Related
TERRORISM AWARENESS IS EVERYONE’S BUSINESS
No matter how well trained and vigilant, law enforcement simply cannot be everywhere. Your eyes and ears as a security officer are needed. After all, you know best what activities in and around your neighborhood/property appear to be “out of the ordinary” or “suspicious”.
WHAT TO LOOK FOR:
• Individuals who do not fit the surrounding environment-dressed in bulky or inappropriate attire for the location or time of year;
• Individuals who show unusual interest in building security systems or access to restricted or sensitive areas;
• Individuals who loiter around buildings, parking lots, and other locations not generally open to the public;
• Individuals making diagrams, taking notes, photographs or video in areas not normally of interest to tourists;
• Multiple sightings of the same suspicious person, vehicle, or activity, separated by time, distance or direction;
• A person observed tampering with company equipment and/or vehicles;
• Abandoned vehicles or vehicles parked in no parking or restricted areas;
• Suspicious objects and unattended items such as backpacks, briefcases or other containers capable of concealing explosives;
• Any activity that appears suspicious or out of place to you!
WHAT TO DO:
• Report suspicious activity IMMEDIATELY to a supervisor, post commander, scheduling manager via urgent page and/or local law enforcement via 9-1-1;
• Give as many details as possible i.e. time, location, description, license number;
• Begin your documentation i.e. DAR, IR etc.
A terrorist attack, like most crime that is not a “crime of convenience”, it requires detailed planning. This planning often includes the surveillance of several potential targets, gathering of the tools required to accomplish the event such as the explosives, transportation, and rehearsals. It is during this planning phase, that we have the best opportunity to deter the event from happening, because “suspicious” activities are occurring. “Suspicious” activity has been described in the past as “you’ll know it when you see it” which is not enough to begin an investigation or notify local law enforcement.
Suspicious” activity can be labeled into these sub categories:
1) When focusing on ‘suspicion’ behavior it should be based upon:
* Where they are (Ex. Hanging out around emergency exits, near or in generator rooms or fire control rooms, etc.)
* When they are there (Ex. Late at night, early in the morning, etc.)
* What they are doing (Ex. Taking photos, looking for security cameras, timing officer’s patrols, etc.)
* Suspicion should NOT be based upon: Race, color or ethnicity
2) Suspicious people:
* Taking pictures of building entrances, loading docks, air ventilations systems.
* Anyone monitoring our patrols or other security measures
* Asking questions about our security department (e.g. how many security officers are working; are they armed)
* In an unauthorized area
* In the wrong place or appears lost
* Overdressed for current weather conditions
* Loitering, staring or watching employees and customers
* Pacing, nervous or jumpy
* Acting in a disorderly manner, alarming or disturbing others
* Repair personnel, utility crews, delivery persons or other “trusted employees” who are out of place
* People expressing an unusual level of interest in operations, personnel, equipment or facilities
* People who are on property without a proper ID, uniform or safety gear
3) Suspicious activities:
* Cars and other vehicles parked in strange locations
* Cars that are parked for a long period of time (occupied or not)
* Out-of-place vans, trucks, motorcycles, bicycles and cars
4) Suspicious Items:
* Items in cars that do not belong there
* Expired vehicle Registrations or other decals; missing Registrations plates
* Unattended or suspicious items
* A package abandoned by a person quickly leaving an area
4a) An unattended package is not necessarily “suspicious”, but could be under the following circumstances:
* On or next to a seat in a vehicle
* Next to pipes, generators, fuse boxes, etc.
* Next to a vending machine or in an area such as a fire pump room
* In a rest room, gym or near the pool
* Placed out of normal view like behind a trash can
* In a waiting area or lobby
Note: A “suspicious” package can be an out-of-place or abandoned container (fire extinguisher, propane canister, thermos, etc.)
4b) Characteristics of “suspicious” package or letters may include the following:
* Contains a threatening note
* Contains a suspicious powdery substance
* Excessive postage
* Handwritten or poorly typed addresses
* Incorrect titles or title but no name
* Misspellings of common words
* Oily stains, discolorations or odors
* No return address
* Excessive weight
* Lopsided or uneven envelope
* Protruding wires or aluminum foil
* Excessive security material such as masking tape, string, etc.
* Visual distractions or ticking sound
* Marked with restrictive endorsements such as "Personal" or "Confidential"
1) When focusing on ‘suspicion’ behavior it should be based upon:
* Where they are (Ex. Hanging out around emergency exits, near or in generator rooms or fire control rooms, etc.)
* When they are there (Ex. Late at night, early in the morning, etc.)
* What they are doing (Ex. Taking photos, looking for security cameras, timing officer’s patrols, etc.)
* Suspicion should NOT be based upon: Race, color or ethnicity
2) Suspicious people:
* Taking pictures of building entrances, loading docks, air ventilations systems.
* Anyone monitoring our patrols or other security measures
* Asking questions about our security department (e.g. how many security officers are working; are they armed)
* In an unauthorized area
* In the wrong place or appears lost
* Overdressed for current weather conditions
* Loitering, staring or watching employees and customers
* Pacing, nervous or jumpy
* Acting in a disorderly manner, alarming or disturbing others
* Repair personnel, utility crews, delivery persons or other “trusted employees” who are out of place
* People expressing an unusual level of interest in operations, personnel, equipment or facilities
* People who are on property without a proper ID, uniform or safety gear
3) Suspicious activities:
* Cars and other vehicles parked in strange locations
* Cars that are parked for a long period of time (occupied or not)
* Out-of-place vans, trucks, motorcycles, bicycles and cars
4) Suspicious Items:
* Items in cars that do not belong there
* Expired vehicle Registrations or other decals; missing Registrations plates
* Unattended or suspicious items
* A package abandoned by a person quickly leaving an area
4a) An unattended package is not necessarily “suspicious”, but could be under the following circumstances:
* On or next to a seat in a vehicle
* Next to pipes, generators, fuse boxes, etc.
* Next to a vending machine or in an area such as a fire pump room
* In a rest room, gym or near the pool
* Placed out of normal view like behind a trash can
* In a waiting area or lobby
Note: A “suspicious” package can be an out-of-place or abandoned container (fire extinguisher, propane canister, thermos, etc.)
4b) Characteristics of “suspicious” package or letters may include the following:
* Contains a threatening note
* Contains a suspicious powdery substance
* Excessive postage
* Handwritten or poorly typed addresses
* Incorrect titles or title but no name
* Misspellings of common words
* Oily stains, discolorations or odors
* No return address
* Excessive weight
* Lopsided or uneven envelope
* Protruding wires or aluminum foil
* Excessive security material such as masking tape, string, etc.
* Visual distractions or ticking sound
* Marked with restrictive endorsements such as "Personal" or "Confidential"
Signs of Potential Violence
It’s wrong to assume that when work place violence occurs, the person involved just “snapped”. There are often warning signs of the potential for violence well in advance of the act itself. These indicators should be recognized, managed and treated to reduce the risk of violence in the work place. The following behaviors are often associated with persons who commit violent acts, and can be presented individually or in combination. This list is NOT an all-inclusive and the presence of any of these behaviors in a coworkers is not proof that violent tendencies exist.
Behavior:
Attitude:
Though the probability of a violent incident in the work place may be limited, here are some steps you can take if confronted in the work place.
Step 1:
General response to disruptive behavior (no threats or weapons)
Step 2:
If step 1 does not work and the person does not seem dangerous
Step 3:
If step 1 is ineffective and the person seems dangerous
Always call 9-1-1 at once if a crime is in progress, a violent incident has occurred or specific threats are made.
Use a phone out of side of the individual and call 9-1-1 if anyone does the following:
=======================================================================
1) Do not attempt to intervene physically or deal with the situation yourself – let the police handle the situation
2) Clear all other personnel out of the area to a safe location as quickly as possible
3) Keep the police on the phone as long as possible to provide the most up-to-date information
=======================================================================
Types of Threats:
Direct
Conditional
Veiled
Address
569 S. Orange Grove Ave. Los Angeles, CA. 90036
Call: +1 (323) 533-0034
Email:info@spartan-securityservices.com
© 2021 All Rights Reserved. Spartan Security Services | Terms of Use | Privacy Policy | Sitemap | Private Patrol Operator #15155 | Powered by SOCIALBILITTY Web Design.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |