9. True or False? Private Security Staff are 10. If you suspect a person is guilty of a crime,
permitted to detain suspects according to the but have not witnessed it, can you detain
UAE Penal Code. the suspect?
TRUE / FALSE a. Yes, according to the law
11. What are the 4 steps you must follow when b. Yes, ONLY if the suspect consents
making a citizen’s arrest? to being detained
c. No, not permitted at all
12. When is it permitted to use force in self-
defence according to Ch. 4, Section 1
Article 56 UAE Penal Code?
13. Which article of Wadeema Law states: Give 14. In Abu Dhabi and Northern Emirates,
children priority of protection, care, rescue and Which directorate is responsible for the
guidance in cases of emergency, disaster, regulation of Private Security?
armed conflict and any crimes committed ?
15. In Dubai, which directorate is responsible for 16. List 5 security license categories available
the regulation of Private Security? from Abu Dhabi and Dubai
17. What are the 8 personal requirements to apply 18. List the 7 items and equipment that
for a security guard license in Abu Dhabi and Security staff must carry on them according
Northern Emirates? to Ministerial decision no. 557 of 2008
47
19. What are the 4 D’s of physical security? 20. Give 3 examples of security measures for
each of the 4 D’s
21. What are the 5 zones of security access? 22. List the 4 public security and safety
departments that security staff are most
likely to deal with
48
Module 5
Control room
operations
49
Module 5 5.1.1. Purpose and application
A security control room brings together the
Control room operations elements of a security operation, and offers a
logical way to coordinate the effects of security
Qualification Link systems, personnel and response options. A
security control room containing monitoring
Units and control systems can commonly be found in:
Nil Hotels
Learning outcomes Banks
1. Outline the function of security control Shopping Malls
Industrial sites
rooms Airports
2. Identify laws and regulations related to Ports
control room operations 5.1.2. Laws and regulations governing
3. Recognise control room technologies control room operations
and design considerations Within the UAE there are several laws and
4. Apply control room security policy and regulations that govern how a security control
centre should operate, and the use of CCTV.
procedures
5. Summarise roles and tasks within a Key information
security control room The Abu Dhabi Monitoring and Control
6. Identify communication and reporting Centre (ADMCC) has published security
monitoring standards version 5 as a
requirements regulation requirement
7. Identify information security
Dubai has Law No. 24 of 2008 regulating
requirements security service providers and users, relating
8. Outline security control room work to the installation and use of CCTV systems
routines The ADMCC standards describe the following
9. Outline security control room incident requirements for CCTV and control rooms:
Coverage areas for CCTV in various facilities
response procedures Technical requirements of installed
5.1. Introduction to security control rooms equipment
Design, approval and integration processes
A security control room is a common way to Security system inspection requirements
centralise security resources and operational Documentation and logs required
activities. Security staff will almost certainly
interact with a security control room, or work These details are covered in later sections of
within one themselves. this module.
Figure 39 - Security control room
5.2. Control room design
50
o Automatic License Plate
Recognition (ANPR)
The design and construction of a security Access control systems
control room is not the responsibility of Security o Radio Frequency Identification
guards, however understanding the basic
elements will help in comprehending the bigger (RFID) badges
picture of providing security to a site o Keypads
o Biometric systems
5.2.1. Technologies and integration
A central security control room provides an Fingerprint
opportunity to monitor a variety of Eye Scanner
technologies and systems. Advances in Voice recognition
technology mean that there is a great amount Combination
of information that can be viewed easily and o Electro-magnetic locks (remote
quickly through an integrated system.
release)
o Vehicle barriers & gates (remote
release)
Key information Building management systems (BMS)
o Fire alarm and suppression
Examples of technologies and systems that are o Elevator controls
found in a security control room: Emergency intercom
Return to ground
CCTV o Heating, venting and cooling
Access control and parking management
Building management systems (HVAC)
Security alarms and sensors o Gas sensors and alarms
CCTV Security alarms and sensors
o Analogue systems o Perimeter intrusion detection
o Digital I.P cameras Microwave beam
o Digital Video Recorders Infrared beam
o Pan, Tilt and Zoom cameras Vibration sensor
o Motion triggered o Door alarms
o Night vision capable Forced entry
o Thermal vision capable Tamper alarm
51
o Arming and disarming of systems
o System information
Location of alarms
Time and date
Zones breached
Public address systems Location
o Internal communication (intercom)
o Building speakers The placement of a control room may impact
o Site public address speakers the performance of security for the site. For
example:
The number of systems and technologies
available are wide ranging, and control room Centrally located
staff will need to become familiar with the o more protected by layers of
specific systems installed at the site or building security
where they work o reduced response times to all areas
Figure 40 - Control room plan Near site perimeter
o Ease of access for contractors and
5.2.2. Physical design considerations essential services
The location within a building or site, and the o More vulnerable to external threats
floorplan and layout of the control room are
not the responsibility of a security guard, Co-located with reception area
however understanding the design o Suitable for low threat
considerations will improve the situational environments
awareness of security staff. o Organisational management
response may be faster
o Confidentiality may be
compromised due to public access
Room layout
The internal design and placement of desks,
screens, doors, windows and other equipment
will impact the usability of efficiency of the
control room. For example:
Spacing and location of desks
o Open plan allows good
communication
o Improve teamwork and
collaboration
o Consider OHS hazards
Access points
o Access door positioned away from
public zones or reception
o Should be “air locked” to prevent
tail gating through the door
o May require emergency
exit/alternate access points
CCTV monitoring screens
o Should be positioned on desks, not
on walls
o Maximum of 3 screens per desk
o Placed 3 times the distance of the
screen diagonal from the user
Supervisor positioning
52
o Located for best situational o Ensure documentation and reports
awareness within the control room are kept out of view
o Optimised for communication with Physical entry control
control room staff Use electronic security locks
Access badges issued to authorised staff
Windows System keeps record of staff entries and
o Depending on security
requirements exits
o 1-way or 2-way viewing Use a small reception area within the
o Safety glass – smash resistant
o Opening or fixed control room to screen people coming in
and out
Each of the design elements may be present in A biometric access system could also be
the construction of a security control room, and used as a secondary security layer e.g.
knowledge of why they are implemented will
help Security staff to better understand the o Fingerprint reader
overall picture of security at their site. o Eye scanner
5.2.3. Security and access control It is vitally important that the security of the
Controlling who has the ability to enter the control room is maintained, as it is the centre of
control room is of high importance. Critical and all security operations for a site or even multiple
sensitive information and activities are exposed sites.
within the control room, and only those who
need to know should be able to access the 5.3. Roles and tasks within a control room
room.
There are several defined roles and tasks that
Topic focus will be performed by Security staff while
working in a control room. Depending on the
Access control can be achieved through a organisation and the equipment and systems
variety of systems and control measures installed, there might be other roles and duties,
including: but the most basic requirements include:
Control room supervisor
Staff permissions Security systems operator
Communications operator
Maintained list of who can enter the control
room 5.3.1. Security systems operator
The security systems operator may be required
Limited to only those who need access to use installed CCTV systems, monitor and
Regularly updated and monitored respond to alarms and sensors, or control
Visitor access control access remotely through gates, doors or other
access points. A high level of vigilance,
Written policy and procedures for allowing attention to detail and system training is
visitor access important for a successful security systems
o Must have valid reason for visit operator.
o Must be authorised by manager
5.3.1.1. CCTV Operator duties
Escorting visitors inside the control room One of the most common tasks within the
o Visitor ID should be issued, to let control room is the operation of a CCTV system.
others know they are authorised to This role is often key in carrying out successful
be there security operations at a site.
o A member of the Security staff
must be responsible for the visitor
o Visitors must not be left alone
Visitor access log completed
Restrict information on display while visitors
are present
o Black out large CCTV displays
o Reduce volume of radios
53
Key information used to perform periodic visual inspections, and
can include:
The duties of a CCTV operator are:
Vulnerable or critical areas
Daily System checks Remote and low activity areas
Monitoring live video images Areas not covered by foot patrols
Video patrolling Video patrolling sequences are normally set by
Live incident tracking the control room supervisor in cooperation with
Passing information to communications the security manager. Security staff operating
CCTV are expected to follow the video
operators patrolling plans given to them.
Retrieval of stored images
Live incident tracking
Daily system checks
When a safety or security incident is detected
Camera status 100% functional by the CCTV operator, they will continue to
Resolution of video is good track the targets or other elements involved
CCTV operating system working (controllers using the CCTV system. This provides the best
possible situational awareness for the control
and software) room supervisor to form a suitable response
Recording and retrieval system working plan, and adjust the response if necessary as the
A log will be established in the control room for situation changes. While live incident tracking,
daily system checks to be recorded the CCTV operator will:
Live video monitoring Use available video feeds to monitor the
location and activity of concerned parties
This is the primary duty of a CCTV operator
while working in the control room. It is Report the locations of concerned parties to
recommended that a CCTV operator monitors the communications operators and
the available video feeds on a 5-minute cycle. supervisor
The following table describes the expected
visual load of a CCTV operator when monitoring Report the actions of concerned parties to
live video on the 5-minute cycle: the communications operators and
supervisor
Area of coverage Cameras
50 Remain vigilant to further safety or security
Perimeter fence with Intruder 15 threats during an ongoing incident
Detection System and no active 15
security patrols Effective communication during live incident
tracking is a critical part of successful response
Perimeter fence without Intruder to safety and security incidents.
detection system and no active
security patrols Retrieving recorded images
Crowded public areas with active There will be occasions when the CCTV operator
security staff is required to retrieve recorded footage, and
the policy and procedure for this activity will be
Crowded public areas without 5 written by the security manager. The CCTV
active security staff operator must be aware of the policy and
procedure, and follow it accurately. Common
Table 7 - Live video monitoring load reasons for retrieving recorded footage include:
Video patrolling Providing evidence to police
Internal investigations
The term “Video patrolling” is used to describe Training activities
the systematic monitoring of certain areas Peer review of security monitoring
within a site using installed cameras on a If a copy of recorded images is made and
designated route or sequence. This technique is issued to police or other departments, an issue
report will be completed and logged.
54
5.3.1.2. CCTV Operator skills and abilities Understanding where black spots exist in CCTV
The skills and abilities required of a CCTV coverage will guide all security staff when
operator are unique, and not all Security staff conducting mobile patrols of the area, ensuring
will fit the nature of the CCTV operator role. that sufficient attention is given to areas that
There are skills that can be developed through are not monitored. Any black spots should be
practice and training including: marked on the CCTV map.
Site layout knowledge
Visual detection techniques Topic focus
Behavioural analysis
Effective team communication Visual detection techniques
Site layout knowledge Many CCTV systems have the capability to
All security staff must have a thorough detect motion, crossing of zones or even heat
understanding of the layout of their work site, levels, but humans are able to reason and
however CCTV operators need to be able to determine complex scenarios better than any
calculate exact locations using camera locations technology can. Detecting a safety or security
and video feeds to determine where a safety or incident is one of the key skills of a CCTV
security concern is located. Tools available to operator and techniques developed to assist
assist in building this knowledge include: this process include:
Site maps
Change in picture – what is different about
o Camera locations the video feed since last viewing
o Black spots (no coverage)
Site familiarisation patrols Mental library – knowing what safety and
Incident response rehearsals security threats look like e.g.
o Materials
Key information o Equipment
o Weapons
The ADMCC Chapter 7, Section L requires that o Vehicles
all control rooms display a laminated map of o People
each floor with camera locations marked on it. o Environmental factors
With practice and experience, CCTV operators
will instinctively be able to pinpoint locations Does it belong – identifying any element in
using the video feeds they are viewing. the picture that does not “fit” within the
context of the environment
It is good practice to mark the camera location
map with the actual camera ID, in order to Normal state – time and experience will
easily identify which camera feed is positioned show a CCTV operator what is “normal”
where on the map. This map can be a detailed activity for the site, and the absence of
floorplan of each level within a building, and normal will indicate a potential safety or
additional maps for external cameras fitted at security concern
the site.
Pattern recognition – identifying repetitive
C1-Carpark behaviour can assist in determining if a
person or people are behaving in a
C2-Lobby suspicious or threatening manner
C3-I.T Servers A recommended workflow for visual detection
can be described as:
C4-Store room
Scan – assess the visual picture using the visual
C5-Deliveries detection techniques available
Table 8 - CCTV Map example
Identify – determine if there is anything that
stands out
Focus – Concentrate on target elements, and
eliminate distractions. Zoom or clarify the
picture if possible
55
Evaluate – determine if the target elements Tense
present a safety or security incident
Fidgeting
Decide – escalate the incident if required, or
continue to monitor Nervous Pulling at hair
Behavioural analysis Rapid movement
Understanding human behaviour can assist a Rigid walk
CCTV operator in determining if there is
suspicious or threatening behaviour. Behaviour Suspicious Rigid torso when turning
analysis is the process of reading non-verbal Bulges in clothing
communications. This typically consists of:
Personal space Favouring a particular foot
Posture
Eye contact Table 10 - Posture examples
Gestures
Threat profiling Eye contact
Hostile surveillance
Depending on the resolution and capability of
Personal space the CCTV system, it may be possible to analyse
eye contact between people. Knowledge and
Identifying personal space is a strong indicator interpretation of eye contact may assist the
of relationships between people. Normally, CCTV operator in determining the relationships,
close personal space is reserved for spouses or intensions or threats to safety and security.
family members, while distant spacing is used Examples of non-verbal communication
for unknown members of the public. The through eye contact may include:
following is a table of established zones of
personal space: Intimidation
Cooperation
Personal interest or surveillance
Normally, eye contact between strangers is very
brief. Longer eye contact is held between
people who know each other or are
communicating with one another.
Zone Distance Relationship Gestures
Close intimate < 15cm Spouse and family Physical gestures are often a clear indicator of
behavioural intent. Things such as pointing,
Intimate 15-45cm waving, and clenched or waving fists signal the
intent of that person. A CCV operator can use
Personal 46cm-1.2m Business or casual the social and cultural context to interpret
gestures and determine if the person is a
Social 1.2 – 3.6m Unfamiliar people potential threat to safety or security.
Public 3.6m +
Threat profiling
Table 9 - Personal space zones
A useful tool when analysing behaviours is to
Posture establish a profile of various potential threats
identified for a site or organisation. This can
A persons‟ posture can be read to interpret include describing for each threat:
their intentions. Posture can also be used to
conceal carried items or weapons. Examples of Typical clothing and accessories
posture interpretation can include: Physical attributes
Interpretation Posture o Gender
Defensive Hands held up o Age
Aggressive Arms folded o Build
Shaking head o Ethnicity
Body turned away o Cultural identifiers
Leaning forward
One leg forward Religion
56
Markings Equipment inspection and testing
Interpersonal contact Message sending
Message receiving
o Cultural context of personal space Troubleshooting
o Family groups Frequency management
Building a profile for identified threats, and then
comparing attributes of a monitored target can Equipment inspection and testing
help in evaluating if a safety or security incident
is presented, and determining the appropriate The radio operator will check that all radio
actions. equipment and accessories are available, and
working correctly before starting duty. The
Hostile surveillance Inspection process will include:
Almost always, before a deliberate security 100% equipment accounting
breach occurs the person or people involved Battery levels full + spares available
will carry out some form of surveillance. A CCTV Belt clips, antenna and earpieces in good
operator must remain vigilant to the act of
hostile surveillance, and doing so can assist in condition
preventing security breaches. Examples of Transmit and receive working correctly
suspicious activity that may indicate surveillance
includes: Sending and receiving messages
Repeated passing of the same vehicle
Filming or taking photos of security areas The radio operator will send and receive
Drawing or note taking messages using the established radio
Extended waiting around for no apparent procedures. The radio operator will also
escalate incidents to the control room
reason supervisor, enabling incident response decisions
Asking questions about security systems to be made. This procedure is described in
Repeated false alarm activations detail in the communications and reporting
False delivery of packages section
Persons found in “off limits” areas,
Troubleshooting
particularly areas allowing access to critical
systems e.g. heating, venting, cooling or If a radio or its network fails, the radio operator
electrical systems must carry out user level troubleshooting and
attempt to restore communications. This
5.3.2. Communications operator process is described in the following
The communications operator role is another communication procedures section.
major activity within the control room and can
be divided into two sub-roles: Frequency management
Radio operator More complex security operations may utilise
Communications logger several frequencies for communication, with
These two tasks are vital to a successful security different sectors or staff using each frequency.
operation. Detailed information on the The radio operator is the central point of
communications process is given in a later communication and must manage
section. communications passing through multiple
channels, and be able to select and switch
5.3.2.1. Radio operator channels to communicate with the appropriate
The radio operator will use radio people.
communication equipment to relay information
across the security team.
Key information 5.3.2.2. Communications logger
The communications logger is responsible for
The primary duties of a radio operator include: recording all communication passing through
the control centre. The logger will:
57
Log security issues when they occur # Date / From To Message
Log alarm activations and cancellations and Time
reasons why they occurred 25 1430 Lobby CR Visitor escort
Log decisions made by supervisors and
Mohammed Al Ali
managers
Log potential security issues --------------------------------------------------
Prepare daily reports for the control room
18-12-18 Saif Al Zaabi
supervisor
26 1445 Gate CR Rotating post
Best practice for logging is to keep 2 logs, 1 for
daily occurrences, and a second log for 27 1515 Gate CR Delivery truck
supervisor decisions. An electronic version can
be kept in addition to a written log to enable Table 11 - Example communications log
better data analysis and retrieval.
5.3.3. Control room supervisor
Key information Security staff working in the control room will
not be required to supervise the operations,
When completing communications log however understanding the role of the control
entries, rough notes can be kept and then room supervisor will assist others in the control
transferred neatly into the written log and room to work closely with and support the
updated in the electronic log supervisor. The control room supervisor will be
responsible for:
Communications logs may be referred to
during legal investigations – accuracy is Day to day functions of the control room
essential. Deploying reserve security staff to incidents
Formulating and directing response to
Topic focus
safety and security incidents
Logging communication Escalating critical incidents to the security
A best practice for the process of logging manager
communications within a control room can be Preparing reports for the security manager
summarised as follows: Critical incidents may be escalated to a separate
Handwriting is clear and accurate incident management team, with their own
Entries written in black ink incident room. This will depend on the type of
When coming on to logging duty, the date organisation, and the anticipated risks and
threats.
and signature of incoming logger should be
recorded 5.4. Communications and reporting
Entries in chronological order with the time Communication is one of the most important
of each entry recorded in 24hr format elements in a successful security operation, and
Entries numbered in sequence having a clear communication plan and process
Record only facts, not assumptions will assist all members of the team to work
Clearly show errors by drawing a single line together in cooperation.
through the error, with correction made
and initialled 5.4.1. Chains of command
No entries are to be erased A clearly defined chain of command will reduce
No blank spaces or pages are permitted confusion and ensure that the passage of
No pages can be removed or added information across the team flows in a
When changing over duty, the log should coordinated manner. A typical chain of
be ruled under the last entry, and signed by command would look like this:
the outgoing logger
58
Security a radio network. Examples of this are:
Manager
Control room
Control room Escort 1
supervisor Escort 2
Patrol 1
CCTV operator Communications Radio operator Patrol 2
logger Checkpoint 1
Checkpoint 2
Security post
staff The actual names of call signs used will depend
on the site or organisation.
Security post Frequencies
staff
This refers to the broadcasting frequency of the
Figure 41 - Reporting chain example radios used. A simple method of referring to
frequencies is by channel. A radio channel can
5.4.2. Communication pathways be programmed to a set frequency, and that
An established communication pathway will be channel then allocated to a particular team or
required when using radios for communication purpose. Channel allocation could look like this:
because if there are many staff using the radio,
there is potential for confusion and loss of Frequency Channel Group
information. This is normally referred to as a 450Mhz 1 Entry control Point
radio network. A radio network is made up of: 525Mhz 2 Mobile patrol
650Mhz 3 Reception security
Call signs
Frequencies The purpose of allocating channels to sub
Equipment groups within a security operation is to reduce
the confusion and the amount of traffic coming
o Handheld radios across the radio at each post or location.
o Base station radio
Key information Radio network diagrams
Call signs To make the communication pathways clear, a
A call sign is a unique name used to identify a radio network diagram can be drawn that will
person or position of duty within the security describe the call signs, channels, and reporting
team. There can only be one of each callsign on lines within a security operation. An example of
a radio network diagram follows:
59
Checkpoint 1
Channel 1
Reception Checkpoint 2
Channel 3 Channel 1
Control room
Mobile patrol Mobile patrol
2 1
Channel 2 Channel 2
Figure 42 - Example radio network diagram
5.4.3. Radio communication equipment o Press to talk button
A radio is one of the most essential pieces of Battery
equipment available to security staff. Charging cable / base
Understanding the radio types available, the Antennae
parts and components, and how to safely Belt clip
handle the radio is vital to a successful security Earpiece
operation. External microphone
Radio types
There are many manufacturers and brands of
radio, however most will be designed as one of
the following:
Hand held
Vehicle mounted
Base station
Most mobile security staff will carry a hand held
radio, while fixed duty locations may use a base
station.
Radio parts Figure 43 - Example hand held radio
Hand held radios will usually have:
Radio body
o On/Off switch
o Channel selector
60
Vehicle mounted radios are installed in the
dashboard of a car or patrol vehicle, and can
offer extended transmitting ranges. The radio
will consist of:
Radio body
Internal speaker
External microphone
Figure 45 - Base station radio
Figure 44 - Vehicle mount radio 5.4.4. Communication procedures
A standard method for using a radio to
A base station radio is normally used in a communicate is essential for efficient
control centre or other fixed location. The base communication and passage of information.
station radio will consist of: There are globally established standards for
Radio body radio communication that cover:
External speaker
Antennae outputs Forming radio messages
Channel switches Radio network etiquette
Use of the phonetic alphabet
Radio messages
To send a message over the radio network, specific information is required. The simplest way to
describe this is as follows:
Topic focus
Starting a radio call
Information: Receiving Identify Transmitting Message End of
Say: call sign call sign - transmission
Patrol 1 This is Control Room Over
Sending a radio message End of
transmission
Information: Receiving Identify Transmitting Message
Say: call sign This is call sign Over
Send current
Patrol 1 Control Room location End of
transmission
Ending a radio message
Out
Information: Receiving Identify Transmitting Message
Say: call sign call sign Roger
Patrol 1 This is Control Room
Continuing the conversation
61
It is acceptable once the conversation has been It is important that a plan is established should
established, to stop saying your own call sign at communications fail using the primary method.
the start of each transmission, and instead only Normally this would include:
announce your call sign when closing the radio Assigning alternate radio channels as
call. For example:
backup
- “Patrol 1, this is control room, over” Landline phones at specific locations
- “Control room, this is Patrol 1, over” Mobile phone
- “Patrol 1, send current location, over” Using a runner to relay messages
- “Control room, Location A1, over”
- “Patrol 1, this is control room, roger, out” Black spot mapping
Key information The nature of radio communications means that
in certain environments or with particular radio
To achieve a clearly transmitted message, the frequencies, there will be areas where clear
following points should be remembered: communications are impossible. It is important
Rhythm – Speak in a predictable rhythm that a security team are aware of areas within
Speed – Speak slowly enough to be clearly their site that prohibit clear radio
communication. A best practice method is to
understood map the “black spots” of radio coverage. A map
Volume – Do not shout or whisper, a can then be kept in the control room, and this
should be updated when:
normal conversational volume is required New frequencies are used
Pitch – A very low pitched voice is difficult New radio equipment is purchased
Security teams first occupy a site
to understand when transmitted by radio After any construction or modifications at
Radio etiquette the site
It is good practice to allow an ongoing radio 5.4.5. Reportable information
conversation to finish, rather than interrupting. Understanding what type of information should
The only time when it is acceptable to interrupt, be reported will make the security operation
is when there is a safety or security issue that efficient and responsive. Security staff must be
takes priority. aware of the information that they are required
to pass up the reporting chain, and each site or
Lost communications procedure organisation will have different requirements
set out in standard operating procedures
If there is a loss of radio communications the (SOPs). Common examples of reportable
following steps are to be taken in order: information include:
Check all connections on the radio e.g. Health and safety concerns
Potential security issues
o Antenna False alarm activations
o External Microphone Actual security incidents
o Battery fit Equipment loss or damage
Power of Customer complaints
Replace the battery Internal conflicts
Power on Each type of reportable information will have an
Move to another location and try again associated reporting format. The standard
Revert to alternate channel formats used will be covered in a later section.
Switch to alternate method of
communication e.g. mobile phone Key information
Return to control room
Alternative communications plan
62
A daily summary report will be prepared by the Information security – being protected
site or organisational security manager for against the unauthorised use of
submission to the national security operations information, including electronic data, and
room. The normal flow of information going the measures taken to achieve this.
into this report would be:
5.5.1. Information security threats
1. Security staff notebook
Topic focus
2. Incident reports Threats to the security of information can
compromise not just a security operation, but
also larger parts of an organisation or business
3. Control room daily report including:
Trade secrets
Personal data
4. Security manager report Financial records
Understanding how information could be
accessed by unauthorised people can help
5. Submitted to National Security Operations security staff to safeguard against it. Examples
Centre of methods to access sensitive information
include:
The specific communication and reporting
requirements will be different for each site or Physical access
organisation, but security staff should be Visual exposure
familiar with what to look for when taking up
duty at a new location. The information o Computer screens
contained in this section will serve as a starting o Desks
point, with further details coming from site or o Notice boards
organisational SOPs. o Printer tray
Theft
5.5. Information security o Opportunity – unsecured
Aside from the physical security measures
applied to a control room, security staff must be documents
aware of information security threats, risks and o Forced entry
consequences of failing to follow good Copying
information security practices. Best practice for Photography and recording
information security standards can be found in Digital access
the Abu Dhabi Systems and Information Centre Wrong recipient on emails
manual of Information Security Standards. Unsecured computer networks
Social media
Figure 46 - Information security
5.5.2. Storage and destruction of
Key definitions information
Organisations will employ policy and procedure
to guide how information should be stored, and
the requirements for destroying security
classified information. Characteristics of
information that requires secure storage
include:
Exposes vulnerabilities of an organisation,
premises or services
Can lead to financial loss
Can embarrass an individual or organisation
63
Can compromise personal data
Any information that could reveal this type of
detail must be securely stored.
Figure 48 - Lockable filing cabinet
Figure 47 - Destroyed physical information 5.5.2.2. Methods of physical information
storage
5.5.2.1. Information security policy Key information
Organisational management will implement
information security policies describing the Security classified information can be kept
processes and procedures for handling securely using a variety of methods, and
confidential or sensitive information. The policy depending on the impact of disclosure higher
will include guidance on: levels of security may be employed. Examples
could include:
Classifying information
o Classified and marked according to Kept in a folder while out of secure storage
the impact of its disclosure Locked filing cabinet
A safe
Access privileges Access controlled archive room
o Who is permitted to access and A combination of these measures could be
view the information utilised e.g. kept inside a locked filing cabinet,
o How to verify the access permission inside an access controlled archive room.
e.g. Lists of staff verified by I.D
o Access logging requirements e.g. a 5.5.2.3. Methods of physical information
record kept of who has accessed destruction
the security classified information
There are a variety of methods available for
Storage requirements destroying security classified information that is
o How each classification of no longer required to be kept. Depending on
information must be stored the level of classification, and organisational
policy, options for destroying can include:
Destruction requirements
o How each classification of Burning
information can be disposed of o Controlled burn of documents and
o Documentation of disposal e.g. a removal of ashes
record kept of what information
was destroyed and when Pulping
o Who can authorise the disposal of o Mixing with water and reduced to
classified information e.g. Line pulp
manager, security manager, board
members etc. Shredding
o Documents cut into fine strips by
machine, the width of the strips
may be specified according to
information security policies
Cross-shredding
64
o Documents passed through an Specific consideration should be given to the
industrial shredder at 90 degree recording and storage of security camera video
angles to produce fine squares images. There are currently 2 common methods
for recording and storing these images:
Figure 49 - Strip cut vs Cross cut shredding
Digital Video Recorder - DVR
5.5.2.4. Digital information storage Network Video Recorder - NVR
Security classified information may be kept in a A DVR system will record the camera feeds onto
digital format and the storage arrangements a mass storage drive located locally within the
must also be considered. The type of security control room.
information and its impact of disclosure will
determine the security storage methods chosen, The strengths of a DVR system include:
however some options may include:
Physical access required to the system to
Computer based storage retrieve or remove footage
o Password protected files
o Password protected computers Weaknesses include:
o Cloud based storage
o Intranet (internal network) storage Inability to share recorded footage across
o Printing restrictions remote locations
External media storage May be corrupted or damaged by local
o Encrypted USB Flash drive disaster
o Racked mass storage drives
o CD/DVD The strengths of an NVR system include:
These options have strengths and weaknesses, Ability to record images over an internet
and these should be evaluated before network
committing to a particular method for storing
security sensitive information. Can scale the size of the CCTV network
easily
CD/DVD Secure network
Recorded images can be accessed remotely
Flash drive Cloud storage Weaknesses include:
Table 12 - Digital information storage Vulnerable to unauthorised remote
options access(Hacking)
Network outages may result in lost
recording time
5.5.2.5. Digital information destruction
A variety of methods are available to securely
dispose of digital information. The method used
by an organisation will depend on the
sensitivity of the information, cost and
regulatory requirements. Some examples of
destruction methods include:
Granulation
o The process of grinding down
physical storage media into fine
particles
Degaussing
o The process of removing magnetic
information from media storage
devices
o Commonly used to securely remove
information from:
Storage tapes
Hard drives
65
Media storage Drive and tape If there is any request to receive copies of
recorded images captured by the control room,
crushing machine degaussing machine an authorisation form must be completed to
document the release to a third party. The Abu
Table 13 - Digital information destruction Dhabi Security Monitoring Standards provides a
form reference MCC/SMS/ICIL that can be used
machines to record the details. The information required
when issuing a copy of recorded images
The most common reason for destroying digital includes:
media storage, is when a storage device is
being retired, or no longer needed. The risk of Date and time of image capture
information that remains on the device being CCTV operator name
exposed is too great, and the information must Camera I.D
be permanently destroyed. Incident record number
Receiving officer name
5.5.3. Visibility of sensitive information Receiving officer contact details
Receiving officer signature
Topic focus Date of return or destruction
Security manager signature
Security staff must remain aware of the visibility An example of this document can be found at
of any information that is not classified in such the end of this module.
a way that it is permanently secured, but still
presents a risk should members of the public or A strict policy must be followed when
other groups be able to view. Typical areas to consenting to release recorded images, as the
monitor for sensitive information include: confidentiality of others will be breached. The
most common occasion for releasing images
Noticeboards will be to provide the police with evidence after
Desk space an incident has occurred.
Computer monitors
Video monitors 5.5.5. I.T and Cyber security
All security staff can monitor what information Although I.T security is a specialised field,
is on display, and take action to remove from Security staff must be familiar with the basic
visible display if required. concepts in order to maintain vigilance towards
the threat of compromise through I.T systems.
Figure 50 - Computer screen privacy hood
5.5.4. Release of recorded images Basic precautions to consider include:
Key information Allow computer systems and software to
run updates
Ensure virus scanning software is installed
and running
Use strong passwords for online systems
including a combination of letters, numbers
and special characters
Do not open emails received from
suspicious senders – report to I.T
department
Restrict physical access to computer
workstations
Report any unusual behaviour by computer
systems e.g.
o Apparent loss of control
o Flickering or erratic screen
66
o Pop-up windows completion and filing of various documentation
and reports including:
Figure 51 - Virus scanning tools
More advanced precautions against cyber Daily incident summaries to PSBD
threats are available, and some highly sensitive operations
sites may utilise a technique known as “air-
gapping” their data storage. This means that Maintaining the visitors log
the computer systems that contain the classified CCTV Incident log
information are not physically connected to any CCTV Maintenance / Fault Log
networks or internet, removing the opportunity CCTV Daily system check log
for remote intrusion and theft. CCTV Viewing Log
5.6. Daily routine and procedure CCTV Image copy release log
Daily routine within the control room will be Example of these logs and reports are found at
described within the post duty instructions, and the end of this module.
a typical control room routine will involve shift
hand over, specific duty rotation, rest breaks, 5.6.2. Fatigue management
and the completion and filing of reports.
The demands of working in a control room will
Figure 52 - Shift work require long periods of concentration and
attention to detail. In order to effectively work
5.6.1. Documentation and reports in this environment, fatigue must be planned
Key information
The communications logger working within a for and managed. The approach for managing
control room will be responsible for the fatigue within a control room fill be the
responsibility of the Security manager, and will
include:
Shift timings
o Dependant on available staff
numbers
o Depend on site requirements
o 2 x 12 hour shifts are common;
however, 3 x 8 hour shifts are ideal
e.g.
0600-1400
1400-2200
2200-0600
o Oncoming shifts will need time to
hand over, so overlap is planned for
Shift rotations
o Staff will be rotated from early
shifts to late shifts through a cycle
e.g.
Day 1 0600-1400
Day 2 0600-1400
Day 3 1400-2200
Day 4 1400-2200
Day 5 2200-0600
Day 6 2200-0600
Day 7 Off duty
o This will reduce the negative effects
of shift working
Task rotations
o Frequent rotation of control room
tasks will ensure staff remain highly
vigilant
67
o Task rotation every 30 minutes is
good practice e.g. It is good practice for security shift supervisors
to give a collective briefing to incoming staff,
CCTV operator 0600-0630 alerting them to any significant activities that
have been carried out by the outgoing shift,
Radio operator 0630-0700 and any planned work that needs to be
completed during the next shift.
Communications 0700-0730
Topic focus
Break 0730-0745
A shift hand over checklist can help staff to
o Staff numbers will impact rotation ensure that the hand over process is completed
Planned breaks accurately and smoothly. Information to cover
includes:
o Control room Security staff must be Resolved incidents
Ongoing incidents
able to recharge energy and be Changes to site staff / contact information
Technical or site issues
able to escape the intensity of Unusual occurrences
Numbers and position of duty security staff
control room work Signing over of duty equipment
Using this approach will ensure that all staff are
o A separate break area should be aware of what is happening within their site,
and are able to recognise potential problems
allocated, outside of the control before they occur.
room
o Regular, short breaks can be used
with a longer break taken
periodically
o Security managers will design an
optimal shift break pattern
Figure 53 - Shift fatigue
5.6.3. Shift hand over Figure 54 - Shift handover checklist
The handing over of duty to an incoming team
is one of the most critical parts of a security 5.7. Incident response procedure
operation. The continuity of a quality security
service depends on a smooth and accurate Staff working within a control room will need to
hand over of responsibility. The primary be familiar with the steps to be taken should an
benefits of a well organised shift hand over are: incident occur. The site Security manager will
Increased situational awareness for provide standard operating procedures to the
staff, and these procedures will include:
incoming team Escalation procedure
Management of ongoing issues Who is in control
Continuity of security operations Staff who are expected to respond
Controlling movement of staff
Key information
It is vital that the shift hand over is done in an
overlapping method, known as relief in place.
The incoming Security staff will arrive at
individual posts to relieve the outgoing staff,
achieving 100% security coverage at all times.
68
Evacuation procedure if required Topic focus
Escalation procedure 5.7.1.1. Alarm activation
Normal procedure for incidents requiring If an alarm sounds or indicates in the security
escalation will be to notify the control room control room:
supervisor, who will then escalate to the Identify the source of the alarm e.g. Fire,
Security manager.
gas leak, intrusion detection, camera
Incident control outage etc.
Any active incident will be controlled by the Identify the location of the alarm
control room supervisor Communicate the alarm status to nearest
security staff
Expected response staff Instruct nearest security staff to investigate
Situation dependant, however stand by security and confirm the situation
personnel, fire warden, first aider, facilities Carry out incident response procedure
management and I.T support may be required based on confirmation of incident
to respond Document and record according to SOPs
Controlling staff movement 5.7.1.2. Perimeter breach
During an ongoing incident, the movement of If a site perimeter breach is confirmed:
responding staff must be controlled in order to Call the police
reduce the risk of further complicating an Monitor the area through CCTV or security
incident. Safety and security will be considered
by the control room supervisor, and instructions personnel to locate the intruder(s)
given through the control room radio operator Identify if any theft, damage or other
to responding staff regarding:
Locations to move to operational impact has occurred
Routes to take If intruders are located, detain in
Time to move
Precautions to take based on monitoring of accordance with the legal requirements
Document and record according to SOPs
the situation
Other responding staff or external agencies Figure 55 - Perimeter breach
5.7.1.3. Theft
expected to be in contact with If a theft is identified or reported:
Record the date, time and location
Evacuation procedures Call the police
All staff must be aware of the evacuation Use available monitoring systems to review
procedures specific to the place of duty, and
what events will trigger an evacuation. Such images of the area
events may include: Instruct Security staff to take any witness
Uncontrolled fire
Hazardous material spill statements
Gas leak Request Security staff preserve any
These details will be contained within site SOPs
evidence and the suspected crime scene
5.7.1. Actions for security incident Document and record according to SOPs
All sites and organisations will have unique
actions required to be followed, however a
general guide for actions to when responding
to security incidents can be useful for Security
staff to use as the base of security operations.
69
5.7.1.4. Bomb threat 5.7.3. Actions for equipment failure
If a bomb threat is received in the security Equipment failure can severely impact the
control room: success of a security operation. The type of
Signal to others that a bomb threat is in equipment and its necessity will dictate the
actions to be taken, and could be categorised
progress according to SOPs (the control as follows:
room supervisor will arrange for the police
to be called) Critical
Remain calm and be courteous to the caller Life support systems i.e.
Don‟t interrupt the caller
Try to keep the caller talking in order to o Ventilation of toxic gases
determine as much information about them o Water treatment
as possible o Fire detection and suppression
Complete the bomb threat checklist Should any life support systems fail, serious
Evacuate the threatened area according to consideration must be given to evacuating the
SOPs building or site in order to reduce the risk of
harm to personnel.
Figure 56 - Telephone bomb threat
Security Operations
5.7.2. Actions for safety incident CCTV Cameras
Safety incidents will be responded to by Intrusion sensors
Security staff, and the control room operators Communications equipment
will coordinate this response. If a health or Barriers and gates
safety incident is identified: Searching equipment
Instruct attending Security staff to make the
Topic focus
area safe e.g. control access to the area
Request incident details Loss of capability through equipment failure
Determine the required department to may result in a compromised security operation.
If any of these types of equipment fail, control
rectify the issue room operators should:
Coordinate the response of maintenance or Deploy security staff to the failure location
Initiate an urgent maintenance request
facilities management Deploy available back up equipment
Process the attending security staff incident Document and record in accordance with
report SOPs
Document and record according to SOPs Security supervisors will assess the risk and
severity of the equipment loss, and may initiate
Key information a full or partial lockdown of certain sites.
If a health and safety issue has been identified Non-critical operations
that poses an immediate risk to site personnel, PPE
do not allow the issue to go uncontrolled. Lights, air conditioning or heating
Maintain a Security presence at the location The failure of equipment related to the comfort
until the issue has been resolved, or handed of staff, or general facilities will need reporting
over to the relevant department. to maintenance and the situation documented
and recorded in accordance with SOPs
5.7.4. Actions for lost communications
As the centre of the security operation, a loss of
communications is a serious problem for the
control room. Depending on the actual
communications technology used, a standard
action to be taken could include:
70
Switch radios to alternate channel Target – Suspect, or person of interest
Use secondary communications device e.g. Monitoring – Continuous viewing of a
situation, area or target
o Mobile phone DVR – Digital Video Recorder
o Land line phones NVR – Network Video Recorder
o Intercom system
Send resting control room staff to bring Further research
replacement radios to remote staff
Request technical support Abu Dhabi Monitoring and Control Centre
Maintain critical communication pathways Standards v5.0
via foot messenger
Dubai Law No. 24 of 2008
5.7.5. Actions for power failure
Should a site or part of a site experience a
power failure:
Identify any critical systems that may be
blacked out e.g.
o CCTV coverage
o Intrusion alarms
o Access control systems
Direct remote staff to the affected area to
attempt re-setting of local power at the
switch panel
Deploy Security staff to cover critical areas
affected by power loss
Call facilities management for urgent
maintenance
Escalate to municipal utilities service if
required
If a health and safety risk is presented,
coordinate the evacuation of non-essential
staff from the affected area
Figure 57 - Power failure on site
Key definitions
SOPs – Standard Operating Procedures
Control room – Central operations room of a
site security service
CCTV – Closed Circuit Television
BMS – Building Management System
ADMCC – Abu Dhabi Monitoring and Control
Centre
71
Example control room documentation
PSBD daily incident report
Day Company Daily Incident Report Time
Emirate Date
Location
Phone number
Reporting Security Staff Name
Nationality
Company Name
Location
Incident/Accident type
Response procedure taken
Company operations staff Name
Company operations incident
summary
Received at PSBD Operations by
Rank
Name
Date
Signature
72
Control room visitor log
Date Arrival time Departure Surname Initial
time
7
Organisation Position Signature Signed in by
73
CCTV Incident log CCTV Incident Log Location
Time
Date
Incident type Live incident recording Y/N
Employer
Recording number
Reporting person name
Description of incident
Response to incident
Police requested at time Time of police arrival
Police number
Name of attending police Medical arrival
Signature
Medical requested at time
74
Name of attending medics
Name of control room
supervisor
CCTV Maintenance / Fault report log
CCTV Maintenance / Fault report log
Date Time Engineer
Reason Regular maintenance Call out
Maintenance details
Outcome
75
Viewing log for recorded CCTV
Viewing Viewing Camera Operator name Persons viewin
date time ID
7
ng Organisational Reason for viewing Outcome if any
Details
76
Issued copy of CCTV images log
Issued copy of CCTV images log
Reason for provision Legal proceedings Subject access Other
Camera ID
Date of creation Time of creation CCTV Operator
Incident number
Police or Third party name
Contact details
Signature of third party
Date of destruction or return
Security Manager signature
77
Daily CCTV system check log
Date Time Operator Date/Time stamp Camera and
checked recording quality
checked
78
Module 5 Revision 2. Identify 2 laws and regulations governing
the operation of security control rooms in
Revision questions the UAE?
1. List the 3 main roles within a Security
Control room?
3. List 5 examples of technologies that could 4. All visitors to a control room must be
be integrated within a control room logged and escorted – True or False
5. List 3 tasks of a CCTV operator 6. List 2 tasks of a communications logger
7. List 3 tasks of a radio operator 8. Outline the chain of command and
reporting within a standard security
control room
79
9. Identify 3 radio accessories used in 10. Identify 4 examples of reportable
security operations information
11. List 3 ways to destroy physical documents 12. List 2 methods of secure document
storage
13. List 3 potential I.T security threats 14. List 3 locations that sensitive information
may be visible in the workplace
15. Identify 5 pieces of information that could 16. Outline the procedure for handling a
be included in a shift handover checklist telephone bomb threat
17. Name the procedure for overlapping 18. Name the document that needs to be
security shifts during hand over completed when issuing recorded images
to police or a third party
80
Module 6
Patrolling
Module 6 Key information
Patrolling The 4 P’s of patrolling
Qualification Link Protection of life:
from dangerous / hazardous situations, assault,
Units or emergency situations
SEC03004NU18-Conduct site security
Protection of property and premises
patrols Protecting property from theft, fire, criminal
SEC03003NU18-Use security search damage, or defacement.
methods and equipment Prevention of loss and waste
Learning outcomes Loss by theft, breach of confidentiality, or abuse
1. Interpret site security plans and prepare of client‟s property, such as unauthorised use of
computers, telephones or other equipment.
for security patrols
2. Conduct security patrols Preventing and deterring crime
3. Carry out inspection of key security areas Theft, breach of peace, criminal damage, public
4. Search structures order offences
5. Use standard formats to document patrol
Further aims can be identified as:
activity Increased situational awareness
Providing an overt physical security
Key definitions
presence
Security Patrol – Travelling a route or path Reducing response time to critical areas
with the aim of enhancing the safety and Inspecting the status of security measures
security of a site or area Deterring criminal activity
Dismounted – Moving by foot Increasing alertness of Security staff
Mounted – Moving by any vehicle type Providing customer service
Patrol report – Standard report documenting
security patrol activities
6.1. Aims and methods of patrolling 6.1.2. Methods of patrolling
There are several methods that Security staff
One of the primary duties of Security staff are can use to conduct patrols, each with its own
to conduct periodic patrols of the site or area benefit and weakness. The most common
for which they are responsible. There are methods include:
various aims when conducting patrols, and
methods by which the patrol is carried out. Walking patrol
6.1.1. Security patrol aims This form of patrolling is the most common,
The primary aims of security patrolling will vary and is utilised in most organisations.
slightly depending on the organisation,
however the following can be referred to as a Benefits include:
foundation for why Security staff conduct Enhanced situational awareness
patrols: Can utilise human senses
Ability to inspect closer detail
Interaction with staff, and members of the
public
Weaknesses include: measures marked. Security staff can refer to
Time required to cover larger areas these maps to aid in the familiarisation of the
Physically exhausting site, and where the relevant utilities, systems
Environmental exposure and infrastructure is located.
Vehicle patrol Key information
Vehicle patrols could take many forms When reading a site plan map look for the
including: following details:
Car Version – always use the latest
Golf Buggy Legend – ensure the symbols indicating
Cycle
Segway critical systems, locations and security
Benefits include: measures are understood
Ability to patrol a large area or perimeter Scale – identify the size of the area to be
Can be fitted with supporting technologies patrolled
Orientation – make sure the site plan
such as: layout is understood (Normally oriented to
o Radio north)
o GPS tracker Perimeter – identify the boundaries of the
o High powered lighting site
Zones – identify the boundaries of any
Can keep Security staff protected from the zones within the site plan
environment during patrols
Some site plans may be supplemented with
Weaknesses include: satellite imagery, digital renderings, or even
High profile may alert criminals to an scale models that allow for an enhanced
understanding of the site.
approaching patrol
Removes the ability to use some of the 6.2.2. Crime prevention strategies
Site security plans may include specific
human senses strategies to prevent and deter crime. The
Can be expensive to maintain and operate patrolling staff should confirm these strategies
and ensure that measures within the site are in
Remote technology patrol support. Specific strategies could include:
Increasing the risk for criminals
Technologies can be used to survey areas in a
form of “Remote Patrolling”. Examples of this o Chance of detection
include: o Exposure to public
CCTV Cameras o Enforcement of laws
Drones Reducing reward for criminals
o E.g. Compartmentalising valuables
6.2. Site plans and patrol routes Increasing difficulty in committing crime
o Deny access
It is essential that Security staff tasked with o Security depth e.g. 4 D‟s
performing security patrols understand the Reducing temptation for criminal activity
layout of their work site, and established o Removing valuable items from view
patrolling routes. o Constant vigilance of security
o Warning signs
Key information 6.2.3. Routes and timings
In addition to a well-designed site plan, Security
Site security plans, patrol maps and patrol staff will use patrol plans that describe the
instructions can be found in a sites Security routes and zones that must be patrolled, and
Control Room
6.2.1. Site layout and security systems
Security supervisors and managers are
responsible for maintaining site plans with
critical systems, key locations and security
the timings or schedules that are to be When a business or organisation is open to
followed. For example: the public
Day Zone Route Time Method When deliveries, maintenance or other
scheduled activities normally occur
06:30 Vehicle
A 10:30 Walking All of this information will be evaluated in order
to plan a cohesive patrol schedule.
Perimeter B 16:30 Walking
6.3. Patrol preparation
20:30 Vehicle
Security patrols can be divided into 3 phases:
C 00:30 Vehicle
Preparation
1 Outer A 08:30 Walking Conduct
public B 11:30 Vehicle Completion
C 13:30 Walking The preparation phase is vital to ensure the
safety and success of the security patrol.
Inner A 09:30 Walking
6.3.1. Confirmation of patrol requirements
public B 12:30 Walking The first step in the preparation phase is to
confirm the requirements for the patrol
Secure A 07:30 Walking including:
B 17:30 Walking
Aims and objectives of the patrol e.g.
Table 14 - Example patrol plan o Information gathering
o Routine inspections
The following will have been considered when o Show of force
preparing a patrol plan for a specific site or
location: Zones and routes to be covered
Key security areas to be inspected e.g.
Site layout and size
o Power generation equipment
How can 100% site inspection be achieved o Life support systems
What are the most efficient routes to travel o Hazardous waste processing
o Fuel storage
through the site o Data centres etc.
Security zones Communications procedures including:
o Primary and alternate radio
How is the site divided into access zones
What controls are in place to separate the frequency
o Secondary communications
zones o Reporting requirements
Who is likely to be present in each zone, Other Equipment to be carried e.g.
o Keys and access passes
and what threats or risks have been o Defensive tools (if required)
identified o Patrol inspection checklist
Critical security areas o Patrol map
o Patrol touring device
Which areas are most critical to the o Torch
organisation o Notebook and pen
o Personal first aid
Do certain areas require rapid response o Appropriate PPE
capabilities in the event of an incident These patrol requirements are normally
outlined within a work instruction document
Supporting technologies and systems prepared by the Security Manager.
What areas are covered by CCTV or sensors
Where are access panels or alarms installed
Personnel available
Numbers of staff available to perform
patrols
Organisational policies regarding lone
workers
Shift rotations
Timings of shift start and end
Reduction in personnel for night shifts
Organisational timings
6.3.2. Equipment preparation and testing device On/Off operation
Registers home point
Key information Personal first Signed for in post
aid equipment register
Having confirmed the requirements of the Kit contents in date and
patrolling activity, thorough equipment Torch complete
preparation and testing must be carried out to Signed for in post
reduce the risk of failure while on patrol. A pre- equipment register
patrol checklist can be developed to guide and Batteries in good condition
assist Security staff in carry out the appropriate Bulb/LED operational
checks and tests Case or pouch in good
condition
A good practice for pre-patrol checks: Signed for in post
equipment register
Item Check This systematic approach to checking and
Keys & Passes Correct for zones and testing equipment will reduce as much as
patrol route possible the chance of equipment failure, and
Radio Signed for in key register increase the odds for a successful security
No damage to body patrol.
Duty belt Antennae fitted in good
Plastic condition Safety!
Buttons and switches
handcuff normal operation Security staff must be aware of organisational
Pepper spray Battery charged, and spare OHS policies. Depending on the place of duty
available PPE inspection may include:
Baton Correct frequencies
Patrol touring programmed Dangerous noise levels
Accessories fitted in good Hard hearing protection rated to decibel
condition e.g.
Belt clip levels required
External microphone Soft hearing protection requirement
Earpiece Time of exposure limits
Signed for in post Traffic safety
equipment register Hi-Visibility vests, with reflective panels
Pouches in good condition Illuminated traffic rod (red/green)
Baton loop securely fitted Traffic cones
Buckle in good condition Industrial machinery and Plant equipment
Signed for in duty post Safety boots
equipment register Hard hat
No deterioration of the Eye protection rated for projectile risks
plastic material Flammable environments
Locking teeth function Flame resistant clothing
Signed for in restricted item Ionising radiation exposure
register Dosimeter badges
Shots remaining
Arm/Disarm lever working Any Security staff who patrol through zones or
Signed for in restricted item areas with health and safety risks present must
register adopt the appropriate PPE levels whilst exposed
No cracks or rough edges to those risks.
Signed for in restricted item
register
Battery charged
6.4. Conducting security patrols o Suspicious items or occurrences
Human interaction
Procedures for conducting security patrols may
be different depending on the site or o Gauge behaviour of colleagues and
organisation. Specific instructions for the staff
conduct of patrols will be given for each
location or organisation, and Security staff must o Gauge behaviour of public
be familiar with the relevant procedures. o Observe relationships and
6.4.1. Communications with control room interactions
Communications while on patrol are essential in o Observe body language and non-
order to send or receive information, request
assistance, or report risks and threats. Before verbal communications
leaving to conduct a security patrol, the Make sure to follow the patrol route in order to
following steps should be taken: ensure that no areas are left uninspected
Perform a radio communications check with
The security patrol is an excellent opportunity
the control room ensuring: to gather information on the state of safety and
o Signal strength is good security at a site, and the use of detailed note
o Your callsign is identified taking, photography and completion of
inspection checklists is essential in providing
Advise the control room of the planned the control room and security managers with
route useful information for decision making.
Advise the control room that patrol is now 6.4.2.1. Progress reporting
commencing at the current time Most sites and organisations will require
security patrols to report on progress. The
6.4.2. Patrol events details required may be different depending on
While on patrol Security staff will complete a the site. The reasons for progress reporting
series of checks to ensure the safety and include:
security of the site. The events that take place
will differ depending on the specific site, Security staff safety
however the most common events include: o Control room know the location of
patrolling staff
Topic focus o Support is able to be sent
accurately
Safety inspections
o Fire exits clear of obstructions Situational awareness
o Fire alarm panels operating o Control room aware of security
correctly status within the site
o Fire extinguishers in correct o Able to take pro-active steps to
location and in good condition prevent possible security risks
o General health and safety hazards
Time management
Security inspections o Completion of patrols may be time
o Doors and windows secured sensitive
o Areas not covered by CCTV o Patrolling staff may have other
checked duties to move on to
o Parking areas checked for violations
or suspicious activity Record keeping
o Personnel within access zones are o Progress reports will be logged
authorised (I.D worn) o Evidence of duty being performed
o Access zone controls are working
correctly 6.4.2.2. Responding to unplanned events
o Site perimeter is secure During the conduct of security patrols, there
may be unplanned events that require the
response of patrolling staff. This could include:
Discovery of security breach
Discovery of immediate health and safety
concern
Extra support required at another location
In the event that patrolling staff are required to patrol, in order to properly understand the
respond, the following should be completed: primary aims of the security patrol. Critical areas
The control room must be notified specific to each site will be different, but as a
Progress noted regarding the current patrol general guide the following could be included
This will enable the patrolling task to be in a critical area list:
completed accurately when the unplanned Heating, Venting and Cooling machinery
incident has been resolved. Power supply access
Water and utilities access
6.4.3. Patrol completion procedures Hazardous materials storage
Upon completion of a security patrol, staff must Medical waste disposal systems
follow a post-patrol procedure. This will ensure Oil, Gas or Petroleum pipelines
that the benefits of the patrol activity are High value goods storage
gained. Typical patrol completion procedures Data storage centres
include: Site entry and exit points
VIP offices or accommodation
Return of Equipment Perimeter zones
Inspect all patrol equipment for damage Essential operations zones e.g.
and wear o Airport runways & aprons
Sign in any patrol specific equipment o Manufacturing rooms
Place any powered items on charge o Import/export yards and terminals
Sign in and secure restricted items Any area specified by the business or
Patrol notes and reports organisation as essential to their success may
Review patrol notes for accuracy be a critical area.
Ensure any patrol checklists are complete
Prepare a patrol report if required 6.5.2. Determining security status of
Submit patrol documentation to the control critical areas
room In order to conduct security inspections of
Patrol duty handover critical areas within a site, patrolling staff must
Verbal briefing of oncoming patrol staff understand what is the „normal‟ state for that
area. This knowledge will usually be gained
o Significant observations during a site induction conducted by the site
o Incidents if any security supervisor or manager.
o Routes taken during previous patrol
o Specific tasks uncompleted Topic focus
The patrol completion requirements may be Some basic considerations that may apply
different depending on the type and scale of include:
the site or organisation, but following this
method as a basic guide will ensure smooth
security patrolling operations.
6.5. Key and critical areas
Key and critical areas are those which are
essential to the continuous operations of an
organisation, or that interference with would
cause harm to people, property or information.
6.5.1. Critical area knowledge
Security staff must possess detailed knowledge
of critical areas within the site they are tasked to
Obvious damage to equipment or o Enabling 100% search coverage of
infrastructure the building
Liquid leaks or escaping gases Building purpose e.g.
Signs of forced entry, or unsecured access o Office space
o Storage
points o Plant and Machinery housing
Loss of power or other utilities o Warehousing
Suspected unauthorised persons in the area
Obvious missing items e.g. Generators, 6.6.3. Building search safety considerations
Before entering a building to conduct a security
Computer servers, electrical cabling etc. search, safety must be given priority. The
Open access gates following areas should be considered, and a
It should be a priority of new Security staff to quick risk assessment performed:
learn and understand the critical security areas
within a site and what the normal state of Security circumstance of search
operations looks like. o Suspicious person inside
o Suspicious item inside
While on security patrol, Security staff will o Suspicious activity near the building
report to the control room on the current status o Aggressive person inside
of identified critical areas to provide real-time
updates on the status of these areas within the Health and safety
site o Lighting conditions inside
o Low doorways, piping or conduits
6.6. Building searches o Trip hazards
o Hazardous substances
Security patrolling staff may be required to o Presence of fire or gas
search buildings and structures within the site in o Available exits in case of emergency
response to reported information, or as a abandonment of search
routine task.
Communications plan
6.6.1. Building search requirements o Radio coverage inside building
Establishing the purpose for searching a o Use of runners to relay search
building will provide the patrolling security staff progress
with essential information that will help them to o Alternate communications in case
make decisions about personal safety, and of failure
contribute to a successful building search.
Security staff should assess the presence of
6.6.2. Planning to search a building these risks to personal safety and the safety of
When planning to conduct a building search the team, and take appropriate precautions and
the following considerations can be made: use the correct PPE before conducting the
Entry and exit locations building search.
o Enabling escape of suspects 6.6.4. Searching with other security staff
o Calling in further support Depending on the size of the building, threat
o Enabling retreat of security staff level and available security staff, a building
Stairwell locations search may involve a larger search team. The
o Enabling transit within a multi-floor main principles of searching as a team are as
follows:
building
o Provide escape routes for suspects Communication
o Provide choke points for inner- o Radio, visual, or verbal
o Brief and relevant to search task
cordon during search
Number of floors Coordinated movements
o 1 person in charge
o May dictate the size of search team o Methodical progress through
building
o Clear by sections before moving on
o Single floor at a time if multi-floor
building
Maintenance of a cordon Security patrolling activity is required to be
o Use of Security staff to cordon documented, and as described previously, it will
access to the building usually be in the form of patrol notes kept in
o Prevent others from entering the security notebook, completed patrol
o Prevent suspects from escaping checklists, and if any incidents were dealt with,
an incident report will also be completed.
The use of training drills and practice will
enhance a search teams‟ efficiency and skill in 6.7.1. Reporting requirements
quickly and accurately completing a search of a Site duty instructions will describe the types of
building. Security staff should be familiar with events, occurrences or incidents that require a
the layout of all buildings within their site. formal incident report. Security staff should be
prepared to keep notes on any occurrence that
6.6.5. Use of canines for building searches they believe may have an impact on the safety
Trained canines can be used as a tool to assist or security at the site.
in the search of buildings. Depending on the
scenario, and what is being searched for, a The standard procedure for reporting is:
canine may provide excellent support in the Urgent incident
form of:
Confirming the presence of explosives o Report in real-time over radio to
Confirming the presence of narcotics control room
Personnel tracking / missing person trace
Cadaver detection (Deceased persons) o Take mental notes while dealing
with incident
Key information
o Write incident details in notebook
For the effective use of canines in search, it is immediately after incident is
important to reduce contamination of the area resolved
with further human scents.
o Prepare formal incident report
Some further basic rules for canine search o Submit to control room
operations include: Non urgent incident
Do not approach the dog for petting o Report to control room
Do not feed the dog o Write notes in notebook
Do not distract the dog handler o Include details in patrol report
The dog can only work for short intervals Other observations
o Write notes in notebook
effectively o Include observation details in patrol
Environmental conditions will impact the
report
duration and effectiveness of canine search
e.g. heat exhaustion 6.7.2. Standard patrol documentation
Security staff must be familiar with the standard
Safety! patrol report format that is in use at the site.
If there is any doubt about the personal safety Topic focus
of a high risk building search, Security staff
should defer to the appropriate public security A security patrol report is a standard document
agency e.g. Police, Civil Defence, Military that the Security staff will complete. The
contents of a patrol report include:
6.7. Patrol documentation Staff name
Staff ID
Date
Start time
Finish time
Zones/Areas inspected
Route taken
Security checks performed
Security status of critical areas
Safety inspections performed
Observations or comments
Signature
When completing a patrol report, accuracy is
essential. Include only facts, and not
assumptions. The patrol report may act as a
legal document if any investigations are
opened, and the contents of the report must be
true.
An example of this document can be found on
the next page.
Key information
Any security documents be secured in
accordance with organisational policy, and
information security standards. Best practice for
this includes:
Lockable filing cabinets kept in an access
controlled room (control room)
A document register kept to record files
stored and removed from the cabinet
Proper destruction of documents no longer
required e.g.
o Shredding, burning, pulping or
granulation
A record of destroyed documents kept
Example patrol report
Name Start time Finish time ID
Date Ro
Location Check Secu
1 Fire exits
2 Fire extinguishers
Zone 1 3 Zones not covered by CCTV
Zone 2 4 Reception area
5 Fire alarm panels
6 VIP Carpark
7 Exterior pathways
8 Windows and doors
9 Data room
10 HVAC room
11 Rear gate
Other observations
Module 6 – Patrolling
Signature 1 2 3 4 5
oute A B C Zones
urity Status Comments
Page 91 of 253
Module 6 Revision
Revision questions 2. What are the 4 P‟s of patrolling (Aims)
1. Where would the site security plans, patrol
instructions and patrol maps be found?
a. In the main reception
b. In the security control room
c. On the company website
d. In the finance office
3. List 3 methods of security patrolling 4. List 3 crime prevention strategies
5. List the steps of the patrol preparation phase 6. List 5 security inspection events while on
patrol
7. List the steps of patrol completion phase 8. Outline the information security requirements
for patrol documentation
9. List 5 examples of critical areas for inspection 10. What are the 3 categories of safety to
on patrol consider before searching a building?
11. List the 3 principles of teamwork when 12. Summarise the precautions that need to be
searching a building taken regarding human scent when using
canines for search