tennessee baptist site security training course 3 copyright permission obtained from original author...

27

Upload: jesse-french

Post on 18-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY
Page 2: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Tennessee BaptistTennessee BaptistSite Security Site Security

Training Course 3Training Course 3

Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY http://securitytrainingcourse.com/

Page 3: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Special Types of SecuritySpecial Types of Security

Theft PreventionTheft Prevention

Physical SecurityPhysical Security

Page 4: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Theft PreventionTheft Prevention

Theft is the largest percentage of asset Theft is the largest percentage of asset lossloss

Page 5: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Why People StealWhy People Steal

Financial gainFinancial gain Desire to have the item in questionDesire to have the item in question The challenge – daredevilThe challenge – daredevil Retaliate against unpopular policiesRetaliate against unpopular policies Finance an addictionFinance an addiction Psychological disorderPsychological disorder

Page 6: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Opportunities for theft arise from:Opportunities for theft arise from:

Lack of credential Lack of credential screeningscreening

Failure to lock up Failure to lock up areas or exterior areas or exterior doorsdoors

Page 7: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Warning Signs of Impending TheftWarning Signs of Impending Theft

Persons who watches for a long timePersons who watches for a long time Overly friendly personsOverly friendly persons Hole in perimeter fenceHole in perimeter fence Out-of-place item concealed in a strange or Out-of-place item concealed in a strange or

unusual locationunusual location Adjustment of clothingAdjustment of clothing Bulges in clothingBulges in clothing Excess number of portable, desirable items in Excess number of portable, desirable items in

the work areathe work area

Page 8: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Warning Signs of Impending TheftWarning Signs of Impending Theft

Vehicle parked out of placeVehicle parked out of place Unusual walk, stiff leg or armUnusual walk, stiff leg or arm A vehicle parked unusually close to an A vehicle parked unusually close to an

entrance or exitentrance or exit Book or magazine folded or bags as if to Book or magazine folded or bags as if to

conceal a small itemconceal a small item persons loitering in restricted areaspersons loitering in restricted areas

Page 9: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Warning Signs of Impending TheftWarning Signs of Impending Theft

Shifting packages from side to sideShifting packages from side to side persons in a hurrypersons in a hurry Personal clothing carried in a bundle or Personal clothing carried in a bundle or

ballball persons holding tools or materials not persons holding tools or materials not

used for their normal dutiesused for their normal duties

Page 10: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Preventing TheftPreventing Theft

Although catching Although catching thieves is important, thieves is important, PREVENTING theft is PREVENTING theft is even MORE even MORE importantimportant

Know what types of Know what types of items can be brought items can be brought into a controlled area into a controlled area (for example, a (for example, a knapsack may not be knapsack may not be allowed)allowed)

Page 11: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Preventing TheftPreventing Theft

Learn what can be stolenLearn what can be stolen

Check vehicles for visible items and lockedCheck vehicles for visible items and locked

See that personal items are stored and securedSee that personal items are stored and secured

Check garbage containersCheck garbage containers

Lock and key controlLock and key control

Page 12: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

When You Suspect TheftWhen You Suspect Theft

When in When in doubt doubt about search policy, about search policy, askask your Supervisoryour Supervisor

Your attitude must be representative of Your attitude must be representative of TBDR and non-threateningTBDR and non-threatening

Page 13: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

When You Suspect TheftWhen You Suspect TheftWhen You Suspect TheftWhen You Suspect Theft Bear in mind: Individuals are protected by the 4Bear in mind: Individuals are protected by the 4thth

Amendment against unlawful searches and seizures. Amendment against unlawful searches and seizures. There must be a just and probable cause to search and There must be a just and probable cause to search and seize.seize.

To presume intent of theft, some overt action or To presume intent of theft, some overt action or circumstance must be present to show wrongful intentcircumstance must be present to show wrongful intent

Request the person to step aside into out of the way Request the person to step aside into out of the way areaarea

Ask the person for identificationAsk the person for identification

Ask the person to take out whatever is in the package, Ask the person to take out whatever is in the package, pocket, or bulge in clothingpocket, or bulge in clothing

Page 14: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

When You Suspect TheftWhen You Suspect Theft If the person refuses, If the person refuses,

advise him or her that advise him or her that their refusal will require their refusal will require notification of the policenotification of the police

Still remain polite and Still remain polite and non-threatening to the non-threatening to the suspectsuspect

Contact your Security Contact your Security SupervisorSupervisor

Collect all allegedly stolen Collect all allegedly stolen itemsitems

Page 15: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

When You Suspect TheftWhen You Suspect Theft

If directed by If directed by Supervisor, detain Supervisor, detain suspect and call the suspect and call the policepolice

Write an Incident Write an Incident ReportReport

Report verbally alsoReport verbally also

Report to your Security Report to your Security SupervisorSupervisor

Page 16: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

After Detecting TheftAfter Detecting Theft

If personal property is involved, the If personal property is involved, the decision to prosecute under criminal decision to prosecute under criminal law is up to the victimized personlaw is up to the victimized person

If TBDR property is involved, the If TBDR property is involved, the decision to prosecute is made by TBDR decision to prosecute is made by TBDR DirectorDirector

Page 17: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Physical SecurityPhysical Security

First line of defense is First line of defense is the the PERIMETERPERIMETER

Second line of defense Second line of defense is the exterior of is the exterior of BUILDINGSBUILDINGS

Third line of defense is Third line of defense is INTERIOR CONTROLSINTERIOR CONTROLS

Page 18: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Perimeter SecurityPerimeter Security

Outside security lightingOutside security lighting

Fencing, walls, barriersFencing, walls, barriers

Clear demarcation of Clear demarcation of property line shows areas of property line shows areas of controlcontrol

Parking lot patrolParking lot patrol

Guard at entrance Guard at entrance identifying and monitoring identifying and monitoring incoming personsincoming persons

Page 19: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Exterior of BuildingsExterior of Buildings

Access controlAccess control

Locks and keysLocks and keys

Protective lightingProtective lighting

Page 20: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Interior ControlsInterior Controls

Credentials checksCredentials checks

Lock and key systemLock and key system

Page 21: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Controlling accessControlling access

PeoplePeople

VehiclesVehicles

PropertyProperty

Page 22: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Access ControlAccess Control

Security at entranceSecurity at entrance

Frequent patrols of indoor and outdoor or Frequent patrols of indoor and outdoor or open areasopen areas

Fences funnel visitorsFences funnel visitors

Informational signsInformational signs

Identification of individualsIdentification of individuals

LocksLocks

Page 23: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Entrance securityEntrance security

Admit only authorized personnel with IDAdmit only authorized personnel with ID

Check materials entering facility and Check materials entering facility and groundsgrounds

Page 24: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Entrance securityEntrance security

Contact the Site Contact the Site Supervisor for the Supervisor for the following:following:

Presented Warrants, Presented Warrants, Letters of Authority, Letters of Authority, or Subpoenasor Subpoenas

Process Server at Process Server at the entrancethe entrance

Page 25: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY

Vehicle or Truck Entry Vehicle or Truck Entry ProceduresProcedures

Ensure that only Ensure that only authorized vehicles authorized vehicles enter and exitenter and exit

Protect crossing Protect crossing pedestrians and pedestrians and automobilesautomobiles

Direct vendors, Direct vendors, contractors, and contractors, and emergency personnelemergency personnel

Page 26: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY
Page 27: Tennessee Baptist Site Security Training Course 3 Copyright Permission obtained from original author Gerald T. Aitken of Maybrook NY