Odin Training

Course Content
MODULE 1: WELCOME & LICENSING PROCESS
You need to know the basics so that you can work safely and carry out your duties in a professional manner. This course covers all of the essential areas needed for this basic training.
0/2
MODULE 2: INTRODUCTION TO THE PRIVATE SECURITY INDUSTRY
An overview of the duties, responsibilities and life of a Security Guard.
0/3
MODULE 3: THE PRIVATE SECURITY AND INVESTIGATIVE SERVICES ACT AND MINISTRY CODE OF CONDUCT
Learn about the legislation that governs our business.
0/4
Security Guard
About Lesson

Security Guards control movement of personnel and materials in, out of, or within a facility that are essential to normal operations, and prevent unauthorized access and egress. Security Guards must understand access controls and measures involving the interaction of human resources in conjunction with other supporting security elements such as electronic systems and physical barriers.

 –Canadian General Standards Board Standard 133.1 Paragraph A8.1

 

Security Guards respond to alarms. This session will provide the candidates with a basic understanding of the principle of protective and fire alarm systems which they are likely to encounter, with some information on the manner by which these systems will function.

 -Canadian General Standards Board Standard 133.1 Paragraph A5.1

  

Access Control Systems

Simply put, access control describes any mechanism that’s goal is to get the right person into the right area at the right time. While this sounds complex, it really isn’t. For example, the home you live in, the vehicle you drive, and the places in which you work all require access control. You prevent unwanted persons from entering your home by locking it up when you leave. You prevent unwanted persons from using your vehicle by locking the doors, or by using anti-theft mechanisms. You lock your office door each night when you go home to prevent unwanted persons from entering the premises without your consent or control. Access to these places and devices is controlled through access control mechanisms. Keys to the locking mechanisms are not distributed to anyone who might want access.

Instead, you provide keys, the combination to a locking mechanism, and so on to persons you select to have access to the places or property you wish protected. While the methods described in these examples are far from foolproof – a thief may steal a key, smash a door or window, pick a lock, or hot-wire a car – other control mechanisms may be used to increase security access to the property.

One method of supplementing the level of access control provided by these mechanisms is the use of Security Guards. In most cases, controlling the movement of people, materials, and vehicles into, out of, and within an area is one of the primary functions of security. By controlling who has access to which area of a property at what time, access control ensures that the right people are given access to areas they have the authority to enter, at the right time. It controls traffic into, within, and out of an area, whether it is a building, a parking area, a residential complex, or other facility.

The amount of access control needed at each site will vary from minimum to maximum, depending on what needs to be protected.

MINIMUM ACCESS CONTROL

This type of control is used at sites that allow general admission, such as malls. It assumes everyone is entering for lawful purposes. People are only denied entry by the Security Guard if rules are not followed or the law is broken.

MEDIUM ACCESS CONTROL

This type of control is often used at office or residential buildings. The Security Guard or someone in the building may use an intercom to allow access to the property. The intercom system may discourage someone from coming in, but if they really want to get in they can enter behind someone who has authority to enter the building.

MAXIMUM ACCESS CONTROL

This type of control is found at sites with high security, such as some government offices, labs, military bases, software manufacturers, etc. Sites like these use a combination of security personnel and alarm systems to have total access control in all parts of the property.

RULES FOR ACCESS

Each building, facility or work site may have different rules for access. The public may be given admittance to some, all, or none of the premises. These rules can change, depending upon the time of day. For example, an office tower with a lobby that is open to the public during normal working hours may lock its doors and restrict access after hours. Similarly, the parking lot that is closed to the public from 7 a.m. to 5 p.m. may drop all restrictions and allow anyone to park on the lot after hours.

The site rules may restrict not only public access to all or part of the premises, but may also restrict access for people that work on that site. By way of an example, we can imagine a large pharmaceutical plant with a number of different branches, all working on different projects, but within the same building. For security reasons, management may decide that employees must stay within their own work areas. In this case, access controls would have to be introduced to prevent the employees from entering these other areas.

The needs of the client will determine the access control mechanisms at a job site. Because the client is more aware of these needs then security is likely to be, and because the client will be more aware of sensitive areas (for example tenants in an office tower that may object to the use of certain mechanisms such as physical search) the client needs to determine which access control mechanisms are used.

The owner(s) of the property will set all of the rules respecting access to the premises, including who will be given access and under what circumstances; when bags and briefcases will be searched; when people will be stopped and questioned or allowed free access to the property. It is the role of security to ensure that these rules are complied with.

ELEVATOR AND ESCALATOR OPERATION

Should guards have the responsibility of supervising elevator operations, the following procedures are recommended:

(a) Verify that the load maximums are posted;

(b) Encourage passengers to move to the rear of the elevator and face the front;

(c) Keep people, clothing and personal belongings away from the doors on closure;

(d) Be familiar with the emergency system on board, including the stop button and bells, and the telephone system if there is one;

Escalator operation follows basically the same procedure as elevators. Do not permit crowding, encourage people to face in the direction of travel on the escalator and encourage them to remain stationary. Emergency stop buttons are located at the top and bottom of escalators. Guards should be familiar with their location. Whenever accidents occur on an escalator, the emergency stop button should be pressed immediately. If the problem is cleared and the escalator is to be restarted, then no one should be allowed on the escalator until it is moving. Should escalators malfunction, the guard should ensure that the system is turned off and is not restarted until it has been properly repaired by qualified service personnel.

METHODS OF CONTROLLING ACCESS TO PROPERTY

Access control mechanisms control the entry and exit of people onto the property or into specific areas of the property. There are many devices available for use as access control mechanisms including card readers, touch keys, ID cards, badges, and fingerprint ID.

In smaller work sites, a Security Guard may be able to recognize individuals. This method of access control, while useful, is limited by the memory of the individual Security Guard. One guard may be able to remember a large number of faces, while the next may be unable to recall more than a few. Furthermore, the larger the number of people given access, the greater the likelihood that a mistake will be made and someone that should not be given access to the premises will be able to slip inside.

The use of photo badges (badges that act as identification to a guard at a manual checkpoint) may supplement the effectiveness of this method of access control. Keys and locks are also a useful method of controlling access to the entire property or to specific sections of the work site. Disadvantages are that keys are susceptible to loss or theft, and, unless locks are changed with frequency, persons who should not be given access may be able to obtain it. Locks are also subject to picking. Furthermore, they don’t work well to keep out intruders if no one ever actually locks the door or window!

The use of ticket machines is another example of access control, where those who don’t obtain a ticket are not granted access to the property.

Access control generally starts with the outside perimeter or property perimeter of the premises, where the property that is being guarded begins. As one progresses from the outer perimeter to the centre of the protected site, access control mechanisms generally are harder to breach. Once inside the outer perimeter, one finds the inner perimeter or building perimeter and the central core or interior of the building. The inner perimeter consists of all common areas within the entire protected property, while the central core represents the central area that the property owner wishes to be protected.

ACCESS CONTROL AREA EXAMPLES:

Shopping Centre

Outer Perimeter Inner Perimeter Central Core
Outside edges of Parking lot Sidewalks, parking lot around building Shopping centre itself

 

Building construction site

Outer Perimeter Inner Perimeter Central Core
Outside edges of Parking lot – starting with the fence that keeps the public from entering site Ground inside fence around building, surrounding the building under construction, road in, parking area for equipment, tool shed, and so on.

Building structure itself

 

Bank

Outer Perimeter Inner Perimeter Central Core
Outside edges of property of Bank; the front, where the bank “storefront” contacts the sidewalk; in the rear, the parking lot available to the public Walls of the bank in building itself; doors and windows are areas of concern Bank vault

 

PERIMETER, AREA, BUILDING AND POINT OF OBJECT PROTECTION SYSTEMS

Security systems may be used to protect inside and outside perimeters, the central core of the site, or they may be installed at specific spots within these areas. Objects themselves, such as safes and vaults, can also be protected with specific security devices.

The first line of defence in protecting property is control mechanisms placed around the outside perimeter of the property. While far from perfect, things like access booths, gates, fences and walls are things commonly used in restricting access to property in a cost effective way. The goal of introducing a perimeter protection system is to ensure that an intruder is detected immediately upon entering the property. This is why an outside perimeter protection system is also called a point of entry protection system. Whether an outside perimeter system is “complete” or “partial” is determined by the proportions of the outer perimeter protected. If, for example, the outer perimeter has detection devices on only the accessible openings – like windows, doors, and gates – it is termed a partial protection system. A complete system, in contrast, includes detection devices in these areas as well as in the walls, floors and ceilings.

 

Area systems – more commonly found in the inner perimeter and central core areas – is the second line of defence against intruders. Instead of detecting the opening of a door, window or gate, an area system detects intruders once they have actually entered the premises. Examples of area protection systems include motion detectors, pressure plates, audio detectors and photoelectric cells.

Point or spot systems are the third line of defence. Bank vaults, paintings in art museums, and so on, are objects that may have sensors attached, or may be surrounded by audio and infrared detectors and other security mechanisms.

Fences and walls. Typically made of wood, wire, or other solid substances, fences and walls may surround property, controlling access. Natural barriers, such as rivers, cliffs, ravines and other similar impediments may provide similar protection to that available through the usual fence or wall.

Even with barbed or razor wire attached, fences and other barriers are not a foolproof mechanism for controlling access to the property. Barriers of this nature may be cut through, knocked down, tunnelled under or climbed over. Walls and fences may be made of material that can be seen through. Persons inside the premises may therefore have a restricted view of what is going on outside the property.

Regular maintenance and patrol of a perimeter secured by a fence, wall or other barrier must be performed in order to maintain the effectiveness of this access control mechanism. Materials stacked against fences and walls that may enable intruders to enter the property should promptly be brought to the attention of a supervisor or appropriate official on the site.

Gates and other openings. Fences and walls do not normally continue uninterrupted around a site. Gates or other openings in an otherwise continuous barrier are used as a means of entrance and exit. Security personnel (in access booths at the entrance, or controlling the gate mechanism through a video camera), keys, and other access mechanisms can be used to allow legitimate users to access the premises.

Infrared beam perimeter security systems. These systems consist of a number of poles or columns surrounding the premises. Mounted to these structures are a series of devices that form an infrared curtain around the property. When one or more of the infrared beams are interrupted, an alarm may be sounded.

Typically, each column is fitted with an anti-tamper/anti-climbing device that activates an alarm should an intruder try to step on top of the columns to jump over the beams or attempt to remove or otherwise tamper with the system. Infrared beam systems are electronic devices. Unless connected to a backup or emergency power source, these devices will not be able to operate in the event of a power failure.

Cameras. Mounted at strategic points on the premises, cameras can be an additional security mechanism that can be used, in conjunction with other access control mechanisms, to protect the property being guarded. Cameras may be fixed (immovable), moveable, or activated by movement, and may be placed to allow vision of the outer perimeter, inner perimeter, or within the central core areas.

Even when set up by experts, camera surveillance systems may not cover all areas that need protection. Cameras do not automatically raise an alarm, or open a gate; a living human being must operate and monitor camera equipment and take the appropriate action in the situation. In conducting camera duties, Security Guards must maintain a continuous level of concentration throughout their shift. This can be particularly challenging, especially if the shift is long and uninterrupted. Availability of backup power is a concern as well for closed circuit camera systems; unless emergency power has been provided, the “eyes” of a camera-based security system can be eliminated relatively easily.

Lighting. Property can be provided a great deal of protection simply by ensuring that the premises are properly illuminated. For example, imagine property that has dim lighting or one that has many areas that are completely unlit, full of shadows and have places to hide from observation. Contrast this to property that is brightly lit, without any shadowed areas where an offender can hide. Normally, security can better protect property that is well lit; it is far easier for guards, passersby, and workers on the site to spot problems before they reach a critical point. At the same time, the risk of guards themselves being attacked from ambush is decreased by a properly illuminated work site.

Lights will normally be placed in all three areas of property: along the outer perimeter, the inner perimeter, and within the inner core. Criminals are also deterred by brightly-lit property, which would render clandestine activities difficult.

Controls to the lighting should be situated where potential intruders or unwelcome guests would not have access. Again, unless emergency or backup power has been provided, lighting is vulnerable to power failure (natural, legitimate/planned or as part of an unlawful attempt to gain access to the property).

 

TECHNOLOGY USED TO CONTROL ACCESS/EGRESS

Access control usually occurs in one of two ways in this area. These ways are: entry by way of Security Guard and entry through a mechanical or electronic device.

 

  1. ENTRY THROUGH SECURITY GUARD

You may be asked to stand or sit at the main entrance of a site. Your main tasks are to check identification and to decide if people are authorized to enter.

Personnel recognition – This is often used at small sites. You let in only people who you recognize. Staff tells you if they are expecting any visitors. You use a special form to write down information about visitors. This method only works if you know each person who enters and if you see each person enter. If your attention is somewhere else or you don’t have time to identify everyone, unauthorized people may enter.

ID systems – Many government offices use this method. All employees show you an ID card before entering. You check each ID card carefully.

Things to look for are:

  • a coloured photo and physical description of the holder;
  • the full name and signature of the holder;
  • the company’s name and an issuing authority’s signature;
  • an expiry date;
  • a serial number (for the card itself or an employee number).

 

Special passes – In high security areas you may allow only people with special passes or badges to enter. You must be very familiar with this type of access control so you know what to look for. If visitors and short-term workers want a pass to enter the area, they may have to give you a piece of ID such as their driver’s licence. Their names must be entered in a logbook. You return their ID when they give back the pass as they are leaving. In sites with maximum access control, visitors may have their picture taken and be given a temporary ID card that they must wear until they leave the property.

Access control doesn’t work unless you follow the rules carefully for everyone. Some people, especially employees who have worked at a site for many years, may become angry or frustrated if they have to show their ID every day. If you are new to a site you will not be able to recognize all employees. Check ID cards even if you know the person. The card may no longer be acceptable. If someone challenges you, remain calm, explain the reason for security, record information in a logbook or report sheet, and follow your post orders.

Security Guards are sometimes expected to receive, store or deliver mail, messages or parcels. This is not a usually a Security Guard’s responsibility, and you should only do these duties if you have clear instructions in your post orders. Postal or special delivery messengers should wear special badges and have proper identification. Your duty is to check their ID, record their entry, and give them directions so that they can make their delivery.

  1. ENTRY THROUGH MECHANICAL ELECTRONIC DEVICE

At medium access sites, a Security Guard does not always control access.

Employees can let themselves into the area. There are many ways that this occurs:

Keys – Some employees are given a building master key that allows them to enter the building and most areas inside. New technology is replacing the standard metal key at many sites;

Touch keypads – A keypad is on the wall at the entrance. Users are given passwords, codes, or personal identification numbers (PIN) that they must punch in order to enter;

ID card tags – Some cards have a magnetic strip like you see on the back of a debit card. Other cards have a bar code like you see on a store product. The user swipes the card or puts it in a slot in the reader. The reader is mounted on the wall or door. It checks the code on the card. If the card is authorized, the door is unlocked for a short period of time;

Proximity cards – These cards work in a similar way to cards with stripes or bar codes, but they do not have to touch the reader. Someone can unlock the door by passing their card near the reader. These cards may show only an identification number or one side may include photo ID. A key fob is a device that acts the same way as a proximity card. It is a small plastic device that can be attached to a key ring;

Biometric identification – Biographical information about individual employees is stored in a data bank. This could include fingerprints, palm prints, retina patterns (blood vessel patterns in the eye) or face recognition information. If an employee wants to enter an area they must pass their hand, eye, or face by a reader. If the reader matches this information with the stored data bank, the door is unlocked. Because biometric data is unique to each person, this system can be used to prevent theft or fraud. Unlike a password or PIN, a biometric trait cannot be forgotten or lost;

Radio Frequency Identification (RFID). Tags the size of a grain of rice can be embedded in access cards or other security devices that would allow authorized personnel access to areas within a facility and would also allow Security to ‘track’ the individuals as they move throughout the facility. RFID technology is being used in airports in the new e-passport system to help identify legitimate personnel, and distinguish them from possible security risks.

Many guests are not required to produce ID before signing logs; and even where valid ID is required to be produced, this method of screening relies heavily on the honesty of the visitors or the ability of security to spot false identification when presented.

Keys and Locking Systems. Locks are designed to prevent unauthorized personnel from accessing property. Keys may be provided to security in order to allow security access to the property.

A Building Master Key opens all doors within a building, except those rooms or areas which have been “keyed off the master”.

Sub-Master Key opens a group of doors (which may have unique locks operated by individual keys) within a specific area. For example, a “department master” may access all space held by one department in a complex; and within the property assigned to that department, a Sub-Master key may access only a particular section.

Keys may be “security” protected. For example, a key may be engraved or stamped with a particular insignia, number or logo that locksmiths and key copying services are supposed to identify and refuse to copy.

Specially coded security locks, such as push-button combination locks, may also be used. These locks require a code to be entered before access/egress through the door or entryway is permitted. Master keys, sub-master keys and codes for push-button combination locks are usually distributed with care. As will be discussed shortly, liability concerns arise from the careless use and control of access control devices, such as keys and pass codes.

Timed Locks. Banks and other similar agencies can have locks on vaults and safes on timers. At a preset date and time, once a key, code or other mechanism is used, the lock will open, allowing access to the protected area within. Trying to gain access after regular business hours, for example, may require special overrides to the locking system. Some of these systems may not be overridden at all.

 

Ticket machines. Tickets are issued to the person accessing the premises, which provide proof that he or she (or, in parking lots, a vehicle) has been granted access to the property. This method provides little security, as it traditionally limits the users of the premises to anyone who can pay a fee. It does not guarantee the conduct of the user or the safety of other persons or property on the premises.

 

LIMITATIONS ON ACCESS CONTROL MECHANISMS AND TECHNIQUES

The majority of technical access control mechanisms rely on electricity to operate. Backup or emergency power, or a manual override of an electronic system is essential for a meaningful security system. Loss, theft or duplication of keys, cards or passes is possible. Keys or passes can be stolen. Locks can be picked. Doors, gates, and windows can be smashed open. With enough money, programmable cards and similar devices can also be obtained by illegitimate users and made to operate on security systems. Passwords and pass codes that are not changed regularly can be discovered or sold. The point is that no security system is foolproof. A security system is designed only to minimize the risks of unlawful access. Security Guards should supplement the weaknesses of the security system he or she works with in protecting the persons and property on the site to which he or she has been assigned. He or she should keep these factors in mind, to provide the best security possible to the client.

The control of access devices presents other challenges to the security industry as well. For example, a recent decision in Texas held a security firm liable for $18 million dollars in damages after a woman was sexually assaulted and abducted by a man who gained access to her apartment unit by using a backup key. The offender had broken into the security firm’s office and stolen the copy of the victim’s apartment key, which was carefully labelled with the victim’s correct address. The jury found the firm liable because it assumed responsibility for the safe storage, and foreseeable unlawful use, of a labelled key. The Court held that the security firm had a responsibility to protect the homeowner from the unlawful actions of those who might come into contact with such a powerful tool of access.

MATERIALS ACCESS

One of the most sensitive tasks that Security Guards will have to deal with in this Chapter is the issue of the removal of materials from a work site. People routinely leave a site with things like computers, computer disks, boxes and briefcases full of materials, vehicles, and other company possessions.

While there can be no doubt that in some instances, industrial espionage may be a concern, a Security Guard who prevents people from exercising legitimate access to those materials or from removing them from the site will also cause problems. The client – the one hiring security – must be the one that determines what security efforts are appropriate. The client will provide direction formally or informally to the security firm, or to the guards themselves, generally in written form. As with anything, change is inevitable; changes to security operations, policies and procedures will be made from time to time, so it is important for Security Guards to keep on top of and discuss these with a supervisor.

 Shipping and receiving controls. In some instances, clients will ask security to sign for documents, packages and other deliveries. Clear instructions from the client should be taken, or post orders provided to ensure that a Security Guard complies with the wishes of the client. In some instances clients may require:

Special forms to be prepared by recipients of packages;

Logbooks detailing receipt of goods to be completed;

Deliveries signed for; and

Arrangements made to send the delivery to the ultimate recipient on the site.

Guards on gate duty normally will be expected to:

(a) Check vehicle licence numbers and driver’s name;

(b) Ensure that deliveries are expected, or proper authorization for the delivery has been given;

(c) Receive the delivery in accordance with post orders;

(d) Ensure that the “seal” on incoming or outgoing vehicles, if one is used, is in place and has not been tampered with;

(e) Verify, when a vehicle is leaving the premises, that its load is confirmed by using a waybill or other supporting documentation authorizing the removal of property; and

(f) Search the cabs of vehicles entering or leaving for articles, if required by the client and set out in post orders.

 

THE SECURITY OF INFORMATION

CONFIDENTIALITY OF INFORMATION

Keeping critical information secret is called confidentiality. Confidentiality is an essential element of the duties and responsibilities of guards. Part of your job is to protect information, so you don’t want to be the cause of an “information leak.” As a Security Guard you are placed in a position of trust and must always act in ways that keep that trust.

Because of their work-related duties, they often become one of the most informed employees of the company for which they work. You will see and hear many things that you must keep secret or share only with certain members of the company or with others in the security department. It is important that you do not talk about these things with other people.

Guards receive information regarding a wide variety of criminal acts, financial affairs, personal activities or classified work that is being performed. Due to the nature of their job, they often carry keys that would allow them entry to many areas that are not open to others. It is evident that guards are placed in a position of trust, and they must at all costs work to maintain that trust to the highest level. Guards must ensure that confidential and classified information does not leave the workplace, and information of this nature that is passed to security in the performance of their work must not be discussed or shown to anyone outside the security department.

Canadian Government information may be classified under any one of the following categories:

Top Secret – Unauthorized disclosure would cause exceptionally grave damage to the nation.

 

Secret – Unauthorized disclosure would endanger national security, cause serious injuries to the interest or prestige of the nation or any government activity thereof, or would be of great advantage to a foreign nation.

 

Confidential – Unauthorized disclosure would be prejudicial to the interest or prestige of the nation or any government activity, or be of an advantage to a foreign power, individual personal files may be accorded the protection of this classification.

 

Restricted – Should not be published or communicated to anyone except for official purposes. In industry, similar classifications are used to identify information and material that must be kept from competitors and the public.

 

COMPUTER CRIME

Computer crime refers to stealing or damaging computer information. There are many ways in which computer crimes can occur. Data that has been stolen can be used to get goods and services or it can be sold for a profit. An intruder may find confidential information such as passwords or special codes by going through someone’s desk or simply looking in garbage cans. If an employee does not log off their computer when they should, someone else can see the private information or make changes to files.

People from outside as well as people from within the company can become involved in computer crimes at your site. One of your jobs may be to escort people through restricted areas to make sure they don’t have access to confidential information. It is not easy to know if someone is involved in computer crimes. However, there are some signs that may mean computer crimes could be occurring on your site.

 

WATCH FOR ANY OF THE FOLLOWING:

  • Employees who are angry at the company or who have been recently fired;
  • Private information such as pass codes that have been left out in an area where they can easily be seen;
  • People using computers that belong to someone else;
  • Someone who works at home a lot and comes into work at odd hours or at times when you don’t expect them;
  • Employees who arrive early or leave late but don’t seem to do much company work during these times;
  • Employees who talk too freely about things that should be kept confidential.

You will need to use your common sense when deciding that something that you see may mean that someone is involved in computer crimes. If you see something that you are concerned about, take careful notes and report it. No matter where you work or which client you are working for, your assignment will fall under one of these classifications. Remember, a good Security Guard should ensure that he/she is completely familiar with the physical layout of any building, plant, facility or area that he/she is guarding in order to detect when something is amiss or respond quickly when necessary. Without this knowledge, you will not be able to understand the functions of the job, will not be able to perform with pride and confidence, nor be able to react in the event of an emergency.

Always bear in mind, the Security Guard’s primary function is to provide protection. The specific duties for the assignment will normally be contained in orders and instructions issued by management.

 

COMPUTER SECURITY

Protecting computers and the programs they contain is a unique challenge. With every technological change improving computers and the services they provide, there are new dangers to be faced. These dangers include:

  • Theft of computers;
  • Theft or piracy of software;
  • Industrial espionage (theft of ideas or products);
  • Mischief or damage to computers.

Computer theft presents a unique challenge to security staff. While the simpler offences – a person who clearly does not belong on site, physically ripping the cords from the wall and fleeing from the scene with the computer under arm – are easily detected and responded to, some thefts are more difficult to detect. For example, picture a guard at a kiosk in an office tower at closing time. A person in business attire passes by with a laptop computer in its carrying case and a box containing word-processing software under his or her arm. Is this person stealing the computer or the software? Or, are they simply taking it home to finish up some work they did not have time to complete during

the day?

Piracy of software. Software is protected by copyright. Unauthorized use is a violation of this law. Unauthorized copying of software may result in liability for the individual using the software or his or her employer.

 

Industrial Espionage. Like piracy of software, industrial espionage simply represents a specialized type of theft. Industrial secrets – like the recipes for Kentucky Fried Chicken® and Dad’s Cookies® – are often valuable, and carefully protected by the companies that own them. However, it is extremely difficult to tell when a person is taking home legitimate off site work, and when they may be removing secret documents and other possessions of the company.

 

Non-legitimate uses of company equipment. Some companies may develop policy that prevents employees from using company equipment for personal uses. Again, it may be extremely difficult for a Security Guard, who does not know the intended use of company equipment, to determine if this policy has been infringed. The difficulties these and other security policies present should be discussed with the guard’s supervisor, who should consult with the client to determine an approach that is appropriate.

 

Mischief or damage to computers includes not only physical injury to the computer but also actions that result a significant decrease in the function of the computer, such as infection with a computer virus, or deletion/modification of data or computer software.

Definitions that may be useful include:

Virus A program that can infect other programs by modifying them to include a copy of itself (possibly evolving as it progresses).

Worm A program that spreads copies of itself through the network and attached computers.

Trojan Horse A program that has hidden instructions designed to do things that the user of the program did not intend it to do.

Computer viruses and worms are self-propagating programs that can infect other programs by modifying them to include a copy of themselves. When the infected programs are executed, the virus/worm spreads itself to still other programs. Viruses and worms may destroy programs and data. They may use up resources (they can fill computer memory with garbage data, usurp computer cycles, and so on). Trojan horses can insert damaging instructions into any program.

CONDUCTING SECURITY CHECKS AND SEARCHES

While the client determines the rules of access at the work site, a Security Guard must ensure that these rules are complied with. A Security Guard should be clear on the rules that he or she will be enforcing on the site. The only way to ensure that the access requirements will be met is by making the Security Guard familiar with the requirements of that particular site. Security firms, when introducing Security Guards to a new site, should discuss the rules of access and protocol in detail.

People may not only be greatly inconvenienced by a search of their belongings, but insulted as well. It is vital that Security Guards comply with the wishes of the client in determining when these types of invasive and potentially reputation-damaging actions are necessary. If the instructions of the client are ambiguous, then the Security Guards should consult with his or her supervisor.

In the meantime, the Security Guard should take note of suspicious behaviour, items removed from the site, and so on, in an official report. The guard’s notebook should also include a full description of what transpired.

The difficulties these and other security policies present should be discussed with the guard’s supervisor, who should consult with the client to determine an approach that is appropriate. It is much simpler for a guard to explain why he or she must search the briefcase of an employee if management has made the determination that searches are necessary.

 

ALARM SYSTEMS

PURPOSE OF AN ALARM SYSTEM

An alarm system may be generically described as any mechanism designed or intended to provide immediate notification of a condition requiring urgent attention or response.

Hundreds of years ago, alarm systems were quite primitive – from dogs barking at potential intruders to bells or other noisemaking devices on strategically placed strings that would provide an alert. Miners used to take small birds down into the mines with them; the small birds, more susceptible to a reduction of oxygen in the environment, would succumb to the lack of air before the miners would, and thus alert them to the dangerous situation that had developed.

Over time, with developments in technology, alarm systems have become ever more complex. They are also able to provide a more accurate response. Some alarm systems are even capable of performing self-analysis to ensure that a false alarm has not taken place.

Today, alarm systems can be used to warn of a broad range of conditions: intrusion, fire, smoke, the release of toxic chemicals, changes in the environment such as temperature or humidity, and the malfunction of equipment.

A Security Guard should, at a minimum, know how to arm, disarm, and reset an alarm system, test the operating system, and recognize potential (obvious) problems with the system he or she will be working with.

 

TYPES OF ALARM SYSTEMS

Alarms may be mechanical, electrical or some combination of both elements. Purely mechanical alarms include such devices as wind chimes placed near the door of a store, so the clerk will be notified of any entrance or exit by potential customers. Electrical alarms include the sensors and devices used in homes, buildings and compounds, which activate an alarm.

WHAT IS THE MAIN PURPOSE OF AN ALARM SYSTEM?

Alarm systems can be used to warn people of many problems such as:

  • intrusion (illegal entry);
  • fire;
  • smoke;
  • toxic chemical release;
  • changes in temperature;
  • changes in humidity;
  • equipment breakdown;
  • water leaks or other types of leaks.

COMPONENTS OF ALARM EQUIPMENT

HOW DO ALARM SYSTEMS OPERATE?

The types of alarm systems you will work with will vary. Even though some systems are complex, they are all made up of three main parts, the sensor, the transmitter and the annunciator. You can think of an alarm system as a body:

  1. The sensor is like the senses, such as sight, hearing, and touch.
  2. The transmitter is like the nerves which carry messages from the senses to the brain.
  3. The control panel or annunciator is like the brain.

 

  1. SENSOR

This hardware receives or detects information from a protected area.

Smoke and heat detectors sense smoke or high temperatures. Gauges on boilers and heaters measure fluid levels and pressure.

Sensing hardware include devices that are connected by wire or through radio or microwave transmission devices to a control panel. The sensing devices are the eyes and ears of the alarm system and indicate the presence of a particular condition (movement, light/ interruption of a light beam, presence of smoke or toxic chemicals, change in temperature, pressure, or humidity, or similar factors).

There are many types of sensing hardware available:

Magnetic contacts, commonly found in many home security systems, detect the opening of doors, windows, drawers, and cabinets. A magnet is placed on the item being opened, and one on the frame around it. As one magnet moves away with the door or window being opened, a spring opens a contact and signals the control panel. These types of devices are easily defeated by substitution of a secondary magnetic field, used to keep the contacts in the open position while one of the magnets is moved. A “balanced” switch may be installed to defeat this method of circumvention.

 

Shock sensors have replaced older technology designed to detect broken windows. Glass was originally protected by placing a continuous strip of metal wire or foil around the circumference of the window. When the glass was broken, the metal foil or wire was broken as well, interrupting an electric circuit. This interruption was then communicated back to the control panel, which signalled the alarm. Technology has replaced this relatively primitive – and easily defeated – alarm mechanism with vibration or shock sensitive devices attached to the window itself. When the window is shattered, the shock of the blow activates the control panel. Both forms of this technology may also be installed in walls and gates to protect those areas from forced entry.

 

Motion detectors are strategically placed within a premises to capture the movement of an intruder. Normally, motion detectors are placed in high traffic areas where intruders are likely to go should they enter the premises. Several subcategories of motion detectors are available on the market, each with advantages and disadvantages over other types of motion detectors. Photoelectric cells, also known as electric eyes, are composed of a light source and receiver. A beam of invisible laser, infrared or ultraviolet light is sent across the path of travel through a room or hallway. An intruder walking through it will interrupt the beam of light. When the sensor detects an interruption in the beam, it advises the control panel of the breach. Security Guards dealing with premises protected by photoelectric cell technology should be aware of the effects of fog, smoke, and other objects that may inadvertently block the transmission of the photoelectric beam. Intruders aware of the use and location of these devices may be able to step over or crawl under the beam of light.

Ultrasonic detectors operate like miniature radar detectors. They send a pulse of sound into the area being monitored. As sound waves bounce off of objects in the protected area, they reflect a signal back towards a receiver. As with radar, any object that is closer to the sending unit than the reflecting device – as would be the case when a person is moving up a hallway towards the sending unit – would change the “bounce” time and pattern, and activate the alarm.

Microwave motion sensors operate in a fashion similar to ultrasonic detectors. The main difference is that, like all radio waves, microwaves can pass through solid walls, and accidentally detect motion in other rooms or areas.

 

Audio alarms monitor noises produced in the area being protected. These systems detect small sounds made by movement. Because many things inside protected property make noise (air conditioning or heating devices move air and make a small amount of noise; buildings creak and settle) these devices tend not to be as reliable and may be prone to giving false alarms.

 

Infrared sensors measure the amount of infrared energy in the area being monitored and are primarily used to detect intruders. All warm-blooded animals give off body heat, which is detected as infrared energy. A sudden increase in the amount of infrared energy in the area being monitored causes the sensor to indicate conditions have changed.

Unfortunately, changes in the heating or cooling system, sunlight and other sources of heat may cause the alarm to be triggered.

 

Pressure sensors. Much like land mines (but without the explosive components) it is possible to insert devices into the areas to be protected that trigger an alarm when pressure – such as the pressure of a person walking across the floor – is placed on the device. Some alarm systems place pressure sensitive mats underneath carpeting in strategic areas of the property being protected.

 

Gauges. Sensors may be attached to gauges and other devices used for measuring pressure, fluid level, and so on, so that when a minimum or maximum factor is achieved, the sensor advises the control panel of the situation. Boilers and heating devices commonly have these types of devices installed, as the danger posed by explosion from a build up of pressure can be significant.

 

Temperature sensors monitor the environment for radical changes in the environment. Sensors may monitor a large change in the temperature of the area – for example, a rise from normal room temperature to 1000 degrees (the high temperature of hot gasses released by a fire may be easily monitored in this fashion, as would a fall in temperature below freezing) or may include reaction to a specific temperature (for example, once 500 degrees is reached in the area, the sensor will advise the control panel).

The following table gives some examples of sensors that are used with intrusion alarms:

SENSORS

Sensor type How it works Security concerns
Shock activated by vibration from pressure or forced entry – installed in windows, doors, gates, walls, safes, vaults a strong gust of wind could set it off.
Motion

 

activated by movement – installed

in high traffic areas

 
Laser beam

beam of light sent to receiver – intruder breaks beam intruder can step over or under beam
Ultrasonic

sound waves sent to receiver – sound causes waves to bounce off objects, like radar may be set off by mouse running, air movement
Microwave

radio waves sent to receiver – movement breaks radio signal waves can move through walls and detect motion in other rooms
Audio

microphone picks up loud sounds, for example breaking glass may be set off by air conditioning, heating equipment
Magnetic / foil circuit breakers activated by opening of doors or windows adding a second magnet can stop it from working
Infrared energy activated by heat increase from human and animal bodies as well as fire may be set off by rapid change in heating / cooling systems
Pressure activated by walking pressure – installed under mats, possibly near vaults and safes  
Wire activated by change in tension – stretched along perimeter barrier such as fence  
Proximity alarm electromagnetic field around protected object – activated by entering field, installed around high security fences, safes, vaults, works of art animals, tall grass can set off perimeter alarms

 

 

 

  1. TRANSMITTER

This is any device that sends alarm messages from the sensor to the control panel. This could be hard wiring, telephone wires, fibre optic lines, and radio signals.

 

Transmitters send a signal from the sensor to the control panel, advising the control panel that certain events have taken place. For example, assume that a segment of light wire or metal foil has been placed on a window to protect the premises from intruders. The protected window is smashed, breaking the wire or foil, and interrupting an electric circuit. This message must be communicated somewhere for it to be acted upon. Transmitters sent the message from the sensor to the control panel. Transmission devices include wires, fibre optic lines, and radio signals.

  1. CONTROL PANEL OR ANNUNCIATOR

This is the central component that receives messages and translates the information into a response. Most control panels contain the same type of hardware.

Control panels are the “brains” of an electronic security system. A control panel receives the messages, warnings and alerts provided by the sensing hardware, and translate this information into a response. When it receives information that it has been designed or programmed to watch for – such as an increase in temperature, the existence of smoke particles beyond a minimum threshold, movement, sound levels, or whatever the key information is – it responds by taking a predetermined action. This action may take the form of a call to a response agency, emergency personnel such as police, ambulance or fire.

Control panel hardware What it does
Data processing equipment from sensors Receives and interprets information
Alarm transmission equipment Sets off alarms such as sirens, horns,

telephone / radio signal, buzzers

On / off and reset controls Allow operator to turn the alarm on or off. Made up of panel board with keys, pads or buttons
LCD panel Shows whether alarm is on or off and if system is operating correctly or where trouble spots are
Back-up power supplies Provide emergency power in case of

accidental or planned power outage

 

 

While individual manufacturers provide different systems to do different things, generally speaking, all control panels contain the same type of hardware, namely data processing equipment, alarm transmission equipment, on/off and reset controls, system status indicators, and a backup power supply.

Data processing equipment receives the information provided by the intelligence gathering devices. This equipment interprets the information received and reacts in accordance with the preprogrammed instructions.

Alarm transmission equipment is the means by which an alarm is raised. This may be as simple as a horn or siren, or it may send a signal over the telephone lines or via radio transmission to a monitoring station on the property or at a remote site.

On/off and reset controls usually consist of a panel board with keys, toggles or digital key pads that allow an operator to turn the alarm on, off, or reset the system (in case a problem has developed).

System status indicators are the mechanisms that are used to describe how (or if) the system is operating. Commonly indicated by a variety of lights, the usual colours are red (to demonstrate that the system is okay, but not turned on) yellow (there is trouble somewhere in the system) and green (system armed and operating correctly).

Backup power supplies are common features in most alarm systems. An emergency power source is used in case of an accidental, planned or deliberate (sabotaged) power outage.

 

GENERAL OPERATING PROCEDURES

Except during the times in which the public is given unrestricted access to the premises (when the alarm may be overridden or shut off), electronic alarm systems will be active. When a specific condition is obtained – a motion sensitive detector is activated by an intruder, temperature changes a certain amount over a specific time period, smoke or other chemicals are detected at levels beyond a predetermined threshold – the system will activate the alarm.

COMMON CAUSES OF ALARM ACTIVATION

There are four main reasons why an alarm will activate:

  1. A specified event has taken place (an intruder has entered the premises, for example), (approx. 0.01%);
  2. A malfunction has occurred, (approx. 19.69%);
  3. Human error, (approx. 45.80%); or
  4. Undetermined, (approx. 34.50%).

According to industry statistics, the number of errors is far greater than the number of legitimate alarms.*  A Security Guard responding to an alarm, however, should not become complacent. Whenever an alarm is detected, the Security Guard MUST treat it as if it were a legitimate event.

malfunction is considered any correctable problem discovered within an alarm system that caused the system to operate incorrectly, either by activating an alarm when one was not required (false positive) or by failing to activate the alarm when one was required (false negative). All security systems must be subject to periodic maintenance. Wiring deteriorates, walls crack, fences rot or rust, electronic devices get dropped or bumped into. All of these things must be periodically checked to ensure that they are still fully functional. Failure to maintain these systems may mean significant problems in the operation of a security system.

 

Human error means that the false alarm was caused by the improper actions of a person. Commonly, this situation arises when someone fails to turn off or turn on the alarm properly; or by failing to install the equipment properly in the first place.

Undetermined means that neither the alarm system nor an operator/installer could be determined to be the cause of the false alarm.

MONITORING OF ALARMS

Just because a property is protected by an alarm does not mean that the alarm is monitored. Alarm systems are generally broken down into two basic categories:

 

Local Alarms, also known as unmonitored alarms, when activated, send signals to a localized bell, horn, siren, strobe light or similar device or combination of devices. Outside agencies, such as the police, fire or monitoring agencies are not advised of the alarm. Local alarms, although cheap to operate, may not be heard unless people are in or near the building being protected. The combination of a Security Guard on site and a local alarm significantly reduces the likelihood that a local alarm will remain undetected.

 

Monitored alarm systems are broken down into two subcategories: locally monitored and centrally monitored.

locally monitored alarm system takes the basic local alarm system and adds a dialler or communicator. The control panel is connected to a telephone line (either a committed line or a general line). In the case of an alarm, the control panel automatically selects a series of numbers to which it dials and transmits information about the event that has taken place.

 

Centrally monitored alarm systems connect the control panel directly to a central agency that monitors alarms all over the country using a dedicated transmission line. The central station is operative 24 hours per day, 365 days per year. When a call is received, trained personnel, who have been provided with a predetermined list of contact numbers, take a predetermined action. For example, in the case of an intruder alarm in a store (a sensor on the window goes off, indicating that someone has tried to enter the premises), the central agency might call the store itself, then the store owner; if no one is available at the first two numbers, then the police or other emergency personnel might be contacted. The alarm signal normally provides the type of alarm (fire, damage to a window or door) that has been triggered so the central agency knows which emergency personnel to contact. These systems typically detect a cut or broken phone line and respond as an alarm.

 

SECURITY RESPONSIBILITIES DURING AN ALARM

Security Guards unfamiliar with the type of alarm system in the area they are guarding should consult either their supervisor or the site owner to determine what the system equipment is like, and to ensure that they operate in accordance with the client’s instructions with respect to the alarm.

The responsibilities assigned to a Security Guard during an alarm must be determined in advance by the client (the agency that has hired the security services), and the security firm that has agreed to perform those duties. These responsibilities may range from notifying the client, or the police, fire or other emergency personnel, to identifying the cause of the alarm and reacting appropriately.

* Regardless of the level of threat occurring, the primary responsibilities of the Security Guard remain the same, the protection of people and property. In some cases, the Security Guard may be instructed by his/ her company (or the client) to immediately evacuate the site once an alarm has been activated. In other cases, the Security Guard may be instructed to completely seal the building. For example, after a bank hold-up, Security Guards are often instructed to secure the crime scene pending the arrival of the police. In securing the crime scene, the Security Guard often has to encourage bank customers to remain at the premise[s] until the police have had an opportunity to interview them.