Professional Documents
Culture Documents
Training Manual For SECURITY Guards
Training Manual For SECURITY Guards
Training Manual For SECURITY Guards
SECURITY
TRAINING
MANUAL Basic Guards
Training
Maj® Sharjeel
M/S FAMOUS SECURITY CO. (PVT.) LTD.
TABLE OF CONTENTS
1. INTRODUCTION TO SECURITY
2. ACCESS CONTROL
3. EFFECTIVE COMMUNICATIONS
4. ELECTRONIC ALARM SYSTEMS
5. EMERGENCY PLANNING
6. EMPLOYEE DISHONESTY
7. ETHICS
8. FIELD NOTES AND REPORT WRITING
9. FIRE PREVENTION AND DETECTION
10. HAZARDOUS MATERIAL
11. INTERNAL THREATS TO AN ORGANIZATION
12. PATROLLING TECHNIQUES
13. SECURITY PLANNING
14. SAFETY AT WORK
15. SECURITY AND PROTECTION AWARENESS
16. INVESTIGATIONS
17. INDUSTRIAL SECURITY SURVEY
18. SURVEILLANCE
19. TERRORISM AND EXECUTIVE PROTECTION
20. TRAFFIC CONTROL
21. WORKPLACE VIOLENT BEHAVIOR
22. CRIME SCENE PROCESS
23. COMPUTER SECURITY
24. FIRST AID AND SECURITY PERSONNEL
25. WEAPONS OF MASS DESTRUCTION
26. INTERVIEWING PROCEDURES AND TECHNIQUES
27. RISK MANAGEMENT OPERATIONS
28. STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS
29. DRUG ABUSE
30. OBSERVATIONS TECHNIQUES
31. EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH DEVICES
32. CROWD CONTROL AND MANAGEMENT
33. MANAGING OF DISRUPTIVE PERSONS
34. CRISIS INTERVENTION AND PLANNING
35. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
36. DEFENCE TACTICS AND SAFETY OF SECURITY
PERSONNEL
37. APPREHENSION & DETENTION
38. TESTIFYING IN COURTROOM
(Note: Review/update of this manual shall be done for every six months
to keep the document dynamic & current.)
INTRODUCTION TO SECURITY
DEFINITION OF SECURITY:
HISTORICAL PERSPECTIVE:
From the earliest times humans have recognized the need to protect
themselves, their family and their property. Like
Forming small groups and living together.
Maintaining order.
Recognizing the threats
Raising armies and their deployment in territorial boundaries.
Planning for security will be done by the following three steps:
Vulnerability analysis
Countermeasures planning and implementation
Through test of its operation
Factors considered for security planning:
Crimes and loss incidents
Social environment
Legal system
Loss prevention resources
ACCESS CONTROL
Access control is the ability to permit or deny
Access control programs are instituted to:
Permit or deny entry to or presence in a given place
Increase or reduce the rate or density of movement to, from, or
within a defined place.
Protect persons, materials, and information from unauthorized
observation or removal.
Prevent injury to people or damage to material.
Identity of employees or visitors can be determined by human or a
computer:
Security guards
Card reader systems
Biometric readers
EFFECTIVE COMMUNICATIONS
EMERGENCY PLANNING
Pressure
o Motivation
o Personal financial problems
o Drug abuse
o Etc.
Rationalization
o Environment in the corporation
o Present practices
ETHICS
Ethics are those rules of conduct by which all the security personnel
regulate their conduct among themselves with all other persons with
whom they deal in their regular performance of duties.
Security Personnel Shall:
Perform duties in accordance with the rules and regulations of
employer/client and the law of the land of Govt. of India.
Observe honesty, integrity, truthfulness, and politeness while
discharging their duties and responsibilities.
Safeguard the physical assets, information, etc., and exercise due
care to prevent it from damage and theft.
Protect the reputation of your employer and client.
Causes of Fire
Accidental
Natural
Arson -- criminal act
Fire detection systems working mechanisms:
Smoke
Gas
Heat
Fire inspections help in:
Prevent fire
Compliance to fire regulations and codes
Detects impending dangers
Detects in malfunctioning of equipment
Highlights the areas which requires attention
Highlights the places where portable fire extinguishers are
required.
Duties of fire inspectors should look for:
Adequate lighting in stairways and hallways
Emergency lighting
Accessibility of emergency exits
Availability of proper fire extinguishers
Usability of fire extinguishers
Posting of no smoking signs
Operational and properly placed exit signs
Rubbish accumulations and unsanitary conditions
Obstructed sprinkler heads
Improper storage of hazardous material
Etc.
HAZARDOUS MATERIAL
Any substance or material that poses an unreasonable risk to health,
safety, and property of people, animals, and environment.
How it is harmful to people?
Absorption
Inhalation
Ingestion
Injection
INTERNAL THREATS TO AN ORGANIZATION
In any organization first internal threat starts for people. They are:
Acts of Commission
Thefts and pilferage
Vandalism
Sabotage
Workplace violence
Arson
Bombing
Etc.
Acts of Omission
Violation of safety norms
Careless and reckless handling of operational and process
machinery
Routine maintenance of mechanical, electrical, and other
equipment.
Etc.
PATROLLING TECHNIQUES
1. Know your neighborhood
Familiarize with the area to be patrolled
i. Boundaries and adjoining areas
ii. Buildings
iii. Other installations
iv. Etc.
2. Patrol procedures
Purpose of patrolling
i. To prevent and discourage crime through visible
patrols
ii. To report suspicious activity and criminal activity
Be unsystematic in patrol routes. Do not patrol by
predesigned set pattern
Know probable critical and trouble spots
3. Observations to be made
Make notes immediately. Do not leave it to the memory
Be accurate in report writing
4. Reporting
Information regarding suspicious objects, places, safety and
persons.
Information on urgent matters should be reported
immediately
Do not leave your suspicion unreported
Patrol reports must be submitted in each patrol
immediately after completion
SECURITY PLANNING
1. Identification of assets, threats, risks, vulnerabilities as well as
such as operational issues, culture and cost.
2. Countermeasures are to be prepared to mitigate the
vulnerabilities.
3. Implementation of selected countermeasures
4. Ensuring that the effectiveness of countermeasures does not
deteriorate and that the solutions are adjusted to meet the ever
changing needs of security.
SAFETY AT WORK
A Condition of being safe and protection by activities of environment.
Safety can be ensured by regulating and controlling:
Human factors
Ergonomics
Stress at work
Diseases and conditions
First aid
Dangerous substances
Fire prevention
Electrical safety
Construction and contractor activities
Etc.
SECURITY AND PROTECTION AWARENESS
Security awareness is a state of mind when you are conscious of an
existing security program and its relevance to your behavior as well as
the effect of your behavior on reducing the security risks.
Purpose of awareness:
Understanding the relationship between the security and
successful operations
Know one’s obligations under the security program
Perceive the connection between the security program objectives
and selected security measures.
Be familiar with the sources of help and procedures under security
program.
Compliance.
Principles of training
I hear – I forget
I see – I remember
I do – I never forget
INVESTIGATIONS
An investigation is a process of gathering information which is not
publicly available and verify the truthfulness and accuracy of information
gathered or obtained.
Types of investigations:
Criminal and non criminal investigations
Covert or overt investigations
Reactive or proactive investigations
The above investigations may fall into the following categories:
Incident investigations
Administrative enquiries
Background, financial, and lifestyle investigations
Approach to investigations can be done in:
Constructive way
Reconstructive way
The most important traits of investigators are;
Observation skills
Communication skills
Trustworthiness
Persistence
Ability to deal effectively with people
Self-motivating and Self-starting
Ability to multitask
Professional demeanor
Flexibility
Patience
The qualities of an investigation:
Objectivity –
Thoroughness – Checking all leads and checking key leads more
than once to ensure consistency
Relevancy – information gathered should be the subject of the
investigation
Accuracy –
Timeliness – Ability to complete investigation on time.
Documentation of investigation:
Report writing
o Initial report
o Progress report
o Special report
o Final report
Elements of the report:
o Administrative information
o Summary
o Narrative
o Conclusion
o Enclosures
INDUSTRIAL SECURITY SURVEY
Security survey is a critical and onsite examination to ascertain
present security status
identify deficiencies or excesses
determine the protection needed
Prepare recommendations to improve overall security of the
organization.
Ways of conducting
surveillance properly:
Covert or overt surveillance
CCTV connected to recording systems and monitoring
Wiretapping or bugging but with a warrant and legally
While doing surveillance, consider the following:
Always maintain a log of all the activities
Know the law of the land
Maintenances of confidentiality, means release of information on
need to know basis
Cost of surveillance
Surveillance is the visual monitoring of a location or individual to
determine what activities or conduct is occurring.
This visual monitoring is accompanied by a log, record of what is
occurring within the surveillance area.
This surveillance may be:
Stationary
Moving
Or combination of both.
With an objective of detecting:
Commission of crime
Serious policy violation
Gathering intelligence
Preventing a crime
Etc.
Surveillance can be done by:
Human eye
By means of electronic and mechanical hardware.
TERRORISM AND EXECUTIVE PROTECTION
TERRORISM
EXECUTIVE PROTECTION
Executive protection is also called as VIP protection.
Executive protection is service designed to protect
Guard entertainers
Wealthy persons
Top executives of any business groups
Top government executives
Threatened political leaders
Leaders of Government
Any individual whose personal security is endangered
Etc.
Qualities of security personnel involved in VIP protection
Intelligence
Prompt and quick reaction
Good observation skills
Executive protection includes protection at:
Residence
Transit
Office and at other destination
TRAFFIC CONTROL
Identification of common space and private space
Identification of visitors, packages, and mail control
Sign in sheets and visitor passes are issued
Entrances to the complex: specific doors
Separate vehicle and truck entrances
Speed bumps, signs of access control, and parking lots
Designated parking for visitors, handicapped, employees, and
trucks
Use of CCTV to take pictures of violators of traffic.
WORKPLACE VIOLENT BEHAVIOR
Workplace violence is violence or threat of violence against worker. It
can range from threats and verbal abuse to physical assaults and
homicide.
Warning Signs:
1. Threatening statements to kill/harm self or other
2. Violent, reckless, or anti-social behavior
3. Drug abuse
4. Serious stress in their life
5. Confrontational, angry, easily provoked, unpredictable behavior
6. Fascination for fire arms
Measures to be taken to prevent or reduce the workplace violence are:
1. Provide safety education
2. Provide secure working environment
3. Develop policies and procedures to address workplace violence
4. Encourage employees to report and record all incidents
5. Provide proper medical treatment after the incident
6. Investigate all incidents of threats
Techniques of interviewing:
Establish a good rapport
Maintain a eye contact
Do not jump to conclusions
Listen attentively
Be perceptive about every movement
As open ended questions that can’t be answered with yes or no
Use silence to solicit a response to an interview
Have interviewee offer chronology of events
Test the veracity of interviewees responses by asking questions
which you know answers
Discuss the seriousness or gravity of the incident
Request the interviewee to repeat his/her version of the events.
When appropriate, confront interviewee with information that
you have gathered
Maintain control.
Stages of Interview:
Approach: Starts with Greeting
Warm up: Establishing rapport
Start: Actual interview asking the witness or suspect to tell
everything.
Direct Questioning: to clarify or reconcile inconsistencies and
other queries
Ending: Completing the interviewing by summarizing and
expressing sincere gratitude.
RISK MANAGEMENT OPERATIONS
Operational risk is the potential losses associated with operations or
work. These risks and losses or vary from business to business, place to
place, etc. The countermeasures are to be devised as per
appropriateness and risk indicators.
These losses may cause from:
Internal Causes
o People
o Processes
o Systems
External causes
The management of these risks is based on following tow basic factors:
Frequency of occurrence
Impact on business
The processes of management of risks are divided into following
categories:
Risk identification
Risk assessment
Risk treatment
o Risk avoidance
o Risk mitigation
o Risk sharing and transfer
o Risk acceptance
Risk monitoring
High Explosives:
Crisis means any kind of emergency which stops and obstructs work &
operations of your employer and the client.
This crisis may be of two types:
1. Natural
2. Human induced – Intentional
3. Human induced – accidental
Planning for crisis can be done in three ways:
1. Pre-event
All measures of detection, prevention, and protection of
assets.
If natural emergencies measures to optimize the loss
control
2. During
Prevention of life
Attending the injured
Crowd control
Safe evacuation
Providing easy access to emergency vehicles
Protection of property from damage etc.
3. After
Restoration of normalcy
Aids in investigations
Etc.
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
Crime prevention through environmental design is a concept of
planning and designing area and built environment to reduce the
incidence and fear of crime by implementing the following four
concepts from planning stage to building construction stage. The
concepts are:
1. Natural Surveillance – allowing movements of outsiders and
intruders easily observable without any obstructions.
2. Territorial Reinforcement – developing a sense of territorial
control by separating the private and public spaces, construction
of fences, gateway procedures, etc.
3. Natural Access Control – Creating perception risk, easy detection,
High probability of being caught, etc.
4. Target Hardening – installation of protection systems against
possible intrusions by adversaries.
DEFENCE TACTICS AND SAFETY OF SECURITY PERSONNEL
Security personnel are at times may confront with people who act and
use aggressive tactics to accomplish their mission and achieve their
objective. The following incidents where security personnel can use the
defense tactics:
1. Conflict resolution
2. Obstruction of aggressive person from injuring co-employees and
damaging the property.
3. Apprehension and detention of criminals
4. Weaponry awareness
5. Etc.
The use of defense tactics requires the knowledge of local law section &
clauses which address rights of private defense and exceptions.
Defense tactics are:
1. Awareness of surroundings and recognition of harmful situations
2. Reduce the chances of incidence
3. Avoid the potentially harmful situation
4. Self defense techniques
5. Do not risk personal safety
6. Neutralizing the adversary
7. Etc.
Security may come across a situation where they have to apprehend and
detain criminals till the arrival of local police.
This requires knowledge on local law which addresses it and the duties,
responsibilities of citizens and security personnel under such
circumstances.
The main points to be remembered while apprehending and detaining
any suspect are:
1. Shall not use excessive physical force
2. Use of physical force ceases immediately persons under suspicion
surrenders or on neutralizing.
TESTIFYING IN COURTROOM