs, but the images they capture from the CCTV camera is
digital. The amount of digital images captured on a DVR is determined by a
few factors including the frames per second recorded, the amount of
cameras hooked up to the DVR device, the resolution that the DVR saves
the images at, and the video compression used (e.g. MPEG4).
Matching type:
2. It is a policy or program
designed to prevent or control
crisis situations that may cause
B. Security control
harm to employees.
3. It is the systematic
observation of person, C. Simulated security
places, or things to obtain camera
information.
D. It is defined as the use of one
or more cameras for the
purpose of monitoring an
D. Surveillance system
area or facility, in the
interest of observation or
safety.
E. It is a series of monitoring
devices designed to check on
environmental conditions; a
closed –circuit television
system (CCTV) used to E. Surveillance
maintain close observation of
a person or a group.
1. C
2. B
3. E
4. A
5. D
Physical access
E. Intrusion Detection
One of the most important features of a guest room is the lock on the door.
Key control systems are used to ensure guest safety by changing the access
to a guest room between guests.
In the past, key control systems were limited to basic metal keys. These
were easily lost and costly to replace.
Key control systems eventually evolved into systems that were easier to
replace called key cards. These plastic keys resembled a playing card and
were filled with small holes on one end that the door lock could read when
inserted.
Upon departure, this card can be reprogrammed for a new guest and new
room. If lost, the information can be erased easily. Another benefit to this
key is that no guest room number is printed on them, therefore lost keys
pose no security risk.
A. Identify the following statement. Write the correct answer on the space
provided each number.
B. MATCHING TYPE: Match column A from Column B then write the letter
on the space provided
COLUMN A COLUMN B
____1. Rely on employees to challenge A. Install external
individuals with no visible Surveillance
badge or credentials. B. Intrusion Detection
____2. Use metal detectors/x-ray C. Maintain control of
machines to screen personnel, everyone entering the
visitors, and bags. facility
____3. Install closed-circuit television D. Prevent unauthorized
(CCTV) to observe your facility people from entering
externally and actively monitor facility
its view of critical spaces. E. Provide obstacles and
____4. Install a security alarm barriers
system
_____5. Enforce display of badge for
employees while at work.
______1. Keys for lockers and cabinets should be under the custody of
designated chief security.
_______ 5. Desk clerk should give the room key only to a registered
occupant, if in doubt, ask the guest for his ID
A.
1. Access control
2. Credential
3. Access control system
4. Electronic access control
B.
1. D
2. B
3. A
4. E
5. C
C.
1. F
2. T
3. T
4. F
5. T
However, they also raise privacy concerns and require strict adherence
to legal requirements.
2. Theft Prevention
3. Personal Safety
Security cameras can help to prevent violence and help employees feel
safer, especially if the footage is continually monitored by security guards.
To help prevent violence it is important that security cameras cover areas
that are minimally frequented and where an attack may be more likely to
occur. Because violence can also be caused by non-employees, it may be
helpful to monitor entrances to the building.
1. Date of incident
2. Time when incident was detected
3. Place of Occurrence
4. Victim(s)
5. Suspect(s)
6. Description of Incident
Sample Form
Victim/s: None
Learning Outcome:
Learning Activity:
Steps/Procedure:
1. Check that there are no worn-out power cord and damaged power
outlet to ensure safety before using.
2. Insert power cord to power outlet; use adaptor if the male plug is 3-
legged and the outlet is a 2 ganged hole outlet.
3. Press POWER on. First, the Auto Voltage Regulator (AVR) followed by
the Video Monitor.
4. Press REC button to start recording. Observe the images in the video
monitor for at least 5 minutes. Fill-in the suspicious incident form.
Press again REC button to stop recording.
5. Press PLAY button to start playing back the most recently recorded
segment. Press PLAY to stop playing back.
6. Press ENTER/MODE button to switch to full screen or quad display.
7. Press ESC to return to last menu
8. Press POWER off. Video Monitor – AVR.
9. Remove power cord from the power outlet by holding the plug firmly.
Note: A slide presentation and a video clip can be viewed to visualize the
actual operation.
CRITERIA YES NO
Performance Objective:
Steps/ Procedure:
Assessment Method:
Performance Objective:
Equipment:
Steps/ Procedure:
2. If the person is looking for anyone, do not give the room number.
“Excuse me sir. Are you looking for someone?”
3. Once the visitor mentions the name of a person he wants to see, tell
him to get seated at the lounge and to wait while you check with the
guest. (this is needed for him to hear your conversation with guest as
you check if he/she wants to see the visitor). “Sir/Ma’am. Do you
mind waiting in our, lounge and I’ll find out if _____is around.
Assessment Method:
CRITERIA YES NO
Figure 1.
SNSAT MINI-HOSTEL
Bomb Threat Call Sheet
Telephone Exchange Section
Characteristics of Caller
Sex _____ Voice/Sign language _______________
Temperament/disposition/others _____________________
Other observations:
____________________________________________________________________
_______________________________________________________
Performance Objective:
Information sheet 3-4-1, sample suspicious objects, bomb threat call sheet
Equipment:
Steps/ Procedure:
2. In the event that a suspicious object is found in the premises of the hotel,
the following shall be undertaken:
Do not touch the object nor open it for it may explode.
Report to the security officer or duty manager
Security office or duty manager will coordinate with bomb experts
to check the object
Assessment Method:
CRITERIA YES NO
1.Report suspicious looking persons or objects
immediately to the security officer or duty manager
for proper investigation
Introduction to Front Office and Hotel Operations by: Amelia Samson Roldan;
2008 ed.