Security Training Academy
Security Training Academy
SECURITY GRADE D NOTES
MODULE 1:
BASIC FIRE FIGHTING
It is important what to do and to do when fighting a fire because this
knowledge can save your life.
DO'S
Ensure back-up assistance
Ensure that an escape route is available
Follow instructions on the extinguisher's label
Break the seal and remove the safety device.
Check the operating milt
Apply the extinguisher medium to the base of the flames
Drive the flames away from you
For vertical fires start at the base of the flame and move upwards
If the fire is outside approach the fire from the windward side.
When approaching fire adopt a crouching approach attitude which provides
some protection against heat and smoke.
Keep alert for any changes in the fire pattern.
When tackling a fire involving electrical equipment isolate power as soon as possible
to prevent re-ignition.
Ensure that the fire is completely extinguished and no sparks remain
DON'T S
Do not place yourself at risk
Never tilt or invert any fire extinguisher
Never walk on the spillage area in case the flames flesh back.
When tackling flammable liquid fires using controllable discharge type extinguisher
medium until the fire is completely extinguished.
When the fire is extinguished, back off slowly and never turn your back on it.
VERSION 1/2015 Page 1
Security Training Academy
CLASSIFICATION OF FIRES AND TYPES OF FRE EXTINGUISHERS
Classes Description Examples Fire Extinguisher Color of label
of fires
Class A Solid Wood; coal; R e d
p l a s t i
combustible
c Water
material
Class B Flammable liquids Oil; Foam Yellow
Petrol;
benzen
e
Class C Electrical Generat BCF Green I
appliances ors;
cables
Class D Metals Magnesi Dry Blue
um; chemical
aluminu Powder
m;
sodium
Methane;
L Class E Flammable gas Carbon Dioxide Black J
butane
All fires involve 3 common elements:
Fuel; oxygen; and heat.
Chain reaction necessary to start the fire.
METHODS OF STARVING THE FIRE
Close windows and doors
Blanket small fire with a bag
Hose down hot walls and floors or the fire.
Saturate with appropriate extinguisher.
Drag combustible articles away or cool them with water.
Keep bystanders away.
Turn off all electric mains
Clear gates and paths for fire brigade to arrive when fire brigade arrives indicate
location of fire.
MODULE 2:
RADIO COMMUNICATION
Sometimes the two-way radio is the only link between the Security Officer and the
control room. Therefore, it is necessary that the Security Officer knows the phonetic
alphabet to prevent misunderstandings or messages received wrongly.
VERSION 1/2015 Page 2
Security Training Academy
SECURITY OF COMMUNICATIONS
Based on the principle that "enemy listens", every effort must be made to
safeguard the information transmitted over the air. Examples which must be
safeguarded are:
Information received from delicate sources.
Inters and Satraps of a classified nature.
Future intentions on operations
Movement of bullions and cash, etc...
PHONETIC ALPHABET
A – ALPHA N - NOVEMBER
B – BRAVO O - OSCAR
C – CHARLIE P - PAPPA
D – DELTA Q - QUEBEC
E – ECHO R - ROMEO
F – FOXTROT S - SIERRA
G – GOLF T - TANGO
H – HOTEL U - UNIFORM
I – INDIA V - VICTOR
J – JULIET W - WISKEY
K – KILO X – X-RAY
L – LIMA Y - YANKEE
M – MIKE Z – ZULU
MODULE 3:
BASIC OCCUPATIONAL SAFETY
It is important for us to know how an accident happens and how to prevent it, and how
unsafe acts and conditions can affect us in a working situation.
DEFINITION OF AN ACCIDENT
An accident can be defined as an undesirable event often caused by unsafe acts and
conditions. It can damage property and injure personnel. Accidents are the result of lack
of control. Accidents don't just happen. It is direct result of a person acting in an unsafe
manner. The result of unsafe condition that has been left unattended
CAUSES OF AN ACCIDENT
Lack of knowledge Physical
or mental defect
Inadequate work standard
Improper attitude unsafe conditions.
VERSION 1/2015 Page 3
Security Training Academy
UNSAFE ACTS
Working at unsafe speed — example driving a forklift at a high speed inside the
workshop.
Failure to secure machinery and materials
Rendering safety devices inoperative.
Arranging items in an unsafe manner
UNSAFE CONDITIONS
Unsafe construction
Lack of guards (protective covers for machines)
Uneven or slippery floors
Poorly lit up areas
Unsafe storage of hazardous substances.
Committing unsafe acts
Creating unsafe conditions
REPORT UNSAFE ACTS AND CONDITIONS
Report to the supervisor. If no supervisor is present, make an entry in the
occurrence book. Make sure that the entry has been brought to management
attention.
Causes of accidents on a percentage basis — unsafe acts 88%, unsafe conditions 10%
and providence %.
MODULE 4:
PUBLIC RELATIONS
It is important that the Security Officer know how to deal with people to
create favorable impression and to avoid conflict.
FAVOURABLE IMPRESSIONS
Smartly dressed
Have a professional attitude
Communicate effectively
Show concern
Demonstrate good manners
VERSION 1/2015 Page 4
Security Training Academy
POINTS THAT CONTRIBUTE TO POOR RELATIONS WITH THE GENERAL PUBLIC
Poor attitude
Crude Speech
Incompetence
Rumor Spreading
Impoliteness
Exploitation
Abuse of authority
Poor communication
Disinterest
MODULE 5:
POCKET BOOK
It is important to us as we are frequently involved in arrests, investigations and
then have to give evidence in court.
REASONS FOR KEEPING A POCKET BOOK
To provide permanent personal record on hours and work performance.
For recording instructions, messages and incidents during course of duties.
To record details of found property.
To record particulars of fires, accidents, enquiries, suspicious persons and
vehicles and information that can be of assistance in an investigation.
To record all arrests made and the explanation of the accused.
To record all irregularities and hazards observed during period of duty.
AS EVIDENCE IN COURT
To be used as evidence in court
To remember particulars of a case to be used in court
Particulars of arrests and investigation to be used in court
Information that assist in the investigation.
The information written into the pocket book must answer the following critical
questions: Who; When; Where; what; Why; and How. The pocket must always be kept
neat and clean. It is an official document and no pages must be torn out or entries
raised or altered. All entries must he made with pen. (Black and Red).
VERSION 1/2015 Page 5
Security Training Academy
MODULE 6:
ACCESS CONTROL
This module is important because it is necessary to know how to control
people, parcels and vehicles entering the premises.
DEFINITION OF ACCESS CONTROL
Access control is the application of systems or methods to control
access/exits/passage of people. Vehicles and parcels/goods into and out of
premises.
REASONS FO ACCESS CONTROL
Who has access and to which area.
Egress procedure
How are they identified?
How are they monitored during their period of duty/visit?
Observing all orders relating to access control.
FUNCTIONS AT ACCESS CONTROL
Supervisions of entry/exits of all regular employees.
Regulating of all parcels entering or leaving the premises.
Control of all visitors or contractors entering the
premises. Issuing of permits to authorized visitors
Keeping of a visitor’s log book
Conducting searches.
Maintaining a record of all vehicles entering or leaving
premises.
THE 3 "D" PRINCIPLES
Access control is based on 3 "D" Principle: Denial; Detection; deterrence.
DENIAL
This is the first line of defense and includes all the measures and aids which
prevent an unauthorized person from entering the premises. This includes the
following gates; guards; fences, etc...
DETECTION
If the intruder succeeds to break through the first line of defense he must be
discovered, apprehended and removed before he has the opportunity to commit a
crime. The following aids are used guards, dogs, alarms, CCTV. Etc...
VERSION 1/2015 Page 6
Security Training Academy
DETERRENCE
The more barriers for the intruder to encounter the lesser his chances become in
achieving his aim. Quite often this psychological deterrent is enough to turn him
away. The following aids can be used fences; gates; dogs, etc...
SECURITY KNOWLEDGE
Utilizing of all aids
One official language
Task description
Powers of observation
Legal aspects
Behavioral patterns
Permits and waybills
Access and Egress procedures
Immediate action drills
Emergency procedures
Radio communication
AIDS TO EFECTIVE ACCESS CONTROL
Fences Alarms Lights Burglar-proofing Locks
Electronic gates/booms Guards Dogs Strong Rooms.
Safes CCTV
THE FOLLWING PROCEDURES TO BE FOLLOWED WHEN THE VISTOR
ARRIVES:
Gr e et t h e vi si t or
Ask if you could assist him
Ask him to identify himself (ID document)
Determine who and what department he want to visit.
Determine whether he has an appointment.
Determine whether he has a firearm to declare — issue a receipt — put away in
safe.
Complete visitor register
Issue permit and arrange escort; and
Thank the visitor for his time when leaving
Take permit back
H a n do v er fi r e ar m
Writ e t h e l e avi n g
Ask if he has any company property to declare; and
Wish him a safe journey.
VERSION 1/2015 Page 7
Security Training Academy
MODULE 7:
SEARCH PROCEDURES AND TECHNIQUES
It is important for Security Officer to know how to conduct a search and how to
follow the procedures of searching.
THE GOLDEN RULES OF SEARCHING
Identi fy the person
Search systematically and thoroughly
Put yourself in the place of the person to be searched and determine where you
will hide an article.
Be alert against any possible attack during the search.
A search must always be conducted within the bounds of the Criminal
Procedure act.
WHAT TO LOOK FOR DURING SEARCHES?
Suspicious objects and/or weapons.
Prohibited habit forming drugs and/or
liquor.
Precious metals and/or stolen
property.
SEARCHING OF VEHICLE
Determine if the vehicle may enter or leave the premises
To search a motor vehicle thoroughly takes a long time and searches are
normally done superficially
The time to search a vehicle thoroughly cannot be justified unless there are good reasons
to do so. There are many hiding places in a vehicle, but if the search is done
systematically and thoroughly most items come to light.
PROCEDURE TO BE FOLLOWED
The persons in the vehicle must be informed that they and the vehicle are liable to
be searched.
All persons should be told to get out of the vehicle.
One Security Officer must do the searching whilst the second Security Officer stands
back and supervise the search.
He will inform the searcher which places still to be searched.
If a person refuses to be searched or have his vehicle searched, he will be denied
access to the premises
VERSION 1/2015 Page 8
Security Training Academy
EXTERIOR
Number plates
Under mudguards and bumpers.
Under the car — look for newly painted areas on underside, welded plates or unusual
additions
INTERIOR
The car must be searched from front to near.
ENGINE COMPARTMENT
Air filter
Lift battery' and look underneath
Heater.
PASSENGER COMPARTMENT
Dashboard pockets and/or cubby holes
Behind dashboard
Check weights of doors
Wind down windows
Check all seats
Lift movable mats
Check under seats
Rear window panel shelf
COMMERCIAL VEHICLES
Between twin rear wheels
Packing sacks or containers
Drivers cab
All along the chassis
Under the seat of the cab
On the inside of the spare wheel
Hidden against the tail-board of a loaded vehicle
Look for false bottoms in vehicle with wooden body
MOTORCYCLES
Petrol tanks
Toolbox or case
Rubber handle or grips
Foot rest
Lamps
Mudguards and all hollow tubular frameworks should be examined.
VERSION 1/2015 Page 9
Security Training Academy
BICYCLES
Handle bars and rubber grips
Bells and bicycle pumps
Lamps and dynamos
The saddle
All tubular frameworks
Under mudguard and chain case
Sacks and tool bags.
PROCEDURES IN DOING ROUTINE CHECKS
Obtain permission to search
Request person to stand with his legs apart and arms raised
Run hands quickly but thoroughly over the body, head to toe.
Clothing should be rolled between the fingers to discover even the smallest object.
If suspect let him stand facing the wall or vehicle with his hands on the structure.
Routine checks normally imply the checking of ID. Documents.
The following should be checked
Photograph
Compare the photograph in the document with the holder. Should the person be
wearing a hat and there is a problem regarding identification asks him to remove the
hat?
Stamp
Careful examination of the stamp to ensure that it is genuine and original.
Condition of Document
Check the date of issue against the condition of the document. There should be
reason for suspicion if a new document is in poor condition and vice versa.
Avoid leading questions.
PROCEDURE IN SELECTING COMPANY EMPLOYEES FOR SEARCHING
The selecting of company employees for searching can be done electronically or
manually. Some company's use a computer which is programmed to select the person
as they pass the turnstile or door. Other makes use of color cards or balls which
employee draws. The following must be kept in mind when selecting employees to be
searched:
Don't discriminate against race, religion or sex.
Don't select the same person every day.
Stay friendly
Don't make jokes about it.
VERSION 1/2015 Page 10
Security Training Academy
When searching a person, the following arrears must be covered:
Under the arms
Th e st o m ac h
Inside the thighs and crutch
Turn-ups of trousers, seems and padded areas.
Headgear must be removed and searched
Overalls and clothing in the hands.
When searching a briefcase or parcel:
Do not damage everything
Obtain permission before searching.
Ask owner to open own briefcase or parcel.
Check for false bottoms or compartments.
If anything suspicious report to senior.
MODULE 8:
LEGAL ASPECTS
It is important that the Security Officer know that there are certain laws against the use
of another person’s vehicle without his consent and know which articles may be seized
in terms of Criminal Procedure Act during a search.
UNAUTHORIZED ACTS; SECTION 123 (1) ROAD TRAFFIC 29/1989
a. sta rt t he v e hi cl e
b. put the vehicle into gear
c. tamper with the machine or any part of the vehicle
d. enters or climbs upon that vehicle
e. If you ride in or drive that vehicle upon a public road without permission.
SECTION 20: SEIZE OF ARTICLES BY THE STATE
a. which i s concerned
b. which may afford as evidence
c. Which - is intended to be used?
SECTION 1 (1) OF THE GENERAL LAW OF AMENDMENT
Any person who, without a bona fide claim or right and without the consent of the
owner or person having control thereof, removes any property from the control of the
owner or any other person competent to give such consent, whether or not he
intends throughout to return the property to the owner or person from who's control
he removed it. Shall, unless it is proved that such person, at the time of the removal,
had reasonable grounds for believing that the owner or such person would have
consented to such use if he had known about it, be guilty of an offence.
VERSION 1/2015 Page 11
Security Training Academy
SECTION 36 OF THE GENERAL LAW AMENDMENT ACT
Any person who is found in possession of any goods other than stock or produce of which
there is reasonable suspicion that they have been stolen and is unable to give a
satisfactory account of such possession shall be guilty of an offence and liable on
conviction to the penalties which may be imposed on a conviction of theft.
GROUNDS OF JUSTIFICATION — CONSENT
Se arches must be conducted within the framework of the law. Whenever a search
is done, it must be done with strict regard to decency and order. If the provisions of
the Criminal Procedure Act don't apply on the specific situation the only way to
conduct the search is by getting his or her consent.
REQUIREMENTS OF CONSENT TO BE VALID
a. Person who consent must be capable to exercise his will
He is not under the influence of drugs or liquor.
He does not suffer from mental defect and is mature to appreciate the
implications of his consent
b. He must have the authority to consent.
Consent can only be given by a person who or whose property will be search
c. Consent must not be contrary to public morals.
If a lady consents to a body search by a man, it will not be regarded as valid.
d. Consent cannot be withdrawn after the act has started.
It must be withdrawn before the search has started.
e. Consent must cover the whole act.
Consent to search a briefcase is not a consent to do a body search.
If a person consents to be searched by a specific person. Another person can't
do the search.
f. Consent must be voluntary.
Consent obtained through the use of threats is not valid.
It is only valid if the person understands the implications of the consent.
Consent fraudulently obtained will not be valid.
MODULE 9:
SELF DEFENCE AND MINIMUM FORCE:
VERSION 1/2015 Page 12
Security Training Academy
PRACTICALS
VERSION 1/2015 Page 13