The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by M. Usman, 2020-09-16 16:21:06

nsi book

nsi book

9. True or False? Private Security Staff are 10. If you suspect a person is guilty of a crime,
permitted to detain suspects according to the but have not witnessed it, can you detain
UAE Penal Code. the suspect?

TRUE / FALSE a. Yes, according to the law

11. What are the 4 steps you must follow when b. Yes, ONLY if the suspect consents
making a citizen’s arrest? to being detained

c. No, not permitted at all

12. When is it permitted to use force in self-
defence according to Ch. 4, Section 1
Article 56 UAE Penal Code?

13. Which article of Wadeema Law states: Give 14. In Abu Dhabi and Northern Emirates,
children priority of protection, care, rescue and Which directorate is responsible for the
guidance in cases of emergency, disaster, regulation of Private Security?
armed conflict and any crimes committed ?

15. In Dubai, which directorate is responsible for 16. List 5 security license categories available
the regulation of Private Security? from Abu Dhabi and Dubai

17. What are the 8 personal requirements to apply 18. List the 7 items and equipment that
for a security guard license in Abu Dhabi and Security staff must carry on them according
Northern Emirates? to Ministerial decision no. 557 of 2008

47

19. What are the 4 D’s of physical security? 20. Give 3 examples of security measures for
each of the 4 D’s

21. What are the 5 zones of security access? 22. List the 4 public security and safety
departments that security staff are most
likely to deal with

48

Module 5
Control room

operations

49

Module 5 5.1.1. Purpose and application
A security control room brings together the
Control room operations elements of a security operation, and offers a
logical way to coordinate the effects of security
Qualification Link systems, personnel and response options. A
security control room containing monitoring
Units and control systems can commonly be found in:
 Nil  Hotels
Learning outcomes  Banks
1. Outline the function of security control  Shopping Malls
 Industrial sites
rooms  Airports
2. Identify laws and regulations related to  Ports

control room operations 5.1.2. Laws and regulations governing
3. Recognise control room technologies control room operations

and design considerations Within the UAE there are several laws and
4. Apply control room security policy and regulations that govern how a security control
centre should operate, and the use of CCTV.
procedures
5. Summarise roles and tasks within a Key information

security control room  The Abu Dhabi Monitoring and Control
6. Identify communication and reporting Centre (ADMCC) has published security
monitoring standards version 5 as a
requirements regulation requirement
7. Identify information security
 Dubai has Law No. 24 of 2008 regulating
requirements security service providers and users, relating
8. Outline security control room work to the installation and use of CCTV systems

routines The ADMCC standards describe the following
9. Outline security control room incident requirements for CCTV and control rooms:
 Coverage areas for CCTV in various facilities
response procedures  Technical requirements of installed

5.1. Introduction to security control rooms equipment
 Design, approval and integration processes
A security control room is a common way to  Security system inspection requirements
centralise security resources and operational  Documentation and logs required
activities. Security staff will almost certainly
interact with a security control room, or work These details are covered in later sections of
within one themselves. this module.

Figure 39 - Security control room

5.2. Control room design

50

o Automatic License Plate

Recognition (ANPR)

The design and construction of a security  Access control systems
control room is not the responsibility of Security o Radio Frequency Identification
guards, however understanding the basic
elements will help in comprehending the bigger (RFID) badges
picture of providing security to a site o Keypads
o Biometric systems
5.2.1. Technologies and integration
A central security control room provides an  Fingerprint
opportunity to monitor a variety of  Eye Scanner
technologies and systems. Advances in  Voice recognition
technology mean that there is a great amount  Combination
of information that can be viewed easily and o Electro-magnetic locks (remote
quickly through an integrated system.
release)
o Vehicle barriers & gates (remote

release)

Key information  Building management systems (BMS)
o Fire alarm and suppression
Examples of technologies and systems that are o Elevator controls
found in a security control room:  Emergency intercom
 Return to ground
 CCTV o Heating, venting and cooling
 Access control and parking management
 Building management systems (HVAC)
 Security alarms and sensors o Gas sensors and alarms

 CCTV  Security alarms and sensors
o Analogue systems o Perimeter intrusion detection
o Digital I.P cameras  Microwave beam
o Digital Video Recorders  Infrared beam
o Pan, Tilt and Zoom cameras  Vibration sensor
o Motion triggered o Door alarms
o Night vision capable  Forced entry
o Thermal vision capable  Tamper alarm

51

o Arming and disarming of systems

o System information
 Location of alarms
 Time and date
 Zones breached

 Public address systems Location
o Internal communication (intercom)
o Building speakers The placement of a control room may impact
o Site public address speakers the performance of security for the site. For
example:
The number of systems and technologies
available are wide ranging, and control room  Centrally located
staff will need to become familiar with the o more protected by layers of
specific systems installed at the site or building security
where they work o reduced response times to all areas

Figure 40 - Control room plan  Near site perimeter
o Ease of access for contractors and
5.2.2. Physical design considerations essential services
The location within a building or site, and the o More vulnerable to external threats
floorplan and layout of the control room are
not the responsibility of a security guard,  Co-located with reception area
however understanding the design o Suitable for low threat
considerations will improve the situational environments
awareness of security staff. o Organisational management
response may be faster
o Confidentiality may be
compromised due to public access

Room layout

The internal design and placement of desks,
screens, doors, windows and other equipment
will impact the usability of efficiency of the
control room. For example:

 Spacing and location of desks
o Open plan allows good
communication
o Improve teamwork and
collaboration
o Consider OHS hazards

 Access points
o Access door positioned away from
public zones or reception
o Should be “air locked” to prevent
tail gating through the door
o May require emergency
exit/alternate access points

 CCTV monitoring screens
o Should be positioned on desks, not
on walls
o Maximum of 3 screens per desk
o Placed 3 times the distance of the
screen diagonal from the user

 Supervisor positioning

52

o Located for best situational o Ensure documentation and reports
awareness within the control room are kept out of view

o Optimised for communication with Physical entry control
control room staff  Use electronic security locks
 Access badges issued to authorised staff
 Windows  System keeps record of staff entries and
o Depending on security
requirements exits
o 1-way or 2-way viewing  Use a small reception area within the
o Safety glass – smash resistant
o Opening or fixed control room to screen people coming in
and out
Each of the design elements may be present in  A biometric access system could also be
the construction of a security control room, and used as a secondary security layer e.g.
knowledge of why they are implemented will
help Security staff to better understand the o Fingerprint reader
overall picture of security at their site. o Eye scanner

5.2.3. Security and access control It is vitally important that the security of the
Controlling who has the ability to enter the control room is maintained, as it is the centre of
control room is of high importance. Critical and all security operations for a site or even multiple
sensitive information and activities are exposed sites.
within the control room, and only those who
need to know should be able to access the 5.3. Roles and tasks within a control room
room.
There are several defined roles and tasks that
Topic focus will be performed by Security staff while
working in a control room. Depending on the
Access control can be achieved through a organisation and the equipment and systems
variety of systems and control measures installed, there might be other roles and duties,
including: but the most basic requirements include:
 Control room supervisor
Staff permissions  Security systems operator
 Communications operator
 Maintained list of who can enter the control
room 5.3.1. Security systems operator
The security systems operator may be required
 Limited to only those who need access to use installed CCTV systems, monitor and
 Regularly updated and monitored respond to alarms and sensors, or control
Visitor access control access remotely through gates, doors or other
access points. A high level of vigilance,
 Written policy and procedures for allowing attention to detail and system training is
visitor access important for a successful security systems
o Must have valid reason for visit operator.
o Must be authorised by manager
5.3.1.1. CCTV Operator duties
 Escorting visitors inside the control room One of the most common tasks within the
o Visitor ID should be issued, to let control room is the operation of a CCTV system.
others know they are authorised to This role is often key in carrying out successful
be there security operations at a site.
o A member of the Security staff
must be responsible for the visitor
o Visitors must not be left alone

 Visitor access log completed
 Restrict information on display while visitors

are present
o Black out large CCTV displays
o Reduce volume of radios

53

Key information used to perform periodic visual inspections, and
can include:
The duties of a CCTV operator are:
 Vulnerable or critical areas
 Daily System checks  Remote and low activity areas
 Monitoring live video images  Areas not covered by foot patrols
 Video patrolling Video patrolling sequences are normally set by
 Live incident tracking the control room supervisor in cooperation with
 Passing information to communications the security manager. Security staff operating
CCTV are expected to follow the video
operators patrolling plans given to them.
 Retrieval of stored images
Live incident tracking
Daily system checks
When a safety or security incident is detected
 Camera status 100% functional by the CCTV operator, they will continue to
 Resolution of video is good track the targets or other elements involved
 CCTV operating system working (controllers using the CCTV system. This provides the best
possible situational awareness for the control
and software) room supervisor to form a suitable response
 Recording and retrieval system working plan, and adjust the response if necessary as the
A log will be established in the control room for situation changes. While live incident tracking,
daily system checks to be recorded the CCTV operator will:

Live video monitoring  Use available video feeds to monitor the
location and activity of concerned parties
This is the primary duty of a CCTV operator
while working in the control room. It is  Report the locations of concerned parties to
recommended that a CCTV operator monitors the communications operators and
the available video feeds on a 5-minute cycle. supervisor
The following table describes the expected
visual load of a CCTV operator when monitoring  Report the actions of concerned parties to
live video on the 5-minute cycle: the communications operators and
supervisor
Area of coverage Cameras
50  Remain vigilant to further safety or security
Perimeter fence with Intruder 15 threats during an ongoing incident
Detection System and no active 15
security patrols Effective communication during live incident
tracking is a critical part of successful response
Perimeter fence without Intruder to safety and security incidents.
detection system and no active
security patrols Retrieving recorded images

Crowded public areas with active There will be occasions when the CCTV operator
security staff is required to retrieve recorded footage, and
the policy and procedure for this activity will be
Crowded public areas without 5 written by the security manager. The CCTV
active security staff operator must be aware of the policy and
procedure, and follow it accurately. Common
Table 7 - Live video monitoring load reasons for retrieving recorded footage include:

Video patrolling  Providing evidence to police
 Internal investigations
The term “Video patrolling” is used to describe  Training activities
the systematic monitoring of certain areas  Peer review of security monitoring
within a site using installed cameras on a If a copy of recorded images is made and
designated route or sequence. This technique is issued to police or other departments, an issue
report will be completed and logged.

54

5.3.1.2. CCTV Operator skills and abilities Understanding where black spots exist in CCTV
The skills and abilities required of a CCTV coverage will guide all security staff when
operator are unique, and not all Security staff conducting mobile patrols of the area, ensuring
will fit the nature of the CCTV operator role. that sufficient attention is given to areas that
There are skills that can be developed through are not monitored. Any black spots should be
practice and training including: marked on the CCTV map.
 Site layout knowledge
 Visual detection techniques Topic focus
 Behavioural analysis
 Effective team communication Visual detection techniques

Site layout knowledge Many CCTV systems have the capability to
All security staff must have a thorough detect motion, crossing of zones or even heat
understanding of the layout of their work site, levels, but humans are able to reason and
however CCTV operators need to be able to determine complex scenarios better than any
calculate exact locations using camera locations technology can. Detecting a safety or security
and video feeds to determine where a safety or incident is one of the key skills of a CCTV
security concern is located. Tools available to operator and techniques developed to assist
assist in building this knowledge include: this process include:
 Site maps
 Change in picture – what is different about
o Camera locations the video feed since last viewing
o Black spots (no coverage)
 Site familiarisation patrols  Mental library – knowing what safety and
 Incident response rehearsals security threats look like e.g.
o Materials
Key information o Equipment
o Weapons
The ADMCC Chapter 7, Section L requires that o Vehicles
all control rooms display a laminated map of o People
each floor with camera locations marked on it. o Environmental factors
With practice and experience, CCTV operators
will instinctively be able to pinpoint locations  Does it belong – identifying any element in
using the video feeds they are viewing. the picture that does not “fit” within the
context of the environment
It is good practice to mark the camera location
map with the actual camera ID, in order to  Normal state – time and experience will
easily identify which camera feed is positioned show a CCTV operator what is “normal”
where on the map. This map can be a detailed activity for the site, and the absence of
floorplan of each level within a building, and normal will indicate a potential safety or
additional maps for external cameras fitted at security concern
the site.
 Pattern recognition – identifying repetitive
C1-Carpark behaviour can assist in determining if a
person or people are behaving in a
C2-Lobby suspicious or threatening manner

C3-I.T Servers A recommended workflow for visual detection
can be described as:
C4-Store room
Scan – assess the visual picture using the visual
C5-Deliveries detection techniques available
Table 8 - CCTV Map example
Identify – determine if there is anything that
stands out

Focus – Concentrate on target elements, and
eliminate distractions. Zoom or clarify the
picture if possible

55

Evaluate – determine if the target elements Tense
present a safety or security incident
Fidgeting
Decide – escalate the incident if required, or
continue to monitor Nervous Pulling at hair

Behavioural analysis Rapid movement

Understanding human behaviour can assist a Rigid walk
CCTV operator in determining if there is
suspicious or threatening behaviour. Behaviour Suspicious Rigid torso when turning
analysis is the process of reading non-verbal Bulges in clothing
communications. This typically consists of:
 Personal space Favouring a particular foot
 Posture
 Eye contact Table 10 - Posture examples
 Gestures
 Threat profiling Eye contact
 Hostile surveillance
Depending on the resolution and capability of
Personal space the CCTV system, it may be possible to analyse
eye contact between people. Knowledge and
Identifying personal space is a strong indicator interpretation of eye contact may assist the
of relationships between people. Normally, CCTV operator in determining the relationships,
close personal space is reserved for spouses or intensions or threats to safety and security.
family members, while distant spacing is used Examples of non-verbal communication
for unknown members of the public. The through eye contact may include:
following is a table of established zones of
personal space:  Intimidation
 Cooperation
 Personal interest or surveillance
Normally, eye contact between strangers is very
brief. Longer eye contact is held between
people who know each other or are
communicating with one another.

Zone Distance Relationship Gestures

Close intimate < 15cm Spouse and family Physical gestures are often a clear indicator of
behavioural intent. Things such as pointing,
Intimate 15-45cm waving, and clenched or waving fists signal the
intent of that person. A CCV operator can use
Personal 46cm-1.2m Business or casual the social and cultural context to interpret
gestures and determine if the person is a
Social 1.2 – 3.6m Unfamiliar people potential threat to safety or security.
Public 3.6m +
Threat profiling
Table 9 - Personal space zones
A useful tool when analysing behaviours is to
Posture establish a profile of various potential threats
identified for a site or organisation. This can
A persons‟ posture can be read to interpret include describing for each threat:
their intentions. Posture can also be used to
conceal carried items or weapons. Examples of  Typical clothing and accessories
posture interpretation can include:  Physical attributes

Interpretation Posture o Gender
Defensive Hands held up o Age
Aggressive Arms folded o Build
Shaking head o Ethnicity
Body turned away o Cultural identifiers
Leaning forward
One leg forward  Religion

56

 Markings  Equipment inspection and testing
 Interpersonal contact  Message sending
 Message receiving
o Cultural context of personal space  Troubleshooting
o Family groups  Frequency management
Building a profile for identified threats, and then
comparing attributes of a monitored target can Equipment inspection and testing
help in evaluating if a safety or security incident
is presented, and determining the appropriate The radio operator will check that all radio
actions. equipment and accessories are available, and
working correctly before starting duty. The
Hostile surveillance Inspection process will include:
Almost always, before a deliberate security  100% equipment accounting
breach occurs the person or people involved  Battery levels full + spares available
will carry out some form of surveillance. A CCTV  Belt clips, antenna and earpieces in good
operator must remain vigilant to the act of
hostile surveillance, and doing so can assist in condition
preventing security breaches. Examples of  Transmit and receive working correctly
suspicious activity that may indicate surveillance
includes: Sending and receiving messages
 Repeated passing of the same vehicle
 Filming or taking photos of security areas The radio operator will send and receive
 Drawing or note taking messages using the established radio
 Extended waiting around for no apparent procedures. The radio operator will also
escalate incidents to the control room
reason supervisor, enabling incident response decisions
 Asking questions about security systems to be made. This procedure is described in
 Repeated false alarm activations detail in the communications and reporting
 False delivery of packages section
 Persons found in “off limits” areas,
Troubleshooting
particularly areas allowing access to critical
systems e.g. heating, venting, cooling or If a radio or its network fails, the radio operator
electrical systems must carry out user level troubleshooting and
attempt to restore communications. This
5.3.2. Communications operator process is described in the following
The communications operator role is another communication procedures section.
major activity within the control room and can
be divided into two sub-roles: Frequency management

 Radio operator More complex security operations may utilise
 Communications logger several frequencies for communication, with
These two tasks are vital to a successful security different sectors or staff using each frequency.
operation. Detailed information on the The radio operator is the central point of
communications process is given in a later communication and must manage
section. communications passing through multiple
channels, and be able to select and switch
5.3.2.1. Radio operator channels to communicate with the appropriate
The radio operator will use radio people.
communication equipment to relay information
across the security team.

Key information 5.3.2.2. Communications logger
The communications logger is responsible for
The primary duties of a radio operator include: recording all communication passing through
the control centre. The logger will:

57

 Log security issues when they occur # Date / From To Message
 Log alarm activations and cancellations and Time

reasons why they occurred 25 1430 Lobby CR Visitor escort
 Log decisions made by supervisors and
Mohammed Al Ali
managers
 Log potential security issues --------------------------------------------------
 Prepare daily reports for the control room
18-12-18 Saif Al Zaabi
supervisor
26 1445 Gate CR Rotating post
Best practice for logging is to keep 2 logs, 1 for
daily occurrences, and a second log for 27 1515 Gate CR Delivery truck
supervisor decisions. An electronic version can
be kept in addition to a written log to enable Table 11 - Example communications log
better data analysis and retrieval.
5.3.3. Control room supervisor
Key information Security staff working in the control room will
not be required to supervise the operations,
 When completing communications log however understanding the role of the control
entries, rough notes can be kept and then room supervisor will assist others in the control
transferred neatly into the written log and room to work closely with and support the
updated in the electronic log supervisor. The control room supervisor will be
responsible for:
 Communications logs may be referred to
during legal investigations – accuracy is  Day to day functions of the control room
essential.  Deploying reserve security staff to incidents
 Formulating and directing response to
Topic focus
safety and security incidents
Logging communication  Escalating critical incidents to the security

A best practice for the process of logging manager
communications within a control room can be  Preparing reports for the security manager
summarised as follows: Critical incidents may be escalated to a separate
 Handwriting is clear and accurate incident management team, with their own
 Entries written in black ink incident room. This will depend on the type of
 When coming on to logging duty, the date organisation, and the anticipated risks and
threats.
and signature of incoming logger should be
recorded 5.4. Communications and reporting
 Entries in chronological order with the time Communication is one of the most important
of each entry recorded in 24hr format elements in a successful security operation, and
 Entries numbered in sequence having a clear communication plan and process
 Record only facts, not assumptions will assist all members of the team to work
 Clearly show errors by drawing a single line together in cooperation.
through the error, with correction made
and initialled 5.4.1. Chains of command
 No entries are to be erased A clearly defined chain of command will reduce
 No blank spaces or pages are permitted confusion and ensure that the passage of
 No pages can be removed or added information across the team flows in a
 When changing over duty, the log should coordinated manner. A typical chain of
be ruled under the last entry, and signed by command would look like this:
the outgoing logger

58

Security a radio network. Examples of this are:
Manager
 Control room
Control room  Escort 1
supervisor  Escort 2
 Patrol 1
CCTV operator Communications Radio operator  Patrol 2
logger  Checkpoint 1
 Checkpoint 2
Security post
staff The actual names of call signs used will depend

on the site or organisation.

Security post Frequencies
staff
This refers to the broadcasting frequency of the
Figure 41 - Reporting chain example radios used. A simple method of referring to
frequencies is by channel. A radio channel can
5.4.2. Communication pathways be programmed to a set frequency, and that
An established communication pathway will be channel then allocated to a particular team or
required when using radios for communication purpose. Channel allocation could look like this:
because if there are many staff using the radio,
there is potential for confusion and loss of Frequency Channel Group
information. This is normally referred to as a 450Mhz 1 Entry control Point
radio network. A radio network is made up of: 525Mhz 2 Mobile patrol
650Mhz 3 Reception security
 Call signs
 Frequencies The purpose of allocating channels to sub
 Equipment groups within a security operation is to reduce
the confusion and the amount of traffic coming
o Handheld radios across the radio at each post or location.
o Base station radio

Key information Radio network diagrams

Call signs To make the communication pathways clear, a
A call sign is a unique name used to identify a radio network diagram can be drawn that will
person or position of duty within the security describe the call signs, channels, and reporting
team. There can only be one of each callsign on lines within a security operation. An example of
a radio network diagram follows:

59

Checkpoint 1
Channel 1

Reception Checkpoint 2
Channel 3 Channel 1

Control room

Mobile patrol Mobile patrol
2 1

Channel 2 Channel 2

Figure 42 - Example radio network diagram

5.4.3. Radio communication equipment o Press to talk button
A radio is one of the most essential pieces of  Battery
equipment available to security staff.  Charging cable / base
Understanding the radio types available, the  Antennae
parts and components, and how to safely  Belt clip
handle the radio is vital to a successful security  Earpiece
operation.  External microphone

Radio types

There are many manufacturers and brands of
radio, however most will be designed as one of
the following:

 Hand held
 Vehicle mounted
 Base station
Most mobile security staff will carry a hand held
radio, while fixed duty locations may use a base
station.

Radio parts Figure 43 - Example hand held radio

Hand held radios will usually have:

 Radio body
o On/Off switch
o Channel selector

60

Vehicle mounted radios are installed in the
dashboard of a car or patrol vehicle, and can
offer extended transmitting ranges. The radio
will consist of:

 Radio body
 Internal speaker
 External microphone

Figure 45 - Base station radio

Figure 44 - Vehicle mount radio 5.4.4. Communication procedures
A standard method for using a radio to
A base station radio is normally used in a communicate is essential for efficient
control centre or other fixed location. The base communication and passage of information.
station radio will consist of: There are globally established standards for
 Radio body radio communication that cover:
 External speaker
 Antennae outputs  Forming radio messages
 Channel switches  Radio network etiquette
 Use of the phonetic alphabet

Radio messages
To send a message over the radio network, specific information is required. The simplest way to
describe this is as follows:

Topic focus

Starting a radio call

Information: Receiving Identify Transmitting Message End of
Say: call sign call sign - transmission

Patrol 1 This is Control Room Over

Sending a radio message End of
transmission
Information: Receiving Identify Transmitting Message
Say: call sign This is call sign Over
Send current
Patrol 1 Control Room location End of
transmission
Ending a radio message
Out
Information: Receiving Identify Transmitting Message
Say: call sign call sign Roger

Patrol 1 This is Control Room

Continuing the conversation

61

It is acceptable once the conversation has been It is important that a plan is established should
established, to stop saying your own call sign at communications fail using the primary method.
the start of each transmission, and instead only Normally this would include:
announce your call sign when closing the radio  Assigning alternate radio channels as
call. For example:
backup
- “Patrol 1, this is control room, over”  Landline phones at specific locations
- “Control room, this is Patrol 1, over”  Mobile phone
- “Patrol 1, send current location, over”  Using a runner to relay messages
- “Control room, Location A1, over”
- “Patrol 1, this is control room, roger, out” Black spot mapping

Key information The nature of radio communications means that
in certain environments or with particular radio
To achieve a clearly transmitted message, the frequencies, there will be areas where clear
following points should be remembered: communications are impossible. It is important
 Rhythm – Speak in a predictable rhythm that a security team are aware of areas within
 Speed – Speak slowly enough to be clearly their site that prohibit clear radio
communication. A best practice method is to
understood map the “black spots” of radio coverage. A map
 Volume – Do not shout or whisper, a can then be kept in the control room, and this
should be updated when:
normal conversational volume is required  New frequencies are used
 Pitch – A very low pitched voice is difficult  New radio equipment is purchased
 Security teams first occupy a site
to understand when transmitted by radio  After any construction or modifications at

Radio etiquette the site

It is good practice to allow an ongoing radio 5.4.5. Reportable information
conversation to finish, rather than interrupting. Understanding what type of information should
The only time when it is acceptable to interrupt, be reported will make the security operation
is when there is a safety or security issue that efficient and responsive. Security staff must be
takes priority. aware of the information that they are required
to pass up the reporting chain, and each site or
Lost communications procedure organisation will have different requirements
set out in standard operating procedures
If there is a loss of radio communications the (SOPs). Common examples of reportable
following steps are to be taken in order: information include:
 Check all connections on the radio e.g.  Health and safety concerns
 Potential security issues
o Antenna  False alarm activations
o External Microphone  Actual security incidents
o Battery fit  Equipment loss or damage
 Power of  Customer complaints
 Replace the battery  Internal conflicts
 Power on Each type of reportable information will have an
 Move to another location and try again associated reporting format. The standard
 Revert to alternate channel formats used will be covered in a later section.
 Switch to alternate method of
communication e.g. mobile phone Key information
 Return to control room

Alternative communications plan

62

A daily summary report will be prepared by the  Information security – being protected
site or organisational security manager for against the unauthorised use of
submission to the national security operations information, including electronic data, and
room. The normal flow of information going the measures taken to achieve this.
into this report would be:
5.5.1. Information security threats
1. Security staff notebook
 Topic focus

2. Incident reports Threats to the security of information can
 compromise not just a security operation, but
also larger parts of an organisation or business
3. Control room daily report including:
  Trade secrets
 Personal data
4. Security manager report  Financial records
 Understanding how information could be
accessed by unauthorised people can help
5. Submitted to National Security Operations security staff to safeguard against it. Examples
Centre of methods to access sensitive information
include:
The specific communication and reporting
requirements will be different for each site or Physical access
organisation, but security staff should be  Visual exposure
familiar with what to look for when taking up
duty at a new location. The information o Computer screens
contained in this section will serve as a starting o Desks
point, with further details coming from site or o Notice boards
organisational SOPs. o Printer tray
 Theft
5.5. Information security o Opportunity – unsecured
Aside from the physical security measures
applied to a control room, security staff must be documents
aware of information security threats, risks and o Forced entry
consequences of failing to follow good  Copying
information security practices. Best practice for  Photography and recording
information security standards can be found in Digital access
the Abu Dhabi Systems and Information Centre  Wrong recipient on emails
manual of Information Security Standards.  Unsecured computer networks
 Social media
Figure 46 - Information security
5.5.2. Storage and destruction of
Key definitions information

Organisations will employ policy and procedure
to guide how information should be stored, and
the requirements for destroying security
classified information. Characteristics of
information that requires secure storage
include:
 Exposes vulnerabilities of an organisation,

premises or services
 Can lead to financial loss
 Can embarrass an individual or organisation

63

 Can compromise personal data
Any information that could reveal this type of
detail must be securely stored.

Figure 48 - Lockable filing cabinet

Figure 47 - Destroyed physical information 5.5.2.2. Methods of physical information
storage

5.5.2.1. Information security policy Key information
Organisational management will implement
information security policies describing the Security classified information can be kept
processes and procedures for handling securely using a variety of methods, and
confidential or sensitive information. The policy depending on the impact of disclosure higher
will include guidance on: levels of security may be employed. Examples
could include:
 Classifying information
o Classified and marked according to  Kept in a folder while out of secure storage
the impact of its disclosure  Locked filing cabinet
 A safe
 Access privileges  Access controlled archive room
o Who is permitted to access and A combination of these measures could be
view the information utilised e.g. kept inside a locked filing cabinet,
o How to verify the access permission inside an access controlled archive room.
e.g. Lists of staff verified by I.D
o Access logging requirements e.g. a 5.5.2.3. Methods of physical information
record kept of who has accessed destruction
the security classified information
There are a variety of methods available for
 Storage requirements destroying security classified information that is
o How each classification of no longer required to be kept. Depending on
information must be stored the level of classification, and organisational
policy, options for destroying can include:
 Destruction requirements
o How each classification of  Burning
information can be disposed of o Controlled burn of documents and
o Documentation of disposal e.g. a removal of ashes
record kept of what information
was destroyed and when  Pulping
o Who can authorise the disposal of o Mixing with water and reduced to
classified information e.g. Line pulp
manager, security manager, board
members etc.  Shredding
o Documents cut into fine strips by
machine, the width of the strips
may be specified according to
information security policies

 Cross-shredding

64

o Documents passed through an Specific consideration should be given to the
industrial shredder at 90 degree recording and storage of security camera video
angles to produce fine squares images. There are currently 2 common methods
for recording and storing these images:
Figure 49 - Strip cut vs Cross cut shredding
 Digital Video Recorder - DVR
5.5.2.4. Digital information storage  Network Video Recorder - NVR
Security classified information may be kept in a A DVR system will record the camera feeds onto
digital format and the storage arrangements a mass storage drive located locally within the
must also be considered. The type of security control room.
information and its impact of disclosure will
determine the security storage methods chosen, The strengths of a DVR system include:
however some options may include:
 Physical access required to the system to
 Computer based storage retrieve or remove footage
o Password protected files
o Password protected computers Weaknesses include:
o Cloud based storage
o Intranet (internal network) storage  Inability to share recorded footage across
o Printing restrictions remote locations

 External media storage  May be corrupted or damaged by local
o Encrypted USB Flash drive disaster
o Racked mass storage drives
o CD/DVD The strengths of an NVR system include:

These options have strengths and weaknesses,  Ability to record images over an internet
and these should be evaluated before network
committing to a particular method for storing
security sensitive information.  Can scale the size of the CCTV network
easily
CD/DVD Secure network
 Recorded images can be accessed remotely
Flash drive Cloud storage Weaknesses include:

Table 12 - Digital information storage  Vulnerable to unauthorised remote
options access(Hacking)

 Network outages may result in lost
recording time

5.5.2.5. Digital information destruction
A variety of methods are available to securely
dispose of digital information. The method used
by an organisation will depend on the
sensitivity of the information, cost and
regulatory requirements. Some examples of
destruction methods include:

 Granulation
o The process of grinding down
physical storage media into fine
particles

 Degaussing
o The process of removing magnetic
information from media storage
devices
o Commonly used to securely remove
information from:
 Storage tapes
 Hard drives

65

Media storage Drive and tape If there is any request to receive copies of
recorded images captured by the control room,
crushing machine degaussing machine an authorisation form must be completed to
document the release to a third party. The Abu
Table 13 - Digital information destruction Dhabi Security Monitoring Standards provides a
form reference MCC/SMS/ICIL that can be used
machines to record the details. The information required
when issuing a copy of recorded images
The most common reason for destroying digital includes:
media storage, is when a storage device is
being retired, or no longer needed. The risk of  Date and time of image capture
information that remains on the device being  CCTV operator name
exposed is too great, and the information must  Camera I.D
be permanently destroyed.  Incident record number
 Receiving officer name
5.5.3. Visibility of sensitive information  Receiving officer contact details
 Receiving officer signature
Topic focus  Date of return or destruction
 Security manager signature
Security staff must remain aware of the visibility An example of this document can be found at
of any information that is not classified in such the end of this module.
a way that it is permanently secured, but still
presents a risk should members of the public or A strict policy must be followed when
other groups be able to view. Typical areas to consenting to release recorded images, as the
monitor for sensitive information include: confidentiality of others will be breached. The
most common occasion for releasing images
 Noticeboards will be to provide the police with evidence after
 Desk space an incident has occurred.
 Computer monitors
 Video monitors 5.5.5. I.T and Cyber security
All security staff can monitor what information Although I.T security is a specialised field,
is on display, and take action to remove from Security staff must be familiar with the basic
visible display if required. concepts in order to maintain vigilance towards
the threat of compromise through I.T systems.
Figure 50 - Computer screen privacy hood
5.5.4. Release of recorded images Basic precautions to consider include:

Key information  Allow computer systems and software to
run updates

 Ensure virus scanning software is installed
and running

 Use strong passwords for online systems
including a combination of letters, numbers
and special characters

 Do not open emails received from
suspicious senders – report to I.T
department

 Restrict physical access to computer
workstations

 Report any unusual behaviour by computer
systems e.g.
o Apparent loss of control
o Flickering or erratic screen

66

o Pop-up windows completion and filing of various documentation
and reports including:
Figure 51 - Virus scanning tools
More advanced precautions against cyber  Daily incident summaries to PSBD
threats are available, and some highly sensitive operations
sites may utilise a technique known as “air-
gapping” their data storage. This means that  Maintaining the visitors log
the computer systems that contain the classified  CCTV Incident log
information are not physically connected to any  CCTV Maintenance / Fault Log
networks or internet, removing the opportunity  CCTV Daily system check log
for remote intrusion and theft.  CCTV Viewing Log
5.6. Daily routine and procedure  CCTV Image copy release log
Daily routine within the control room will be Example of these logs and reports are found at
described within the post duty instructions, and the end of this module.
a typical control room routine will involve shift
hand over, specific duty rotation, rest breaks, 5.6.2. Fatigue management
and the completion and filing of reports.
The demands of working in a control room will
Figure 52 - Shift work require long periods of concentration and
attention to detail. In order to effectively work
5.6.1. Documentation and reports in this environment, fatigue must be planned
Key information
The communications logger working within a for and managed. The approach for managing
control room will be responsible for the fatigue within a control room fill be the
responsibility of the Security manager, and will
include:

 Shift timings
o Dependant on available staff
numbers
o Depend on site requirements
o 2 x 12 hour shifts are common;
however, 3 x 8 hour shifts are ideal

e.g.
 0600-1400
 1400-2200
 2200-0600

o Oncoming shifts will need time to

hand over, so overlap is planned for
 Shift rotations

o Staff will be rotated from early

shifts to late shifts through a cycle

e.g.

Day 1 0600-1400

Day 2 0600-1400

Day 3 1400-2200

Day 4 1400-2200

Day 5 2200-0600

Day 6 2200-0600

Day 7 Off duty

o This will reduce the negative effects

of shift working

 Task rotations

o Frequent rotation of control room

tasks will ensure staff remain highly

vigilant

67

o Task rotation every 30 minutes is

good practice e.g. It is good practice for security shift supervisors
to give a collective briefing to incoming staff,
CCTV operator 0600-0630 alerting them to any significant activities that
have been carried out by the outgoing shift,
Radio operator 0630-0700 and any planned work that needs to be
completed during the next shift.
Communications 0700-0730
Topic focus
Break 0730-0745
A shift hand over checklist can help staff to
o Staff numbers will impact rotation ensure that the hand over process is completed
 Planned breaks accurately and smoothly. Information to cover
includes:
o Control room Security staff must be  Resolved incidents
 Ongoing incidents
able to recharge energy and be  Changes to site staff / contact information
 Technical or site issues
able to escape the intensity of  Unusual occurrences
 Numbers and position of duty security staff
control room work  Signing over of duty equipment
Using this approach will ensure that all staff are
o A separate break area should be aware of what is happening within their site,
and are able to recognise potential problems
allocated, outside of the control before they occur.

room

o Regular, short breaks can be used

with a longer break taken

periodically
o Security managers will design an

optimal shift break pattern

Figure 53 - Shift fatigue

5.6.3. Shift hand over Figure 54 - Shift handover checklist
The handing over of duty to an incoming team
is one of the most critical parts of a security 5.7. Incident response procedure
operation. The continuity of a quality security
service depends on a smooth and accurate Staff working within a control room will need to
hand over of responsibility. The primary be familiar with the steps to be taken should an
benefits of a well organised shift hand over are: incident occur. The site Security manager will
 Increased situational awareness for provide standard operating procedures to the
staff, and these procedures will include:
incoming team  Escalation procedure
 Management of ongoing issues  Who is in control
 Continuity of security operations  Staff who are expected to respond
 Controlling movement of staff
Key information

It is vital that the shift hand over is done in an
overlapping method, known as relief in place.
The incoming Security staff will arrive at
individual posts to relieve the outgoing staff,
achieving 100% security coverage at all times.

68

 Evacuation procedure if required Topic focus

 Escalation procedure 5.7.1.1. Alarm activation
Normal procedure for incidents requiring If an alarm sounds or indicates in the security
escalation will be to notify the control room control room:
supervisor, who will then escalate to the  Identify the source of the alarm e.g. Fire,
Security manager.
gas leak, intrusion detection, camera
 Incident control outage etc.
Any active incident will be controlled by the  Identify the location of the alarm
control room supervisor  Communicate the alarm status to nearest
security staff
 Expected response staff  Instruct nearest security staff to investigate
Situation dependant, however stand by security and confirm the situation
personnel, fire warden, first aider, facilities  Carry out incident response procedure
management and I.T support may be required based on confirmation of incident
to respond  Document and record according to SOPs

 Controlling staff movement 5.7.1.2. Perimeter breach
During an ongoing incident, the movement of If a site perimeter breach is confirmed:
responding staff must be controlled in order to  Call the police
reduce the risk of further complicating an  Monitor the area through CCTV or security
incident. Safety and security will be considered
by the control room supervisor, and instructions personnel to locate the intruder(s)
given through the control room radio operator  Identify if any theft, damage or other
to responding staff regarding:
 Locations to move to operational impact has occurred
 Routes to take  If intruders are located, detain in
 Time to move
 Precautions to take based on monitoring of accordance with the legal requirements
 Document and record according to SOPs
the situation
 Other responding staff or external agencies Figure 55 - Perimeter breach
5.7.1.3. Theft
expected to be in contact with If a theft is identified or reported:
 Record the date, time and location
 Evacuation procedures  Call the police
All staff must be aware of the evacuation  Use available monitoring systems to review
procedures specific to the place of duty, and
what events will trigger an evacuation. Such images of the area
events may include:  Instruct Security staff to take any witness
 Uncontrolled fire
 Hazardous material spill statements
 Gas leak  Request Security staff preserve any
These details will be contained within site SOPs
evidence and the suspected crime scene
5.7.1. Actions for security incident  Document and record according to SOPs
All sites and organisations will have unique
actions required to be followed, however a
general guide for actions to when responding
to security incidents can be useful for Security
staff to use as the base of security operations.

69

5.7.1.4. Bomb threat 5.7.3. Actions for equipment failure
If a bomb threat is received in the security Equipment failure can severely impact the
control room: success of a security operation. The type of
 Signal to others that a bomb threat is in equipment and its necessity will dictate the
actions to be taken, and could be categorised
progress according to SOPs (the control as follows:
room supervisor will arrange for the police
to be called) Critical
 Remain calm and be courteous to the caller  Life support systems i.e.
 Don‟t interrupt the caller
 Try to keep the caller talking in order to o Ventilation of toxic gases
determine as much information about them o Water treatment
as possible o Fire detection and suppression
 Complete the bomb threat checklist Should any life support systems fail, serious
 Evacuate the threatened area according to consideration must be given to evacuating the
SOPs building or site in order to reduce the risk of
harm to personnel.
Figure 56 - Telephone bomb threat
Security Operations
5.7.2. Actions for safety incident  CCTV Cameras
Safety incidents will be responded to by  Intrusion sensors
Security staff, and the control room operators  Communications equipment
will coordinate this response. If a health or  Barriers and gates
safety incident is identified:  Searching equipment
 Instruct attending Security staff to make the
Topic focus
area safe e.g. control access to the area
 Request incident details Loss of capability through equipment failure
 Determine the required department to may result in a compromised security operation.
If any of these types of equipment fail, control
rectify the issue room operators should:
 Coordinate the response of maintenance or  Deploy security staff to the failure location
 Initiate an urgent maintenance request
facilities management  Deploy available back up equipment
 Process the attending security staff incident  Document and record in accordance with

report SOPs
 Document and record according to SOPs Security supervisors will assess the risk and
severity of the equipment loss, and may initiate
Key information a full or partial lockdown of certain sites.

If a health and safety issue has been identified Non-critical operations
that poses an immediate risk to site personnel,  PPE
do not allow the issue to go uncontrolled.  Lights, air conditioning or heating
Maintain a Security presence at the location The failure of equipment related to the comfort
until the issue has been resolved, or handed of staff, or general facilities will need reporting
over to the relevant department. to maintenance and the situation documented
and recorded in accordance with SOPs

5.7.4. Actions for lost communications
As the centre of the security operation, a loss of
communications is a serious problem for the
control room. Depending on the actual
communications technology used, a standard
action to be taken could include:

70

 Switch radios to alternate channel Target – Suspect, or person of interest
 Use secondary communications device e.g. Monitoring – Continuous viewing of a
situation, area or target
o Mobile phone DVR – Digital Video Recorder
o Land line phones NVR – Network Video Recorder
o Intercom system
 Send resting control room staff to bring Further research
replacement radios to remote staff
 Request technical support  Abu Dhabi Monitoring and Control Centre
 Maintain critical communication pathways Standards v5.0
via foot messenger
 Dubai Law No. 24 of 2008
5.7.5. Actions for power failure
Should a site or part of a site experience a
power failure:

 Identify any critical systems that may be
blacked out e.g.
o CCTV coverage
o Intrusion alarms
o Access control systems

 Direct remote staff to the affected area to
attempt re-setting of local power at the
switch panel

 Deploy Security staff to cover critical areas
affected by power loss

 Call facilities management for urgent
maintenance

 Escalate to municipal utilities service if
required

 If a health and safety risk is presented,
coordinate the evacuation of non-essential
staff from the affected area

Figure 57 - Power failure on site

Key definitions

SOPs – Standard Operating Procedures
Control room – Central operations room of a
site security service
CCTV – Closed Circuit Television
BMS – Building Management System
ADMCC – Abu Dhabi Monitoring and Control
Centre

71

Example control room documentation
PSBD daily incident report

Day Company Daily Incident Report Time
Emirate Date
Location

Phone number
Reporting Security Staff Name

Nationality
Company Name

Location
Incident/Accident type

Response procedure taken

Company operations staff Name

Company operations incident
summary

Received at PSBD Operations by
Rank
Name
Date
Signature

72

Control room visitor log

Date Arrival time Departure Surname Initial
time

7

Organisation Position Signature Signed in by

73

CCTV Incident log CCTV Incident Log Location
Time
Date
Incident type Live incident recording Y/N
Employer
Recording number
Reporting person name

Description of incident

Response to incident

Police requested at time Time of police arrival
Police number
Name of attending police Medical arrival
Signature
Medical requested at time
74
Name of attending medics
Name of control room
supervisor

CCTV Maintenance / Fault report log

CCTV Maintenance / Fault report log

Date Time Engineer
Reason  Regular maintenance  Call out
Maintenance details

Outcome

75

Viewing log for recorded CCTV

Viewing Viewing Camera Operator name Persons viewin
date time ID

7

ng Organisational Reason for viewing Outcome if any
Details

76

Issued copy of CCTV images log

Issued copy of CCTV images log

Reason for provision  Legal proceedings  Subject access  Other
Camera ID
Date of creation Time of creation CCTV Operator

Incident number
Police or Third party name

Contact details
Signature of third party
Date of destruction or return
Security Manager signature

77

Daily CCTV system check log

Date Time Operator Date/Time stamp Camera and
checked recording quality

checked

78

Module 5 Revision 2. Identify 2 laws and regulations governing
the operation of security control rooms in
Revision questions the UAE?

1. List the 3 main roles within a Security
Control room?

3. List 5 examples of technologies that could 4. All visitors to a control room must be
be integrated within a control room logged and escorted – True or False

5. List 3 tasks of a CCTV operator 6. List 2 tasks of a communications logger

7. List 3 tasks of a radio operator 8. Outline the chain of command and
reporting within a standard security
control room

79

9. Identify 3 radio accessories used in 10. Identify 4 examples of reportable
security operations information

11. List 3 ways to destroy physical documents 12. List 2 methods of secure document
storage

13. List 3 potential I.T security threats 14. List 3 locations that sensitive information
may be visible in the workplace

15. Identify 5 pieces of information that could 16. Outline the procedure for handling a
be included in a shift handover checklist telephone bomb threat

17. Name the procedure for overlapping 18. Name the document that needs to be
security shifts during hand over completed when issuing recorded images
to police or a third party

80

Module 6
Patrolling

Module 6 Key information

Patrolling The 4 P’s of patrolling

Qualification Link Protection of life:
from dangerous / hazardous situations, assault,
Units or emergency situations
 SEC03004NU18-Conduct site security
Protection of property and premises
patrols Protecting property from theft, fire, criminal
 SEC03003NU18-Use security search damage, or defacement.

methods and equipment Prevention of loss and waste
Learning outcomes Loss by theft, breach of confidentiality, or abuse
1. Interpret site security plans and prepare of client‟s property, such as unauthorised use of
computers, telephones or other equipment.
for security patrols
2. Conduct security patrols Preventing and deterring crime
3. Carry out inspection of key security areas Theft, breach of peace, criminal damage, public
4. Search structures order offences
5. Use standard formats to document patrol
Further aims can be identified as:
activity  Increased situational awareness
 Providing an overt physical security
Key definitions
presence
Security Patrol – Travelling a route or path  Reducing response time to critical areas
with the aim of enhancing the safety and  Inspecting the status of security measures
security of a site or area  Deterring criminal activity
Dismounted – Moving by foot  Increasing alertness of Security staff
Mounted – Moving by any vehicle type  Providing customer service
Patrol report – Standard report documenting
security patrol activities

6.1. Aims and methods of patrolling 6.1.2. Methods of patrolling
There are several methods that Security staff
One of the primary duties of Security staff are can use to conduct patrols, each with its own
to conduct periodic patrols of the site or area benefit and weakness. The most common
for which they are responsible. There are methods include:
various aims when conducting patrols, and
methods by which the patrol is carried out. Walking patrol

6.1.1. Security patrol aims This form of patrolling is the most common,
The primary aims of security patrolling will vary and is utilised in most organisations.
slightly depending on the organisation,
however the following can be referred to as a Benefits include:
foundation for why Security staff conduct  Enhanced situational awareness
patrols:  Can utilise human senses
 Ability to inspect closer detail
 Interaction with staff, and members of the

public

Weaknesses include: measures marked. Security staff can refer to
 Time required to cover larger areas these maps to aid in the familiarisation of the
 Physically exhausting site, and where the relevant utilities, systems
 Environmental exposure and infrastructure is located.

Vehicle patrol Key information

Vehicle patrols could take many forms When reading a site plan map look for the
including: following details:
 Car  Version – always use the latest
 Golf Buggy  Legend – ensure the symbols indicating
 Cycle
 Segway critical systems, locations and security
Benefits include: measures are understood
 Ability to patrol a large area or perimeter  Scale – identify the size of the area to be
 Can be fitted with supporting technologies patrolled
 Orientation – make sure the site plan
such as: layout is understood (Normally oriented to
o Radio north)
o GPS tracker  Perimeter – identify the boundaries of the
o High powered lighting site
 Zones – identify the boundaries of any
 Can keep Security staff protected from the zones within the site plan
environment during patrols
Some site plans may be supplemented with
Weaknesses include: satellite imagery, digital renderings, or even
 High profile may alert criminals to an scale models that allow for an enhanced
understanding of the site.
approaching patrol
 Removes the ability to use some of the 6.2.2. Crime prevention strategies
Site security plans may include specific
human senses strategies to prevent and deter crime. The
 Can be expensive to maintain and operate patrolling staff should confirm these strategies
and ensure that measures within the site are in
Remote technology patrol support. Specific strategies could include:
 Increasing the risk for criminals
Technologies can be used to survey areas in a
form of “Remote Patrolling”. Examples of this o Chance of detection
include: o Exposure to public
 CCTV Cameras o Enforcement of laws
 Drones  Reducing reward for criminals
o E.g. Compartmentalising valuables
6.2. Site plans and patrol routes  Increasing difficulty in committing crime
o Deny access
It is essential that Security staff tasked with o Security depth e.g. 4 D‟s
performing security patrols understand the  Reducing temptation for criminal activity
layout of their work site, and established o Removing valuable items from view
patrolling routes. o Constant vigilance of security
o Warning signs
Key information 6.2.3. Routes and timings
In addition to a well-designed site plan, Security
Site security plans, patrol maps and patrol staff will use patrol plans that describe the
instructions can be found in a sites Security routes and zones that must be patrolled, and
Control Room

6.2.1. Site layout and security systems
Security supervisors and managers are
responsible for maintaining site plans with
critical systems, key locations and security

the timings or schedules that are to be  When a business or organisation is open to
followed. For example: the public

Day Zone Route Time Method  When deliveries, maintenance or other
scheduled activities normally occur
06:30 Vehicle
A 10:30 Walking All of this information will be evaluated in order
to plan a cohesive patrol schedule.
Perimeter B 16:30 Walking
6.3. Patrol preparation
20:30 Vehicle
Security patrols can be divided into 3 phases:
C 00:30 Vehicle
 Preparation
1 Outer A 08:30 Walking  Conduct
public B 11:30 Vehicle  Completion
C 13:30 Walking The preparation phase is vital to ensure the
safety and success of the security patrol.
Inner A 09:30 Walking
6.3.1. Confirmation of patrol requirements
public B 12:30 Walking The first step in the preparation phase is to
confirm the requirements for the patrol
Secure A 07:30 Walking including:
B 17:30 Walking
 Aims and objectives of the patrol e.g.
Table 14 - Example patrol plan o Information gathering
o Routine inspections
The following will have been considered when o Show of force
preparing a patrol plan for a specific site or
location:  Zones and routes to be covered
 Key security areas to be inspected e.g.
Site layout and size
o Power generation equipment
 How can 100% site inspection be achieved o Life support systems
 What are the most efficient routes to travel o Hazardous waste processing
o Fuel storage
through the site o Data centres etc.
Security zones  Communications procedures including:
o Primary and alternate radio
 How is the site divided into access zones
 What controls are in place to separate the frequency
o Secondary communications
zones o Reporting requirements
 Who is likely to be present in each zone,  Other Equipment to be carried e.g.
o Keys and access passes
and what threats or risks have been o Defensive tools (if required)
identified o Patrol inspection checklist
Critical security areas o Patrol map
o Patrol touring device
 Which areas are most critical to the o Torch
organisation o Notebook and pen
o Personal first aid
 Do certain areas require rapid response o Appropriate PPE
capabilities in the event of an incident These patrol requirements are normally
outlined within a work instruction document
Supporting technologies and systems prepared by the Security Manager.

 What areas are covered by CCTV or sensors
 Where are access panels or alarms installed
Personnel available

 Numbers of staff available to perform
patrols

 Organisational policies regarding lone
workers

Shift rotations

 Timings of shift start and end
 Reduction in personnel for night shifts
Organisational timings

6.3.2. Equipment preparation and testing device On/Off operation
Registers home point
Key information Personal first Signed for in post
aid equipment register
Having confirmed the requirements of the Kit contents in date and
patrolling activity, thorough equipment Torch complete
preparation and testing must be carried out to Signed for in post
reduce the risk of failure while on patrol. A pre- equipment register
patrol checklist can be developed to guide and Batteries in good condition
assist Security staff in carry out the appropriate Bulb/LED operational
checks and tests Case or pouch in good
condition
A good practice for pre-patrol checks: Signed for in post
equipment register

Item Check This systematic approach to checking and
Keys & Passes Correct for zones and testing equipment will reduce as much as
patrol route possible the chance of equipment failure, and
Radio Signed for in key register increase the odds for a successful security
No damage to body patrol.
Duty belt Antennae fitted in good
Plastic condition Safety!
Buttons and switches
handcuff normal operation Security staff must be aware of organisational
Pepper spray Battery charged, and spare OHS policies. Depending on the place of duty
available PPE inspection may include:
Baton Correct frequencies
Patrol touring programmed Dangerous noise levels
Accessories fitted in good  Hard hearing protection rated to decibel
condition e.g.
 Belt clip levels required
 External microphone  Soft hearing protection requirement
 Earpiece  Time of exposure limits
Signed for in post Traffic safety
equipment register  Hi-Visibility vests, with reflective panels
Pouches in good condition  Illuminated traffic rod (red/green)
Baton loop securely fitted  Traffic cones
Buckle in good condition Industrial machinery and Plant equipment
Signed for in duty post  Safety boots
equipment register  Hard hat
No deterioration of the  Eye protection rated for projectile risks
plastic material Flammable environments
Locking teeth function  Flame resistant clothing
Signed for in restricted item Ionising radiation exposure
register  Dosimeter badges
Shots remaining
Arm/Disarm lever working Any Security staff who patrol through zones or
Signed for in restricted item areas with health and safety risks present must
register adopt the appropriate PPE levels whilst exposed
No cracks or rough edges to those risks.
Signed for in restricted item
register
Battery charged

6.4. Conducting security patrols o Suspicious items or occurrences
 Human interaction
Procedures for conducting security patrols may
be different depending on the site or o Gauge behaviour of colleagues and
organisation. Specific instructions for the staff
conduct of patrols will be given for each
location or organisation, and Security staff must o Gauge behaviour of public
be familiar with the relevant procedures. o Observe relationships and

6.4.1. Communications with control room interactions
Communications while on patrol are essential in o Observe body language and non-
order to send or receive information, request
assistance, or report risks and threats. Before verbal communications
leaving to conduct a security patrol, the Make sure to follow the patrol route in order to
following steps should be taken: ensure that no areas are left uninspected
 Perform a radio communications check with
The security patrol is an excellent opportunity
the control room ensuring: to gather information on the state of safety and
o Signal strength is good security at a site, and the use of detailed note
o Your callsign is identified taking, photography and completion of
inspection checklists is essential in providing
 Advise the control room of the planned the control room and security managers with
route useful information for decision making.

 Advise the control room that patrol is now 6.4.2.1. Progress reporting
commencing at the current time Most sites and organisations will require
security patrols to report on progress. The
6.4.2. Patrol events details required may be different depending on
While on patrol Security staff will complete a the site. The reasons for progress reporting
series of checks to ensure the safety and include:
security of the site. The events that take place
will differ depending on the specific site,  Security staff safety
however the most common events include: o Control room know the location of
patrolling staff
Topic focus o Support is able to be sent
accurately
 Safety inspections
o Fire exits clear of obstructions  Situational awareness
o Fire alarm panels operating o Control room aware of security
correctly status within the site
o Fire extinguishers in correct o Able to take pro-active steps to
location and in good condition prevent possible security risks
o General health and safety hazards
 Time management
 Security inspections o Completion of patrols may be time
o Doors and windows secured sensitive
o Areas not covered by CCTV o Patrolling staff may have other
checked duties to move on to
o Parking areas checked for violations
or suspicious activity  Record keeping
o Personnel within access zones are o Progress reports will be logged
authorised (I.D worn) o Evidence of duty being performed
o Access zone controls are working
correctly 6.4.2.2. Responding to unplanned events
o Site perimeter is secure During the conduct of security patrols, there
may be unplanned events that require the
response of patrolling staff. This could include:

 Discovery of security breach
 Discovery of immediate health and safety

concern
 Extra support required at another location

In the event that patrolling staff are required to patrol, in order to properly understand the
respond, the following should be completed: primary aims of the security patrol. Critical areas
 The control room must be notified specific to each site will be different, but as a
 Progress noted regarding the current patrol general guide the following could be included
This will enable the patrolling task to be in a critical area list:
completed accurately when the unplanned  Heating, Venting and Cooling machinery
incident has been resolved.  Power supply access
 Water and utilities access
6.4.3. Patrol completion procedures  Hazardous materials storage
Upon completion of a security patrol, staff must  Medical waste disposal systems
follow a post-patrol procedure. This will ensure  Oil, Gas or Petroleum pipelines
that the benefits of the patrol activity are  High value goods storage
gained. Typical patrol completion procedures  Data storage centres
include:  Site entry and exit points
 VIP offices or accommodation
Return of Equipment  Perimeter zones
 Inspect all patrol equipment for damage  Essential operations zones e.g.

and wear o Airport runways & aprons
 Sign in any patrol specific equipment o Manufacturing rooms
 Place any powered items on charge o Import/export yards and terminals
 Sign in and secure restricted items Any area specified by the business or
Patrol notes and reports organisation as essential to their success may
 Review patrol notes for accuracy be a critical area.
 Ensure any patrol checklists are complete
 Prepare a patrol report if required 6.5.2. Determining security status of
 Submit patrol documentation to the control critical areas

room In order to conduct security inspections of
Patrol duty handover critical areas within a site, patrolling staff must
 Verbal briefing of oncoming patrol staff understand what is the „normal‟ state for that
area. This knowledge will usually be gained
o Significant observations during a site induction conducted by the site
o Incidents if any security supervisor or manager.
o Routes taken during previous patrol
o Specific tasks uncompleted Topic focus

The patrol completion requirements may be Some basic considerations that may apply
different depending on the type and scale of include:
the site or organisation, but following this
method as a basic guide will ensure smooth
security patrolling operations.

6.5. Key and critical areas

Key and critical areas are those which are
essential to the continuous operations of an
organisation, or that interference with would
cause harm to people, property or information.

6.5.1. Critical area knowledge
Security staff must possess detailed knowledge
of critical areas within the site they are tasked to

 Obvious damage to equipment or o Enabling 100% search coverage of
infrastructure the building

 Liquid leaks or escaping gases  Building purpose e.g.
 Signs of forced entry, or unsecured access o Office space
o Storage
points o Plant and Machinery housing
 Loss of power or other utilities o Warehousing
 Suspected unauthorised persons in the area
 Obvious missing items e.g. Generators, 6.6.3. Building search safety considerations
Before entering a building to conduct a security
Computer servers, electrical cabling etc. search, safety must be given priority. The
 Open access gates following areas should be considered, and a
It should be a priority of new Security staff to quick risk assessment performed:
learn and understand the critical security areas
within a site and what the normal state of  Security circumstance of search
operations looks like. o Suspicious person inside
o Suspicious item inside
While on security patrol, Security staff will o Suspicious activity near the building
report to the control room on the current status o Aggressive person inside
of identified critical areas to provide real-time
updates on the status of these areas within the  Health and safety
site o Lighting conditions inside
o Low doorways, piping or conduits
6.6. Building searches o Trip hazards
o Hazardous substances
Security patrolling staff may be required to o Presence of fire or gas
search buildings and structures within the site in o Available exits in case of emergency
response to reported information, or as a abandonment of search
routine task.
 Communications plan
6.6.1. Building search requirements o Radio coverage inside building
Establishing the purpose for searching a o Use of runners to relay search
building will provide the patrolling security staff progress
with essential information that will help them to o Alternate communications in case
make decisions about personal safety, and of failure
contribute to a successful building search.
Security staff should assess the presence of
6.6.2. Planning to search a building these risks to personal safety and the safety of
When planning to conduct a building search the team, and take appropriate precautions and
the following considerations can be made: use the correct PPE before conducting the
 Entry and exit locations building search.

o Enabling escape of suspects 6.6.4. Searching with other security staff
o Calling in further support Depending on the size of the building, threat
o Enabling retreat of security staff level and available security staff, a building
 Stairwell locations search may involve a larger search team. The
o Enabling transit within a multi-floor main principles of searching as a team are as
follows:
building
o Provide escape routes for suspects  Communication
o Provide choke points for inner- o Radio, visual, or verbal
o Brief and relevant to search task
cordon during search
 Number of floors  Coordinated movements
o 1 person in charge
o May dictate the size of search team o Methodical progress through
building
o Clear by sections before moving on
o Single floor at a time if multi-floor
building

 Maintenance of a cordon Security patrolling activity is required to be
o Use of Security staff to cordon documented, and as described previously, it will
access to the building usually be in the form of patrol notes kept in
o Prevent others from entering the security notebook, completed patrol
o Prevent suspects from escaping checklists, and if any incidents were dealt with,
an incident report will also be completed.
The use of training drills and practice will
enhance a search teams‟ efficiency and skill in 6.7.1. Reporting requirements
quickly and accurately completing a search of a Site duty instructions will describe the types of
building. Security staff should be familiar with events, occurrences or incidents that require a
the layout of all buildings within their site. formal incident report. Security staff should be
prepared to keep notes on any occurrence that
6.6.5. Use of canines for building searches they believe may have an impact on the safety
Trained canines can be used as a tool to assist or security at the site.
in the search of buildings. Depending on the
scenario, and what is being searched for, a The standard procedure for reporting is:
canine may provide excellent support in the  Urgent incident
form of:
 Confirming the presence of explosives o Report in real-time over radio to
 Confirming the presence of narcotics control room
 Personnel tracking / missing person trace
 Cadaver detection (Deceased persons) o Take mental notes while dealing
with incident
Key information
o Write incident details in notebook
For the effective use of canines in search, it is immediately after incident is
important to reduce contamination of the area resolved
with further human scents.
o Prepare formal incident report
Some further basic rules for canine search o Submit to control room
operations include:  Non urgent incident
 Do not approach the dog for petting o Report to control room
 Do not feed the dog o Write notes in notebook
 Do not distract the dog handler o Include details in patrol report
 The dog can only work for short intervals  Other observations
o Write notes in notebook
effectively o Include observation details in patrol
 Environmental conditions will impact the
report
duration and effectiveness of canine search
e.g. heat exhaustion 6.7.2. Standard patrol documentation
Security staff must be familiar with the standard
Safety! patrol report format that is in use at the site.

If there is any doubt about the personal safety Topic focus
of a high risk building search, Security staff
should defer to the appropriate public security A security patrol report is a standard document
agency e.g. Police, Civil Defence, Military that the Security staff will complete. The
contents of a patrol report include:
6.7. Patrol documentation  Staff name
 Staff ID
 Date
 Start time
 Finish time
 Zones/Areas inspected

 Route taken
 Security checks performed
 Security status of critical areas
 Safety inspections performed
 Observations or comments
 Signature

When completing a patrol report, accuracy is
essential. Include only facts, and not
assumptions. The patrol report may act as a
legal document if any investigations are
opened, and the contents of the report must be
true.

An example of this document can be found on
the next page.

Key information

Any security documents be secured in
accordance with organisational policy, and
information security standards. Best practice for
this includes:
 Lockable filing cabinets kept in an access

controlled room (control room)
 A document register kept to record files

stored and removed from the cabinet
 Proper destruction of documents no longer

required e.g.
o Shredding, burning, pulping or
granulation

 A record of destroyed documents kept

Example patrol report

Name Start time Finish time ID
Date Ro

Location Check Secu

1 Fire exits 
2 Fire extinguishers
Zone 1 3 Zones not covered by CCTV
Zone 2 4 Reception area
5 Fire alarm panels
6 VIP Carpark
7 Exterior pathways
8 Windows and doors
9 Data room
10 HVAC room
11 Rear gate

Other observations

Module 6 – Patrolling

Signature 1 2 3 4 5

oute A  B  C  Zones

urity Status Comments



Page 91 of 253

Module 6 Revision

Revision questions 2. What are the 4 P‟s of patrolling (Aims)

1. Where would the site security plans, patrol
instructions and patrol maps be found?

a. In the main reception
b. In the security control room
c. On the company website
d. In the finance office

3. List 3 methods of security patrolling 4. List 3 crime prevention strategies

5. List the steps of the patrol preparation phase 6. List 5 security inspection events while on
patrol

7. List the steps of patrol completion phase 8. Outline the information security requirements
for patrol documentation

9. List 5 examples of critical areas for inspection 10. What are the 3 categories of safety to

on patrol consider before searching a building?

11. List the 3 principles of teamwork when 12. Summarise the precautions that need to be
searching a building taken regarding human scent when using
canines for search


Click to View FlipBook Version