Sei sulla pagina 1di 42

Black Belt Commandos Security System

Security Training Manual

SECURITY TRAINING MANUAL

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

TABLE OF CONTENTS

1. INTRODUCTION TO SECURITY
2. ACCESS CONTROL
3. EFFECTIVE COMMUNICATIONS
4. ELECTRONIC ALARM SYSTEMS
5. EMERGENCY PLANNING
6. EMPLOYEE DISHONESTY
7. ETHICS
8. FIELD NOTES AND REPORT WRITING
9. FIRE PREVENTION AND DETECTION
10. HAZARDOUS MATERIAL

11. INTERNAL THREATS TO AN ORGANIZATION

12. PATROLLING TECHNIQUES

13. SECURITY PLANNING

14. SAFETY AT WORK

15. SECURITY AND PROTECTION AWARENESS

16. INVESTIGATIONS

17. INDUSTRIAL SECURITY SURVEY

18. SURVEILLANCE

19. TERRORISM AND EXECUTIVE PROTECTION

20. TRAFFIC CONTROL

21. WORKPLACE VIOLENT BEHAVIOR

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

22. CRIME SCENE PROCESS

23. COMPUTER SECURITY

24. FIRST AID AND SECURITY PERSONNEL

25. WEAPONS OF MASS DESTRUCTION

26. INTERVIEWING PROCEDURES AND TECHNIQUES

27. RISK MANAGEMENT OPERATIONS

28. STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS

29. DRUG ABUSE

30. OBSERVATIONS TECHNIQUES

31. EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH


DEVICES
32. CROWD CONTROL AND MANAGEMENT

33. MANAGING OF DISRUPTIVE PERSONS

34. CRISIS INTERVENTION AND PLANNING

35. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN

36. DEFENCE TACTICS AND SAFETY OF SECURITY


PERSONNEL
37. APPREHENSION & DETENTION

38. TESTIFYING IN COURTROOM

(Note: Review/update of this manual shall be done for every six


months to keep the document dynamic & current.)

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

INTRODUCTION TO SECURITY

DEFINITION OF SECURITY:
“A condition of being protected from harm, injury, danger, losses,
criminals, threats, risks, etc.”

HISTORICAL PERSPECTIVE:
From the earliest times humans have recognized the need to protect
themselves, their family and their property. Like
• Forming small groups and living together.
• Maintaining order.
• Recognizing the threats
• Raising armies and their deployment in territorial boundaries.
Planning for security will be done by the following three steps:
• Vulnerability analysis

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Countermeasures planning and implementation


• Through test of its operation
Factors considered for security planning:
• Crimes and loss incidents
• Social environment
• Legal system
• Loss prevention resources

ACCESS CONTROL

Access control is the ability to permit or deny


Access control programs are instituted to:
• Permit or deny entry to or presence in a given place
• Increase or reduce the rate or density of movement to, from, or
within a defined place.
• Protect persons, materials, and information from unauthorized
observation or removal.
• Prevent injury to people or damage to material.
Identity of employees or visitors can be determined by human or a
computer:
• Security guards
• Card reader systems
• Biometric readers

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

EFFECTIVE COMMUNICATIONS

Communication is process of conveying information from a sender to


receiver with the use of a medium in which the communicated
information is understood the same way by both sender and receiver.

There are three general types of communication equipment are used


which communicates the audio and visual information by use of wired,
radio, and light as medium.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

ELECTRONIC ALARM SYSTEMS

A device which notifies designated people about the impending by way


of audible or visual signal.
Three general categories of devices are outlined based on what they
protect:
• Perimeter or point of entry
• General area or room
• Object

The following are the general sensor technologies used in alarm


systems:
• Passive infrared
• Glass break sensors
• Electro mechanical
• Ultrasonic or microwave
• Vibration or shock
• Photoelectric
• Audio
• Capacitance

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

EMERGENCY PLANNING

An emergency is a situation which poses immediate risk to health, life,


property, and environment.
Emergency planning will highlight the types of emergencies which the
organization likely to encounter and the emergency management team
may have to take counter measures or require them to consider in
advance for preventing or minimizing its adverse effects.

An emergency plan should accomplish the following:


• Define the emergency
• Organize a team with specific tasks to complete, before, during,
and after an emergency.
• Establish a method for using available resources
• Provide means to restore normal operations from the emergency
situation.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

Planning priorities
• Protect life
• Prevent or minimize injuries
• Reduce the exposure of assets
• Optimize the loss control whose exposure cannot be reduced.
• Restore the normal operations as quickly as possible.

EMPLOYEE DISHONESTY

Employee dishonesty is one of the most dangerous and difficult task to


detect and identify within any organization.
Employee dishonesty starts at:
• Accepting bribes
• Involving conflicts of interests
• Stealing from employers
• Breach of fiduciary relationship
• Etc.
Employee dishonesty starts in any corporation when the following
three elements are present:
• Opportunity
o Lack of controls like policies, procedures, and processes
o Inadequate of audits

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Pressure
o Motivation
o Personal financial problems
o Drug abuse
o Etc.
• Rationalization
o Environment in the corporation
o Present practices

ETHICS

Ethics are those rules of conduct by which all the security personnel
regulate their conduct among themselves with all other persons with
whom they deal in their regular performance of duties.
Security Personnel Shall:
• Perform duties in accordance with the rules and regulations of
employer/client and the law of the land of Govt. of India.
• Observe honesty, integrity, truthfulness, and politeness while
discharging their duties and responsibilities.
• Safeguard the physical assets, information, etc., and exercise
due care to prevent it from damage and theft.
• Protect the reputation of your employer and client.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

FIELD NOTES AND REPORT WRITING

It is remarkable how quickly how quickly human mind losses a


considerable part of its ability to recall the details of events accurately
he observed in the past. Hence the field note is the invaluable tool in
the hands of investigator.
An investigative report is the clear, comprehensive written document
of facts presented chronologically regarding a specific assignment and
from which the events of the events of the investigation can
reconstructed even after lapse of time.

A good report must be:


• In writing
• Told in first person narrative
• Objective
• Factual
• Chronological
• Easily understood
• Comprehensive
• Withstand the test of time
• No place for hypothesis or opinion

Patrolling:

• Foot Patrolling
• Mobile Patrolling
Why patrolling
• Hazards will be identified and reported
• Deficiencies in the protection program are highlighted
• Check on existing protection program.

The field notes include:

• Doors, windows, and other openings those are not secure.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Suspicious persons, vehicles, or circumstances.


• Disorder or unusual activity.
• Hazardous conditions.
• Any other special notices.

Report writing:
Reports can be classified as follows:

• Daily. Monthly, Quarterly and yearly reports.


• Preliminary reports
• Interim reports
• Special reports
• Final reports
Characteristics of report writing
• Accurate with relevant information
• Timeliness of information
• Concise
• Relevant

FIRE PREVENTION AND DETECTION

Ingredients of fire:
• Fuel
• Oxygen
• Heat
• Combustion

Causes of Fire
• Accidental
• Natural

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Arson -- criminal act

Fire detection systems working mechanisms:


• Smoke
• Gas
• Heat
Fire inspections help in:
• Prevent fire
• Compliance to fire regulations and codes
• Detects impending dangers
• Detects in malfunctioning of equipment
• Highlights the areas which requires attention
• Highlights the places where portable fire extinguishers are
required.

Duties of fire inspectors should look for:


• Adequate lighting in stairways and hallways
• Emergency lighting
• Accessibility of emergency exits
• Availability of proper fire extinguishers
• Usability of fire extinguishers
• Posting of no smoking signs
• Operational and properly placed exit signs
• Rubbish accumulations and unsanitary conditions

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Obstructed sprinkler heads


• Improper storage of hazardous material
• Etc.

HAZARDOUS MATERIAL

Any substance or material that poses an unreasonable risk to health,


safety, and property of people, animals, and environment.
How it is harmful to people?
• Absorption
• Inhalation
• Ingestion
• Injection

INTERNAL THREATS TO AN ORGANIZATION

In any organization first internal threat starts for people. They are:
• Acts of Commission
 Thefts and pilferage
 Vandalism

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

 Sabotage
 Workplace violence
 Arson
 Bombing
 Etc.
• Acts of Omission
 Violation of safety norms
 Careless and reckless handling of operational and process
machinery
 Routine maintenance of mechanical, electrical, and other
equipment.
 Etc.

PATROLLING TECHNIQUES

1. Know your neighborhood


• Familiarize with the area to be patrolled
i. Boundaries and adjoining areas

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

ii. Buildings
iii. Other installations
iv. Etc.
2. Patrol procedures
• Purpose of patrolling
i. To prevent and discourage crime through visible
patrols
ii. To report suspicious activity and criminal activity
• Be unsystematic in patrol routes. Do not patrol by
predesigned set pattern
• Know probable critical and trouble spots
3. Observations to be made
• Make notes immediately. Do not leave it to the memory
• Be accurate in report writing
4. Reporting
• Information regarding suspicious objects, places, safety
and persons.
• Information on urgent matters should be reported
immediately
• Do not leave your suspicion unreported
• Patrol reports must be submitted in each patrol
immediately after completion

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

SECURITY PLANNING

1. Identification of assets, threats, risks, vulnerabilities as well as


such as operational issues, culture and cost.
2. Countermeasures are to be prepared to mitigate the
vulnerabilities.
3. Implementation of selected countermeasures
4. Ensuring that the effectiveness of countermeasures does not
deteriorate and that the solutions are adjusted to meet the ever
changing needs of security.

SAFETY AT WORK

A Condition of being safe and protection by activities of environment.


Safety can be ensured by regulating and controlling:
• Human factors
• Ergonomics
• Stress at work
• Diseases and conditions
• First aid
• Dangerous substances
• Fire prevention
• Electrical safety
• Construction and contractor activities
• Etc.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

SECURITY AND PROTECTION AWARENESS

Security awareness is a state of mind when you are conscious of an


existing security program and its relevance to your behavior as well as
the effect of your behavior on reducing the security risks.
Purpose of awareness:
• Understanding the relationship between the security and
successful operations
• Know one’s obligations under the security program
• Perceive the connection between the security program objectives
and selected security measures.
• Be familiar with the sources of help and procedures under
security program.
• Compliance.
Principles of training
• I hear – I forget
• I see – I remember
• I do – I never forget

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

INVESTIGATIONS

An investigation is a process of gathering information which is not


publicly available and verify the truthfulness and accuracy of
information gathered or obtained.
Types of investigations:
• Criminal and non criminal investigations
• Covert or overt investigations
• Reactive or proactive investigations
The above investigations may fall into the following categories:
• Incident investigations
• Administrative enquiries
• Background, financial, and lifestyle investigations
Approach to investigations can be done in:
• Constructive way
• Reconstructive way
The most important traits of investigators are;
• Observation skills
• Communication skills
• Trustworthiness
• Persistence
• Ability to deal effectively with people
• Self-motivating and Self-starting
• Ability to multitask
• Professional demeanor
• Flexibility
• Patience
The qualities of an investigation:
• Objectivity –
• Thoroughness – Checking all leads and checking key leads more
than once to ensure consistency
• Relevancy – information gathered should be the subject of the
investigation
• Accuracy –

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Timeliness – Ability to complete investigation on time.

Documentation of investigation:
• Report writing
o Initial report
o Progress report
o Special report
o Final report
• Elements of the report:
o Administrative information
o Summary
o Narrative
o Conclusion
o Enclosures

INDUSTRIAL SECURITY SURVEY

Security survey is a critical and onsite examination to ascertain


• present security status
• identify deficiencies or excesses
• determine the protection needed
• Prepare recommendations to improve overall security of the
organization.

Uses of security survey


• Establishment of policies and procedures
• Protect against the internal and external theft
• Develop access control procedures
• Provide control over movement and identification of employees,
visitors on company premises.
• Review the selection, training, and deployment of security
personnel
• Assists in establishment of emergency and disaster plans

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Identify the internal resources available and needed for the


establishment of security program
• Etc.

SURVEILLANCE

Surveillance is the monitoring of behavior of people, objects, or


processes for conformity to expected or desired norms or desired
norms for security and proper control.

Ways of conducting
surveillance properly:
• Covert or overt
surveillance
• CCTV connected
to recording
systems and
monitoring
• Wiretapping or
bugging but with a warrant and legally
While doing surveillance, consider the following:
• Always maintain a log of all the activities
• Know the law of the land
• Maintenances of confidentiality, means release of information on
need to know basis
• Cost of surveillance

Surveillance is the visual monitoring of a location or individual to


determine what activities or conduct is occurring.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

This visual monitoring is accompanied by a log, record of what is


occurring within the surveillance area.

This surveillance may be:


• Stationary
• Moving
• Or combination of both.
With an objective of detecting:
• Commission of crime
• Serious policy violation
• Gathering intelligence
• Preventing a crime
• Etc.
Surveillance can be done by:
• Human eye
• By means of electronic and mechanical hardware.

TERRORISM AND EXECUTIVE PROTECTION

TERRORISM
EXECUTIVE PROTECTION

Executive protection is also called as VIP protection.


Executive protection is service designed to protect
• Guard entertainers
• Wealthy persons
• Top executives of any business groups
• Top government executives
• Threatened political leaders
• Leaders of Government
• Any individual whose personal security is endangered

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Etc.
Qualities of security personnel involved in VIP protection
• Intelligence
• Prompt and quick reaction
• Good observation skills
Executive protection includes protection at:
• Residence
• Transit
• Office and at other destination

TRAFFIC CONTROL

• Identification of common space and private space


• Identification of visitors, packages, and mail control
• Sign in sheets and visitor passes are issued
• Entrances to the complex: specific doors
• Separate vehicle and truck entrances
• Speed bumps, signs of access control, and parking lots
• Designated parking for visitors, handicapped, employees, and
trucks
• Use of CCTV to take pictures of violators of traffic.

WORKPLACE VIOLENT BEHAVIOR

Workplace violence is violence or threat of violence against worker. It


can range from threats and verbal abuse to physical assaults and
homicide.
Warning Signs:
1. Threatening statements to kill/harm self or other
2. Violent, reckless, or anti-social behavior
3. Drug abuse
4. Serious stress in their life
5. Confrontational, angry, easily provoked, unpredictable behavior
6. Fascination for fire arms
Measures to be taken to prevent or reduce the workplace violence are:
1. Provide safety education
2. Provide secure working environment

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

3. Develop policies and procedures to address workplace violence


4. Encourage employees to report and record all incidents
5. Provide proper medical treatment after the incident
6. Investigate all incidents of threats

CRIME SCENE PROCESS

What constitutes crime scene?


• Crime is the area where crime has been committed, the
immediate area surrounding the scene.
• A crime scene can be extended from the actual area in which the
crime has occurred to any area where the suspect flees to or
leaves the evidence.
• Area where the evidence has been found
Duties of security personnel at the crime scene:
• Five first-aid to the victim if there is an injury
• Protection crime scene to preserve the integrity of evidence and
prevent it from contamination.
• Shall not allow any individual to enter into the crime scene
• Notifying the supervisor about the incident
• Vehicle shall be allowed to parked away from the scene of crime
• Document all the actions taken observations made at crime
scene
• Media shall not be allowed to cross the boundaries of crime
scene
• Photographing the crime scene for further investigations
• Do not unnecessarily touch anything
• Get names of all present at the scene

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

COMPUTER SECURITY

Use of computers in present world for the processing and storage of


information has become inevitable for its ease of access, storage,
modify, copying, retrieving, etc. Since the information is the lifeblood
of any business security of computers, equipment and its storage
media requires attention.
Potential threats for computer:
• Acts of human error or failure
• Compromises to information security
• Deliberate acts of software attacks
• Deliberate acts of sabotage or vandalism
• Deliberate acts of theft
• Technical and hardware failure
• Forces of nature
Best practices of computer security:
• Physical security measures
• Software controls
• Hardware controls
• Legal controls

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Procedural controls
• Etc.

FIRST AID AND SECURITY PERSONNEL

First aid is an initial or preliminary care given to an injured or sick


person until professional treatment is accessed.
First aid is an important and useful skill. Timely First aid can result in:
• Preservation life
• Prevention or mitigation of disability
• Helps in recovery
• Promotion of safety awareness
• Identifying the safety concerns
• Assistance in early rehabilitation

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

Basic principles of first aid:


• Use of an adhesive bandage
• Applying direct pressure on bleed
• Cardiopulmonary resuscitation

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual


• Artificial respiration

• Snake bite and first aid.

WEAPONS OF MASS DESTRUCTION

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

Any weapon, explosive, incendiary device designed and manufactured


to cause death, bodily injury through the release of toxic or poisonous
chemicals, decease organism, radiation, at a level dangerous to human
life and environment.

Examples of weapons of mass destruction:


1. Nuclear weapons
2. Chemical weapons
3. Biological pathogens
4. Toxic chemicals
5. Biological toxins
6. Radioisotopes.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

INTERVIEWING PROCEDURES AND TECHNIQUES

Interviewing is the conversation or questioning by an investigator with


a witness or a suspect who has or believed to have information
relevant to the subject matter of investigation.
Key reasons for conducting interview:
• To gather information to establish the facts
• To verify information received from other sources
• To identify additional witnesses
• To identify persons responsible for the events or incidents
• To secure additional evidence
• To develop background information on the specifics of the event
or offence
• To eliminate suspects
• To discover details of other offences
Techniques of interviewing:
• Establish a good rapport
• Maintain a eye contact
• Do not jump to conclusions
• Listen attentively
• Be perceptive about every movement
• As open ended questions that can’t be answered with yes or no
• Use silence to solicit a response to an interview
• Have interviewee offer chronology of events
• Test the veracity of interviewees responses by asking questions
which you know answers
• Discuss the seriousness or gravity of the incident
• Request the interviewee to repeat his/her version of the events.
• When appropriate, confront interviewee with information that
you have gathered
• Maintain control.
Stages of Interview:
• Approach: Starts with Greeting
• Warm up: Establishing rapport
• Start: Actual interview asking the witness or suspect to tell
everything.
• Direct Questioning: to clarify or reconcile inconsistencies and
other queries

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Ending: Completing the interviewing by summarizing and


expressing sincere gratitude.

RISK MANAGEMENT OPERATIONS

Operational risk is the potential losses associated with operations or


work. These risks and losses or vary from business to business, place
to place, etc. The countermeasures are to be devised as per
appropriateness and risk indicators.
These losses may cause from:
• Internal Causes
o People
o Processes
o Systems
• External causes
The management of these risks is based on following tow basic factors:
• Frequency of occurrence
• Impact on business
The processes of management of risks are divided into following
categories:
• Risk identification
• Risk assessment
• Risk treatment
o Risk avoidance
o Risk mitigation
o Risk sharing and transfer
o Risk acceptance
• Risk monitoring

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS

Strike is concerted refusal by employees to continue working, in an


attempt to force an employer to meet certain demands.
Types of strikes:
• Economic strike: dispute over wages and working conditions
• Unfair labor practices strike: contention over unfair labor
practices on the part of the employer
Potential Dangers:
• Violence
• Damage
Handling of strikes:
• Pre strike planning
• Strike operations
• Post strike analysis and Evaluation
Lockout is a work stoppage in which an employer prevents employees
from working.
Reason for lockout:
• Financial losses
• Inability of employer to continue the business
• Prolonged refusal by employees to continue working by
participating in strike and related activities.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

ABUSE

Drug is substance by its chemical nature alters the structure or


function of a living organism. Drug is any chemical substance that
alters mood, perception or consciousness. If this drug is used for other
than designated purposes will lead to apparent injury of self or society.

Common Signs of drug abuse:


• Changes in attendance and discipline
• Changes in normal capabilities-work habits, efficiency, etc.
• Poor physical appearance
• Wearing sunglasses at inappropriate times to hide dilated or
constricted pupils
• Constantly wearing long-sleeve shirts to hide needle marks
• Associating with known drug users
• Stealing
• Constant running nose or sniffing
• Etc.
Types of Drugs:
• Narcotics – Natural and synthetic opiates
• Depressants – induce sleep, relieve stress and allay anxiety
• Sedatives - induce sleep, relieve stress and allay anxiety
• Stimulants – reverse the effects of mental and physical fatigue
• Hallucinogens – creates dream images and hallucinations.
Prevention of drug abuse at workplace:
• Having a written down policy
• Awareness programs
• Drug screening
• Investigations reports of drug abuse

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Employee assistance programs


• Enforcing disciplinary action
• Behavioral monitoring of suspected people
• Etc.

OBSERVATIONS TECHNIQUES

The following observation techniques are required for security


personnel, which will be useful for investigations, crime scene search,
patrolling etc.
• Patience
• Alertness
• Good Memory
• Attention
• Habit of observing details not generalities
• Developing accurate sense of time, distance, speed, direction,
age, etc.
• Ability to distinguish between colors, tones, shades, shapes, etc.
• Ability to visualize events
• Ability to listen carefully and interpret sounds accurately
• Ability to identify smells
• Ability to recollect and visualize the past events
• Ability to distinguish between various textures.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH DEVICES

An explosive is a material that produces sudden expansion of material


usually accompanied by the production heat, pressure, and noise upon
initiation.
Explosives can be categorized as:
• Low Explosives
• High Explosives
Low Explosives:
Low explosive usually is a mixture of combustion material. The
examples of low explosives normally are:
• Gun powder
• Yellow phosphorous
• Mixture of Aluminum chloride andiron oxide
• Potassium permanganate and glycerin
• Potassium chlorate and sugar ignited by sulfuric acid
• Pyrotechniques
• Illumination devices
• Etc.
High Explosives:

High explosives are normally employed in mining, demolition, and


military warheads. These explosives are divided as follows:

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

• Primary explosives

These explosive are extremely sensitive to mechanical shock,


friction, and heat, to which they will respond by burning rapidly or
detonation.

• Secondary explosives

These explosives are relatively insensitive to shock, friction, and


heat. They require a booster to cause an explosion. Examples of
high explosives are:
o Dynamite
o TNT
o RDX
o PETN
o HMX
o Picric acid
o Gun cotton
o Fulminates

• Tertiary explosives

Explosive devices:
The mechanisms for explosive devices are of two types:
• Standard Mechanism – used by military operations personnel for
war purposes
• Improvised Mechanism – used by insurgents, terrorists, antisocial
elements for the purpose of disturbance of peace process,
personal gain, etc.
IED: Stands for Improvised Explosive Device
Components of IED:
1. Switch
2. Main explosive
3. Battery

Detection Equipment:

1. Ion mobility spectrometry

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

2. X ray equipment
3. Fire arms and Explosive detector dog squads
The following procedures are to be followed in case of suspicious
explosives are found in premises:
1. Do not touch or move the object further
2. Inform your supervisor/security officer about suspicious object
3. Restrict all access to the area
4. Turn off all Radio equipment, mobile phones, etc.
5. Place the placards or other signs indicating suspicious object
6. Evacuate the area
7. If the object is present in a room, open all doors and windows.
8. Do not allow any one to handle the object until the authorized
bomb squad arrives.

CROWD CONTROL AND MANAGEMENT

Controlling of crowd is an important function of security. The planning


to control crowd are based on the understanding of following points to
take necessary measures.
1. Cultural issues
2. Political issues
3. Psychology of the crowd
4. Past experiences
5. Presence and possibility of terrorists and insurgents influence on
area
6. Kind of VIPs are visiting the site
7. Access to weapons and other destructive material

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

8. Etc.
Preparations for crowd control issues:
1. Compartmentalization of the area
2. Vehicle parking
3. Fire brigade
4. Safety and Ambulance services
5. Sufficient no. of security personnel
6. Screening at entrances and emergency exits
7. Sign boards
8. Protection of VIPs, executives, etc.
9. Etc.

MANAGING OF DISRUPTIVE PERSONS

Handling of disruptive behavior quires training, awareness and


experience on such incidents.
Causes of disruptive behavior of employees at workplace:
1. Domestic and family issues carried to work spot
2. Drug abuse
3. Economical problems
4. Work environment
5. Religious, cultural, psychological issues

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

6. Absence of appropriate policies, code of conduct, and ethics.


7. Etc.

Planning for prevention and handling of disruptive persons


1. Having clear policy on employee acceptable behavior, code of
conduct, ethics, etc.
2. pre hire employee background screening
3. Employee assistance programs
4. Initiating investigations and taking appropriate disciplinary
actions
5. Behavioral monitoring of employees by their supervisors
6. Proper reporting system of incidents
7. Training of security personnel in handling of disruptive persons
8. Safety of other employees
9. Security screening at entrances and other protection measures,
etc.

CRISIS INTERVENTION AND PLANNING

Crisis means any kind of emergency which stops and obstructs work &
operations of your employer and the client.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

This crisis may be of two types:


1. Natural
2. Human induced – Intentional
3. Human induced – accidental
Planning for crisis can be done in three ways:
1. Pre-event
• All measures of detection, prevention, and protection of
assets.
• If natural emergencies measures to optimize the loss
control
2. During
• Prevention of life
• Attending the injured
• Crowd control
• Safe evacuation
• Providing easy access to emergency vehicles
• Protection of property from damage etc.
3. After
• Restoration of normalcy
• Aids in investigations
• Etc.

CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN

Crime prevention through environmental design is a concept of


planning and designing area and built environment to reduce
the incidence and fear of crime by implementing the following
four concepts from planning stage to building construction
stage. The concepts are:
1. Natural Surveillance – allowing movements of outsiders and
intruders easily observable without any obstructions.
2. Territorial Reinforcement – developing a sense of territorial
control by separating the private and public spaces, construction
of fences, gateway procedures, etc.
3. Natural Access Control – Creating perception risk, easy detection,
High probability of being caught, etc.
4. Target Hardening – installation of protection systems against
possible intrusions by adversaries.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

DEFENCE TACTICS AND SAFETY OF SECURITY PERSONNEL

Security personnel are at times may confront with people who act and
use aggressive tactics to accomplish their mission and achieve their
objective. The following incidents where security personnel can use the
defense tactics:
1. Conflict resolution
2. Obstruction of aggressive person from injuring co-employees and
damaging the property.
3. Apprehension and detention of criminals
4. Weaponry awareness
5. Etc.
The use of defense tactics requires the knowledge of local law section
& clauses which address rights of private defense and exceptions.
Defense tactics are:
1. Awareness of surroundings and recognition of harmful situations
2. Reduce the chances of incidence
3. Avoid the potentially harmful situation
4. Self defense techniques
5. Do not risk personal safety
6. Neutralizing the adversary
7. Etc.
APPREHENSION & DETENTION

Security may come across a situation where they have to apprehend


and detain criminals till the arrival of local police.
This requires knowledge on local law which addresses it and the duties,
responsibilities of citizens and security personnel under such
circumstances.
The main points to be remembered while apprehending and detaining
any suspect are:
1. Shall not use excessive physical force
2. Use of physical force ceases immediately persons under
suspicion surrenders or on neutralizing.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
Black Belt Commandos Security System

Security Training Manual

TESTIFYING IN COURTROOM

At times security personnel will be called to court to depose witness


statement in front of magistrates and judges.
The following steps to be followed and points to be remembered while
attending the court.
1. Go through the case file and refresh your knowledge on case.
2. Attire of security personnel should be professional
3. Do not talk with any defense lawyers and witnesses
4. Answer to the questions. Do not answer more than what you
hare asked for.
5. Should be attentive and polite in courtroom while answering the
questions.
6. Be watchful of bribery tactics
7. Etc.

#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

Potrebbero piacerti anche