Upload
augustine-prashanth
View
226
Download
0
Embed Size (px)
Citation preview
8/8/2019 Security Training Manual
1/42
Black Belt Commandos Security System
Security Training Manual
SECURITY TRAINING MANUAL
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
2/42
Black Belt Commandos Security System
Security Training Manual
TABLE OF CONTENTS
1. INTRODUCTION TO SECURITY
2. ACCESS CONTROL
3. EFFECTIVE COMMUNICATIONS
4. ELECTRONIC ALARM SYSTEMS
5. EMERGENCY PLANNING
6. EMPLOYEE DISHONESTY
7. ETHICS
8. FIELD NOTES AND REPORT WRITING
9. FIRE PREVENTION AND DETECTION
10. HAZARDOUS MATERIAL
11. INTERNAL THREATS TO AN ORGANIZATION
12. PATROLLING TECHNIQUES
13. SECURITY PLANNING
14. SAFETY AT WORK
15. SECURITY AND PROTECTION AWARENESS
16. INVESTIGATIONS
17. INDUSTRIAL SECURITY SURVEY
18. SURVEILLANCE
19. TERRORISM AND EXECUTIVE PROTECTION
20. TRAFFIC CONTROL
21. WORKPLACE VIOLENT BEHAVIOR
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
3/42
Black Belt Commandos Security System
Security Training Manual
22. CRIME SCENE PROCESS
23. COMPUTER SECURITY
24. FIRST AID AND SECURITY PERSONNEL
25. WEAPONS OF MASS DESTRUCTION
26. INTERVIEWING PROCEDURES AND TECHNIQUES
27. RISK MANAGEMENT OPERATIONS
28. STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS
29.DRUG ABUSE
30. OBSERVATIONS TECHNIQUES
31. EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH
DEVICES
32. CROWD CONTROL AND MANAGEMENT
33. MANAGING OF DISRUPTIVE PERSONS
34. CRISIS INTERVENTION AND PLANNING
35. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
36. DEFENCE TACTICS AND SAFETY OF SECURITY
PERSONNEL
37. APPREHENSION & DETENTION
38. TESTIFYING IN COURTROOM
(Note: Review/update of this manual shall be done for every six
months to keep the document dynamic & current.)
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
4/42
Black Belt Commandos Security System
Security Training Manual
INTRODUCTION TO SECURITY
DEFINITION OF SECURITY:A condition of being protected from harm, injury, danger, losses,criminals, threats, risks, etc.
HISTORICAL PERSPECTIVE:From the earliest times humans have recognized the need to protect
themselves, their family and their property. Like Forming small groups and living together.
Maintaining order.
Recognizing the threats
Raising armies and their deployment in territorial boundaries.Planning for security will be done by the following three steps:
Vulnerability analysis
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
5/42
Black Belt Commandos Security System
Security Training Manual
Countermeasures planning and implementation
Through test of its operation
Factors considered for security planning: Crimes and loss incidents
Social environment
Legal system
Loss prevention resources
ACCESS CONTROL
Access control is the ability to permit or denyAccess control programs are instituted to:
Permit or deny entry to or presence in a given place
Increase or reduce the rate or density of movement to, from, orwithin a defined place.
Protect persons, materials, and information from unauthorizedobservation or removal.
Prevent injury to people or damage to material.Identity of employees or visitors can be determined by human or acomputer:
Security guards
Card reader systems
Biometric readers
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
http://en.wikipedia.org/wiki/Image:NewYorkCitySubwayEntranceInterior.jpg8/8/2019 Security Training Manual
6/42
Black Belt Commandos Security System
Security Training Manual
EFFECTIVE COMMUNICATIONS
Communication is process of conveying information from a sender toreceiver with the use of a medium in which the communicatedinformation is understood the same way by both sender and receiver.
There are three general types of communication equipment are usedwhich communicates the audio and visual information by use of wired,radio, and light as medium.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
http://en.wikipedia.org/wiki/Image:Encoding_communication.jpghttp://upload.wikimedia.org/wikipedia/en/b/b0/Communication_emisor.jpg8/8/2019 Security Training Manual
7/42
Black Belt Commandos Security System
Security Training Manual
ELECTRONIC ALARM SYSTEMS
A device which notifies designated people about the impending by wayof audible or visual signal.
Three general categories of devices are outlined based on what theyprotect:
Perimeter or point of entry
General area or room
Object
The following are the general sensor technologies used in alarmsystems:
Passive infrared
Glass break sensors
Electro mechanical Ultrasonic or microwave
Vibration or shock
Photoelectric
Audio
Capacitance
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
8/42
Black Belt Commandos Security System
Security Training Manual
EMERGENCY PLANNING
An emergency is a situation which poses immediate risk to health, life,property, and environment.Emergency planning will highlight the types of emergencies which theorganization likely to encounter and the emergency management teammay have to take counter measures or require them to consider inadvance for preventing or minimizing its adverse effects.
An emergency plan should accomplish the following:
Define the emergency
Organize a team with specific tasks to complete, before, during,and after an emergency.
Establish a method for using available resources
Provide means to restore normal operations from the emergencysituation.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
9/42
Black Belt Commandos Security System
Security Training Manual
Planning priorities
Protect life
Prevent or minimize injuries
Reduce the exposure of assets
Optimize the loss control whose exposure cannot be reduced. Restore the normal operations as quickly as possible.
EMPLOYEE DISHONESTY
Employee dishonesty is one of the most dangerous and difficult task todetect and identify within any organization.Employee dishonesty starts at:
Accepting bribes
Involving conflicts of interests
Stealing from employers
Breach of fiduciary relationship
Etc.Employee dishonesty starts in any corporation when the followingthree elements are present:
Opportunityo Lack of controls like policies, procedures, and processes
o Inadequate of audits
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
10/42
Black Belt Commandos Security System
Security Training Manual
Pressureo Motivation
o Personal financial problems
o Drug abuse
o Etc.
Rationalizationo Environment in the corporation
o Present practices
ETHICS
Ethics are those rules of conduct by which all the security personnelregulate their conduct among themselves with all other persons withwhom they deal in their regular performance of duties.Security Personnel Shall:
Perform duties in accordance with the rules and regulations ofemployer/client and the law of the land of Govt. of India.
Observe honesty, integrity, truthfulness, and politeness whiledischarging their duties and responsibilities.
Safeguard the physical assets, information, etc., and exercisedue care to prevent it from damage and theft.
Protect the reputation of your employer and client.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
11/42
Black Belt Commandos Security System
Security Training Manual
FIELD NOTES AND REPORT WRITING
It is remarkable how quickly how quickly human mind losses aconsiderable part of its ability to recall the details of events accuratelyhe observed in the past. Hence the field note is the invaluable tool inthe hands of investigator.An investigative report is the clear, comprehensive written documentof facts presented chronologically regarding a specific assignment andfrom which the events of the events of the investigation canreconstructed even after lapse of time.
A good report must be: In writing
Told in first person narrative
Objective
Factual
Chronological
Easily understood
Comprehensive
Withstand the test of time
No place for hypothesis or opinion
Patrolling:
Foot Patrolling
Mobile PatrollingWhy patrolling
Hazards will be identified and reported
Deficiencies in the protection program are highlighted
Check on existing protection program.
The field notes include:
Doors, windows, and other openings those are not secure.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
12/42
Black Belt Commandos Security System
Security Training Manual
Suspicious persons, vehicles, or circumstances.
Disorder or unusual activity.
Hazardous conditions.
Any other special notices.
Report writing:Reports can be classified as follows:
Daily. Monthly, Quarterly and yearly reports.
Preliminary reports
Interim reports
Special reports
Final reportsCharacteristics of report writing
Accurate with relevant information
Timeliness of information
Concise
Relevant
FIRE PREVENTION AND DETECTION
Ingredients of fire:
Fuel Oxygen
Heat
Combustion
Causes of Fire
Accidental
Natural
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
13/42
Black Belt Commandos Security System
Security Training Manual
Arson -- criminal act
Fire detection systems working mechanisms: Smoke
Gas
HeatFire inspections help in:
Prevent fire
Compliance to fire regulations and codes
Detects impending dangers
Detects in malfunctioning of equipment
Highlights the areas which requires attention
Highlights the places where portable fire extinguishers arerequired.
Duties of fire inspectors should look for:
Adequate lighting in stairways and hallways
Emergency lighting
Accessibility of emergency exits
Availability of proper fire extinguishers
Usability of fire extinguishers
Posting of no smoking signs
Operational and properly placed exit signs
Rubbish accumulations and unsanitary conditions
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
14/42
Black Belt Commandos Security System
Security Training Manual
Obstructed sprinkler heads
Improper storage of hazardous material
Etc.
HAZARDOUS MATERIAL
Any substance or material that poses an unreasonable risk to health,safety, and property of people, animals, and environment.How it is harmful to people?
Absorption
Inhalation
Ingestion Injection
INTERNAL THREATS TO AN ORGANIZATION
In any organization first internal threat starts for people. They are:
Acts of Commission
Thefts and pilferage
Vandalism
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
15/42
Black Belt Commandos Security System
Security Training Manual
Sabotage
Workplace violence
Arson
Bombing
Etc.
Acts of Omission
Violation of safety norms
Careless and reckless handling of operational and processmachinery
Routine maintenance of mechanical, electrical, and otherequipment.
Etc.
PATROLLING TECHNIQUES
1. Know your neighborhood
Familiarize with the area to be patrolledi. Boundaries and adjoining areas
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
16/42
8/8/2019 Security Training Manual
17/42
Black Belt Commandos Security System
Security Training Manual
SECURITY PLANNING
1. Identification of assets, threats, risks, vulnerabilities as well assuch as operational issues, culture and cost.
2. Countermeasures are to be prepared to mitigate thevulnerabilities.
3. Implementation of selected countermeasures4. Ensuring that the effectiveness of countermeasures does not
deteriorate and that the solutions are adjusted to meet the everchanging needs of security.
SAFETY AT WORK
A Condition of being safe and protection by activities of environment.Safety can be ensured by regulating and controlling:
Human factors
Ergonomics
Stress at work
Diseases and conditions
First aid
Dangerous substances
Fire prevention Electrical safety
Construction and contractor activities
Etc.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
18/42
Black Belt Commandos Security System
Security Training Manual
SECURITY AND PROTECTION AWARENESS
Security awareness is a state of mind when you are conscious of anexisting security program and its relevance to your behavior as well asthe effect of your behavior on reducing the security risks.Purpose of awareness:
Understanding the relationship between the security and
successful operations Know ones obligations under the security program
Perceive the connection between the security program objectivesand selected security measures.
Be familiar with the sources of help and procedures undersecurity program.
Compliance.Principles of training
I hear I forget
I see I remember
I do I never forget
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
19/42
Black Belt Commandos Security System
Security Training Manual
INVESTIGATIONS
An investigation is a process of gathering information which is notpublicly available and verify the truthfulness and accuracy ofinformation gathered or obtained.Types of investigations:
Criminal and non criminal investigations Covert or overt investigations
Reactive or proactive investigationsThe above investigations may fall into the following categories:
Incident investigations
Administrative enquiries
Background, financial, and lifestyle investigationsApproach to investigations can be done in:
Constructive way
Reconstructive way
The most important traits of investigators are; Observation skills
Communication skills
Trustworthiness
Persistence
Ability to deal effectively with people
Self-motivating and Self-starting
Ability to multitask
Professional demeanor
Flexibility
PatienceThe qualities of an investigation:
Objectivity
Thoroughness Checking all leads and checking key leads morethan once to ensure consistency
Relevancy information gathered should be the subject of theinvestigation
Accuracy
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
20/42
Black Belt Commandos Security System
Security Training Manual
Timeliness Ability to complete investigation on time.
Documentation of investigation:
Report writingo Initial report
o Progress report
o Special report
o Final report
Elements of the report:o Administrative information
o Summary
o Narrative
o Conclusion
o Enclosures
INDUSTRIAL SECURITY SURVEY
Security survey is a critical and onsite examination to ascertain
present security status
identify deficiencies or excesses
determine the protection needed
Prepare recommendations to improve overall security of theorganization.
Uses of security survey
Establishment of policies and procedures
Protect against the internal and external theft Develop access control procedures
Provide control over movement and identification of employees,visitors on company premises.
Review the selection, training, and deployment of securitypersonnel
Assists in establishment of emergency and disaster plans
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
21/42
Black Belt Commandos Security System
Security Training Manual
Identify the internal resources available and needed for theestablishment of security program
Etc.
SURVEILLANCE
Surveillance is the monitoring of behavior of people, objects, orprocesses for conformity to expected or desired norms or desirednorms for security and proper control.
Ways of conductingsurveillance properly:
Covert or overtsurveillance
CCTV connectedto recordingsystems andmonitoring
Wiretapping orbugging but with a warrant and legally
While doing surveillance, consider the following:
Always maintain a log of all the activities
Know the law of the land Maintenances of confidentiality, means release of information on
need to know basis
Cost of surveillance
Surveillance is the visual monitoring of a location or individual todetermine what activities or conduct is occurring.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
22/42
Black Belt Commandos Security System
Security Training Manual
This visual monitoring is accompanied by a log, record of what isoccurring within the surveillance area.
This surveillance may be:
Stationary
Moving
Or combination of both.With an objective of detecting:
Commission of crime
Serious policy violation
Gathering intelligence
Preventing a crime
Etc.Surveillance can be done by:
Human eye
By means of electronic and mechanical hardware.
TERRORISM AND EXECUTIVE PROTECTION
TERRORISMEXECUTIVE PROTECTION
Executive protection is also called as VIP protection.Executive protection is service designed to protect
Guard entertainers Wealthy persons
Top executives of any business groups
Top government executives
Threatened political leaders
Leaders of Government
Any individual whose personal security is endangered
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
23/42
Black Belt Commandos Security System
Security Training Manual
Etc.Qualities of security personnel involved in VIP protection
Intelligence Prompt and quick reaction
Good observation skillsExecutive protection includes protection at:
Residence
Transit
Office and at other destination
TRAFFIC CONTROL
Identification of common space and private space
Identification of visitors, packages, and mail control
Sign in sheets and visitor passes are issued
Entrances to the complex: specific doors
Separate vehicle and truck entrances
Speed bumps, signs of access control, and parking lots
Designated parking for visitors, handicapped, employees, andtrucks
Use of CCTV to take pictures of violators of traffic.
WORKPLACE VIOLENT BEHAVIOR
Workplace violence is violence or threat of violence against worker. Itcan range from threats and verbal abuse to physical assaults andhomicide.Warning Signs:
1. Threatening statements to kill/harm self or other
2. Violent, reckless, or anti-social behavior3. Drug abuse4. Serious stress in their life5. Confrontational, angry, easily provoked, unpredictable behavior6. Fascination for fire arms
Measures to be taken to prevent or reduce the workplace violence are:1. Provide safety education2. Provide secure working environment
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
24/42
Black Belt Commandos Security System
Security Training Manual
3. Develop policies and procedures to address workplace violence4. Encourage employees to report and record all incidents
5. Provide proper medical treatment after the incident6. Investigate all incidents of threats
CRIME SCENE PROCESS
What constitutes crime scene?
Crime is the area where crime has been committed, theimmediate area surrounding the scene.
A crime scene can be extended from the actual area in which thecrime has occurred to any area where the suspect flees to orleaves the evidence.
Area where the evidence has been foundDuties of security personnel at the crime scene:
Five first-aid to the victim if there is an injury
Protection crime scene to preserve the integrity of evidence andprevent it from contamination.
Shall not allow any individual to enter into the crime scene
Notifying the supervisor about the incident
Vehicle shall be allowed to parked away from the scene of crime
Document all the actions taken observations made at crimescene
Media shall not be allowed to cross the boundaries of crime
scene Photographing the crime scene for further investigations
Do not unnecessarily touch anything
Get names of all present at the scene
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
25/42
Black Belt Commandos Security System
Security Training Manual
COMPUTER SECURITY
Use of computers in present world for the processing and storage of
information has become inevitable for its ease of access, storage,modify, copying, retrieving, etc. Since the information is the lifebloodof any business security of computers, equipment and its storagemedia requires attention.Potential threats for computer:
Acts of human error or failure
Compromises to information security
Deliberate acts of software attacks
Deliberate acts of sabotage or vandalism
Deliberate acts of theft
Technical and hardware failure Forces of nature
Best practices of computer security:
Physical security measures
Software controls
Hardware controls
Legal controls
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
26/42
Black Belt Commandos Security System
Security Training Manual
Procedural controls
Etc.
FIRST AID AND SECURITY PERSONNEL
First aid is an initial or preliminary care given to an injured or sickperson until professional treatment is accessed.First aid is an important and useful skill. Timely First aid can result in:
Preservation life
Prevention or mitigation of disability
Helps in recovery
Promotion of safety awareness
Identifying the safety concerns
Assistance in early rehabilitation
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
27/42
Black Belt Commandos Security System
Security Training Manual
Basic principles of first aid: Use of an adhesive bandage
Applying direct pressure on bleed
Cardiopulmonary resuscitation
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
28/42
Black Belt Commandos Security System
Security Training Manual
Artificial respiration
Snake bite and first aid.
WEAPONS OF MASS DESTRUCTION
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
http://en.wikipedia.org/wiki/Image:Insulfation2.jpg8/8/2019 Security Training Manual
29/42
Black Belt Commandos Security System
Security Training Manual
Any weapon, explosive, incendiary device designed and manufacturedto cause death, bodily injury through the release of toxic or poisonous
chemicals, decease organism, radiation, at a level dangerous to humanlife and environment.
Examples of weapons of mass destruction:1. Nuclear weapons2. Chemical weapons3. Biological pathogens4. Toxic chemicals5. Biological toxins6. Radioisotopes.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
30/42
Black Belt Commandos Security System
Security Training Manual
INTERVIEWING PROCEDURES AND TECHNIQUES
Interviewing is the conversation or questioning by an investigator witha witness or a suspect who has or believed to have informationrelevant to the subject matter of investigation.Key reasons for conducting interview:
To gather information to establish the facts
To verify information received from other sources
To identify additional witnesses
To identify persons responsible for the events or incidents
To secure additional evidence
To develop background information on the specifics of the eventor offence
To eliminate suspects
To discover details of other offencesTechniques of interviewing:
Establish a good rapport
Maintain a eye contact
Do not jump to conclusions
Listen attentively
Be perceptive about every movement
As open ended questions that cant be answered with yes or no
Use silence to solicit a response to an interview
Have interviewee offer chronology of events
Test the veracity of interviewees responses by asking questionswhich you know answers
Discuss the seriousness or gravity of the incident
Request the interviewee to repeat his/her version of the events.
When appropriate, confront interviewee with information thatyou have gathered
Maintain control.Stages of Interview:
Approach: Starts with Greeting Warm up: Establishing rapport
Start: Actual interview asking the witness or suspect to telleverything.
Direct Questioning: to clarify or reconcile inconsistencies andother queries
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
31/42
Black Belt Commandos Security System
Security Training Manual
Ending: Completing the interviewing by summarizing andexpressing sincere gratitude.
RISK MANAGEMENT OPERATIONS
Operational risk is the potential losses associated with operations orwork. These risks and losses or vary from business to business, placeto place, etc. The countermeasures are to be devised as perappropriateness and risk indicators.
These losses may cause from: Internal Causes
o People
o Processes
o Systems
External causesThe management of these risks is based on following tow basic factors:
Frequency of occurrence
Impact on business The processes of management of risks are divided into following
categories: Risk identification
Risk assessment
Risk treatmento Risk avoidance
o Risk mitigation
o Risk sharing and transfer
o Risk acceptance
Risk monitoring
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
32/42
Black Belt Commandos Security System
Security Training Manual
STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS
Strike is concerted refusal by employees to continue working, in anattempt to force an employer to meet certain demands.Types of strikes:
Economic strike: dispute over wages and working conditions
Unfair labor practices strike: contention over unfair laborpractices on the part of the employer
Potential Dangers:
Violence
Damage
Handling of strikes: Pre strike planning
Strike operations
Post strike analysis and EvaluationLockout is a work stoppage in which an employer prevents employeesfrom working.Reason for lockout:
Financial losses
Inability of employer to continue the business
Prolonged refusal by employees to continue working byparticipating in strike and related activities.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
33/42
Black Belt Commandos Security System
Security Training Manual
ABUSE
Drug is substance by its chemical nature alters the structure orfunction of a living organism. Drug is any chemical substance thatalters mood, perception or consciousness. If this drug is used for otherthan designated purposes will lead to apparent injury of self or society.
Common Signs of drug abuse:
Changes in attendance and discipline
Changes in normal capabilities-work habits, efficiency, etc.
Poor physical appearance
Wearing sunglasses at inappropriate times to hide dilated orconstricted pupils
Constantly wearing long-sleeve shirts to hide needle marks
Associating with known drug users
Stealing
Constant running nose or sniffing
Etc.Types of Drugs:
Narcotics Natural and synthetic opiates
Depressants induce sleep, relieve stress and allay anxiety
Sedatives - induce sleep, relieve stress and allay anxiety
Stimulants reverse the effects of mental and physical fatigue
Hallucinogens creates dream images and hallucinations.Prevention of drug abuse at workplace:
Having a written down policy
Awareness programs
Drug screening
Investigations reports of drug abuse
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
34/42
8/8/2019 Security Training Manual
35/42
Black Belt Commandos Security System
Security Training Manual
EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH DEVICES
An explosive is a material that produces sudden expansion of materialusually accompanied by the production heat, pressure, and noise uponinitiation.
Explosives can be categorized as: Low Explosives
High ExplosivesLow Explosives:Low explosive usually is a mixture of combustion material. Theexamples of low explosives normally are:
Gun powder
Yellow phosphorous
Mixture of Aluminum chloride andiron oxide
Potassium permanganate and glycerin
Potassium chlorate and sugar ignited by sulfuric acid Pyrotechniques
Illumination devices
Etc.High Explosives:
High explosives are normally employed in mining, demolition, andmilitary warheads. These explosives are divided as follows:
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
36/42
Black Belt Commandos Security System
Security Training Manual
Primary explosives
These explosive are extremely sensitive to mechanical shock,friction, and heat, to which they will respond by burning rapidly ordetonation.
Secondary explosives
These explosives are relatively insensitive to shock, friction, andheat. They require a booster to cause an explosion. Examples ofhigh explosives are:
o Dynamiteo TNT
o RDX
o PETN
o HMX
o Picric acid
o Gun cotton
o Fulminates
Tertiary explosives
Explosive devices:The mechanisms for explosive devices are of two types:
Standard Mechanism used by military operations personnel forwar purposes
Improvised Mechanism used by insurgents, terrorists, antisocialelements for the purpose of disturbance of peace process,personal gain, etc.
IED: Stands for Improvised Explosive DeviceComponents of IED:
1. Switch
2. Main explosive3. Battery
Detection Equipment:
1. Ion mobility spectrometry
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
37/42
8/8/2019 Security Training Manual
38/42
Black Belt Commandos Security System
Security Training Manual
8. Etc.Preparations for crowd control issues:
1. Compartmentalization of the area2. Vehicle parking3. Fire brigade4. Safety and Ambulance services5. Sufficient no. of security personnel6. Screening at entrances and emergency exits7. Sign boards8. Protection of VIPs, executives, etc.9. Etc.
MANAGING OF DISRUPTIVE PERSONS
Handling of disruptive behavior quires training, awareness andexperience on such incidents.Causes of disruptive behavior of employees at workplace:
1. Domestic and family issues carried to work spot2. Drug abuse3. Economical problems4. Work environment5. Religious, cultural, psychological issues
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
39/42
Black Belt Commandos Security System
Security Training Manual
6. Absence of appropriate policies, code of conduct, and ethics.7. Etc.
Planning for prevention and handling of disruptive persons1. Having clear policy on employee acceptable behavior, code of
conduct, ethics, etc.2. pre hire employee background screening3. Employee assistance programs4. Initiating investigations and taking appropriate disciplinary
actions5. Behavioral monitoring of employees by their supervisors6. Proper reporting system of incidents7. Training of security personnel in handling of disruptive persons
8. Safety of other employees9. Security screening at entrances and other protection measures,
etc.
CRISIS INTERVENTION AND PLANNING
Crisis means any kind of emergency which stops and obstructs work &operations of your employer and the client.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
40/42
Black Belt Commandos Security System
Security Training Manual
This crisis may be of two types:1. Natural
2. Human induced Intentional3. Human induced accidental
Planning for crisis can be done in three ways:1. Pre-event
All measures of detection, prevention, and protection ofassets.
If natural emergencies measures to optimize the losscontrol
2. During
Prevention of life
Attending the injured
Crowd control
Safe evacuation
Providing easy access to emergency vehicles
Protection of property from damage etc.3. After
Restoration of normalcy
Aids in investigations
Etc.
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
Crime prevention through environmental design is a concept ofplanning and designing area and built environment to reducethe incidence and fear of crime by implementing the followingfour concepts from planning stage to building constructionstage. The concepts are:
1. Natural Surveillance allowing movements of outsiders andintruders easily observable without any obstructions.
2. Territorial Reinforcement developing a sense of territorialcontrol by separating the private and public spaces, constructionof fences, gateway procedures, etc.
3. Natural Access Control Creating perception risk, easy detection,High probability of being caught, etc.
4. Target Hardening installation of protection systems againstpossible intrusions by adversaries.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
41/42
Black Belt Commandos Security System
Security Training Manual
DEFENCE TACTICS AND SAFETY OF SECURITY PERSONNEL
Security personnel are at times may confront with people who act anduse aggressive tactics to accomplish their mission and achieve theirobjective. The following incidents where security personnel can use thedefense tactics:
1. Conflict resolution2. Obstruction of aggressive person from injuring co-employees and
damaging the property.3. Apprehension and detention of criminals4. Weaponry awareness
5. Etc.The use of defense tactics requires the knowledge of local law section& clauses which address rights of private defense and exceptions.Defense tactics are:
1. Awareness of surroundings and recognition of harmful situations2. Reduce the chances of incidence3. Avoid the potentially harmful situation4. Self defense techniques5. Do not risk personal safety6. Neutralizing the adversary7. Etc.
APPREHENSION & DETENTION
Security may come across a situation where they have to apprehendand detain criminals till the arrival of local police.This requires knowledge on local law which addresses it and the duties,responsibilities of citizens and security personnel under suchcircumstances.The main points to be remembered while apprehending and detainingany suspect are:
1. Shall not use excessive physical force2. Use of physical force ceases immediately persons under
suspicion surrenders or on neutralizing.
#315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043
8/8/2019 Security Training Manual
42/42
Black Belt Commandos Security System
Security Training Manual
TESTIFYING IN COURTROOM
At times security personnel will be called to court to depose witnessstatement in front of magistrates and judges.The following steps to be followed and points to be remembered while
attending the court.1. Go through the case file and refresh your knowledge on case.2. Attire of security personnel should be professional3. Do not talk with any defense lawyers and witnesses4. Answer to the questions. Do not answer more than what you
hare asked for.5. Should be attentive and polite in courtroom while answering the
questions.6. Be watchful of bribery tactics7. Etc.