Training Module on Security Vital Installations: Depots and Terminals.
-
Upload
kristofer-alsip -
Category
Documents
-
view
280 -
download
6
Transcript of Training Module on Security Vital Installations: Depots and Terminals.
Module Details
• Objective: To make participants aware of the things to be done to secure depots and plants
• Participants: A, B, C Grade Officers working in depots and terminals
• Method: Lecture
• Duration: One and half hour
• No of Participants: 20
Module Details Cont…
• Course Material: • Security Return cum Review• Red Alert Strengthening of Security• Bomb Threat Handling Procedure• 38 Recommendations to improve security• Protection Scheme• Write-up on FIR• Sample Work Instructions to Security Force
Overview of Security
• Our Pledge
• Definition
• Importance of Security
• Threat Perception
• Vulnerable Areas and Points
• What does security consist of?
Definition
• The state of plant being secure from the real or potential dangers to which they are exposed.
What is security?
• Security is protection of life and property• It is a natural instinct of all living beings• Since beginning man has been devising
ways and means to protect himself and his family and his belongings
• Our workplace is a part of our extended family and hence every employee should be concerned about protection of our installation and our colleagues
Importance of Security
• Threat:
• 1) Miscreants’ Intentions
• 2) Their capability
• 3) Opportunity
• Not to provide opportunity to strike is in our hands
• Lax security provides soft target for attack
Importance of Security Cont.
• Non-availability of police and public utilities
• Lax security: heavy losses and damages
• A threat to the existence of plant
Why have security?
• Security provides a sense of well being and helps us focus our undivided attention on work
• Ours is a vital installation and it provides a vulnerable target for antinational and antisocial elements.
• A petty thief due to ignorance or nervousness may inadvertently cause a major fire that may cause widespread damage to life and property
Threat Perception
• Security begins with threat perception
• Check with local police station, SP, etc., for type of crimes, incidents that occur in the area and district
• Check past history of the location
• Check local newspapers
• Determine level of security basis the threat perception
Vulnerable Areas and Points
• Identify vulnerable areas and focus security efforts on them
• List of vulnerable areas / points– Gates– Tank truck / tank wagon gantry– Vehicle parking areas– Tank farms– Drinking water reservoir
Physical Security
• Defense in depth
• Perimeter Wall
• Gates
• Watch Towers
• Lighting
• Alarm System
Internal Security
• Access Control
• Security Force
• Communication
• Material Security
• Warehouse Security
Perimeter Wall/Fencing
• Create a psychological deterrent to unauthorized entry
• Prevent / delay unlawful entry or trespass
• Make effective and economical use of guards
• Direct flow of personnel, goods, and vehicles through controlled access (gates)
Perimeter Wall/Fencing
• Chain Link Fence
• Brick/Stone Wall
• 20 ft clearance on either side
• Clear track for vehicles / walking
• No trees
• Periodic inspection
Gates
• Number of gates should be limited
• Gates should be topped with spikes
• Gates should have cabins and should be manned
• Redundant gates should be closed down
Watch Towers
• 15 Ft height
• Fitted out with communication and search lights with 360 degree rotation
• Staircase should have gradual incline
Lighting
• Good lighting provides safety and security
• Review lighting at intervals for improvements
• Lighting specifications are given in the security manual
Employees
• ID should be issued to all employees carrying their latest photographs
• ID should be issued afresh every 5 years
• ID may be color coded according to need to go basis
• ID photo should be signed by issuer
Visitors
• Entry passes issued after checking with concerned official.
• Visitors should not be allowed in the plant area. If authorized, some official should accompany and visitor should not be shown vital areas
• Issue visitor’s badge
Contractors
• Prior approval of the list of casual / contract labor. Such list be given to security
• Check antecedents of contract/casual labor
• Issue badges to casual/contract labor• Frisk casual / contract labor• Written instructions about safety, fire,
security to all contractors
Vehicles
• Check for hidden explosives / stolen goods
• Employees’ and visitors’ vehicles should be parked outside plant area
• Issue entry permits to employees vehicles
• Use mirror trolley for inspection of underside
Security force
• Maintain a register of instructions to security force
• Define and specify scope and areas of responsibility and accountability
• Enforce DGR guidelines
• Train security force
• Use security guards for security jobs
• Use of fire-arms is not recommended
Communication
• Security should have access to direct telephone line.
• List of important telephone numbers should be prominently displayed.
Material Security
• Make gate-pass system fully functional
• Limit the approving authorities to a few senior people
• Separate file for returnable OGP
• Set up a procedure for regular review of ROGP
• Give a list of persons authorized to approve gate passes to security
Material Security Cont…
• Material leaving the location must be covered under approved gate pass
• Use flow meters for filling
• Check expiry dates of calibration certificates
• Keep details of all tank trucks or trucks attached to a location
• Verify accuracy of calibration at intervals
Material Security Cont…
• Valuable scrap may be closely protected
• Scrap yards containing valuable material may be fenced, locked and sealed
• Supervise removal of disposable waste material for hidden articles
• Check all empty tank wagons, tank trucks leaving the location
• Check vehicles leaving the premises
Warehouse Security
• Windows, ventilators, skylights, exhaust ports, etc., should be fitted with iron grills
• Entry be restricted to authorized employees
• Regular stock taking and tallying with ledger balances
• Use multi-levered lock and seal for the door
Warehouse Security Cont.
• Bolt and lock all windows and doors at the end of the day
• Security guards should cover warehouses in their patrolling rounds
Document Security
• Store vital documents in steel cupboards
• Restrict access to vital information to trust worthy employees
• Assign appropriate classification to documents and mark in bold
• Follow up dispatch of confidential documents meticulously to ensure that they reach destination in reasonable time
Document Security Cont.
• Obtain acknowledgement of receipt of confidential document
• Do not allow others to copy confidential documents
Records
• Maintain registers/records at the main gate of incoming outgoing vehicles, visitors, contractors’ men
• Maintain a record of surprise visits made or checks carried out for review and reference
• Maintain a record of incidents for use in the future
Intelligence Cell
• Form a close-knit group of informants
• Gather intelligence
• Liaise with CBI, IB, Police for information
Investigation of Thefts
• Thefts should be promptly reported.
• Maintain a written record of all thefts. Location in charge should review this record
• Make a complaint or FIR when there is outside intrusion or theft in collusion with outside sources
• Aid the police and magistrate
Investigation of Thefts Cont…
• Internal investigation
• Proper attitude for investigator
• Should a case be reported to police
• Method of conducting investigation– Visit to the location– Examination of witness– Questioning of suspect/accused
Investigation of Thefts Cont…
• Report on the result of internal investigation
• Steps in investigation– Visit scene of incident– List physical evidence/clues– Prepare list of documents to be examined– Prepare list of witnesses to be examined– Take charge of relevant materials and
documents
Investigation of Thefts Cont…
– Examine controls procedures and practices concerning the items lost
– Record statement of witnesses
Special Situations
• 38 Recommendations
• Beefing up security during red alerts
• Bomb threats
• Protection Scheme
Assistance of District Administration
• Police Station
• SP
• DySP
• District Collector
• DIG
• Range DIG
• IG