Security Training Manual

Embed Size (px)

Citation preview

  • 8/8/2019 Security Training Manual

    1/42

    Black Belt Commandos Security System

    Security Training Manual

    SECURITY TRAINING MANUAL

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    2/42

    Black Belt Commandos Security System

    Security Training Manual

    TABLE OF CONTENTS

    1. INTRODUCTION TO SECURITY

    2. ACCESS CONTROL

    3. EFFECTIVE COMMUNICATIONS

    4. ELECTRONIC ALARM SYSTEMS

    5. EMERGENCY PLANNING

    6. EMPLOYEE DISHONESTY

    7. ETHICS

    8. FIELD NOTES AND REPORT WRITING

    9. FIRE PREVENTION AND DETECTION

    10. HAZARDOUS MATERIAL

    11. INTERNAL THREATS TO AN ORGANIZATION

    12. PATROLLING TECHNIQUES

    13. SECURITY PLANNING

    14. SAFETY AT WORK

    15. SECURITY AND PROTECTION AWARENESS

    16. INVESTIGATIONS

    17. INDUSTRIAL SECURITY SURVEY

    18. SURVEILLANCE

    19. TERRORISM AND EXECUTIVE PROTECTION

    20. TRAFFIC CONTROL

    21. WORKPLACE VIOLENT BEHAVIOR

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    3/42

    Black Belt Commandos Security System

    Security Training Manual

    22. CRIME SCENE PROCESS

    23. COMPUTER SECURITY

    24. FIRST AID AND SECURITY PERSONNEL

    25. WEAPONS OF MASS DESTRUCTION

    26. INTERVIEWING PROCEDURES AND TECHNIQUES

    27. RISK MANAGEMENT OPERATIONS

    28. STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS

    29.DRUG ABUSE

    30. OBSERVATIONS TECHNIQUES

    31. EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH

    DEVICES

    32. CROWD CONTROL AND MANAGEMENT

    33. MANAGING OF DISRUPTIVE PERSONS

    34. CRISIS INTERVENTION AND PLANNING

    35. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN

    36. DEFENCE TACTICS AND SAFETY OF SECURITY

    PERSONNEL

    37. APPREHENSION & DETENTION

    38. TESTIFYING IN COURTROOM

    (Note: Review/update of this manual shall be done for every six

    months to keep the document dynamic & current.)

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    4/42

    Black Belt Commandos Security System

    Security Training Manual

    INTRODUCTION TO SECURITY

    DEFINITION OF SECURITY:A condition of being protected from harm, injury, danger, losses,criminals, threats, risks, etc.

    HISTORICAL PERSPECTIVE:From the earliest times humans have recognized the need to protect

    themselves, their family and their property. Like Forming small groups and living together.

    Maintaining order.

    Recognizing the threats

    Raising armies and their deployment in territorial boundaries.Planning for security will be done by the following three steps:

    Vulnerability analysis

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    5/42

    Black Belt Commandos Security System

    Security Training Manual

    Countermeasures planning and implementation

    Through test of its operation

    Factors considered for security planning: Crimes and loss incidents

    Social environment

    Legal system

    Loss prevention resources

    ACCESS CONTROL

    Access control is the ability to permit or denyAccess control programs are instituted to:

    Permit or deny entry to or presence in a given place

    Increase or reduce the rate or density of movement to, from, orwithin a defined place.

    Protect persons, materials, and information from unauthorizedobservation or removal.

    Prevent injury to people or damage to material.Identity of employees or visitors can be determined by human or acomputer:

    Security guards

    Card reader systems

    Biometric readers

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

    http://en.wikipedia.org/wiki/Image:NewYorkCitySubwayEntranceInterior.jpg
  • 8/8/2019 Security Training Manual

    6/42

    Black Belt Commandos Security System

    Security Training Manual

    EFFECTIVE COMMUNICATIONS

    Communication is process of conveying information from a sender toreceiver with the use of a medium in which the communicatedinformation is understood the same way by both sender and receiver.

    There are three general types of communication equipment are usedwhich communicates the audio and visual information by use of wired,radio, and light as medium.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

    http://en.wikipedia.org/wiki/Image:Encoding_communication.jpghttp://upload.wikimedia.org/wikipedia/en/b/b0/Communication_emisor.jpg
  • 8/8/2019 Security Training Manual

    7/42

    Black Belt Commandos Security System

    Security Training Manual

    ELECTRONIC ALARM SYSTEMS

    A device which notifies designated people about the impending by wayof audible or visual signal.

    Three general categories of devices are outlined based on what theyprotect:

    Perimeter or point of entry

    General area or room

    Object

    The following are the general sensor technologies used in alarmsystems:

    Passive infrared

    Glass break sensors

    Electro mechanical Ultrasonic or microwave

    Vibration or shock

    Photoelectric

    Audio

    Capacitance

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    8/42

    Black Belt Commandos Security System

    Security Training Manual

    EMERGENCY PLANNING

    An emergency is a situation which poses immediate risk to health, life,property, and environment.Emergency planning will highlight the types of emergencies which theorganization likely to encounter and the emergency management teammay have to take counter measures or require them to consider inadvance for preventing or minimizing its adverse effects.

    An emergency plan should accomplish the following:

    Define the emergency

    Organize a team with specific tasks to complete, before, during,and after an emergency.

    Establish a method for using available resources

    Provide means to restore normal operations from the emergencysituation.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    9/42

    Black Belt Commandos Security System

    Security Training Manual

    Planning priorities

    Protect life

    Prevent or minimize injuries

    Reduce the exposure of assets

    Optimize the loss control whose exposure cannot be reduced. Restore the normal operations as quickly as possible.

    EMPLOYEE DISHONESTY

    Employee dishonesty is one of the most dangerous and difficult task todetect and identify within any organization.Employee dishonesty starts at:

    Accepting bribes

    Involving conflicts of interests

    Stealing from employers

    Breach of fiduciary relationship

    Etc.Employee dishonesty starts in any corporation when the followingthree elements are present:

    Opportunityo Lack of controls like policies, procedures, and processes

    o Inadequate of audits

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    10/42

    Black Belt Commandos Security System

    Security Training Manual

    Pressureo Motivation

    o Personal financial problems

    o Drug abuse

    o Etc.

    Rationalizationo Environment in the corporation

    o Present practices

    ETHICS

    Ethics are those rules of conduct by which all the security personnelregulate their conduct among themselves with all other persons withwhom they deal in their regular performance of duties.Security Personnel Shall:

    Perform duties in accordance with the rules and regulations ofemployer/client and the law of the land of Govt. of India.

    Observe honesty, integrity, truthfulness, and politeness whiledischarging their duties and responsibilities.

    Safeguard the physical assets, information, etc., and exercisedue care to prevent it from damage and theft.

    Protect the reputation of your employer and client.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    11/42

    Black Belt Commandos Security System

    Security Training Manual

    FIELD NOTES AND REPORT WRITING

    It is remarkable how quickly how quickly human mind losses aconsiderable part of its ability to recall the details of events accuratelyhe observed in the past. Hence the field note is the invaluable tool inthe hands of investigator.An investigative report is the clear, comprehensive written documentof facts presented chronologically regarding a specific assignment andfrom which the events of the events of the investigation canreconstructed even after lapse of time.

    A good report must be: In writing

    Told in first person narrative

    Objective

    Factual

    Chronological

    Easily understood

    Comprehensive

    Withstand the test of time

    No place for hypothesis or opinion

    Patrolling:

    Foot Patrolling

    Mobile PatrollingWhy patrolling

    Hazards will be identified and reported

    Deficiencies in the protection program are highlighted

    Check on existing protection program.

    The field notes include:

    Doors, windows, and other openings those are not secure.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    12/42

    Black Belt Commandos Security System

    Security Training Manual

    Suspicious persons, vehicles, or circumstances.

    Disorder or unusual activity.

    Hazardous conditions.

    Any other special notices.

    Report writing:Reports can be classified as follows:

    Daily. Monthly, Quarterly and yearly reports.

    Preliminary reports

    Interim reports

    Special reports

    Final reportsCharacteristics of report writing

    Accurate with relevant information

    Timeliness of information

    Concise

    Relevant

    FIRE PREVENTION AND DETECTION

    Ingredients of fire:

    Fuel Oxygen

    Heat

    Combustion

    Causes of Fire

    Accidental

    Natural

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    13/42

    Black Belt Commandos Security System

    Security Training Manual

    Arson -- criminal act

    Fire detection systems working mechanisms: Smoke

    Gas

    HeatFire inspections help in:

    Prevent fire

    Compliance to fire regulations and codes

    Detects impending dangers

    Detects in malfunctioning of equipment

    Highlights the areas which requires attention

    Highlights the places where portable fire extinguishers arerequired.

    Duties of fire inspectors should look for:

    Adequate lighting in stairways and hallways

    Emergency lighting

    Accessibility of emergency exits

    Availability of proper fire extinguishers

    Usability of fire extinguishers

    Posting of no smoking signs

    Operational and properly placed exit signs

    Rubbish accumulations and unsanitary conditions

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    14/42

    Black Belt Commandos Security System

    Security Training Manual

    Obstructed sprinkler heads

    Improper storage of hazardous material

    Etc.

    HAZARDOUS MATERIAL

    Any substance or material that poses an unreasonable risk to health,safety, and property of people, animals, and environment.How it is harmful to people?

    Absorption

    Inhalation

    Ingestion Injection

    INTERNAL THREATS TO AN ORGANIZATION

    In any organization first internal threat starts for people. They are:

    Acts of Commission

    Thefts and pilferage

    Vandalism

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    15/42

    Black Belt Commandos Security System

    Security Training Manual

    Sabotage

    Workplace violence

    Arson

    Bombing

    Etc.

    Acts of Omission

    Violation of safety norms

    Careless and reckless handling of operational and processmachinery

    Routine maintenance of mechanical, electrical, and otherequipment.

    Etc.

    PATROLLING TECHNIQUES

    1. Know your neighborhood

    Familiarize with the area to be patrolledi. Boundaries and adjoining areas

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    16/42

  • 8/8/2019 Security Training Manual

    17/42

    Black Belt Commandos Security System

    Security Training Manual

    SECURITY PLANNING

    1. Identification of assets, threats, risks, vulnerabilities as well assuch as operational issues, culture and cost.

    2. Countermeasures are to be prepared to mitigate thevulnerabilities.

    3. Implementation of selected countermeasures4. Ensuring that the effectiveness of countermeasures does not

    deteriorate and that the solutions are adjusted to meet the everchanging needs of security.

    SAFETY AT WORK

    A Condition of being safe and protection by activities of environment.Safety can be ensured by regulating and controlling:

    Human factors

    Ergonomics

    Stress at work

    Diseases and conditions

    First aid

    Dangerous substances

    Fire prevention Electrical safety

    Construction and contractor activities

    Etc.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    18/42

    Black Belt Commandos Security System

    Security Training Manual

    SECURITY AND PROTECTION AWARENESS

    Security awareness is a state of mind when you are conscious of anexisting security program and its relevance to your behavior as well asthe effect of your behavior on reducing the security risks.Purpose of awareness:

    Understanding the relationship between the security and

    successful operations Know ones obligations under the security program

    Perceive the connection between the security program objectivesand selected security measures.

    Be familiar with the sources of help and procedures undersecurity program.

    Compliance.Principles of training

    I hear I forget

    I see I remember

    I do I never forget

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    19/42

    Black Belt Commandos Security System

    Security Training Manual

    INVESTIGATIONS

    An investigation is a process of gathering information which is notpublicly available and verify the truthfulness and accuracy ofinformation gathered or obtained.Types of investigations:

    Criminal and non criminal investigations Covert or overt investigations

    Reactive or proactive investigationsThe above investigations may fall into the following categories:

    Incident investigations

    Administrative enquiries

    Background, financial, and lifestyle investigationsApproach to investigations can be done in:

    Constructive way

    Reconstructive way

    The most important traits of investigators are; Observation skills

    Communication skills

    Trustworthiness

    Persistence

    Ability to deal effectively with people

    Self-motivating and Self-starting

    Ability to multitask

    Professional demeanor

    Flexibility

    PatienceThe qualities of an investigation:

    Objectivity

    Thoroughness Checking all leads and checking key leads morethan once to ensure consistency

    Relevancy information gathered should be the subject of theinvestigation

    Accuracy

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    20/42

    Black Belt Commandos Security System

    Security Training Manual

    Timeliness Ability to complete investigation on time.

    Documentation of investigation:

    Report writingo Initial report

    o Progress report

    o Special report

    o Final report

    Elements of the report:o Administrative information

    o Summary

    o Narrative

    o Conclusion

    o Enclosures

    INDUSTRIAL SECURITY SURVEY

    Security survey is a critical and onsite examination to ascertain

    present security status

    identify deficiencies or excesses

    determine the protection needed

    Prepare recommendations to improve overall security of theorganization.

    Uses of security survey

    Establishment of policies and procedures

    Protect against the internal and external theft Develop access control procedures

    Provide control over movement and identification of employees,visitors on company premises.

    Review the selection, training, and deployment of securitypersonnel

    Assists in establishment of emergency and disaster plans

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    21/42

    Black Belt Commandos Security System

    Security Training Manual

    Identify the internal resources available and needed for theestablishment of security program

    Etc.

    SURVEILLANCE

    Surveillance is the monitoring of behavior of people, objects, orprocesses for conformity to expected or desired norms or desirednorms for security and proper control.

    Ways of conductingsurveillance properly:

    Covert or overtsurveillance

    CCTV connectedto recordingsystems andmonitoring

    Wiretapping orbugging but with a warrant and legally

    While doing surveillance, consider the following:

    Always maintain a log of all the activities

    Know the law of the land Maintenances of confidentiality, means release of information on

    need to know basis

    Cost of surveillance

    Surveillance is the visual monitoring of a location or individual todetermine what activities or conduct is occurring.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    22/42

    Black Belt Commandos Security System

    Security Training Manual

    This visual monitoring is accompanied by a log, record of what isoccurring within the surveillance area.

    This surveillance may be:

    Stationary

    Moving

    Or combination of both.With an objective of detecting:

    Commission of crime

    Serious policy violation

    Gathering intelligence

    Preventing a crime

    Etc.Surveillance can be done by:

    Human eye

    By means of electronic and mechanical hardware.

    TERRORISM AND EXECUTIVE PROTECTION

    TERRORISMEXECUTIVE PROTECTION

    Executive protection is also called as VIP protection.Executive protection is service designed to protect

    Guard entertainers Wealthy persons

    Top executives of any business groups

    Top government executives

    Threatened political leaders

    Leaders of Government

    Any individual whose personal security is endangered

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    23/42

    Black Belt Commandos Security System

    Security Training Manual

    Etc.Qualities of security personnel involved in VIP protection

    Intelligence Prompt and quick reaction

    Good observation skillsExecutive protection includes protection at:

    Residence

    Transit

    Office and at other destination

    TRAFFIC CONTROL

    Identification of common space and private space

    Identification of visitors, packages, and mail control

    Sign in sheets and visitor passes are issued

    Entrances to the complex: specific doors

    Separate vehicle and truck entrances

    Speed bumps, signs of access control, and parking lots

    Designated parking for visitors, handicapped, employees, andtrucks

    Use of CCTV to take pictures of violators of traffic.

    WORKPLACE VIOLENT BEHAVIOR

    Workplace violence is violence or threat of violence against worker. Itcan range from threats and verbal abuse to physical assaults andhomicide.Warning Signs:

    1. Threatening statements to kill/harm self or other

    2. Violent, reckless, or anti-social behavior3. Drug abuse4. Serious stress in their life5. Confrontational, angry, easily provoked, unpredictable behavior6. Fascination for fire arms

    Measures to be taken to prevent or reduce the workplace violence are:1. Provide safety education2. Provide secure working environment

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    24/42

    Black Belt Commandos Security System

    Security Training Manual

    3. Develop policies and procedures to address workplace violence4. Encourage employees to report and record all incidents

    5. Provide proper medical treatment after the incident6. Investigate all incidents of threats

    CRIME SCENE PROCESS

    What constitutes crime scene?

    Crime is the area where crime has been committed, theimmediate area surrounding the scene.

    A crime scene can be extended from the actual area in which thecrime has occurred to any area where the suspect flees to orleaves the evidence.

    Area where the evidence has been foundDuties of security personnel at the crime scene:

    Five first-aid to the victim if there is an injury

    Protection crime scene to preserve the integrity of evidence andprevent it from contamination.

    Shall not allow any individual to enter into the crime scene

    Notifying the supervisor about the incident

    Vehicle shall be allowed to parked away from the scene of crime

    Document all the actions taken observations made at crimescene

    Media shall not be allowed to cross the boundaries of crime

    scene Photographing the crime scene for further investigations

    Do not unnecessarily touch anything

    Get names of all present at the scene

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    25/42

    Black Belt Commandos Security System

    Security Training Manual

    COMPUTER SECURITY

    Use of computers in present world for the processing and storage of

    information has become inevitable for its ease of access, storage,modify, copying, retrieving, etc. Since the information is the lifebloodof any business security of computers, equipment and its storagemedia requires attention.Potential threats for computer:

    Acts of human error or failure

    Compromises to information security

    Deliberate acts of software attacks

    Deliberate acts of sabotage or vandalism

    Deliberate acts of theft

    Technical and hardware failure Forces of nature

    Best practices of computer security:

    Physical security measures

    Software controls

    Hardware controls

    Legal controls

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    26/42

    Black Belt Commandos Security System

    Security Training Manual

    Procedural controls

    Etc.

    FIRST AID AND SECURITY PERSONNEL

    First aid is an initial or preliminary care given to an injured or sickperson until professional treatment is accessed.First aid is an important and useful skill. Timely First aid can result in:

    Preservation life

    Prevention or mitigation of disability

    Helps in recovery

    Promotion of safety awareness

    Identifying the safety concerns

    Assistance in early rehabilitation

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    27/42

    Black Belt Commandos Security System

    Security Training Manual

    Basic principles of first aid: Use of an adhesive bandage

    Applying direct pressure on bleed

    Cardiopulmonary resuscitation

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    28/42

    Black Belt Commandos Security System

    Security Training Manual

    Artificial respiration

    Snake bite and first aid.

    WEAPONS OF MASS DESTRUCTION

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

    http://en.wikipedia.org/wiki/Image:Insulfation2.jpg
  • 8/8/2019 Security Training Manual

    29/42

    Black Belt Commandos Security System

    Security Training Manual

    Any weapon, explosive, incendiary device designed and manufacturedto cause death, bodily injury through the release of toxic or poisonous

    chemicals, decease organism, radiation, at a level dangerous to humanlife and environment.

    Examples of weapons of mass destruction:1. Nuclear weapons2. Chemical weapons3. Biological pathogens4. Toxic chemicals5. Biological toxins6. Radioisotopes.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    30/42

    Black Belt Commandos Security System

    Security Training Manual

    INTERVIEWING PROCEDURES AND TECHNIQUES

    Interviewing is the conversation or questioning by an investigator witha witness or a suspect who has or believed to have informationrelevant to the subject matter of investigation.Key reasons for conducting interview:

    To gather information to establish the facts

    To verify information received from other sources

    To identify additional witnesses

    To identify persons responsible for the events or incidents

    To secure additional evidence

    To develop background information on the specifics of the eventor offence

    To eliminate suspects

    To discover details of other offencesTechniques of interviewing:

    Establish a good rapport

    Maintain a eye contact

    Do not jump to conclusions

    Listen attentively

    Be perceptive about every movement

    As open ended questions that cant be answered with yes or no

    Use silence to solicit a response to an interview

    Have interviewee offer chronology of events

    Test the veracity of interviewees responses by asking questionswhich you know answers

    Discuss the seriousness or gravity of the incident

    Request the interviewee to repeat his/her version of the events.

    When appropriate, confront interviewee with information thatyou have gathered

    Maintain control.Stages of Interview:

    Approach: Starts with Greeting Warm up: Establishing rapport

    Start: Actual interview asking the witness or suspect to telleverything.

    Direct Questioning: to clarify or reconcile inconsistencies andother queries

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    31/42

    Black Belt Commandos Security System

    Security Training Manual

    Ending: Completing the interviewing by summarizing andexpressing sincere gratitude.

    RISK MANAGEMENT OPERATIONS

    Operational risk is the potential losses associated with operations orwork. These risks and losses or vary from business to business, placeto place, etc. The countermeasures are to be devised as perappropriateness and risk indicators.

    These losses may cause from: Internal Causes

    o People

    o Processes

    o Systems

    External causesThe management of these risks is based on following tow basic factors:

    Frequency of occurrence

    Impact on business The processes of management of risks are divided into following

    categories: Risk identification

    Risk assessment

    Risk treatmento Risk avoidance

    o Risk mitigation

    o Risk sharing and transfer

    o Risk acceptance

    Risk monitoring

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    32/42

    Black Belt Commandos Security System

    Security Training Manual

    STRIKES, EMPLOYEE UNREST AND LABOR RELATIONS

    Strike is concerted refusal by employees to continue working, in anattempt to force an employer to meet certain demands.Types of strikes:

    Economic strike: dispute over wages and working conditions

    Unfair labor practices strike: contention over unfair laborpractices on the part of the employer

    Potential Dangers:

    Violence

    Damage

    Handling of strikes: Pre strike planning

    Strike operations

    Post strike analysis and EvaluationLockout is a work stoppage in which an employer prevents employeesfrom working.Reason for lockout:

    Financial losses

    Inability of employer to continue the business

    Prolonged refusal by employees to continue working byparticipating in strike and related activities.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    33/42

    Black Belt Commandos Security System

    Security Training Manual

    ABUSE

    Drug is substance by its chemical nature alters the structure orfunction of a living organism. Drug is any chemical substance thatalters mood, perception or consciousness. If this drug is used for otherthan designated purposes will lead to apparent injury of self or society.

    Common Signs of drug abuse:

    Changes in attendance and discipline

    Changes in normal capabilities-work habits, efficiency, etc.

    Poor physical appearance

    Wearing sunglasses at inappropriate times to hide dilated orconstricted pupils

    Constantly wearing long-sleeve shirts to hide needle marks

    Associating with known drug users

    Stealing

    Constant running nose or sniffing

    Etc.Types of Drugs:

    Narcotics Natural and synthetic opiates

    Depressants induce sleep, relieve stress and allay anxiety

    Sedatives - induce sleep, relieve stress and allay anxiety

    Stimulants reverse the effects of mental and physical fatigue

    Hallucinogens creates dream images and hallucinations.Prevention of drug abuse at workplace:

    Having a written down policy

    Awareness programs

    Drug screening

    Investigations reports of drug abuse

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    34/42

  • 8/8/2019 Security Training Manual

    35/42

    Black Belt Commandos Security System

    Security Training Manual

    EXPLOSIVE DEVICES, BOMB THREATS, AND SEARCH DEVICES

    An explosive is a material that produces sudden expansion of materialusually accompanied by the production heat, pressure, and noise uponinitiation.

    Explosives can be categorized as: Low Explosives

    High ExplosivesLow Explosives:Low explosive usually is a mixture of combustion material. Theexamples of low explosives normally are:

    Gun powder

    Yellow phosphorous

    Mixture of Aluminum chloride andiron oxide

    Potassium permanganate and glycerin

    Potassium chlorate and sugar ignited by sulfuric acid Pyrotechniques

    Illumination devices

    Etc.High Explosives:

    High explosives are normally employed in mining, demolition, andmilitary warheads. These explosives are divided as follows:

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    36/42

    Black Belt Commandos Security System

    Security Training Manual

    Primary explosives

    These explosive are extremely sensitive to mechanical shock,friction, and heat, to which they will respond by burning rapidly ordetonation.

    Secondary explosives

    These explosives are relatively insensitive to shock, friction, andheat. They require a booster to cause an explosion. Examples ofhigh explosives are:

    o Dynamiteo TNT

    o RDX

    o PETN

    o HMX

    o Picric acid

    o Gun cotton

    o Fulminates

    Tertiary explosives

    Explosive devices:The mechanisms for explosive devices are of two types:

    Standard Mechanism used by military operations personnel forwar purposes

    Improvised Mechanism used by insurgents, terrorists, antisocialelements for the purpose of disturbance of peace process,personal gain, etc.

    IED: Stands for Improvised Explosive DeviceComponents of IED:

    1. Switch

    2. Main explosive3. Battery

    Detection Equipment:

    1. Ion mobility spectrometry

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    37/42

  • 8/8/2019 Security Training Manual

    38/42

    Black Belt Commandos Security System

    Security Training Manual

    8. Etc.Preparations for crowd control issues:

    1. Compartmentalization of the area2. Vehicle parking3. Fire brigade4. Safety and Ambulance services5. Sufficient no. of security personnel6. Screening at entrances and emergency exits7. Sign boards8. Protection of VIPs, executives, etc.9. Etc.

    MANAGING OF DISRUPTIVE PERSONS

    Handling of disruptive behavior quires training, awareness andexperience on such incidents.Causes of disruptive behavior of employees at workplace:

    1. Domestic and family issues carried to work spot2. Drug abuse3. Economical problems4. Work environment5. Religious, cultural, psychological issues

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    39/42

    Black Belt Commandos Security System

    Security Training Manual

    6. Absence of appropriate policies, code of conduct, and ethics.7. Etc.

    Planning for prevention and handling of disruptive persons1. Having clear policy on employee acceptable behavior, code of

    conduct, ethics, etc.2. pre hire employee background screening3. Employee assistance programs4. Initiating investigations and taking appropriate disciplinary

    actions5. Behavioral monitoring of employees by their supervisors6. Proper reporting system of incidents7. Training of security personnel in handling of disruptive persons

    8. Safety of other employees9. Security screening at entrances and other protection measures,

    etc.

    CRISIS INTERVENTION AND PLANNING

    Crisis means any kind of emergency which stops and obstructs work &operations of your employer and the client.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    40/42

    Black Belt Commandos Security System

    Security Training Manual

    This crisis may be of two types:1. Natural

    2. Human induced Intentional3. Human induced accidental

    Planning for crisis can be done in three ways:1. Pre-event

    All measures of detection, prevention, and protection ofassets.

    If natural emergencies measures to optimize the losscontrol

    2. During

    Prevention of life

    Attending the injured

    Crowd control

    Safe evacuation

    Providing easy access to emergency vehicles

    Protection of property from damage etc.3. After

    Restoration of normalcy

    Aids in investigations

    Etc.

    CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN

    Crime prevention through environmental design is a concept ofplanning and designing area and built environment to reducethe incidence and fear of crime by implementing the followingfour concepts from planning stage to building constructionstage. The concepts are:

    1. Natural Surveillance allowing movements of outsiders andintruders easily observable without any obstructions.

    2. Territorial Reinforcement developing a sense of territorialcontrol by separating the private and public spaces, constructionof fences, gateway procedures, etc.

    3. Natural Access Control Creating perception risk, easy detection,High probability of being caught, etc.

    4. Target Hardening installation of protection systems againstpossible intrusions by adversaries.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    41/42

    Black Belt Commandos Security System

    Security Training Manual

    DEFENCE TACTICS AND SAFETY OF SECURITY PERSONNEL

    Security personnel are at times may confront with people who act anduse aggressive tactics to accomplish their mission and achieve theirobjective. The following incidents where security personnel can use thedefense tactics:

    1. Conflict resolution2. Obstruction of aggressive person from injuring co-employees and

    damaging the property.3. Apprehension and detention of criminals4. Weaponry awareness

    5. Etc.The use of defense tactics requires the knowledge of local law section& clauses which address rights of private defense and exceptions.Defense tactics are:

    1. Awareness of surroundings and recognition of harmful situations2. Reduce the chances of incidence3. Avoid the potentially harmful situation4. Self defense techniques5. Do not risk personal safety6. Neutralizing the adversary7. Etc.

    APPREHENSION & DETENTION

    Security may come across a situation where they have to apprehendand detain criminals till the arrival of local police.This requires knowledge on local law which addresses it and the duties,responsibilities of citizens and security personnel under suchcircumstances.The main points to be remembered while apprehending and detainingany suspect are:

    1. Shall not use excessive physical force2. Use of physical force ceases immediately persons under

    suspicion surrenders or on neutralizing.

    #315, 5th Cross, 3rd Block HRBR Layout, Kalyan Nagar, Bangalore 560043

  • 8/8/2019 Security Training Manual

    42/42

    Black Belt Commandos Security System

    Security Training Manual

    TESTIFYING IN COURTROOM

    At times security personnel will be called to court to depose witnessstatement in front of magistrates and judges.The following steps to be followed and points to be remembered while

    attending the court.1. Go through the case file and refresh your knowledge on case.2. Attire of security personnel should be professional3. Do not talk with any defense lawyers and witnesses4. Answer to the questions. Do not answer more than what you

    hare asked for.5. Should be attentive and polite in courtroom while answering the

    questions.6. Be watchful of bribery tactics7. Etc.