Sie sind auf Seite 1von 18

IMPORTANCE OF SECURITY

Their main goal is to monitor and protect assets and act as a deterrent to
violence.

Security companies in New Jersey and NYC are valuable because they
possess multifaceted skills that can function in various settings. Their training
is not limited to a specific area and can serve other roles such as hospitality.

Security guards form the backbone of security in any setting because of the
flexibility of a security guard. They can be trained in multiple techniques to
protect one’s assets.

Some examples of various types of security guards are airport security,


warehouse security agents, event specific security, mall, hotel or bank
security and cyber security etc.

Each of them has their own unique and specific responsibilities but the goal
remains the same i.e. to protect valuables.

What this means is that a security guard could use his skills and experience
that he or she gained working at a warehouse and use it at another setting
such as a mall or bank.

This type of flexibility is not available in a majority of occupations and also


serves as a way for security personnel to build on their experiences and skills.

In addition, in each setting mentioned above, a security guard can provide


more than just security. Say for example hotel security personnel are able to
be hospitable to hotel guests by pointing them in the right direction within
buildings.

Another example of security guards being able to provide more than just
security is when guards working at an office building are able to walk an
employee to their car after a late night of work.

Similarly, guards at an apartment complex can help residents who are locked
out get into the building if they forget their keys or escort them safely to their
vehicle.

Guards can also be important first responders in emergency situations. Say


there needs to be an emergency evacuation that needs to take place at a
busy concert venue.
Security personnel, who are already present in the arena, using their training
will be able to direct crowds in the correct direction out of the building before
any formal emergency services arrive.

This action could potentially save numerous lives and prevent chaos. It is
important to recognize that to provide 100% security is impossible no matter
method of security is implemented.

However, security guards are able to use their professional skills to


significantly prevent and reduce theft, deter violence and in addition provide
support to customers.

All of this together makes them a valuable inclusion to any setting.

IDENTIFYING SUSPICIOUS PERSONS

Suspicious people may often be identified by their behavior. While no one behavioral
activity is proof that someone is planning to act inappropriately (and many of the
following behavioral indicators are perfectly consistent with innocent behavior), these
factors can help you assess whether someone poses a threat. Behavioral factors to watch
for include:
 Nervousness, nervous glancing or other signs of mental discomfort/being ill-at-
ease. This may include sweating, "tunnel vision" (staring forward inappropriately),
and repeated inappropriate prayer (e.g., outside the facility) or muttering. This
may also include repeated entrances and exits from the building or facility.

 Inappropriate, oversize, loose-fitting clothes (e.g., a heavy overcoat on a warm


day).

 Keeping hands in pockets or cupping hands (as in holding a triggering device).

 Constantly favoring one side or one area of the body as if wearing something
unusual/uncomfortable (e.g., a holster). Pay attention to a person constantly
adjusting waistbands, ankles, or other clothing. Projected angles under clothing
may also be indicative of a firearm, e.g., at the waist or the ankle. Suicide bombers
have been known to repeatedly pat themselves to verify that the bomb vest or belt
is still attached.

 Carrying packages (see below regarding food donations).

 Lack of understanding of basic religious procedure/norms appropriate to the


institution such as a synagogue.
Security people should be told, where possible, to observe people as they exit their cars;
by watching how they adjust clothing and how they approach the building, they can look
for signs that a person might be carrying a weapon, etc.

The most important thing is to be observant. For example, Israelis have become aware
that some suicide bombers shaved off beards prior to committing their acts, thus leaving
untanned skin and unusual facial tan lines. (The majority of suicide bombers there have
been males, 18 - 27). Some also anointed themselves with scented oil, which may be
obvious to someone in their vicinity.

While, again, no one factor is a certain indicator of a problem, once a problem is


identified, ushers and security personnel have three options: do nothing, investigate and
decide whether to take emergency steps, or immediately take emergency steps. This is a
decision only you can make in light of the circumstances, your personal comfort level
and safety considerations.

If you choose to investigate, greet the person in a friendly fashion, asking "Can I be of
assistance?" or "Welcome, is this your first time here?" (Your membership committee
will appreciate this gesture). Evasive or unusual answers may trigger your emergency
procedures. Excuse yourself and initiate your procedures, perhaps by using a pre-
determined code-word with your colleagues. If you choose to admit the person to the
sanctuary pending assistance (e.g., arrival of police) invite the person to sit on an aisle
seat. Assign an usher to inconspicuously monitor the location of the individual.

Make sure the dispatcher understands the emergency nature of the call and the need for
a law enforcement response without sirens. Off-duty officers generally work armed and
are aware of security procedures.

If you remain suspicious, trust your instincts.

If the person leaves immediately, you should call the police anyway.

This guide is intended to help institutions become aware of some basic security
considerations. It is not intended to provide comprehensive, institution-specific advice
on security matters nor is it meant to replace the advice of a security professional. For
comprehensive, institution-specific security advice, a security professional should be
consulted. ADL is not responsible for any loss or damage arising out of the use or misuse
of this information.
Identifying Suspicious Persons

General Guidelines For Identifying Suspicious Persons

 Wearing oversized or inappropriate attire that may conceal a hidden object (e.g. wearing a long
heavy coat in warm weather).
 Entering premises without prior notification or on the pretext of being engaged to perform
some form of work within the premises.

 Loitering near premises or in the lobby of premises for an extended period of time.

 Wandering within premises without a valid pass authorising entry.

 Asking specific questions concerning the security of the premises (e.g. the number of security
guards deployed at the premises and the type of security hardware installed at the premises).

 Asking questions about the personal movement of a specific or prominent individual (e.g. arrival
& departure times, vehicle licence number or parking lot number).

 Not able to provide a reasonable explanation or are uncooperative when asked for their
purpose of visit.

 Making an unexpected delivery of a package to an office or to a specific person.

 Placing an object or a parcel within or outside premises and departing from the area

COMMON MODUS OPERANDI

Modus operandi, (Latin: “operating method”, )abbreviation Mo, in criminology, distinct pattern or
manner of working that comes to be associated with a particular criminal. Criminologists have observed
that, whatever his specialty—burglary, auto theft, or embezzling—the professional criminal is very likely
to adhere to his particular way of operating. If, for example, a burglar begins his career by entering
houses from the roof, he will, in all probability, continue this method for as long as he is able to work.
Some burglars become so attached to their modus operandi that they burglarize the same places or
people again and again.

1. Sneaky Office Intruders

Scene of the crime: Thieves prey on workplaces with little or no security, usually during
lunch hour or the afternoon break when employees leave their desks. Plan of attack:
Taking advantage of offices’ downtime, these intruders sneakily work their way in. They
may take on different disguises like posing as an employee’s friend, visitor, or as a
messenger--complete with a Visitor’s ID. They target valuables like mobile phones, cash,
laptops and credit cards. Saksi reported in April 2009 how a woman was caught on
camera stealing the wallet of Sandy Wong, an employee of a review center in Quezon
City. The suspect slipped inside the office and stole the wallet containing cash and seven
credit cards. By the time Wong reported the credit cards missing, four of them had already
been used. Over P50,000 was charged to her. When the suspect tried to buy a laptop
worth P23,000, the store tipped off Wong, and the police arrested a certain Liza Garcia.
Upon reviewing the CCTV footage, it was found that Garcia was not the same woman
seen inside Wong’s office.
Defense mechanism: Unless your office has implemented extremely tight security
measures, it may be wise to bring your valuables in a small bag wherever you go, or lock
them up somewhere thief-proof. Definitely a hassle but it’s a lesser struggle compared to
slaving away to pay fo someone else’s shopping splurge. If an intruder has already hit
your workplace, report the incident immediately. File charges if security catches him or
her.

2. ATM (Automated Teller Machine) Scams

Scene of the crime: Usually in the vicinity of ATMs, where scammers try all sorts of things
to make a quick buck at the cost of unsuspecting card owners. Plan of attack: ATM
scammers have become more technology-savvy through the years. For instance, in 2007,
they used magnetic rulers to trap money, surveillance cameras and external keypads to
get PINs, and scheme machines to read ATM card information. In 2008, they used a
detachable aluminum contraption and some sort of paste to trap money. In 2009, police
discovered a new kind of scam, the ATM card switching. 24 Oras explained how the M.O.
works: If you have just withdrawn money from an ATM, a scammer may approach you
and tell you that you left a P500 bill behind. He or she will suggest that you check your
ATM balance. As you do so, the scammer will sneakily memorize your PIN and drop a
P500 bill on the ground. When you pick it up--as you are most probably inclined to do--
the scammer will swipe your card and replace it with a fake one.

Defense mechanism: In the 24 Oras report, the public is advised to lock ATM booth doors
when they are inside, bring someone along when withdrawing money, cover the keypad
when typing the PIN, and move to another ATM when there are suspicious people around,
among others.

3. The Zesto Gang

Scene of the crime: Not as visible anymore as they were years ago, the Zesto Gang
members scam bus passengers through quick tactics of distraction, confusion and
intimidation. Named after the eponymous juice packs, the gang sometimes doesn’t even
sell actual Zesto juice packs.

Plan of attack: A Zesto Gang member comes up to you in a bus, with bills of cash folded
lengthwise and wound around the fingers by denomination in typical bus conductor style,
and nonchalantly asks, "Ilan?" ("How many?") Thinking he or she is the bus conductor,
you say how many people you’d like to pay the fares of, not knowing that the scammer is
supposedly actually asking how many juice packs you’d like to buy. After getting your
money, the gang member magically produces juice packs from out of nowhere, swiftly
pokes straws in them and shoves them in front of you. And even if you doth protest to
say, "But I thought..." or "That’s not what I...," you will curtly be told, too late, "Naitusok ko
na eh," meaning they can no longer be sold, thanks to your (purported) hearing deficiency,
and so rather than make a fuss or argue, you just sip in meek silence. Even more
appalling? Scammers jack up the price of the juice pack to as much as ten times the
actual price.
Defense mechanism: You might try feigning sleep like FHM Managing Editor Allan
Hernandez does. Seriously, check out loud if the person asking for your money is indeed
the conductor replete with the requisite ID, bus tickets, and uniform, the top of which can
range from a short-sleeved polo to a casual polo shirt with an embroidered bus logo (but
beware, this too, can be faked). Look behind him or her for a mysterious pail or bag of
juice packs!

4. Airport Ambush

Scene of the crime: Car thieves trail you from the airport and repeatedly attack your car
until you are forced to give it up. Based on the reported incidents this year, this scheme
is usually executed before dawn. Plan of attack: Carnapping suspects are believed to pick
victims among passengers seen at the airport terminal before dawn, according to
Inquirer.net. Once their chosen passengers are on the road, they repeatedly bump the
rear portion of their victims’ vehicle, forcing them to stop. If they don’t, the carnappers
speed up to the front of the victims’ vehicle and cut off their way. The carnappers don’t
pick a particularly secluded area probably because the pre-dawn darkness gives them
privacy. For instance, it was on C-5 Road in Pasig City where four men hijacked the van
of Jorge Bernas, former Pres. Gloria Macapagal-Arroyo’s son-in-law, with his family
onboard in June. About a month later, an American national and his Filipina wife and
stepson were attacked at the intersection of EDSA and Shaw Boulevard. Unlike the family
of private individuals that survived the EDSA incident relatively unscathed, Bernas was
shot twice in the stomach and once on the left arm. It was reportedly because he resisted
the armed men and shouted for help.

Defense mechanism: The Philippine Star columnist Cecile Van Straten (a.k.a. blogger
Chuvaness) suggests "booking a flight that doesn’t arrive in the early hours of the
morning," "avoiding C-5 and Shaw Boulevard especially at odd hours," and "locking your
doors at all times (and stepping) on the gas... if somebody bumps your car," among
others. This is also applicable to other major highways in the country.

5. Test Drive Threat

Scene of the crime: Carnappers pose as buyers who will test drive the car you’re selling-
-and later steal it at gunpoint. Plan of attack: Faux buyers respond to your "car for sale"
ad and ask for a test drive. So, of course, you accompany them. Later, they drive the car
to a secluded area where they force you out at gunpoint. Talk about seller’s remorse.

Defense mechanism: To avoid this carnapping trap, it’s best to let a seasoned used car
dealer handle the sale, says Top Gear associate features editor Dinzo Tabamo. If you
want to sell the vehicle yourself, Tabamo suggests you dictate the test driving route and
bring along one or two companions. If the "buyers" balk at this, then you should refuse to
let them take your car for a ride. We also suggest discreetly taking photos of all potential
buyers before you go on a test drive. This way, if they turn out to be thieves, you’d have
something the police could use to hunt them down.
6. Condo Criminals

Scene of the crime: Condominiums, apartment buildings, and townhouse compounds,


according to 24 Oras. Plan of attack: Thieves invade units that are left unlocked or simply
break into random units. Once inside, they ransack the place for valuables. To top it all
off, some thieves also vandalize the units they invade.

Defense mechanism: Lock the door even when you’re inside the condo unit. Add a chain
lock (this one, if you dare). Ask the landlord to beef up the security or at least make sure
the guards aren’t sleeping on the job.

7. Backstage Burglars

Scene of the crime: During a show or event, crooks sneak into the area behind the stage
or inside the dressing rooms, where the commotion provides great cover for their criminal
activities.

Plan of attack: Thieves can easily pose as aides, assistants, yayas or utility personnel
and blend in with the crowd. They can pick up, say, a laptop, a wallet, or a designer bag
and quickly run, or even casually and nonchalantly walk off with it without anyone knowing
or minding.

Defense mechanism: If you’re part of a show, event or function, designate someone to


watch over your belongings at all times or designate a locked room or office as a holding
room for your belongings. Notify the authorities if you notice any suspicious-looking
people sneaking around, although thieves do have a knack for blending in.

8. Salisi Gang

Scene of the crime: Salisi Gang members lurk anywhere where there are people--malls,
restaurants, fastfood joints, computer shops, bars, and clubs--and are just waiting for you
to get distracted. Even the most tony hangouts of the elite are not exempt from these
chameleons who have mastered the art of blending in and the art of distraction. Plan of
attack: Just because the person next to you is dressed well or "looks normal," it doesn’t
mean he or she has no criminal intentions. The gang members either divert their victims’
attention or wait until their targets are distracted before they move in for the kill. In a video
that was supposedly shot in a major fastfood chain, a trio successfully steals a handbag
from a nearby table (pay attention to the woman on the left). The bag owner realizes what
has happened a few seconds too late. The CCTV footage shot one night at a hip lounge
in The Fort revealed a pack of attractive, fashionable young women working as a group
but sitting at separate tables and ordering drinks like the other patrons. Each woman
would flit about from table to table. At the end of their covert operation, the footage
showed that one of them had filched a total of five evening clutches from various
customers!
Defense mechanism: Constant vigilance! Keep your bag on your lap (not behind you on
your seat) and be cautious about leaving it on another chair, and keep an eye on it at all
times. Bring a bag hook so your bag is kept under the table. Don’t casually leave your
cellphone, laptop or camera on the table where it can easily be grabbed in a split-second.
Take precautions especially when out at night. Thieves are only too happy to see
inebriated women in clubs dancing with wild abandon, unmindful of their evening bags,
phones and cameras exposed on cocktail tables, ready for the taking. Wear a wrist-strap
clutch instead and keep all your belongings in it.

9. Dugo-Dugo Gang

Scene of the crime: This group robs affluent homes by tricking unsuspecting house
helpers into helping them get to the homeowners’ cash and valuables stash. Plan of
attack: Remember that PLDT caller I.D. commercial? That’s basically how the Dugo-Dugo
Gang operates. After casing a household, the gang members wait for the opportune
moment when only the helper is in the house. The scammers call and pretend that a
family member has been hurt and needs money for a surgery or medical procedure of
some sort. Then they pressure the helper into forcing open the family safe, locked
drawers, and the like to get cash and other valuables. The helper is then told to turn over
the loot to the gang members.

Defense mechanism: Tell helpers and everyone in the house about this scam. To find out
if they actually remembered what you said, pretend to be a Dugo-Dugo Gang member
and make them go through a drill. Take it a step further by rewarding those that keep their
wits about them.

10. Budol-Budol Gang

Scene of the crime: The Budol-Budol Gang can strike anywhere using their alleged
powers of hypnotism and "boodle" or counterfeit money--hence the name--that turn out
to be just sheets of paper. Interestingly, Google Translate says "budol" means "gullible
person." Plan of attack: Their M.O. may have evolved over the years but here’s their basic
tactic: They lure or blackmail their victims into giving them valuables or cash in exchange
for a bag filled with fake bills or products. In one reported instance in 2008, two suspected
Budol-Budol Gang members managed to get a cellphone, a Walkman, and P2,000 from
an unidentified 16-year-old girl in Cebu. The male and female suspects claimed they were
looking for a vehicle to transport their things. Before they went to search for a vehicle,
they asked the girl to hold on to a bag supposedly filled with money. In return, they got
the girl to give them her valuables as a sort of safety deposit. It wasn’t long before the girl
discovered the bag contained only fake bills. In 2005, a victim identified only as Marie
claimed some Budol-Budol Gang members hypnotized her into giving them her money,
jewelry, and mobile phones. She said she did not remember much after a man allegedly
engaged her in small talk while she was walking along Ortigas Avenue. All she could
recall was getting inside a certain van, drinking a glass of water, and handing over two
years’ worth of savings of her seaman husband. All that in exchange for a black bag
stuffed with sheets of paper.
Defense mechanism: First of all, bear in mind one of the first things everyone learns as a
kid: Don’t talk to strangers. Of course, that can’t be helped sometimes so remember
another basic rule: Don’t accept candy from strangers. In this case, if strangers are giving
you something as "sweet" as a bagful of cash, you better refuse. If you’re afraid of being
hypnotized, find out how the controversial phenomenon supposedly works to avoid
succumbing to it.

What Is the Role of a Security


Officer?
Posted by Michelle J. on 12/14/2017

The role of a security officer involves the primary goal of protecting the property of the employer. These
security guards are frequently positioned as the first line of defense for businesses and homes against
external threats, intrusion and vulnerabilities to the property and its dwellers. However, security guards
wear many hats, as there are a number of responsibilities they must fulfill that private security company
managers should note. While the specific responsibilities can vary depending on the employer, there are
some common duties that help to define the roles of security officers. Here are a few to consider:

1. Security Issue Prevention


Preventing security issues is one of the most important goals of security officers because they play a
defensive rather than offensive role when it comes to securing the property and maintaining safety for
the public. Unlike police officers, security officers' duties do not include offensive tactics, such as
detaining assailants or apprehending criminals. Instead, security officers can take preventative measures
to deter crime, including trespassing and burglaries. That's why it's critical for private security company
managers to prioritize preventative measures and to teach security prevention best practices to their
personnel. Your security officers must also be visible and observant to help prevent intrusion and crime
from occurring on the property.

2. Observation and Reporting


Security officers are also expected to observe the environment they are protecting. This can be
accomplished by setting and monitoring equipment and building controls. It's also important for security
officers to report incidents by completing detailed reports. These reports may include any surveillance
activity, occurrences, observations, witness statements and signatures, and interviews that took place
during an incident. To enhance these measures, a guard tour solution that includes software that provides
accurate data regarding security officers' whereabouts can be instrumental for reporting and observation
purposes.

3. Incident Response
Responding to an incident quickly and in the right way is an important responsibility that your security
personnel must achieve. It's crucial to control a situation in progress and prevent matters from escalating
when possible. That's why it's key for security officers to be alert and know when to call for help when
the situation gets out of control.

Improve the Quality of your Security Guard


Tour with Geolocation Map!
4. Communication
To maintain the safety of the public and to keep everyone and the property secure, it's vital for security
officers to communicate as effectively and efficiently as possible. Communication can take form in a
variety of ways, including verbally expressing and enforcing the rules and procedures for guests to enter
on the premises of a gated apartment complex, explaining procedures for checking hazardous material
prior to entrance in a lobby or administering first aid in the case of an emergency. Communication also
calls for alerting the appropriate government officials or authorities when a crime occurs and directing
traffic when necessary.

5. Collaboration and Cooperation


Working as a team is a crucial responsibility that your security guards should accomplish. This is
especially important so that all of your security guards are practicing the same safety protocols no matter
who is on duty. Cooperation among security team members can also call for relying on technology, such
as guard patrol control systems, to ensure everyone is where they belong when securing the perimeter
and other areas of the property.

What Is the Role of a Security


Service?
Security services are an important component of keeping people safe in public spaces. Whether in a
school, office building, or shopping mall security officers are tasked with keeping each day
running smoothly and safely. While they are often compared to police officers, it’s important to realize
that there’s a distinction between the two. Both are essential to public welfare in these large, busy
spaces.

The main distinction between police officers and security officers is that police officers typically get
involved after an incident has already occurred. Whether it’s shoplifting, violence, or a break-in the police
are called to the scene to intervene through after the trouble has already started.

Security guards, on the other hand, are there to prevent these kinds of things from happening in the first
place. Their main role is not to react to crime threats without law enforcement, but to deter it just by
being present. It’s less likely that criminals will target an area with an engaged, active security personnel.
That said, if a crime does occur or if a problem escalates, they’re also trained to intervene until the police
arrive.

If you remember that the main goal of a security service it to prevent problems from happening in the
first place, their role becomes a little clearer. Here are some of the duties filled by a security service that
show exactly how important and effective they are.

Visibility and Vigilance


One of the simple things the members of a security team have to do is just be visible. This applies to
mobile security guards, as well as those manning checkpoints and gates, verifying IDs at the building
entrance, or watching the CCTV system. Having a security guard present who is actively on the job can
be enough to prevent a crime from happening.

Most burglars, shoplifters, or vandals are deterred by the presence of a security guard but only if the
security guards are vigilant. If someone wants to commit a crime and is checking out the place
beforehand, finding security guards sleeping on the job, skipping security patrols, and having their backs
to the CCTV isn’t going to do much to deter a crime.

In order to be effective, guards must be diligent. A good security guard sees, hears, and smells
everything and can pick up on anything unusual. They can tell when a visitor is acting suspiciously, pick
up on unfamiliar sounds, and even smell if there’s a gas leak.
Reflexes and Response
A security guard has to respond immediately when something suspicious happens and must always be
prepared to act at a moment’s notice. Obviously, not all situations require the same level of urgency;
that’s why it’s also important for security personnel to make quick and accurate assessments to come
back with the best response.

Most of the time, security guards can diffuse a situation either by making it known that they’re present
and paying attention or by getting involved early on before things get out of hand. Sometimes, it’s as
easy walking by at the right time. Other times, it may involve a little more finesse.

Even when the guard is able to get situations under control and it seems like everything has returned to
normal, it’s important to remain on high alert. It’s also essential to follow the chain of command and
report these issues to the right people to keep them from happening again. Usually, this involves telling
the manager, reporting to a supervisor, or calling the police or emergency services as warranted.

It’s also very important that a security officer knows when it’s time to call for help in the middle of a tense
situation. In the event of an armed robber or use of deadly weapons or force, the security officer’s
immediate move should be to call the police. Often, getting law enforcement involved quickly can
prevent property damage and even save lives.

Monitoring and Maintaining Order


Of course, crisis situations aren’t something that happen on a regular basis. Most of the work that
a security service does is to make sure things stay safe and uneventful during day-to-day business. The
kind of monitoring they do largely depend on the policies set out by management, but security guards
are usually responsible for knowing who is in the building. This can be done by checking IDs, having
guests and visitors sign in or get passes, and even checking employee IDs as they come into work.

Any function or gathering that involves a large group of people in the same place should have a team of
security guards working together to maintain order. Whether it’s a convention, a presentation, a
conference, or even a celebration, security service employees are familiar with how to identify potential
problems and stop them before they start.

Other Duties
Security services are also called upon to advise their employers about how to avoid trouble situations.
The best way to do this is to report on real-life instances that were observed and could have led to
problems. If employees are lax about showing IDs or some guards don’t require visitors to sign in, it
could lead to a bigger security risk. Security guards may also be called upon to give instructional lessons
to staff, like what to do in case of an armed intruder or evacuation procedures in case of fire.

And remember, security work doesn’t stop because the business day ends. A lot of schools, offices, and
other buildings have security guards on duty overnight to keep an eye on things and make sure nothing
happens when the buildings are empty.
REPORTING SUSPICIOUS PERSON

Step 1

Recognize Suspicious Behavior

Suspicious behavior can arise in many situations, and can manifest in many
ways. There are a few signs that you can learn to recognize in a suspicious
person, whether through their looks or through their actions, that can help
you determine whether or not the individual needs to be reported to
authorities. Familiarize yourself with these activities, so that you can
recognize them immediately if they happen in your presence:

 A person parking their vehicle in an unusual place, like a public park or


in front of a school, for an extended period of time. - A person, whether
in a vehicle or not, alone and taking pictures or video of people in a
public or private place, especially if there are a lot of children in the
area. - A person in a vehicle who slows down and seems to be watching
others in the area, and/or continues to drive by the area repeatedly. - A
person who appears to be paranoid or making strange and sudden
movements for no apparent reason (this could also mean the person is
mentally ill, and/or that they have escaped the supervision of their
guardian). - A person in a parking lot who is moving from car to car,
peeking inside or trying to open the doors. - A person in a
neighborhood, moving from house to house, peeking inside or
attempting to open doors. - A person running (not for
sport/exercise/leisure) for seemingly no reason, or as if they are being
chased. - A person who is holding or dragging another person or child,
who is screaming or appears as if they are trying to get away.

Of course, this is not meant to be exhaustive of all examples; if instinct is


telling you that something just isn't right, you should listen to your gut and
act accordingly.

Step 2

Asses the Situation

There may be plausible reasons for why the suspicious person is acting the
way they are; this is why you need to assess the setting around you before
you jump to the conclusion that the activity needs to be reported. For
instance, a man with a camera attached to his shoe taking pictures of young
girls at a park is activity that should definitely be reported. A man with a
digital camera who is clearly taking pictures of his daughter, however, is not.
Another example would be an individual carrying a screaming child as he or
she kicks and yells to be released; if this was happening on, say, school
grounds, it should probably be reported. A child who is clearly throwing a
tantrum while being carried away from a playground, however, is probably
just upset that they are being taken home. It's important to assess the situation
about you before reporting a suspicious person so that you can determine
whether or not the situation truly requires the involvement of the proper
authorities. Of course, if you are ever in doubt, it is always better to alert
authorities to investigate, rather than potentially allowing a suspicious person
to harm somebody else.

Step 3

Make Note of the Suspicious Person's Appearance


When you call to report a suspicious individual, you should have some key
details ready for the person who takes your car. Of course, first and foremost
would be the suspicious situation that you want to report - specific details of
what it happening, how long it's been happening for, where it's happening,
and why you think it's suspicious would help law enforcement officers
respond as best as they can. Additional details that you should take note of
include a thorough description of the suspicious person, including the
clothing and shoes they are wearing, their hair and skin color (and eyes, if
possible), and any distinguishing marks. If there is a vehicle involved, try and
get the make, model, and color of the vehicle, along with the license plate
number - even a partial license plate number would help authorities track the
person down. If the suspicious person has since left the area, give the
authorities the details of where and how they left, and if possible, where they
may be headed to. Even some of this information can help police find the
suspicious person, and put a stop to any criminal activity they may have had
planned.

Step 4

Report a Suspicious Person

Once you have determined that a suspicious person needs to be reported, you
should decide what level of response the situation needs. For instance, a
person who appears to be kidnapping a child would warrant calling 9-1-1,
while a person who has been parking in a car for a long length of time may
only need to be reported to the police department's non-emergency secretary.
Again, when in doubt, always call 9-1-1; just be aware there are other options
when a suspicious person needs to be reported, but isn't necessarily causing
an emergency situation.
SUSPICIOUS..
Checklist for Suspicious Persons
 An unidentified individual observed loitering near a facility or in the lobby of a facility
for an extended period of time.

? An unidentified individual observed wandering throughout a facility.

? An unidentified individual dressed in oversized or inappropriate clothing (e.g. a long


heavy coat in warm weather) that appears to be concealing something.

 An unidentified individual entering a facility carrying an oversized backpack or a large


suitcase.
 An individual in a facility with no visible company issued identification.
 An individual who, when challenged by a supervisor or an employee, does not respond or
does not provide a reasonable explanation for his/her actions.
 An unidentified individual asking specific questions about your facility (e.g. security
related matters, etc.).
 An unidentified individual asking questions about key agency personnel (e.g., their
normal arrival or departure times, their vehicle, location of their parking space, etc.).
 An unidentified individual trying to deliver a package or other item to an office or to a
specific person.
 An unidentified individual observed photographing, videotaping and/or sketching the
exterior or interior of any state facility.
 An individual without proper identification entering your facility claiming to be a
contractor, law enforcement officer, reporter or a service technician.

Checklist for Suspicious Activity


 Two or more unidentified individuals observed loitering near a facility or in the lobby of
a facility.
 Individuals or groups who are uncooperative if challenged by a representative of that
company/ security or an employee.
 Individuals or groups who appear at your facility without prior notification or clearance
and claim to be contractors or service technicians.
 Unidentified individuals attempting to deliver packages or other items to an office or to a
specific person.
 Unidentified individuals attempting to remove property from an office or a facility
without proper authorization.
 Unidentified individuals who appear to be conducting surveillance of a facility (e.g.
sitting in a vehicle for an extended period of time and/or taking photographs or
videotaping, etc.).
 An unidentified individual observed placing an object or a package outside a facility and
departing the area.

Checklist for Suspicious Items or Vehicles


 Any unattended backpacks, boxes, containers, luggage and/or packages in an elevator,
hallway, lobby, restroom, snack bar or stairwell of your facility.
 Any item that could be an improvised explosive device (e.g. items with visible wires,
antennas, batteries, timing devices, metal or plastic pipe with each end capped or
covered, etc.). NOTE: Untrained personnel should not examine or move a possible
improvised explosive device; the area must be cleared pending the arrival of bomb squad
personnel. Contact law enforcement immediately.
 Rental vehicles/trailers parked near a facility, parked at or near the loading dock, or
located in the parking lot without prior authorization.

? Any vehicle that appears to be overloaded or has any substance leaking from it.

 Any vehicle parked illegally or parked at an unusual location.


 Any type of vehicle that appears to be abandoned (e.g. inspection sticker expired or
missing, registration plate expired or missing, etc.).

Das könnte Ihnen auch gefallen