CPP Book 2 - 0
CPP Book 2 - 0
and Management
Richard Franks
Volume 2
Copyright Information
© 2018 NSTA Limited and Richard Franks as trustees of the Franks Family Trust
Copyright protects this material, except as permitted by the copyright Act 1994 (New
Zealand) and Copyright Act 1968 (Australia. Reproduction by any means (photocopying,
electronic, mechanical, recording or otherwise), making available online, electronic
transmission or other publication of this material is prohibited without prior written
permission of the copyright owner.
Please note: The notes and information on legislation and policies and procedures contained
in this guide are plain English interpretations of the publisher and should not be used for a
legal interpretation. They are published to encourage the reader to research and maintain
currency in all aspects of legislation and company policy that apply to the reader in their
jurisdiction.
Moral Rights: All images are drawn by Sheher Bano from Kiwi Creations from concepts and
photographs created by Richard Franks.
Gangsters® (Trademark No 1076256) and the NSTA Logo (Trademark Nos NZ 955944
AUS 2085432) are registered trademarks of NSTA Limited and used under exclusive
licence.
Hanging
Not all hangings are lethal. I f you find a victim strung up and lifeless, you should
immediately administer first aid. You can and should interfere with a crime scene to
preserve life, under circumstances such as these.
The major factors leading to a hanging fatality are the height of the drop at the
moment the hanging occurs and the subsequent suspension of the body (full or
partial). Hangings can result from any of the following situations: workplace accident,
suicide, murder or erotic asphyxiation.
Suicide / Murder
Hangings account for nearly half of all suicide attempts in Australia and New Zealand.
It is possible then that some murderers will stage a "suicide" on their victim to try
to conceal the true nature of their crime.
Erotic asphyxiation
Erotic asphyxiation or ' breath control play' is the intentional restriction of oxygen to
the brain for sexual arousal. The sexual preference for that behaviour is variously
called asphyxiophilia, autoerotic asphyxia or hypoxyphilia. Colloquially, a person
engaging in the activity is sometimes called a 'gasper'.
Initial response
Depending on the availability of other Security Officers or even support staff (e.g.,
management, cleaners etc), the following initial actions should occur:
• Try to support the victim by the legs whilst cutting the rope (or other restraint).
If you cannot support the victim, immediately cut the victim down.
• Apply first aid as per normal resuscitation guidelines.
If working in a team:
• Take command (or allow the other officer to take command and follow their
instructions). Do not get into a power struggle with colleagues.
• Instruct the other officer to support the legs whilst you cut the rope or other
restraint used (this is also another reason for carrying an emergency rescue tool
with you).
• Apply first aid as per normal resuscitation guidelines.
If multiple Security Officers are present (managers, cleaners etc.) and it is possible to
photograph the scene using your smartphone, give your smartphone to someone (if
possible, use your smartphone rather than theirs) and get them to video / photograph
the scene, including the knot and any chairs or other supporting objects.
Treatment
Apply firm pressure directly on the wound with a clean pad, bandage or even a piece
of clothing. Apply pressure around an embedded object. Elevate the injured limb. Lie
the person down. Remove any obvious superficial dirt and debris from the wound. Do
not attempt to clean the wound or probe it. If an object is embedded in the wound,
don't remove it. If the wound is abdominal and organs have been displaced, don’t try
to reposition them. Cover with a wet dressing or cloth. If the bandage becomes soaked
with blood, do not remove it. Apply a fresh bandage over it.
Continue to apply pressure for 10 minutes. If bleeding stops, bind the original wound
dressing tightly with a clean bandage. Check for circulation beyond the bandage every
10 minutes and loosen the bandage slightly if it is restricting circulation. Do not use a
tourniquet. If bleeding does not stop despite continued pressure on the wound, apply
firm pressure to the main artery between the wound and heart. Squeeze the artery
against the bone. With your other hand, continue to apply pressure on the wound.
While waiting for help to arrive, immobilise the injured limb and don't give the person
anything to eat or drink. Treat for shock if necessary.
Initial response
Stay safe (the first rule of first aid is "check for danger"). If you are not the victim,
practice universal precautions and wear personal protective equipment if available.
Any situation that involves a gun is potentially dangerous, and rescuers are no help to
a victim if they become victims themselves. Secure any firearm that is at the scene (this
is evidence) and prevent it from being further used, against you. Call emergency
services as soon as it is clear a gun is involved. Surviving a gunshot wound depends
greatly on how quickly a victim gets to a hospital. Ideally, a gunshot wound victim
should be on the way to a hospital in an ambulance within 10 minutes of being shot.
Do not move the victim unless his or her safety is in jeopardy, i.e., in an active shooting
scenario.
Do not elevate legs to treat for shock if the gunshot wound is above the waist (unless
the gunshot wound is in the arm). Gunshot wounds to the abdomen and chest will
bleed more quickly once the legs are elevated, making it harder for the victim to
breathe. Do not give the victim anything to eat or drink, including water.
Drug overdose
An overdose occurs when a toxic (poisonous) amount of a drug or medicine is taken.
Substances that can cause harm when excessively taken include alcohol, prescription
and over-the-counter medications, illegal drugs and some herbal remedies.
An overdose is a medical emergency that requires immediate medical attention. Always
call 000 (Australia) 1 or 111 (New Zealand) if a drug overdose is known or suspected.
1
or 112 from a mobile phone
Paracetamol overdose
Paracetamol is a common pain reliever and fever reducer that is usually bought over
the counter without a prescription. It is one of the most common medicines taken by
young children in an accidental overdose. People who intend to harm themselves also
commonly take paracetamol (suicide attempts). Signs of paracetamol overdose include
drowsiness, coma, seizures, abdominal pain, nausea and vomiting. Another name for
paracetamol is acetaminophen (often known by its brand name, Tylenol). There is only
a small difference between the maximum daily dose of paracetamol and an overdose,
which can cause liver damage. Large amounts of paracetamol are very dangerous, but
the effects often don’t show until about two to three days after taking the tablets. Yet
treatment must be started early to be effective, before the effects begin. Always seek
treatment for paracetamol overdose immediately, even if the person seems quite well.
Knowledge of basic first aid could mean the difference between life and death in an
emergency. That is why Security Officers are required to do a first aid course, so
that you will be able to act swiftly and appropriately if someone is injured or falls ill.
Drink spiking
Security Officers employed on licensed premises (crowd controllers) are required to
monitor the behaviour of customers and be alert for signs of criminal activity -
including attempts to spike the drinks of customers.
2
Also call 112 from a mobile phone.
3
Program this number into your mobile phone or smartphone, you never know when you will need it at home or work.
A customer whose drink has been spiked may (depending on which drug has been
used) feel drowsy, confused and find it difficult to speak or move. They may also feel
drunker than they should be, given the amount of drink they have consumed. When
these feelings have passed, they may not be able to remember what happened.
• For amusement
• To be malicious
• To carry out a crime: sexual assault, rape or theft.
Date rape drugs can start to take effect within 20 minutes of being taken. The
symptoms for the above drugs, including alcohol, are quite similar and include the
following:
• Drowsiness or light-headedness
• Difficulty concentrating
• Feeling confused or disorientated, particularly after waking up (if they have
been asleep)
• Difficulty speaking or slurring their words.
• Loss of balance and finding it hard to move.
• Lowered inhibitions
• Paranoia (a feeling of fear or distrust of others)
• Amnesia (memory loss) or a "black-out" of events (when they can't remember
large sections of their evening)
• Temporary loss of body sensation (feeling like they are floating above their
body, or having an "out of body" experience)
• Visual problems, particularly blurred vision
• Hallucinations (seeing, hearing or touching things that aren't there)
• Nausea and vomiting
• Unconsciousness
All date rape drugs are particularly dangerous when mixed with alcohol because they
combine to have a very powerful anaesthetic effect. This causes unconsciousness
and, in more extreme cases, can cause coma or even death. How long the drugs'
effects last will depend on how much has been taken and how much alcohol the
customer has drunk. The symptoms could last three to seven hours (12 hours
maximum), but if the customer passes out, it will be hard to know the full effect. They
may still feel some of the symptoms of a date rape drug after a night’s sleep,
such as confusion, amnesia or nausea.
Alcohol
Alcohol is the most common date rape drug. It can be added to a soft (non-alcoholic)
drink without the customer knowing, or double measures can be used instead of
singles. If the customer has had a drink already, they may find it harder to tell how
much alcohol they are drinking. The effects of alcohol will depend on how much the
customer drinks. Large amounts of alcohol can be dangerous, particularly if the
customer passes out and vomits in their sleep. It takes the body one hour to process
a unit of alcohol, so the length of the effects will depend on how many units of
alcohol the customer has consumed.
Tranquilisers
Tranquilisers come in hundreds of different forms. The most common are called
benzodiazepines. You may hear of these as Valium, Rohypnol, Roofies or Benzos. They
can be legally prescribed to treat anxiety or insomnia. Tranquilisers work by slowing
down the body, by relieving tension and making the person feel very relaxed. They
normally come as a tablet.
Ketamine
Ketamine, sometimes called K, is a powerful anaesthetic that is used for both animals
and humans. In its legal form, it is a liquid. Illegally, it is normally a grainy white
powder or a tablet. Ketamine can cause hallucinations (when the person sees or
hears things that are not real), or it can create a feeling of the mind being separate
from your body. If the customer feels very unwell, for example they have symptoms
such as drowsiness, vomiting or hallucinations (seeing or hearing things that are not
there), ask their friend to take them to the accident and emergency (A&E)
department of the nearest hospital. Instruct them that when they arrive at A&E, tell
the medical staff they think their drink has been spiked.
If there is still have some of the spiked drink left, secure this as evidence and give it
to the bar manager to keep. Alternatively, you can give it to the police if they
attend. If you think that the customer’s drink has been spiked but they have no
The stage at which you report the matter to the police will depend on the situation
and whether first aid is required. However, the police will need a blood or urine
sample for testing, so the sooner you or someone else can contact them, the better.
4
Security Officers are not usually aware of the drugs used to spike the drink, so the best course of action is to administer
first aid (if required) the same as for an overdose.
5
112 From a mobile phone.
6
Program this number into your mobile phone or smartphone, you never know when you will need it at home or work.
7
Source Victorian Police publication for the security industry Version 1.0 Published April 2012
• Obesity – a large abdomen or “beer belly” means that when the person is prone
the contents of the abdomen can be forced upward under the diaphragm
restricting breathing.
• Psychosis – stimulant drugs (amphetamines, speed, ‘ICE’, ecstasy) can create
an “excited delirium” in which the person is paranoid, over excited and
potentially violent. The stimulation of the heart can produce cardiac rhythm
disturbances, which can be fatal. In this situation, any difficulty breathing can
result in sudden deterioration in condition and death.
• Pre-existing physical conditions – any condition that impairs breathing under
normal circumstances will put a person at a higher risk when they are physically
restrained. Examples are heart disease, asthma, emphysema, bronchitis and
other chronic lung diseases.
• Pressure on the abdomen – even a thin person will have difficulty breathing if
there is pressure on the abdomen. The more Security Officers there are holding
a person down in a prone position, the greater the risk that there will pressure
on the person’s abdomen, making it difficult to breathe.
• Identify persons at risk – knowledge of the risk factors will help identify potential
situations.
• Avoid prone restraint unless necessary – consider alternative methods for
resolution. The person should be repositioned from the face down or prone
position as soon as practical.
• Do not sit or lean on the abdomen EVER.
• Identify danger signs of asphyxia – Security Officers must remember that some
restraints put the subject in danger, and they should avoid tactics that are
associated with deaths.
• Constantly monitor the person – continuously monitor a restrained person and,
where possible, task a person not involved in the restraint to monitor the
restrained person’s condition.
• Seek medical attention – immediate medical attention should be obtained
where there is any concern over the health of a person who has been actively
restrained.
• Continually ask the restrained person “Are you OK” - do not expect the response
to be “Yes, thank you”. The restrained person will probably swear, call you
names etc - however, they have just done what you wanted them to: they have
told you they are still breathing!
Emotional Intelligence
Emotional intelligence is simply the ability to maintain control over your emotions, this
skill is essential when communicating with co-workers, clients and management.
Communication
The security officer’s role requires the ability to interact with a diverse range of
stakeholders using a combination of verbal and non-verbal skills. Effective use of body
language and eye contact are just as important.
Reliability
Being on time for work every day is the start of reliability and demonstrates to your
team that you can be relied upon, but it doesn’t end there! can you be relied upon to
Positivity
Being continually positive is valuable in helping others keep stress levels down and in
generating a feeling of optimism in the workplace.
Negotiation
Negotiation is any interaction in which two or more people engage in a discussion in
an attempt to come to a shared agreement. A good “Bouncer” can effectively remove
a person with force HOWEVER a great crowd controller can negotiate with a person
and make them want to leave.
Openness to Feedback
Be open to feedback see criticism as feedback that will contribute to self-improvement
as a result, individuals who accept constructive criticism have a better chance of
coming out on top in the long run.
Empathy
People at work gravitate towards those who are capable of showing empathy and
taking actions consistent with an understanding of how others feel. Empathy can be
displayed at work in a variety of ways. For example, you could lend an ear to a
colleague experiencing problems in the company or, support a project when an
unforeseen difficulty strikes.
Teamwork
Teamwork is another great interpersonal skill to have in your repertoire. Modern
workplaces often require employees to rely on each other in some capacity and be
willing to support others when called upon. Effective teamwork involves knowing
when leadership is required and when it’s okay to stand back and be a supportive
project member. As such, a good team player will also possess a slew of interpersonal
skills already mentioned in this list, including emotional intelligence, communication,
and negotiation.
Active Listening
Being open to the ideas of others will lead to an environment where all employees feel
free to share their thoughts. In addition, actively listening enables you to clearly
understand all instructions and thus deliver work that satisfies requirements.
Professional presentation
Customer service is about perceptions. Customers judge service by what they see and
hear. It may seem unfair, but first impressions are important: you don’t get a second
chance at a first impression! To be effective you must always be well presented.
Uniform
Your organisation will specify what is required as far as your uniform goes. At the
minimum, your uniform should be clean and ironed and you should take care to shine
your shoes, the organisations SOPs provide the requirements for your presentation.
Personal hygiene
Ensure you maintain high standards of personal hygiene. Your hair should be tidy. Trim
your fingernails and use a deodorant. If you are a man, shave regularly or trim your
beard or moustache. Pay attention to your oral hygiene too. These small things make
a difference as to how customers see you.
Your bearing
How you carry yourself speaks volumes about you. A slouched posture suggests you
are bored or lacking confidence. Take pride in yourself. When sitting, sit up straight.
You will find this will reduce back fatigue. When standing or walking, think tall. This
won’t make you a tall person, but you will walk with more assurance. Develop a
confident, relaxed presence.
Developing rapport
Developing rapport with a customer or client means you develop a feeling of
sympathetic understanding. Barking out orders or giving a customer a blank stare is
guaranteed to ensure you appear to be completely lacking in warmth. When talking to
clients and customers, maintain eye contact and smile. Let them know that you have
understood their request or instruction. This may be by a simple ‘okay’, or by a
summary of what was said.
Airport
In an aviation environment, Security Officers will interact with customers from all age
groups and cultural backgrounds. All Security Officers must understand the range of
services available at the airport and the general layout of the airport. If, at the airport,
the domestic and international terminals are not connected via walkways and require
shuttle buses or trains to interconnect, the Security Officers should be able to provide
advice and appropriate directions with respect to this, too. A professional Security
Officer must understand the rules of airports to provide customer service. Many
customer problems / arguments can be avoided by the Security Officer meeting and
greeting customers and providing courteous assistance to passengers who need help.
For example, a Security Officer stationed “kerbside” may see a customer arrive carrying
a large surfboard, and several suitcases. Greeting the customer and being able to direct
them to a trolley and explaining the location of oversize baggage check in etc., will
assist the customer navigate the terminal and will also ensure the customer has a good
Be professional.
To be professional, you need to learn everything there is to know about your industry,
your business, products, services and, finally, your customers. You will need to develop
and make the most of your abilities and opportunities.
Listen
Listen closely to what the customer must say. Listen to comments. Ask questions. Be
observant. Watch expressions and reactions or listen for voice tone and you will have
all the information you need to service the customer. Your attention helps to create
empathy and understanding, which allows you to ascertain your customer’s needs.
Show understanding.
Understanding builds empathy and trust. You must have and exhibit a genuine desire
to appreciate the thoughts and feelings of your customers and a sincere wish to help
them to solve their problems. Be intent and focussed on your customer. Notice their
words and actions or tone of voice. Learn to interpret their wants and desires and
you will be rewarded with satisfied customers.
Security officers employed in areas with a large concentration of youths may need
assistance in understanding youth culture, local organisations such as Mission
Australia, Salvation Army are a good source of information. There are also Practice
guides for youth support services available.
Unforeseen problems
Sometimes you may find that unforeseen problems arise: a radio doesn’t work, or
perhaps a crowd attending a show or sale in the mall exits early. Be prepared for some
things to go wrong. Unforeseen problems can be good customer service opportunities.
Be aware of what is going on around you and, when unforeseen problems do occur,
put yourself in the customer’s shoes and think about what they would expect you to
do.
When you receive your instructions, think about the possible “failure points” and have
a ‘plan B’ prepared for the most likely failures. Be as proactive as possible in the
delivery of customer service. For example, while patrolling a site, you notice a car
‘prowling’ outside. A good customer service gesture on your behalf is to observe the
situation, note any relevant identifying information and pass it on to your control base
or supervisor so that a possible threat can be averted. You should also provide any
details in your incident report or the logbook. Not only will it be good customer service,
but it may also in fact prevent a breach of security or assure your own safety.
Follow through.
To recover the situation, you may have to make new promises. Be sure you can deliver
on these promises (or don’t make them!). Take time to check that things were resolved
to the customer’s satisfaction. Customers feel doubly cheated if the recovery process
fails.
Respond to client complaints or special requirements.
Communication and/or mobility-impaired customers have the same requirements as
other customers: quality products and services that meet their needs, including
reliability, and competitive market prices. As it happens among most consumers, staff
attitude is a key deciding factor. We would ideally suggest providing specialised
training for managers and staff.
Complaints
Where you receive a complaint about your company’s services or contract compliance,
refer these immediately to your supervisor and inform the complainant of your
actions, recording all details in your notebook. Follow up with the complainant in a few
days and verify that action has been taken.
If you receive a complaint about your own performance, do not panic or try to fob off
the complainant (a good strategy is to always have a supply of your supervisor’s
business card in your pocket). Write your name on the back, hand it to the complainant
and use words such as: “Thank you I appreciate your feedback, here are my
supervisor’s contact details”, so you can direct the complainant to your immediate
supervisor.
Record all details in your notebook, if you have made a mistake, “Do not hide this”.
Record the details of the mistake and what you have done to prevent a recurrence.
You will then have this available to show your supervisor, if required.
Client feedback
Security officers or supervisors working on a client’s site build relationships with
clients, it is important that relationships are maintained on a professional basis. Best
practice is to hold regular meetings with clients, these can be formal or informal (over
coffee or lunch etc), keep diary notes of each meeting and following each meeting
prepare a report for your immediate supervisor, include feedback obtained such as
client satisfaction with the service provided and importantly areas of concern where
the client would like to see an improvement.
Types of security clients and available services and security systems to meet their
needs.
One standard of service does not meet all client’s requirements, the following are
some common service standards available.
Underpinning knowledge
There are many points to consider that we have discussed previously, prior to applying
any use-of-force. Before being placed in a position where a use-of-force option may be
necessary, the Security Officer must have knowledge of the laws applicable to use-of-
force situations, including assault, self-defence, duty of care and WHS considerations.
The Security Officer must also understand the employer’s WI’s.
In addition, the Security Officer must be conversant with the use-of-force model
(continuum) and conflict resolution techniques to assist in selecting and implementing
the appropriate options when this is necessary. After the event, the Security Officer
must document these in the use-of-force report. Also, the Security Officer must
understand basic First Aid techniques that might be required for any injuries caused
when a restraint of a person becomes necessary, e.g., positional restraint asphyxia.
Pain Compliance
All control and restraint techniques (or defensive tactics) rely on a physical control
concept known as ‘pain compliance’. Pain compliance is the controlled application of
force to manage resistance or aggressive behaviour in an individual. Pain compliance
relies on a basic punishment-reward system. If the individual is non-compliant by
resisting or behaving in an aggressive, obstructive or threatening manner, the Security
Officers can apply controlled pressure. This controlled pressure, in turn, causes a
sensation of pain as a form of discipline. This behaviour management system should
be coupled with effective communication skills, particularly focusing on non-abusive
verbal commands. When the individual complies with the requests of the Security
Officers, such that the individual is no longer aggressive or ceases to resist, the
individual is rewarded. This reward is in the form of pain reduction.
Effective communication skills, especially loud, clear vocal commands (case studies
have shown that without loud, clearly audible and repetitive vocal commands), the
application of pain compliance techniques will actually increase the level of resistance
and aggression from the individual. It has been shown that, at any time the individual
experiences unexpected, moderate levels of pain, the individual’s ability to hear and
comprehend commands is greatly impaired. Therefore, it is necessary to repeat verbal
commands at least three times before most individuals who are subjected to pain
compliance techniques actually hear or comprehend those commands. A Security
Officer must remember that individuals cannot comply with requests or understand
what is expected, if they do not hear or understand the requests. Since the entire
concept of pain compliance relies on the punishment/reward system, it is very difficult
to justify the use of pain compliance techniques if the individual simply does not
understand what is expected of them. It is therefore recommended that, at any time
Positional Asphyxia
Definition: death as a result of body positioning that interferes with breathing; also
known as restraint asphyxia. In its broadest sense, it refers to a state in which the body
is deprived of oxygen. This results in a loss of consciousness and/or death.
8
The tap out principle involves the restrained person tapping his leg with his hand to indicate that he or she is withdrawing
consent for the continued application of force.
Relative positioning
Relative positioning is a principle of zoning, as it relates to the relative position of the
subject to the officer.
• Inside position: directly in front of subject.
• Level I: (Interview Position) a 45-degree angle to the front.
• Level II: side by side.
• Level II 1/2: (Escort Position) to the rear, oblique.
• Level III: directly behind the subject.
The Security Officer has to establish the need to restrain, secure or escort a subject in
accordance with the established threat. The Security Officer needs to select an
appropriate stance and distance from the subject to maximise his or her ability to apply
recognised hold techniques quickly, and then discontinue contact at cessation of the
threat. Operation records and reports (use-of-force report), need to be prepared in a
timely manner, presenting all relevant facts and information in accordance with
established assignment instructions.
9
Surviving Edged Weapons", released in 1988 by Calibre Press.
Natural stance
The Images on the following pages were taken with the Security Officer using his
natural stance which, as you can see, varies considerably. And in some cases, where
feet are close together, the officer in a position where they can easily be taken off-
balance. The natural stance can include adaptions of the weaver and isosceles stances,
adapted to suit the Security Officer’s physique.
10
The weaver stance was developed by a Los Angeles County Deputy Sherriff John Weaver in Southern California in the
late 1950’s for use in teaching handgun stance techniques. The author has adapted the weaver stance so that one stance
can be utilised to use whilst communicating, applying defensive tactics, impact weapons, using handcuffs or firearms.
11
Reversed for left-handed person.
Image: Upper block Left hand) and Right hand ready to block or strike.
Offender has grabbed the front of the Officer's shirt and is about to strike the officer.
Image: offender grabs officer’s shirt Image: Offender is raising arm to strike
Image: offender strikes, but is blocked by officer, who Image: officer raises right hand to protect face and
simultaneously grabs and secures offender’s other simultaneously raises elbow, and grabbing and twisting
hand. offenders’ hand
Image: officer simultaneously twisting hand and rolling Image: officer rapidly rotation offenders’ arm to take
the right arm over offender’s elbow joint offender off balance. (take down technique)
Image: the offender is losing balance, and officer Image: the officer has secured offender on the ground and
straightens offenders’ arm (Lock) and pushes down. places offenders’ hand in a wrist lock variant.
(applying take down technique) (Locking technique)
Image: officer placing arm behind offenders back to Image: Officer is holding offender in position, and
hold offender in place whilst awaiting assistance / communicating with offender, to monitor offender’s
support. (holding technique) wellbeing, and prevent positional asphyxia.
Image: Come-along hold: approach from behind the offender, one hand on wrist (rotating like a motorbike throttle)
whilst support hand is under the elbow joint. The offender's arm should be angled towards your hips and the Security
Officer's body weight used against the arm to propel the offender forward.
Image: approach subject from escort position and secure Image: whilst securing subject's hand, bring the other
subject's hand arm up underneath arm pit and apply pressure to
elbow bend of subject's arm
Image: bring inside hand over subject's hand so that your Photograh: side view: ensure subject's elbow is secured
middle knuckle is over the subject's middle knuckle. in your sternum, to avoid elbow strike to your jaw. To
gain more control, twist subject's hand or thumb.
Image: raising left arm to apply scissor lock. Image: apply scissor lock pressure to subject's arm and
walk them forward to remove them from venue.
Image: officer applying strike to common peroneal nerve Image: officer securing arm of offender, ready to apply
(causing offender to drop his arm). an arm lock.
Image: officer places arm over and under offender’s arm Image: officer simultaneously lifts up on right arm and
presses down on left arm, whilst walking forward.
Image: offender shows signs of aggression Image: offender strikes and officer blocks
Image: officer brings right arm under offender’s right Image: officer controls offender's arm, ready for take
arm down
Image: officer pulls offender's arm backwards, taking Image: officer pulls offender's arm backwards, taking
offender “off balance” offender “off balance”
Image: officer continues to apply pressure until offender is secured on the ground
Image: officer rotates offender's hand clockwise, simultaneously providing verbal command “On your back!”
Image: officer has placed offender on their back (this is not a good holding position).
Image: officer striking radial nerve motor point Image: officer striking median nerve motor point
Image: officer blocking and preparing for next step. Image: Incorrect impact technique.
Summary
Defensive tactics cannot be learnt from a manual or video, manuals and / or videos will
assist in supporting knowledge components of a course, practical instruction and
assessment by a qualified instructor will ensure the officer is competent (only on the
day they are assessed) to maintain currency of skills and knowledge officers should
practice their skills and best if these are practiced with the teams they work with.
Authors note:
Prior to carrying any personal issue PPE or other equipment, always obtain written
approval from your employer to do so. Also check your state laws to confirm it is legal
to carry. In regard to the Emergency Rescue Tool, if you only need this once in your
life, it is worth it. The Author personally has used a seat belt cutter twice in his career
when he was first on the scene at a vehicle accident, and recommends you carry it
where it is easily accessible in an emergency. Security Officers performing mobile
patrols regularly work at night, in the rain and are likely to be first on the scene at a
vehicle accident, especially if you drive on country roads. Your vehicle may just get a
flat tyre. If you have to change a tyre at night, you need to follow basic safety
procedures such as put on your hazard lights, wear a retroreflective vest, this will
increase your visibility and safety.
If you are first on the scene at a vehicle accident, it is sometimes hard to remove a
person from a vehicle - in both of the situations where the author removed people
from vehicles, they were upside down and the seat belt releases were locked in
Use of a torch.
The author always recommends that Security Officers carry a torch, even whilst on day
shift. A small tactical torch can be easily worn on your duty belt. You never know when
the lights will go out in a basement, car park, stairwell or other internal area just when
you need to find a key to open a door, or access an alarm etc.
12
FGG is a current serving police officer and as such cannot endorse products; his name is kept on file for validation.
Risk assessment
The role of a Mobile Patrol Security Officer is to actively “patrol” an area or site with
the intention of identifying any and all risks and threats. Whilst you are there to protect
the premises and property from others, you also have a duty of care to yourself and
any colleagues who may be patrolling with you. When you approach any premises, you
should apply risk identification tactics to your patrol procedures. This is where a visit
to the client’s premises by a supervisor to perform a risk assessment should be
undertaken. During the risk assessment, the supervisor can take photos of the areas
which are required to be checked, and of any hazards on site.
Performing mobile patrols on a small restaurant may seem like a low-risk client, but
what hazards are there really for the Security Officer?
The risk assessment should include a site map which identifies the location of all
hazards, as well as all security lighting and access points. It should include details of
the standard of service required by the client. The results of the risk assessment should
be provided to each Security Officer involved in performing security duties on the
client’s premises.
Considering that Security Officers conducting mobile patrols may have 100 clients
requiring multiple visits per night, cards play an important role in the Security Officer
assessing the risk of entering a client’s premises. The fact that a card is missing or is
disturbed provides early warning to the Security Officer that an offender may be on
site. Cards can also be used on internal doors of a client’s premises (which are visible
from the exterior), so that when a Security Officer is performing a follow-up external
check of a client’s premises, he/she can look inside and see if the premises have been
tampered with. The backs of cards can be written on to provide notes to clients, such
as when doors and windows are found open.
Pipe Readers. Each Security Officer is supplied with their own unique button, which is
scanned at the start and completion of each shift to ensure all recorded tasks are
allocated to the correct Security Officer. When a tour is completed or any time since,
the PIPE can hold several days or weeks of information, depending upon use. The
officer or supervisor downloads the data by placing the PIPE into a downloader, which
automatically transfers the data to a PC. Downloader versions are available for direct
connection to a PC, or for transfer via LAN, WAN, or the Internet. Each PIPE holds 4883
button reads and can be fully downloaded in less than a minute. Once the data has
been successfully transferred, all button reads stored in the PIPE are cleared and it is
ready to be used for a new tour.
Vehicles:
When security officers are accompanied by a dog, the vehicle should be suitable and
safe for the dog, vehicles could include:
• Bicycles
• Motorcycles
• Personal transporters (Segways)
• Golf carts
Check calls.
It is important that all Security Officers understand the requirements (in accordance
with the SOPs), to perform check calls at predetermined times. This would include
commencement and cessation of shifts, as well as at least hourly throughout the shifts.
Failure to perform a check call at the designated time should initiate action by the
control room to attempt to locate you.
Where performing a patrol on a client’s premises the mobile patrolman will need to
contact the control room and advise them of their arrival and departures from the site.
If it normally takes only 15 minutes to complete the patrol and now 20 minutes has
elapsed since the on-site call entering the premises, the control room can follow up to
ensure the mobile patrolman is OK. If they cannot contact the Patrol Officer, they can
despatch another Patrol Officer (or Police) to the last known point and aid if required.
If clients are found working back late or are delayed for other reasons, contact control
room and advise them accordingly, so that they are aware of any changes.
Tyres
The inspection should include tyre pressure and whether the tread wear is even, and
its depth is legal. Do not forget to check the spare tyre: some spare tyres are in
Lights
Headlights, taillights, brake lights, hazard lights and indicators all require checking to
ensure they are fully operational and roadworthy.
All patrols services can be classified as either a safety check; a lock up; or external,
intermediate or internal calls. Some clients may request a combination of these. For
example, a client may require the first call to be an internal check (where the Security
Officer performs just an external check) followed on the second call by an internal
check to ensure all lights are turned off, safes are secured, and alarms are on - followed
by 3 external checks throughout the night.
External check
An external check of a customer’s premises is conducted to ensure that the premises
have been secured when the customer has departed for the night and that no one has
broken in or vandalised the premises since then. It is during the first check of the
evening that the Security Officer should make sure all doors, windows, gates etc. are
secured, and that there are no broken or cracked windows or fresh graffiti. If a breach
of security is identified, the Security Officer will take the appropriate action (refer to
SOP’s). This could include calling the designated after-hours contact to attend to lock
doors etc. If the Security Officer has keys, that can be done by the Security Officer. An
incident report will be required for each such event.
Where graffiti, cracked windows etc. are found, it is advisable to photograph it on a
smartphone and email a copy to the supervisor, in order to provides a record and to
enable you to know if further email is added later on. On large factories or
sportsgrounds, the Security Officer may be required to perform a physical check, either
by vehicle or on foot, of the boundary fence to ensure it is intact It is important the
incident reports are created and submitted to the client so that appropriate repairs
can be made. If repairs are not made, it makes it difficult (if not impossible) for the
Security Officer to identify if the fence has been tampered with on subsequent visits.
In the absence of repairs, emergency repairs can be made (with zip ties for example).
Whilst performing any external check on a building, you can still look inside a
customer’s premises for security issues. Some examples, which have occurred whilst
conducting external checks, include:
Fish and Chip shop: whilst performing the 2nd patrol of the evening, it was noticed that
there was a small flame coming from under the gas fired vats (potential fire hazard).
The customer had forgotten to turn off the vats. The customer came out and turned
off the vats, and then asked why that wasn’t picked up on the first visit. The reason
was that the client had a timer on his internal lights: they turned off at 2200 hours,
which prevented the flames from being seen until then. It was only when the premises
became dark that the flames were noticeable. Always be vigilant when performing
checks.
Finance company: whilst performing an external check on a finance company following
an alarm at the premises, the front door was found open. Upon entering the building,
Where gates are located unsecured, but the chain and padlock are intact, it is
sometimes useful for a Security Officer to use a spare padlock to secure the existing
padlock to the chain. This way both the security company and customer can access the
premises and you can retrieve the spare padlock later.
Intermediate check
Some clients (for example transport depots, sand and soil / garden supply, sand pits,
quarries and construction sites) may have an external fence that requires checking by
the Security Officers, in addition to buildings and equipment inside the fence line.
Internal check
Where a client requests an internal check of their premises, the Security Officer must
perform an external check first. The external check will provide an indicator to the
Security Officer of the likelihood of an intruder being on site. For example, if all doors
and windows are secured, it is less likely an intruder is on site. If a door is open or
unlocked, it is more likely that someone will be onsite.
Here are some tips and issues to think about when conducting a patrol:
• Make sure that you have all of your equipment and that it is working properly
before you begin your shift.
• Always assume there is a security breach – DON’T BE COMPLACENT.
• Patrol quietly – don’t alert any offenders to your position.
Access codes and/or access swipe cards should be secured in the same way keys are
secured, in order to prevent unauthorised access. Alarms can be audible, such as a
siren or bell located externally, silent where the alarm is activated at a control room /
monitoring centre.
.
Control Room or Monitoring Centre
Foot approach
When approaching a client’s premises on foot, make sure you allow sufficient time for
your eyes to adjust to the dark (if required). In Queenstown, New Zealand, it is daylight
till after 2100 hours in summer which provides an opportunity to secure many clients
premises (first check) before it becomes dark. However, in winter it becomes dark
much earlier than that. Use all of your senses, not just sight. If you think there is
something different about the client’s premises, investigate until you identify what it
is. Perform a check call on arrival and departure so that the control room are aware of
your movements and last known location.
Building approach
When approaching a building during the day, you can see external windows (upstairs)
which cannot be physically checked if you are only performing an external check.
Shining a torch or spotlight at the windows will provide a visible indication that the
windows are secured. If performing an internal check, you should always perform the
external check first to determine if potential intruders are on site.
Bushland / garden
• Be alert for snakes/spiders/hiding offenders: they can all bite.
• Local knowledge.
• What effect does your knowledge of the client and the area have with respect
to your tactical mindset?
• What’s out of place?
• Be aware of seasonal issues.
• Make notes or take photographs for future reference.
Mechanical equipment
Never attempt to operate mechanical equipment of any kind (for example, plant,
boilers, refrigeration, compressors or forklifts), unless you are specifically qualified to
operate that equipment and it is a requirement of your employment. Unless there is
an emergency, no equipment should be operated unless that task is specifically listed
in Site Orders or SOP’s as being part of your patrol duties.
Alarmed premises
Client premises may be electronically alarmed or have an access control system. The
system may control entrances and exits for all or parts of the premises. Become
familiar with the type of system, the control unit and the procedures for investigating
and resetting the system to maintain the correct ‘seal’ status.
Theft prevention
Pay special attention to carelessness or suspicious attitudes in areas where attractive
or valuable items are used or stored. Report areas where tools or attractive items or
equipment are left lying around after work has ceased. Check tool cribs or storerooms
for the presence of unauthorised persons or employees acting suspiciously. Identify
any property found outside its normal area: it may have been deliberately placed in
readiness for a theft. Challenge persons moving equipment or supplies. Submit any
recommendations for the improvement to the protection of property. The client and
your employer will thank you for your suggestions. You can record suggestions in the
logbook or make a formal report.
Breaches of security
If you detect a breach of security or a break and enter during your inspection:
• Contact the control room immediately with brief details of the break and
enter.
• The control room operator will contact the client and/or the police and
provide you with instructions.
• Conduct a full inspection of the break and enter area, ensuring the crime
scene is secure and potential evidence is not destroyed or compromised.
Don’t touch things but record all details in your notebook and on the patrol
docket slip.
• If the internal inspection shows no breach of security and you are satisfied all
is secure, re-arm the alarm system and re-secure the premises.
• Contact the control centre and ask for a seal check, complete your patrol
docket and place it under the door or securely in a letterbox.
• Record details of nearby vehicles or observers either in your notebook or take
photographs with your smartphone.
Alarm Response
As a Security Officer, you may be required to attend to security breaches via
instructions from a control room or to respond to a security breach encountered
during your normal duties. Examples: as a mobile patrol Security Officer, you may be
despatched to an alarm activation either at a remote client’s premises by a monitoring
centre, or as a Security Officer stationed in commercial premises after hours. You may
also be despatched to an alarm activation locally by your onsite control room. On
receiving a request to respond, you will be provided with basic information about the
incident such as:
• Alarm status and what type of alarm activation has occurred (e.g., fire, burglary,
late to close, early open, break-glass, distress).
• How many sectors (areas) are in alarm.
• Location or address details, your key number, if you hold keys.
• Whether the client or other personnel such as fire or police are attending.
Offenders on site
You may have arrived at a site in response to an activated alarm and find that there
are obvious signs of a break and enter. If you suspect or know there are persons on
site, immediately contact the control room / monitoring centre or whoever requested
your attendance and ask for assistance. If you are unable to do that, call the Police or
other emergency personnel yourself. Do not enter the premises unless you feel there
is a risk in not doing so. By entering, you may expose yourself to undetected
emergency such as a fire or chemical spill or to the threat of injury. This threat may
also apply to other persons already on site.
Emergency services should be notified when persons are being removed from
premises for, sexual assaults, assaults, stealing, or drug dealing.
Weapons
Guns, knives and other weapons are screened using a variety of screening devices, walk
through metal detectors, handheld metal detectors or frisk searches. It is good practice
to maintain knowledge of current trends in concealed weapons as many are sold on
the internet.
Pistols Revolvers
Knives Detonators
Prohibited Items
Prohibited items are items not allowed in accordance with the SOPs for example a gun
club will allow persons to carry firearms and ammunition into the premises, a movie
theatre may prohibit people bringing their own food. It is a good idea to investigate
and find out why these SOPs are in place.
Security officers rostered on events or concerts need to be alert for people smuggling
drugs, alcohol or other contraband, drugs are restricted for obvious reasons, as they
are illegal, and deaths occur at concerts with inexperienced drug users and poor-
quality drugs readily available.
Alcohol may be concealed in water bottles, ponytails, soda cans, or any number of
other devices, Google how to get alcohol into a concert and you will see current trends
shared amongst people.
13
Areas other than private property (e.g., customs areas at airports, court houses etc) have specific legislation in place
with regard to photography and deletion of photographs. These duties are not normally the responsibility of private
Security Officers.
14
NSW Liquor Act 2007 and Liquor Regulation 2008
SA Liquor Licensing Act 1997 and Liquor Licensing (General) Regulations 1997
VIC Liquor Control Reform Act 1998 and Liquor Control Reform Regulations 2009
WA Liquor Control Act 1988 and Liquor Control Regulations 1989
QLD Liquor Act 1992 Liquor Regulation 2002
NT Liquor Act and Liquor Regulations
TAS Liquor Licensing Act 1990 and Liquor Licensing Regulations 2003
ACT Liquor Act 2010 and Liquor Regulations 2010
NZ The Sale of Liquor Act, 1989, Sale of Liquor Amendment Act 1999 and Sale of Liquor Regulations 1990
Dress standards
The House Policy can set the venue’s dress standards; these requirements should be
clearly visible for all patrons to see before they enter the premises. For example, if the
venue has long queues, signs displaying dress standards or other conditions of entry
should be prominently displayed where customers can see them early in the queue.
This will assist in preventing arguments at the door with customers who have waited
for 30 minutes only to have access denied. Another strategy is to regularly walk up and
down the side of the queue, advising customers of dress standards etc. Monitoring the
behaviour of customers in a queue also provides possible indicators of undue
intoxication etc. Dress standards will vary between venues - if you are employed at
multiple venues, ensure you are aware of and enforce the correct dress standards.
Dress standards could require that appropriate footwear is worn between certain
hours or be of a certain standard and could restrict such items as sporting clothing (the
venue may prescribe that no football Guernsey’s or jumpers are allowed). Most venues
prohibit motorcycle club colours or other gang patches etc. and many clubs will not
allow visible tattoos. Security Officers must be familiar with the venue's dress
standards and apply these standards fairly across the board to all customers. It is also
prudent to ask “Why” - the answer to this will enable Security Officers to understand
Evidence of age
Security Officers are to monitor the age of customers trying to enter a licensed premise
to verify that they are over 18 years of age. Only the following forms of identification
are accepted as proof of age to allow entry into the premises:
• a current Australian driver's licence or permit.
• a current Australian or foreign passport.
• other current identity documents approved by the Liquor Licensing Division
such as:
(a) The Victorian Key-pass
(b) An overseas driver’s license that must contain the person’s photograph,
date of birth and be written in the English language. If this license is not in
English, it must be accompanied by a current document (an international
driver’s license) that converts the document into English.
Strategies undertaken by Security Officers whilst monitoring the ages of patrons
include:
• Check ID in well-lit areas, so you can verify presented ID and customer match.
• Check ID where you know that CCTV systems are in operation. If liquor
licensing officers later catch an underage customer in the licensed premises,
where the customer has perhaps discarded their false ID and claimed you
allowed them to enter without scrutiny, you will have CCTV footage proving
that you checked the customer and their ID before allowing them entry.
• If ID Scanning procedures are in place, follow these procedures to scan
customer’s identification.
15
Security Officers should check House Policy, assignment instructions or licence conditions to verify local requirements
for numbers of security staff on duty at any particular venue. (Western Australia recommend minimum of 2 crowd
controllers for the first 100 patrons and 1 per 100 thereafter.)
Searching items
It is the role of Security Officers to search items carried by customers to ensure that no
dangerous or prohibited items are carried into the premises. In a retail environment,
it is also required that Security Officers inspect bags of customers who are leaving the
premises.
It is not to be forgotten that Security Officers have no rights to forcibly search a
customer’s bags. However, the owner or manager of the premises has the right to
request people voluntarily submit to a search or to deny access to the person. For
instance, customers wishing to fly out of an airport have a choice: submit to the
airport's screening process or don’t catch the airplane.
16
Aviation Security Transport Regulations, 2005, Regulation 4.17 Methods, techniques and equipment to be used for
screening.
17
Maritime Transport and Offshore Security Regulation 2003 Regulation 7.30 Methods Techniques and Equipment to be
used for screening (Large passenger Ship Screening Notice 2011
18
NSW Retail Traders Association Code of Practice
Technology
Most handheld metal detectors use a technology called beat-frequency oscillator
(BFO). In a BFO system, there are two coils of wire. One large coil is in the search head,
and a smaller coil is located inside the control box. Each coil is connected to an
oscillator that generates thousands of pulses of current per second. The frequency of
these pulses is slightly offset between the two coils.
As the pulses travel through each coil, the coil generates radio waves. A tiny receiver
within the control box picks up the radio waves and creates an audible series of tones
(beats) based on the difference between the frequencies. These trigger an audible
and/or vibration alarm to indicate to the screener that an item has been detected.
Customer relations
It is important that Security Officers communicate politely with all customers during
the use of the HHMD, clearly requesting they consent to the process. Whilst you are
conducting the search with the HHMD, clearly explain the process to the customer.
Ensure all items have been removed from pockets etc. by asking questions such as: "Do
you have anything in your pockets?"
19
Hand-Held Metal Detectors for Use in Concealed weapon and Contraband Detection (NIJ Standard-0602.02)
Test Procedures
There is no official HHMD test piece, but a good guide is to use a coin to test
operational effectiveness.
Preparing to search
Prior to commencement of each shift where searching is to be undertaken, Security
Officers should familiarise themselves with the SOP’s of the customer and the location
where searching is being undertaken. SOP’s will establish if the searching is to be
random or if 100% of customers are subject to search, and the method of searching.
Consent to search
Signs should be prominently displayed advising passengers of the requirement to
consent to a search. The Security Officer should politely request each person to
consent to search; for example: “Good morning Sir, as part of the enhanced security
Search procedure
At all times, Security Officers must follow the appropriate legislation 20 (if any) and
policies and procedures 21 in place in relation to screening.
20
Aviation Transport Security Regulations 2005 Regulation 4.17 Methods Techniques and Equipment used for Screening
(ASN)
Aviation Transport Security Act 2004 Section 95B
21
Policies and procedures could relate to Codes of Practice in a retail environment, Clients Human Resources Policies,
Quality Assurance manuals or Standard Operating Procedures (SOP’s).
During the frisk search, if the person decides to withdraw their consent, you must stop
immediately and inform them that they will not be permitted to proceed into the
sterile area.
During the frisk search, if an item such as a mobile phone etc. is located on their person,
stop the frisk search and have them divest themselves of all objects.
Infants and carriages are an ideal concealment area, so must be searched and
remember must offer excellent customer service and communication skills whilst
requesting and conducting the search so that the carer is aware of the process.
Infants
Communicate with the carer and advise them that all persons entering the building
must be searched, including the infant and carriage.
If the person is accompanied by an assistance animal do not separate the person from
the animal, screen the person in accordance with established procedures, and gently
check collars and harnesses on assistance animal.
Persons in wheelchairs must be screened and the wheelchair inspected ask the person
if they can exit the chair and sit in another chair whilst search is conducted, search the
chair and then the person and place person back in the chair.
• Close at midnight?
• Lockout laws?
• ID Scanning?
• Ban alcohol?
22
His section on ID scanning is contextualised to Queensland, where ID scanning is mandatory in other jurisdictions
specific information will be provided.
23
Richard Franks has been in the security industry for over 40 years.
24
Tackling Alcohol-Fuelled Violence Legislation Amendment Act 2016
25
Safe night precincts (SNPs) have been prescribed in the following areas: Airlie Beach, Brisbane CBD, Broadbeach CBD,
Bundaberg CBD, Cairns CBD, Fortitude Valley, Gladstone CBD, Inner West, Brisbane (including Caxton Street), Ipswich CBD,
Mackay CBD, Rockhampton CBD, Sunshine Coast (Caloundra, Maroochydore and Mooloolaba), Surfers Paradise CBD,
Toowoomba CBD, Townsville CBD.
Previous System
The previous system of ID Checking was that the Crowd Controllers checked the ID of
all patrons who they reasonably suspected of being under 18 years of age, prior to
those patrons entering the licensed premises. In addition, bar staff and crowd
controllers could randomly check ID inside the premises. No records were maintained
of the person’s name, address or photograph (other than CCTV images). Patrons who
were asked to leave or were evicted were free to try to gain access to other venues.
ID Scanning Systems
ID Scanners are networked to a centralised operator. When persons are banned, these
details are stored in the network scanners by the operators and the person is banned
from all venues linked to that network. The system is designed to encourage good
behaviour and assists law-enforcement in identifying offenders and victims if needed.
ID Scanning Systems are not designed to replace Crowd Controllers in venues and must
be operated 26 by a crowd controller (who is trained in the use of ID Scanners). ID
Scanning is conducted on 100% of patrons entering the venue and some details are
stored for future reference (name, date of birth & photo).
Acceptable ID
There are five (5) forms of ID27 which are acceptable for scanning in licensed venues:
• an adult proof-of-age card
• a recognised proof-of-age card (e.g., Keypass identity card)
• Australian driver licence or learner permit
• foreign driver licence 28
• passport (from any country).
26
An exemption is in place which allows persons (who are trained) other than crowd controllers to operate the ID Scanner
under the supervision of a licenced crowd controller.
27
The ID document must be current and include a photo of the person and their date of birth.
28
Note: Where a foreign driver licence is not written in English, an international driver permit issued in the foreign country
of origin (and including a photo of the licence holder and translation) should be presented with the foreign driver licence.
29
http://www.fakies.com.au/
30
The ID scanning systems of the following companies are approved as of 6 April 2017: Scantek Solutions Pty Ltd
31
As of 28 January 2016, the Commissioner has approved the following companies as approved operators: QikID Pty Ltd
and Scantek Solutions Pty Ltd
A practical example
When a patron seeks entry to a venue, their entry must still be screened by a crowd
controller. A host or hostess may perform the actual scanning of the patron’s ID into
the ID scanner but must have no further role.
The crowd controller will:
• request ID from the person seeking entry.
• visually assess the authenticity and currency of the ID
• ensure the ID matches the person presenting the ID.
• hand the ID to the person operating the ID scanner.
• determine the person is not unduly intoxicated, disruptive, inappropriately
attired or presented, and conforms to any other admission criteria stipulated.
• receive the ID back from the person operating the scanner, along with a ‘clean’
or ‘banned’ result from the scan.
• refuse entry to the banned or otherwise unsuitable person in a firm, polite, non-
confrontational and professional way.
• manage any resultant direct interaction with unsuccessful entrants.
32
NSW Liquor Act 2007 and Liquor Regulation 2008
SA Liquor Licensing Act 1997 and Liquor Licensing (General) Regulations 1997
VIC Liquor Control Reform Act 1998 and Liquor Control Reform Regulations 2009
WA Liquor Control Act 1988 and Liquor Control Regulations 1989
QLD Liquor Act 1992 Sections 173EF, 173EG, 173EJ & 173EM & Liquor Regulation 2002
NT Liquor Act and Liquor Regulations
TAS Liquor Licensing Act 1990 and Liquor Licensing Regulations 2003
ACT Liquor Act 2010 and Liquor Regulations 2010
NZ The Sale of Liquor Act, 1989, Sale of Liquor Amendment Act 1999 and Sale of Liquor Regulations 1990
33
Crowd controllers are required to complete the appropriate training to obtain their licence, this publication is designed
to upskill past students who have previously completed training, and will be integrated into the full course effective 20th
April 2017
Ban Checking
Ban Checking
A Ban check can only be performed using the following information (which is scanned
from the produced ID):
• Surname
• Given Names
• Date of Birth
• Photograph
34
Image reproduced from the Office of Liquor and gaming Regulation (OLGR) Identification Scanning System Minimum
Technical Requirements Publication (Version 1.4)
Service Mode
Is used to:
• faults find/fix IST/LVH.
• access log file
• perform IST/LVH software updates.
• request a SHA-1 of the software on the ISS.
Cameras
1. The IST must be fitted with a camera.
2. The camera must be adjustable to accommodate for patrons of varying height.
3. The camera must be capable of taking photos under various lighting conditions.
When scanning your ID, we collect your personal information to meet our obligations
under the Queensland liquor laws. This personal information consists of, and is limited
to:
• your name
• your date of birth
• the photograph appearing on your photo ID.
All personal information is securely held and managed at this venue and by our
approved operator <approved operator>. Our approved operator is also subject to the
Australian Government’s privacy laws.
2. Anonymity and pseudonymity
By law, we must operate our ID scanners from 10pm on days that we are approved to
permanently trade past 12 midnight.
During these times, you cannot enter our venue without your identification being
scanned. An exception applies if you are exempted under the Liquor Act from this
requirement.
The only identification accepted is current photo ID as follows:
• an Australian driver licence or learner permit
We are required by law to scan your photo ID prior to letting you into our venue, unless
you are exempt under the Liquor Act. We must refuse entry if you choose not to
produce your photo ID, or if you have been issued with a banning order that applies to
this premise.
The information collected by us is used strictly for safety and security purposes to
identify if you have been issued with a current banning order or licensee ban. The
information may also be used to create a licensee ban from this venue.
4. Dealing with unsolicited personal information
The ID scanner system does not collect or use unsolicited personal information.
5. Notification of the collection of personal information
Our staff will alert you to the ID scanner requirements prior to scanning your photo ID.
Your personal information will only be scanned in your presence.
We must also:
• make this privacy policy publicly available and provide you with a copy if you
request to see it.
• display notification of the personal information to be collected under the ID
scanner requirements at each public entrance to our venue, and the conditions
and requirements related to such (referred to as a ‘Collection Notice’).
You have the right to request access to what personal information is held about you.
You can contact us or our approved operator to request this information.
You will need to provide photo ID before any information can be released. Some
exceptions apply, such as where access would be likely to interfere with criminal
matters, or other breaches of the law.
You can contact us and ask to correct the personal information that is held about you.
<Venue Name>
Address:
Phone:
Email:
Address:
Phone:
Email:
We are also required by law to notify the Queensland Office of Liquor and Gaming
Regulation, within 14 days of any written complaint by you about a breach of privacy.
If you are unhappy with how we handle the complaint or do not receive a response
within 30 days, you have a right to take the complaint to the Office of the Australian
Information Commissioner.
Email: [email protected]
Web: www.oaic.gov.au
In accordance with the Liquor Act 1992, we are required to scan your photo identification
before you enter the premises after 10pm on <insert days> to check if you have been issued
with a banning order that applies to this premise.
You may also be prevented from entering if you are subject to a ban initiated by this venue
or you are subject to a banning order or venue ban for another venue.
If we do not scan your identification as required by the Liquor Act, then we must not allow
you to enter the premises.
The Liquor Act exempts certain persons from having their ID scanned, such as temporary or
permanent residents of the regulated premises. The full list of exemptions is outlined in
section 173 EH (7) of the Liquor Act.
The personal information we collect when scanning your ID is limited to name, date of birth
and photo. It may only be used to:
• identify if you have been issued with a current banning order or licensee ban.
• create a venue ban.
All personal information is stored at the venue and by the approved operator in a way that
protects it from unauthorised access, modification or disclosure. Your personal information
is automatically and permanently deleted from the ID scanner system 30 days after it is first
entered into the system. However, information on banned people will be held in the system
for the period of the ban, which may exceed 30 days.
You may request access to the personal information that is held about you. You can contact
us or our approved operator to request this information. You will need to provide photo ID
before any information can be released. Some exceptions apply.
You can also ask us to correct the personal information that is held about you. We will require
satisfactory proof of any reported inaccuracy before we consider correcting your personal
information.
Further information is available in our ID Scanner Privacy Policy which is publicly available on
our website at <website address> or please ask us for a copy.
To make a complaint or raise privacy concerns, contact this venue’s privacy officer at <contact
details for venue> or our approved operator <contact details for approved operator>.
36
Screening People and Items and controlling entry and entry into airports, maritime facilities and court houses is covered
other courses, Aviation Protection Officer (Passenger Screener / Checked Baggage Screener,) APO Maritime Screening
Officer, MSO & Court House Screening Officer CSO
Example
The client needs a procedure developed to search vehicles entering and exiting a
factory site to minimise theft. The following steps should be followed:
Legislation
Identify legislation that may apply to the client’s premises, including the following:
• Work Health & Safety Act and Regulations (control entry for safety reasons).
• Identify site-specific legislation that applies (financial institutions, casinos etc.
cannot allow people into secure areas, while airports and maritime facilities
have rigorous rules and procedures controlling entry and exit).
37
Standard Operating Procedures (SOP’s) are defined in Australian Standard AS/NZS 4421:2011 Guard and Security Patrol
Services as Operational document detailing the specific duties to be performed under the contract. These are sometimes
referred to by clients and others as Standard Operating Procedures (SOP’s)
Industrial relations
It is wise to consult unions or industry associations when developing procedures for
searching staff entering or leaving a client’s premises, to ensure that objections are
managed, and policies and procedures implemented to address any concerns.
What should the procedures cover?
The procedures should cover all legislative and IR concerns by:
1. Including in the staff terms and conditions of employment a clause that all
employees consent to a vehicle, bag or physical search and what happens if they
refuse.
2. Placing appropriate signage so that all staff and visitors are reminded of the
requirements.
3. Training Security Officers on how to conduct the search in accordance with the
procedures.
4. Process of dealing with persons who refuse.
5. Passes for staff and visitors and what to do with lost / forgotten passes.
Security Officers may be required to search persons, vehicles* and physical effects. To
undertake these tasks, Security Officers will be required to demonstrate an
understanding of appropriate legislation and SOP’s and maintain excellent customer
service skills, whilst performing these tasks. As there are differences between sites,
Security Officers who rotate between sites should ensure they are familiar with the
site-specific requirements for each.
Vehicles* include: Bicycles, buses, cars, motorcycles, personal transporters, ride-on
lawn mowers, trolleys, trucks etc.
38
Australian Retailers Association - Guidelines for the checking of bags and parcels in retail stores
Access validations
The Security Officer will check the bona fides of all transport entering and departing
the premises in accordance with the organisations SOP’s. This may be by issuing a
visitor pass on arrival and collecting this on departure.
Arriving trucks may be making deliveries, and the Security Officer would check the
bona fides of the transport against the list supplied and direct the driver to the
appropriate delivery area. Truck’s departing may be subject to checking their
consignment against their manifest to ensure the truck is removing materials within its
scope of authority.
Security Officers must not only record the details of each vehicle entering the site,
(registration number, date and time etc.) but should also check the manifest and
inspect the load to see if it matches. An observant Security Officer would be alert for
things that are not normal on the site. It only takes a small amount of explosive to
compromise the security of any installation, so be alert.
As well as the security of each site, couriers and delivery drivers could also be involved
in stealing. Make sure you check manifests and that if a discrepancy is noticed (such as
changing a number from 1 to a 10), double check the manifest in accordance with your
SOPs to ensure that the driver is authorised to remove the load.
Record keeping
Access control
Access control usually happens in one of two ways: entry under the Security Officer's
control or entry through a mechanical or electronic device.
Special passes - in high security areas, you may allow only people with special passes
or badges to enter. You must be very familiar with this type of access control so that
you know what to look for. If visitors and short-term workers want a pass to enter the
area, they may have to give you a piece of ID such as their driver’s licence.
Their names must be entered in a logbook. You return their ID when they give back the
pass as they are leaving. In sites with maximum access control, visitors may have their
picture taken and be given a temporary ID card that they must wear until they leave
the property.
Access control doesn’t work unless you follow the rules carefully for everyone. Some
people, especially employees who have worked at a site for many years, may become
angry or frustrated if they have to show their ID every day. If you are new to a site, you
will not be able to recognise all employees. Check ID cards even if you know the person.
The card may no longer be good. If someone challenges you, remain calm, explain the
Security of equipment
Where bollards are used to control access, the bollard should be secured when not in
use to prevent unauthorised use; the bollard could be stolen or used as a weapon for
assault and/or break and entry purposes.
Care should be taken to ensure keys are not lost.
Avoidance procedures
The Security Officers and all team members involved in the restraint of the subject
must ensure that:
• the Subject has a clear, unobstructed airway.
Entering premises
Vehicles entering could contain explosives (terrorist activity), firearms or drugs. The
range of possible illegal substances or contraband is unlimited.
Exiting premises
Vehicles exiting may contain stolen goods / property, so it is important to verify all
consignments with the presented paperwork.
Position vehicle
A designated area should be available for vehicle searches, if this is not available then
traffic cones should be placed around vehicle so other vehicles do not run into it whilst
search is being undertaken.
The designated area should be well lit (will assist in searching and minimise the
requirement for use of a torch) and have good ventilation to prevent a build-up of
fumes.
Search compartments (glove boxes, consoles CD trays, cup holders, areas for
sunglasses etc) place removed items in a tray for easy identification and retrieval. Use
the torch to look at the compartments and check for tool marks etc that may indicate
tampering. Remove rubber mats in consoles and cupholders as contraband may be
concealed underneath or within the cup holders etc.
Be alert for airbags to avoid triggering these yet be alert for signs of tampering that
could indicate airbags have been removed and replaced with contraband.
Check under and around the seats using a mirror and or flashlight, check under the
seats on the floor and up under the lining.
Check the carpets and upholstery. This part is the most dangerous, as there may be
needles or other sharp objects hidden in the upholstery.
Run your hands - while wearing gloves - along the edges of every seat. Get in between
the cushions and run your hands back and forth slowly.
Lift up any floor mats, and if there is any part of the carpet that appears to have been
lifted from the floor, check underneath.
Using a mirror and a flashlight, (a mirror or smartphone on a selfie stick can suffice)
look up underneath the vehicle. You may need to lay on the ground to do this, so lay
out some cardboard or a piece of fabric to protect your body from the ground. Look
for anything that seems haphazardly secured to the bottom of the vehicle.
Consent
Clearly marked signage should be available that says “It is a condition of entry that all
vehicles may be searched prior to entry” the driver can choose to be searched or leave
and not be searched. Whilst similar sign is advisable for those departing it is possible
that people withdraw their consent, in these cases (as in all) it is important you are
aware of the organisation’s SOPs of vehicle searches and the procedures to follow in
event of a refusal to be searched.
What is a crowd?
A crowd is essentially a large number of people gathered together to attend a function,
a game, an entertainment event or a specific gathering such as a political rally. Crowds
can be broken up into three groups: - conventional, expressive and spectator crowds.
It is important that Security Officers review how crowds have reacted to previous
functions / events of a similar nature. This will provide valuable insight into how to
prepare for the tasks that have to be completed. When conducting risk assessments,
supervisors should review past events and provide feedback to the team at the briefing
sessions as to how those previous events went.
Expressive Crowds
Members of an expressive crowd can be involved in activities such as dancing, singing
and other types of group entertainment including promotions for sporting or film stars.
This type of crowd will normally remain docile unless something occurs to change its
mood, such as a person or group of persons creating a disturbance by heckling a sports
star for example.
Crowd knowledge
To be effective in controlling a crowd, you need to know four basic things about that
crowd: the reasons for the gathering; the area occupied; the common traits of the
people comprising the crowd; and finally, the identity of potential troublemakers.
Usually, the first three elements present no problem. A risk assessment should be
conducted on each event to determine the security requirements and should include
feedback on past events of a similar nature. The fourth element, however, may be hard
to identify. Each event will have its own culture and will attract certain types of
behaviour.
For example, let us consider the annual Schoolies event on the Gold Coast, where kids
celebrate the end of their school years. Common problems are:
• Toolies (people who are too old to be schoolies, but who go to the event
anyway)
• Underage drinking (both in licensed venues and with respect to alcohol
supplied in bulk to be consumed in hotel rooms etc.)
• Drugs
• Fights
Keeping detailed records of incidents and conducting debriefing sessions at the end of
the event will assist in the planning of future events and allocation of resources.
The door Security Officer is ideally placed to monitor the number of persons who are
in the venue by using a counter to record the number of persons entering (and leaving
the venue). This ensures the venue complies with regulations imposed by licensing,
council or fire brigade.
Head counts may be undertaken randomly by the roving Security Officers to ensure
compliance. A professional Security Officer would also be able to estimate the number
of patrons in a venue based upon experience.
Control Basics
The main objectives of crowd control at special events are no different from that at
other functions or even nightclubs. That is, the primary aim is to maintain order and
Managing Queues
Failing to manage queues at licensed venues can lead to aggressive behaviour in
patrons resulting from impatience, boredom, people bumping into each other, etc.
Venues with strict house policies should ensure that, when queues are long and exceed
5 minutes of queue time, crowd control staff are allocated to walk the queue and
address breaches of house policy.
Some examples:
Where a venue has rules that state, “No Visible Tattoos”, staff should walk the queue
and inform patrons who breach this house policy of the issue, so that they can either
manage compliance or leave the queue. When someone in this situation has queued
for 30 minutes and is only informed of the house policy when they reach the front of
the queue, they can become aggressive.
Where queue jumpers are identified, they should be despatched to the back of the
queue or denied entry.
Another strategy is to generally walk the queue and meet and greet patrons, especially
regulars. Be alert for disorderly conduct - if people cannot behave in the queue,
consider how they will behave once inside. Patrons who are intoxicated may have been
denied access to or removed from other venues and are bar hopping, hoping to get in.
Managing Crowds
Licensed venues and other places of mass gathering create security risks by filling
limited spaces with large numbers of people.
These risks include assault, sexual assault, stealing, transmission of airborne diseases,
heat stroke and crushing (leading to restriction of breathing). To assist in maintaining
safety in venues, crowd controllers should monitor the number of people in the venue.
Fire departments and or liquor licencing will place conditions on the building or licence,
restricting the number of patrons who are allowed at any one time.
To prevent crushing, simply monitor the numbers of people who enter a venue. Once
the maximum number has been reached, only let a person in only as another exits the
venue.
The FIST model of crowd disasters 39
The primary elements involved in crowd disasters have been determined from
personal experiences, analysis of major crowd incidents and basic traffic flow
principles. The elements provide a model for understanding the causes of crowd
disasters, means of prevention and possible mitigation of an ongoing crowd incident.
The elements of the model form the acronym "FIST", which is a useful reminder that
any crowd situation can quickly become threatening and potentially lethal. The
acronym is defined as follows:
• FORCE (F) of the crowd, or crowd pressure.
• INFORMATION (I) upon which the crowd acts or reacts, real or perceived, true
or false.
39
The causes and prevention of crowd disasters by John J. Fruin, Ph.D., P.E. United States of America
Force
Crowd forces can reach levels that are almost impossible to resist or control. Virtually
all crowd deaths are due to compressive asphyxia and not the "trampling" reported by
the news media. Evidence of bent steel railings after several fatal crowd incidents show
that forces of more than 4500 N (1,000 lbs.) occurred. Forces are due to pushing, and
the domino effect of people leaning against each other.
Compressive asphyxia occurs as a result of people being stacked up vertically, one on
top of the other, or due to horizontal pushing and leaning forces. In the Ibrox Park
soccer stadium incident, police reported that the pile of bodies was 3 m (10 feet) high.
At this height, people on the bottom would experience chest pressures of 3600-4000
N (800-900 lbs.), assuming half the weight of those above was concentrated in the
upper body area.
Horizontal forces sufficient to cause compressive asphyxia would be more dynamic as
people push against each other in an attempt to obtain breathing space. In the
Cincinnati rock concert incident, a line of bodies was found approximately 9 m (30 ft)
from a wall near the entrance. This indicates that crowd pressures probably came from
both directions as rear ranks pressed forward and front ranks pushed off the wall.
Experiments to determine concentrated forces on guardrails due to leaning and
pushing have shown that force of 30% to 75% of participant weight can occur. In a US
National Bureau of Standards study of guardrails, three persons exerted a leaning force
of 792 N (178 lbs.) and 609 N (137 lbs.) pushing. In a similar Australian Building
Technology Centre study, three persons in a combined leaning and pushing posture
developed a force of 1370 N (306 lbs.). This study showed that under a simulated
"panic", 5 persons were capable of developing a force of 3430 N (766 lbs.).
Information
In the broad systems sense, information has many forms. It includes all means of
communication, the sights and sounds affecting group perceptions, public address
announcements, training and actions of personnel, signs, and even ticketing.
Time
A simple illustration of timing is the more gradual and lighter density arrival process
before an event, compared to the rapid egress and heavy crowd densities after the end
of an event.
Prevention of crowd disasters by crowd management
Most major crowd disasters can be prevented by simple crowd management
strategies. The primary crowd management objectives are the avoidance of critical
crowd densities and the triggering of rapid group movement.
Terminology
Although the terms "crowd management" and "crowd control" are often used
interchangeably, there are important differences. Crowd management is defined as
the systematic planning for, and supervision of, the orderly movement and assembly
of people. Crowd control is the restriction or limitation of group behaviour. Crowd
management involves the assessment of the people handling capabilities of a space
prior to use. It includes evaluation of projected levels of occupancy, adequacy of means
of ingress and egress, processing procedures such as ticket collection, and expected
types of activities and group behaviour.
Crowd control may be part of a crowd management plan or occur as an unplanned
reaction to a group problem. It can include extreme measures to enforce order, such
as the use of force, arrest or threat of personal injury. It may employ barriers that alter
the space available for occupancy and patterns of group movement. Inappropriate or
poorly managed control procedures have precipitated crowd incidents rather than
preventing them. For example, police reacting to a group of unruly persons at a rock
concert, herded spectators into areas where there were no means of egress.
Information
Crowd managers must process a wide range of information about a venue and the
people occupying it before a group assembly occurs. Included is an assessment of the
nature of the group, experience with similar groups, potential behaviour patterns,
Nature of Crowd
Crowds can attract others who come to observe and to peacefully enjoy the event,
predators in search of victims, and people with other psychological or social agenda to
pursue. Constant monitoring of crowd behaviour is necessary for good crowd
management. A proactive type of management is required that anticipates and
resolves problems before they occur, rather than reacting when it could be too late.
Staff training
The training of crowd management personnel is of vital concern. Often casual labour
is employed at large events. These employees may only receive vague instructions,
usually about controlling certain crowd behaviours. Even permanent staff may have
limited training in crowd management, recognition of potentially dangerous crowd
problems, and the handling of accidents and other emergencies. Training should
include instructions on the basics of normal and emergency crowd movement and
assembly; initial handling of accident victims, altercations and other crowd incidents;
communications procedures and use of communications equipment; avoidance of
actions that may incite or trigger dangerous crowd behaviours; and conduct and
demeanour during an emergency. All personnel should be provided with a quick
reference pocket guide to reinforce training guidelines and communications
procedures.
Responsibilities of performers
Actions by performers such as late cancellation, walking off stage, encouraging fans to
move closer, throwing souvenirs to the audience or other actions have precipitated
inappropriate or hazardous group reactions. Entertainers should be fully informed of
their own responsibilities for maintaining order, and the problems associated with
inciting potentially dangerous group behaviours. Performers must provide advance
notice of cancellation, before patrons begin entering the venue. Communication with
the crowd should not be delayed if cancellation occurs after entry. Announcements
should clearly establish refund policies, exit routes, and need for orderly movement.
Ticketing
Tickets are an important crowd management information factor. Reserved section and
seat tickets determine specific area occupancy, and routes of entry and egress. Tickets
also provide a means of instructing patrons on rules of conduct expected within the
venue. Major art exhibitions have managed crowding by arrival time ticketing, valid
only during a specific time period.
Space
Architects and engineers typically give minimal attention to the movement of people
in initial building design, beyond compliance with local building codes. Code
Movement pathways
Access tree diagrams, or schematic line illustrations of pathway configuration,
pedestrian volume and direction, are useful planning tools. The tree diagrams show
the capacities of doors, corridors, stairs, escalators, landings, and identify pressure and
conflict points. Pathway alignments should be simple and direct, and not circuitous or
offset from the normal straight line of sight. Arrangements that result in unbalanced
use of egress or ingress routes, dead ends, or similar confusing and irregular pathway
choices, are not acceptable.
Dispersed and equally balanced ingress and egress points are preferred over a single
centralized location. The influence of external facilities on the volume and direction of
movement must be considered. Concentration of parking or transit on one side of a
venue will focus internal movement towards that side, resulting in unbalanced traffic
demands. Architectural statements, aided by directional graphics, should be used to
visually define and clarify what processing functions are taking place. Ticketing should
be separated from admissions, and the flow between them sequential, uni-directional,
and without crossing conflicts.
Pressure points
Pressure points are locations where a change in pathway processing capacity, normal
directions of movement, or a confluence of traffic streams, results in conflicts or
accident exposure. Examples include directional changes where there are
inadequately guarded openings to lower levels, at stair approaches, and landings at
the discharge or outlet ends of escalators. Crowd pressures at such locations have
resulted in people being pushed over guardrails, downstairs, or in structural failure of
guardrails.
Time
The rationale for time-based crowd management strategies is the control of pedestrian
demand rates so that traffic flow does not exceed the capacity of any element of the
venue. The objective of temporal strategies is to keep pedestrian densities below
critical levels. Restaurant reservations and the arrival time ticketing method used for
museum exhibits are familiar examples of time-based crowd management.
Metering
It may be necessary to meter or throttle the arrival rate demand at facilities with
limited processing capacity. Examples could include stairs, narrow corridors,
escalators, ticket gates, pressure points, or other locations where excessive arrivals will
cause hazardous overcrowding. Metering must be carefully applied because it will
cause waiting lines and crowding on the approaches to the metered facility. The
approach area should be large enough to accommodate expected demands and to
establish formal queue lines. Communication is a critical aspect of metering control.
Personnel involved in the metering operation should be in constant communication
with each other and alert to any interruptions in flow.
Conclusions
The crowd incident model and its derivative guidelines show that many crowd disasters
could have been avoided by simple advance planning and management techniques.
Reliable real-time communication between those responsible for crowd management,
and authoritative communication with the crowd, are also critical elements in defusing
a potentially lethal crowd incident. These strategies are also the least costly means of
preventing crowd disasters.
Crowd behaviour, dynamics and movement patterns that can threaten security.
Remember it is important to understand the behaviour of crowds at the event you are
working at, crowds will behave differently based upon the event, i.e., a football crowd
will behave differently to a crowd at car racing, boxing, rock concert or the opera.
Some activity may cause inconvenience whilst others can threaten the security of the
venue, activities that can threaten security include:
40
NSW Liquor Act 2007 and Liquor Regulation 2008
SA Liquor Licensing Act 1997 and Liquor Licensing (General) Regulations 1997
VIC Liquor Control Reform Act 1998 and Liquor Control Reform Regulations 2009
WA Liquor Control Act 1988 and Liquor Control Regulations 1989
NT Liquor Act and Liquor Regulations
TAS Liquor Licensing Act 1990 and Liquor Licensing Regulations 2003
ACT Liquor Act 2010 and Liquor Regulations 2010
NZ The Sale of Liquor Act, 1989, Sale of Liquor Amendment Act 1999 and Sale of Liquor Regulations 1990
Definition of liquor
The definition of liquor is:
• (1) “Liquor” is a spiritous or fermented fluid of an intoxicating nature
intended for human consumption.
• (2) “Liquor” also includes any other substance intended for human
consumption in which the level of ethyl alcohol (ethanol) is more than 5 ml/L
(0.5%) at 20ºC.
• (3) “Liquor” also includes any other substance containing ethyl alcohol
(ethanol) which substance is prescribed under a regulation as liquor.
• (4) However, “liquor” does not include a fluid that would otherwise be liquor,
if it is used merely as a preservative or medium in which fruit is offered for
sale to the public in sealed containers and with the contents visible.
Methylated spirits are not liquor for two reasons:
• it is not intended for human consumption.
• it is methyl alcohol, not ethyl alcohol.
Intoxication commences when the first drink of alcohol enters the body. It can affect a
person’s behaviour within minutes of the first drink. Drinking heavily over a short
period of time usually results in a “hangover” – headache, nausea, shaking and
sometimes vomiting. A hangover is due partly to poisoning by alcohol and other
components of the drink, and partly to the body’s reaction to withdrawal from alcohol.
There are dozens of home remedies, but there is currently no known effective cure.
Effects of alcohol
Most people consume alcohol in a responsible manner which does not jeopardise their
health. However, activities such as binge drinking, drink driving or drinking whilst
operating machinery can be disastrous. Short-term effects of unhealthy drinking
patterns include headaches, nausea, sleeping difficulties and depression. Longer-term
Speech
• Incoherent or muddled speech
• Loss of train of thought
• Rambling or unintelligible conversation
• Slurring words
Balance
• Bumping into or knocking over furniture or people
• Falling down or cannot stand.
• Difficulty walking straight.
• Staggering or stumbling
• Swaying uncontrollably
• Unsteady on feet.
Coordination
• Difficulty counting or paying money and fumbling change.
• Difficulty opening or closing doors.
• Dropping drinks
• Inability to find mouth with a glass.
• Spilling drinks
Liver
Liver
Lungs
Sweat glands
41
Source National Health and Medical Research Council
Regularly patrolling vulnerable areas, asking people if they are ok? Will go a long way
to preventing harassment or sexual assaults.
Physical
• looking pale
• perspiring excessively
• breathing difficulties
• fainting
• muscular spasms
• obvious intense pain
• extreme fatigue
• complaints of sleep problems or falling asleep in unexpected circumstances.
• continual episodes of illness, colds, flu, etc.
Behavioural
• avoidance of tasks
• withdrawing socially or verbally
• poor self-care and personal hygiene
• being excessively demanding of others
• increases in impulsive behaviour.
• talk of suicide.
• violent acts towards self and/or others
Summary
A crowd controller who is exposed to a person demonstrating signs of distress, mental
illness can easily confuse them for undue intoxication that’s why we always say we
believe the person is showing signs of undue intoxication, not that they are intoxicated.
When a person demonstrates a breach of house rules, the crowd controller must
investigate and where the person is identified as unduly intoxicated or a minor
removed from the premises, or offered access to
1. Taxi / uber
2. A friend to take them home.
3. Safe area to assist in sobering up
Venue layout
Familiarise yourself with the layout (floor plan) of the premises, confirm entry and exit
points and locations of facilities and emergency equipment. The liquor licence should
also mark any areas the licence is responsible for such as car parks, footpath areas etc.
Crowd Control
Station
Crowd Control Station should be equipped with first aid kit, battery chargers, fire
extinguishers, telephones,
42
NSW Liquor Act 2007 and Liquor Regulation 2008
SA Liquor Licensing Act 1997 and Liquor Licensing (General) Regulations 1997
VIC Liquor Control Reform Act 1998 and Liquor Control Reform Regulations 2009
WA Liquor Control Act 1988 and Liquor Control Regulations 1989
QLD Liquor Act 1992 Liquor Regulation 2002
NT Liquor Act and Liquor Regulations
TAS Liquor Licensing Act 1990 and Liquor Licensing Regulations 2003
ACT Liquor Act 2010 and Liquor Regulations 2010
NZ The Sale of Liquor Act, 1989, Sale of Liquor Amendment Act 1999 and Sale of Liquor Regulations 1990
House policy
Harm minimisation is the concept of minimising the harm to the community and its
members, arising from the use of alcohol. A mandatory requirement for licensed
premises is the development of harm minimisation documents including a House
Policy, which sets out the terms and conditions for the use of the premises. The House
Policy should establish clear standards to be applied with regard to such things as
intoxication, juveniles, responsible service of alcohol and respecting your neighbours.
A good House Policy is a powerful tool for service staff to assist in the successful
prevention and management of intoxication and anti-social behaviour. The House
Policy should provide guidance and assistance to Security Officers, so that those
stationed at the entrance to the licensed premises:
• have sufficient light, so that they can easily view / verify acceptable evidence
presented for proof of age.
• are aware of the House Policy.
• have access to support, if required.
• are aware of location of CCTV systems; and
are aware of the liquor licence conditions applicable to these premises.
Dress standards
The House Policy can set the venue’s dress standards; these requirements should be
clearly visible for all patrons to see before they enter the premises. For example, if the
venue has long queues, signs displaying dress standards or other conditions of entry
should be prominently displayed where customers can see them early in the queue.
This will assist in preventing arguments at the door with customers who have waited
for 30 minutes only to have access denied. Another strategy is to regularly walk up and
down the side of the queue, advising customers of dress standards etc. Monitoring the
behaviour of customers in a queue also provides possible indicators of undue
intoxication etc. Dress standards will vary between venues - if you are employed at
multiple venues, ensure you are aware of and enforce the correct dress standards.
Dress standards could require that appropriate footwear is worn between certain
hours or be of a certain standard and could restrict such items as sporting clothing (the
venue may prescribe that no football Guernsey’s or jumpers are allowed). Most venues
prohibit motorcycle club colours or other gang patches etc. and many clubs will not
Evidence of age
Security Officers are to monitor the age of customers trying to enter a licensed premise
to verify that they are over 18 years of age. Only the following forms of identification
are accepted as proof of age to allow entry into the premises:
a current Australian driver's licence or permit.
a current Australian or foreign passport.
other current identity documents approved by the Liquor Licensing Division
such as:
(a) The Victorian Key-pass
(b) An overseas driver’s license that must contain the person’s photograph,
date of birth and be written in the English language. If this license is not in
English, it must be accompanied by a current document (an international
driver’s license) that converts the document into English.
When checking ID for fraudulent, fake or defaced cards you should:
• examine ID in well-lit areas (covered by CCTV43 if possible) where alterations will
be more obvious (have an initial checkpoint at the front door)
• ask patrons to remove ID from wallets and purses for inspection.
• hold the ID in your own hands and take your time examining it.
• feel around the photo, birth date and edges of the card, especially with cards
enclosed in plastic (wrinkles, bumps and air bubbles could mean the ID has been
tampered with)
• compare the photo with the patron presenting the ID (pay particular attention
to distinguishing facial features - do they match?)
43
if later approached by liquor licensing after they have caught an underage customer in the licensed premises, (The
customer may have now thrown away their false ID and claim you did not check them as they entered). You will have
CCTV footage showing you checking the ID and customer.
Underage drinking
The requirement for drinking alcohol on licensed premises is that the person must be
over 18 years of age. Any person under the age of 18 years is classed as a minor. A
minor is permitted in some jurisdictions to consume alcohol in private places under
the responsible supervisor of an adult. However, nightclubs, bars and other licensed
premises which employ Security Officers are not classed as private places.
44
Security Officers should check house policy, assignment instructions or licence conditions to verify local requirements
for numbers of security staff on duty at any particular venue.
Image: Unduly intoxicated person allowed to continue drink can be a danger to self and others
Dry areas can assist intoxicated persons have coffee or soft drinks where no alcohol is
served, ensuring the person who is unduly intoxicated has a place to stay whilst
awaiting a lift or letting their friends finish having a good time.
Summary
When commencing duty on licensed premises, you must complete the crowd
controller's register and select the required ID badge to wear. Then read the standard
operating procedures and work instructions applicable to the licensed venue. When
work instructions or standard operating procedures require clarification, ensure these
are clarified with the relevant person.
Responsibility of licensed premises for an intoxicated patron’s alcohol-related harm:
the thin line between personal responsibility and a social host’s intervention.
45
Extract from Crowd Control at Venues and Events, a practical guide to occupational health and safety second edition.
1. Identify and list the hazards that have the potential to cause an injury.
This involves using information and input from all resources including employees,
previous incident records, publications (e.g., this Manual), industry experts and, most
importantly, your own eyes and ears (look at what’s going on in your own workplace
and listen to what people are saying). In ‘WHS speak’, this is called ‘identifying hazards’.
Work together with employees and ask them what they believe could cause an injury.
This should produce a large list of hazards. Don’t dismiss any ideas.
Introduction
There are many distinct roles conducted by Security Officers in the Australian security
industry, some of which require additional training and licences and/or endorsements.
These include:
• Bodyguard, (Close Protection Operative) and
• Cash in Transit
• Monitoring / Control Room Operators
• Dog handlers
A bodyguard (or close personal protection operative) is responsible for planning and
conducting the safe escort of a client (or clients), either alone or within a team. This
type of Security Officer requires additional licensing as a bodyguard. Cash in Transit
officers pick up cash or valuables and deliver these from one location to another, either
covertly or uniformed, using either soft skin or armoured vehicles. They may be armed,
depending on risk assessments conducted. They are Security Officers who also require
additional licensing (either cash in transit licence or armed guard licence). There are
everyday functions of Security Officers / crowd controllers when a Security Officer
escorts the client who is carrying the cash and/or valuables. Examples of this could be:
• Crowd controller escorting the venue manager to the night safe deposit box.
• Security Officer in shopping centre escorting tenants to bank or night safe.
• Mobile patrol officer escorting managers of fast-food outlets to night safe.
• Security Officer on duty in hospitals escorting pharmacy staff carrying drugs.
• Security officer on duty in hospital escort staff to vehicles at end of shifts.
Valuables could include:
• Cash / Art works
• Bullion
• Firearms
• Pharmaceuticals
• Alcohol and/or cigarettes
• Jewellery or Precious stones
The professional security officer must also have a “Plan B” Contingency plan, in case of
the following events occurring:
• Changes in traffic
• Loss of communication
• Identifying a threat and changing from primary to secondary routes
Communications equipment.
The battery levels must be checked to ensure they are sufficient to complete the
assignment, or spare batteries sourced. Channels must be allocated so that all staff are
operating on the same frequency. Communications checks must be undertaken with
control to ensure communications are operational.
Don’t rely upon one communication method / device, have spare batteries, radios
and/or mobile phones. During the planning stage blackspots should be identified and
alternate communications arranged.
Mobile phones have an advantage over two-way radios in that they can communicate
over long distances (worldwide), can transmit and/or receive text or images and can
download speciality apps (such as risk assessment templates)
Communications processes
Clients do not usually attend toolbox meetings, so it is a good idea to brief clients of
the task and communications processes in place, especially what action is required in
relation to identified threats along the route.
Personal presentation
The SOP’s will describe the requirements for uniforms and presentation, most escort
of clients and / or valuables will be in uniform when the tasks are ancillary to your
normal security duties. Examples include:
• Security officers in bars / clubs escorting staff to their vehicles at knock off time,
or escorting nurses to their vehicles at shift changes.
• Security officers escorting staff and or valuables to the bank’s night safe or other
points of despatch.
Assess risks.
Risk assessments must be completed, and primary and secondary routes planned for
even the shortest assignments, if a route is blocked you need an alternate route and
it’s too late to make route changes without proper planning. Don’t create risks? It is
often said that loose lips sink ships, and this is true for the security industry, telling
your friends and / or family of the tasks you complete, and details of assignments can
increase the risk to you! Who will they tell, so maintain client confidentiality at all
times? Many robberies have been undertaken on clients by associates of the client’s
friends, the client’s ex-wife / partner, ex business partner, staff (current and past) are
all aware of the client’s business practices and may communicate these to others.
Remember the primary goal is to protect the client not the consignment, the risk is
there because of the consignment’s presence,
Example, telling a friend about a $10,000 cash escort for a client and naming the client
or premises is a risk, as the friend quite innocently may tell someone else and even
exaggerate the amount to $100,000 NOW you are a risk.
The client is escorted to their destination in accordance with SOP’s the destination
could be a Bank, Australia Post, Jewellery Store or an office, the destinations are
endless.
Unless arrangements have been made in advance (usually only for large transactions)
you will be required to join the queue like all other customers. You should allow the
client to join the queue and you should step to one side and maintain surveillance from
a safe position that provides the best opportunity to maintain surveillance of your
client. During the assignment the security operative must maintain regular radio check
calls to advise control room that all is ok.
Maintain observation.
Throughout the assignment the security operative must maintain constant surveillance
of their surroundings to identify and assess potential security risks.
There are two types of risks, “friendly” and “unfriendly” a friendly risk is when a
personal friend of the client attempts to initiate conversation or creates a bad joke
(i.e., this is a stick up) this can occur (and has) when acquaintances of the client know
the client is involved in carrying valuables and thinks it’s funny! (it’s not) OR when a
friend or customer (innocently) approaches the client to initiate conversation.
In the above instances the security operative must intervene (politely) and ensure the
client focuses on the consignment and not communication with others.
When escorting staff members to vehicles, always approach the vehicle from the rear
(if possible) this allows the security operative to observe the rear seats to ensure no
one is hidden there prior to opening doors.
Many if not all hospitals and shopping centres maintain staff parking areas which are
under video surveillance and allows the security operatives the opportunity to
maintain patrols of these areas regularly during patrols.
Escorting persons
The procedures for escorting persons (without a consignment) are similar to those of
escorting with a consignment. The major difference is the end. Most escorts are
escorting people to a destination such as a staff member to their car, once the staff
member is at their vehicle they will depart and not return with you.
Other situations where staff escorts may be required are takeaway restaurants that
employ a lot of young people, at closing the company may hire security to stand guard
whilst the premises are locked up, escort the manager to the bank night safe, and
remain outside premises with staff members until their ride (parents or other) arrive
to pick them up.
Nightclubs or adult venues that employ strippers etc may also require security to
escort staff to the car park to ensure they are safely off the premises; some customers
may mis-interpret good customer service (which girls provide to get tips) as an
indication the girls like the customers.
Finalise and review escort procedures and maintain equipment and documentation.
Upon completion of the assignment, you must check and clean all security equipment
used and ensure faulty equipment is tagged and reported so that repairs or
replacement can be initiated.
Complete all documentation in accordance with SOP’s, these would be based upon the
original notes taken at the time. Debriefs are an excellent opportunity for security
operatives to provide feedback on the assignment and review the escort procedures
in SOP’s and improve future practices.
The dynamic risk assessment flow chart (below) demonstrates the relationships
between developing risks assessments and safe work procedures, dynamic risk
assessments, and debriefing after each assignment so that feedback can be provided
to assist in reviewing and improving existing procedures.
Nevertheless, it is essential that an effective risk assessment is carried out at any scene
of operations. However, in the circumstances of emergency incidents, experience has
shown that it is impractical to expect the security officer, in addition to the incident
size-up and deployment of the supervisor, to complete some kind of checklist or form.
After action has been initiated on the basis of a ‘Dynamic Risk Assessment’, it is
important that this is reviewed and confirmed as quickly as practicable, and further
reviewed and confirmed at regular intervals.
For the purposes of this dynamic risk assessment process, the lead security officer will
transmit informative situation reports via designated communication channels.
Although the dynamic management of risk is continuous throughout the incident, the
focus of operational activity will change as the incident evolves. It is, therefore, useful
to consider the process during three separate stages of an incident. These are.
Hazards must be identified and the risks to the supervisor, the public and the
environment considered. The benefits of proceeding with a task must be weighed
carefully against the risks. It is important to think before you act rather than act before
you think.
In order to identify hazards, the Lead security officer will initially need to consider:
The Security Officer is required to develop and perfect their personal awareness and
intuition and learn to trust their instincts. Any of the above situations could be a
diversionary tactic planned by criminals, or they could just create opportunities for a
spur of the moment crime. Risk assessments should have anticipated most
circumstances and you should have assignment instructions to follow in the event
these occur. Where a Security Officer feels that something is just not right, they
should notify base and request further instructions. This may be that a field support
officer is required to attend and conduct a clearance, or you are directed to return
to base.
• Maintaining control
• Welfare, and
• Incident Debrief.
Maintaining Control
The process of task and hazard identification, assessment of risk, planning,
organisation, control, monitoring and review of the preventative and protective
measures must continue until the last appliance leaves the incident ground. There are
usually fewer reasons for accepting risks at this stage, because there are fewer benefits
to be gained from the tasks being carried out. The CPO’s and Lead CPO should
therefore have no hesitation in halting work in order to maintain safety.
As the urgency of the situation diminishes, the CPO’s may wish to nominate a lead CPO
to gather information for the post incident review. Whenever possible, this CPO should
debrief crews before they leave the incident, whilst events are still fresh in their minds.
Details of all ‘near misses’ i.e., occurrences that could have caused injury but did not
in this instance, must be recorded because experience has shown that there are many
near misses for every accident that causes harm. If, therefore, we fail to eradicate the
causes of a near miss, we will probably fail to prevent injury or damage in the future.
Welfare
The welfare of CPO’s is an important consideration. It must be given particular
attention by the lead CPO, at arduous incidents or incidents that require a rapid
turnover of personnel. Welfare includes provision of rest and feeding which should,
where possible, be outside the immediate incident area and always away from any risk
of direct or indirect contamination.
It is equally important to highlight all equipment, systems or procedures which did not
work satisfactorily, or which made the working environment unsafe.
Any significant information gained, or lessons learned must be fed back to lead CPO in
order to enable any necessary review, re-evaluation, refinement and modification of
the risk assessment and its management to ensure the CPO’s compliance with all
legislation.
Definitions
Australian Standards46 - Australian Standards are documents that provide voluntary
guidance on standards for control rooms, and monitoring centres, including
construction, alarm response times, qualifications of staff etc. These will be referenced
to throughout this course. The Standards provide the basic requirements for a range
of security equipment.
CCTV control equipment - Equipment for receiving, processing and initiating the onward
transmission of data.
CCTV system - A system consisting of camera equipment, monitoring and associated equipment
for transmission and controlling purposes, which might be necessary for the surveillance of a
defined secure area.
Check Call - Routine communication made to verify the location and status of a security officer
on assignment.
46 AS/NZS 62676.1.2:2020
AS/NZS 62676.1.2:2020 Video surveillance systems for use in security applications, Part 1.2: System requirements —
Performance requirements for video transmission (IEC 62676-1-2:2013, MOD)
Control Room Operator - A security officer who has had their security licence endorsed
(where required) to operate a control room. Control Room Operators may also be
required to respond to security risk incidents.
Legislation 47
What is legislation?
Legislation is the act of making or enacting laws. When people talk about ‘The
legislation’, they mean a law or a body of laws. ‘The private security legislation’ in a
state or territory is all the laws enacted specifically to control and administer the
private security industry.
Regulation of the private security industry is a state responsibility. Each state and
territory have its own legislation and regulations (listed below.)
Monitoring Centre48 - A monitoring centre is a secure and isolated facility that monitors
alarm information transmitted from external locations.
NOTE: In contrast to a control room, a monitoring centre is typically remote from the
security risk and monitoring centre operators do not personally attend the site of alarm
activations or other monitored events.
Operations Room - A communication centre that monitors mobile patrols and/or static
security officers and that may provide a key holding service.
Poll - A signal using the path that carries an alarm transmission sent from a known
source with a returned acknowledgement sent from the intended recipient.
Security systems (may include) - alarms and signals, access control systems, alarm
actioning sequence, biometric devices, break and enter reporting, business
equipment, communications equipment, computers and networked systems,
electronic screening equipment, key register, motion sensors, patrol, static guard and
foot patrols, personal and asset tracking signals, personal duress and hold up alarms,
shutters, slow open or close alarms, static alarms, system alarms, time management
alarms, traffic display, video cameras and monitors.
Standard operating procedure (SOP) - Documentation detailing the methodology to
perform specific duties by the security officer.
• Control Rooms
• Monitoring Centres
There will be variations in State / Territory legislation, and the course facilitator will
provide details of specific legislation affecting you in the jurisdiction you are attending
the course.
Control Room
A Control room can consist of a basic alarm panel and CCTV or be more elaborate and
equivalent to a monitoring centre.
Review SOP’s
The organisations SOP’s must be reviewed, and any changes or updates noted short
term changes still be recorded in the short-term message book (paper based or
electronic) e.g., John Smiths Menswear are working late tonight, or Permanent
changes would be recorded as John Smiths Menswear has closed permanently.
Legislation
CRO’s must identify and comply with all legislative requirements that apply, these
could include completing attendance registers (signing on and/or off duty) compliance
with licensing requirements such as holding a current security licence and
endorsements.
Seek clarification.
Where messages or SOPs are not clear, the CRO should clarify these with the
appropriate person in accordance with SOP’s, this could be a supervisor located
elsewhere or with the security officer being relieved if there is a formal handover.
• Customer complaints
• Support and back-up being sent to the wrong place.
• Reports completed incorrectly.
Effective communication requires all staff collect and organise information in a way
that allows the organisation to make sense of the details. To allow this to happen it is
important that all employees transmit their messages using the communication
channels contained in the SOP’s.
It is important that all staff are aware of the correct communication channels so that
customer complaints can be dealt with quickly and efficiently and that alarm responses
are despatched in accordance with client’s instructions.
• Minor complaints, these are easily resolved by the operator, for example the
client is complaining their alarm or CCTV system is not working. You can talk
them through corrective action and record the details in accordance with your
SOP’s or arrange an alarm response or technician to attend to fix the problem,
• Details of complaint, including complainants name, date and time, and method
of complaint e.g., phone, fax, email etc.
• Details of options offered to the client.
• Results of any negotiations or client’s instructions.
Recording sufficient details of the complaint will ensure the complaint is handled
efficiently and the client is not contacted unnecessarily to clarify the complaint further,
which could result in the client getting angry etc.
Support and back-up being sent to the wrong place.
Poor communication between monitoring centre operators and police and/or security
patrol officers can result in back-up staff being despatched to the wrong address, this
can have serious consequences (resulting in injury or even death) for patrol officers /
security officers who require immediate prompt back up.
Correct use of the phonetic alphabet and SOP’s (which may list alarm codes etc.) will
assist monitoring control staff and security officers and/or mobile patrol officers
provide effective communication.
There are many monitoring centres and control rooms in Australia that are not graded,
however they still may meet all the criteria to comply with the Australian Standards.
Industry associations, (Such as ASIAL50) are authorised to perform the grading of
monitoring centres, against a checklist contained in the Australian Standards. As of 2nd
November 2011, there were 34 security monitoring centres certified by ASIAL in
Australia.
Work Health and Safety
When an operator identifies a risk, it must be reported. It is not good enough to
identify a problem if you do not report it so that appropriate action can be actioned.
In most cases, an operator makes his or her report by filling in an incident report. This
report should in turn, be registered in a workplace safety register; this is usually held
and maintained by the organisations designated safety officer. For hazards on a smaller
scale, you should do what you can to control the situation. For example, if your chair
has a broken wheel, and a spare chair is available, you could swap chairs, complete an
• Lighting
• Sound levels
• Rest periods
• Design of workstation
• Safety of operators
Lighting
Natural light is not available to monitoring centre operators for security reasons, to
avoid complaints / problems from poor lighting such as:
• difficulty seeing document or screen (too much light or glare, or too little light
or shadows),
• eyestrain,
• eye irritation,
• blurred vision,
• dry burning eyes, and
• headaches.
A good visual environment needs to be in place in the monitoring centre, this includes:
• having sufficient light, coming from the right direction and not cause
obscuring shadows,
• providing good (but not excessive) contrast between the task and the
background,
• limiting glare and extreme contrasts, and
• providing the right type of light.
Computer monitors can also act as mirrors and reflect light from other sources, some
tips to improve the quality of light in the monitoring centre, are:
Sound Levels
Excessive noise may increase staff stress and fatigue. General noise may be reduced
by floor carpeting and by locating office areas away from sources of external noise.
The recommended decibel range for office work is 55 to 65 dBA.
Rest Periods
Grade A monitoring centres are required to have the following amenities51 contained
within the monitoring control room shell.
• 1 toilet
• 1 hand basin
• A meals preparation area including sink.
This allows the operator to take breaks without leaving the security of the monitoring
centre. Grade C monitoring centre amenities must be contained within the building
operating the monitoring centre, and Grade C monitoring centre amenities are
contained within the building housing the monitoring centre. The operators should
take rest breaks according to SOP’s.
• All controls and task materials are placed within a comfortable reach of both
hands so that there is no unnecessary twisting of any part of the body.
• The keyboard is placed in a position that allows the forearms to be close to
the horizontal and the wrists to be straight. That is, with the hand in line with
the forearm. If this causes the elbows to be held far out from the side of the
body, then re-check the work surface height. Some people prefer to have
their wrists supported on a wrist desk or the desk. Be careful not to have the
wrist extended or bent in an up position.
• Keep the mouse as close as possible to the keyboard, elbow bent and close
to the body.
Safety of operators
To ensure the safety of operators, the Australian Standard’s 52 require “A Grade”
certified monitoring centres to have an airlock (no greater than 6m2) so that access to
the monitoring centre is controlled, e.g., door A, must be closed before door B or C is
opened.
Viewing Room
To enhance the safety of monitoring centre operators, access to the monitoring centre
should be restricted to authorised persons only; access should be controlled via an
airlock system, which can only be opened by the monitoring centre operators. Clients
or potential clients wishing to inspect the monitoring centre can do so via the viewing
room, the viewing room should be separated from the monitoring centre by attack
resistant glass.
Access to the monitoring centre should be restricted to authorised persons only; this
includes operators, management of the monitoring centre, and service personnel.
52 AS 2201.2:2022 Intruder alarm systems monitoring centres – 2.2.7 Entrance Construction grade A
Companion systems
The control room or monitoring centre should be forwarded to the companion control
room / monitoring centre and checked for operations.
Searching for stored files
If files are stored in a consistent format, they are easily retrievable, for example video
files may be required if a crime is reported, the police or a lawyer may request files
from an incident in the past. If the format files are stored in is consistent then searching
is made easier. To search for all video files simply enter CCTV in the search field, for all
files in 2018 enter CCTV.2018 etc.
Dialler
Dialler monitoring is the most common format used around the world and is achieved
by connecting your security system to an existing phone line at your premise. Alarm
signals are transmitted via the public switched telephone network (PSTN) or NBN VOIP
Line. Local call fees will therefore apply, unless the monitoring centres uses a 1300
Number as a call-in number (most common).
The Monitoring Centre will not be aware of any line faults or any deliberate attempts
to cut the telephone line until a routine weekly test signal is not received. So, all an
intruder needs to do is cut the phone lines prior to breaking in and no alarm system
Operating procedures
• When an alarm event is triggered, the alarm system picks up the phone line and
waits for a dial tone. (if someone is on a call it will disconnect them)
• When a dial tone is received, the alarm dials the number of the monitoring
centre. The monitoring centre then receives the call, and waits for one second,
after which it sends the handshake. The handshake is made of 100 mSec of
1400Hz pure-tone, then 100 mSec of silence, and then 100 mSec of 2300Hz pure-
tone.
• 250 mSec after that, the alarm sends the Contact ID message. This message
comprises 16 DTMF digits. Each digit is 50 mSec long, and they are separated
with 50 mSec silence. The last digit is a check-sum digit that enables the
monitoring centre to verify the integrity of the received message.
• After a successful reception of a message, the monitoring centre sends a kissoff
signal. This is 800 mSec of 1400Hz pure tone. If the alarm system does not
receive the kissoff tone in time, it retransmits the message.
Handshake
DTMF
Kissoff
Communication Protocol
The most common protocol is Contact ID, this transmits a message from the alarm
panel to the monitoring centre in a series of digits / codes. The codes are then
interpreted by the monitoring centre software and displayed on the screen for
operator action.
GPRS
GPRS monitoring is achieved by connecting a GPRS unit to your security system. Once
connected the GPRS unit will send all your alarm signals via the mobile phone network
with the additional feature of sending small data packets at specified intervals allowing
the Security Monitoring Centre to identify any loss in communication.
The GPRS unit will check your connection at varied times from 90 seconds (for high
security applications) to 60 minutes (for lower security applications). This is known as
polling. The GPRS devices can provide two independent paths from your premise to
the Security Monitoring Centre as they can use both the Optus GPRS and Telstra GPRS
networks. GPRS units also allow a landline to be connected as a backup communication
path if both GPRS connections are lost providing you with even greater protection.
IP Alarm Monitoring
Internet Protocol (IP) Alarm Monitoring is the leading technology, turning a traditional
alarm reporting system into a fully integrated monitoring solution. IP Monitoring gives
true peace of mind. Utilising multiple technologies to communicate alarm information
to the monitoring centre, the system will automatically revert to a second path should
the primary communication path become unavailable. Constant polling to the alarm
monitoring centre ensures that the system remains operational. The benefits of IP
monitoring are:
Network protocols split the communication process into discrete tasks across each OSI
model layer. To enable network communication, one or more protocols operate at
every layer. For example, the Internet Protocol (IP) routes data by managing the
information such as data packets’ source address and destination to enable network-
to-network communications. Therefore, it’s referred to as a network layer protocol.
Physical: Physical protection for networks includes actions like storing an on-site
server in a rack closet and securing it with a lock or requiring a code to access a secure
point of entry. Because servers store valuable information such as consumer data or
trade secrets, they need tight, physical security controls like biometric scanners or
Network Vulnerabilities
There are plenty of network vulnerabilities a hacker can exploit to access valuable
information, but the four most common types are:
• Malware: Malicious software includes worms, Trojans, and viruses that can
infiltrate a device or host server. People unknowingly buy or download malware
that will exploit a network vulnerability.
• Outdated or Bugged Software: Systems: running an application without
adequate patching can potentially infect an entire network if someone finds and
manipulates the flaw.
• Social Engineering Attack: Network intruders can use various methods to fool
workers into unintentionally giving up confidential data like passwords or login
information.
• Misconfigured Firewalls or Operating Systems: Default settings are easy to
guess and are well known.
Microwave
Dual tech
AI - With the abilities afforded by AI, robots can navigate any designated area
autonomously to keep an eye out for suspicious behaviour or alert first responders to
those who may need aid.
Biometric security - Biometric security is the use of biometric data for identification,
access control, and authentication. Hardware components such as cameras or
fingerprint readers collect biometric data, which is scanned and algorithmically
compared to information held in a database.
Robotics - Security robots automatically move along the patrol route, detect strangers,
and transmit messages to the guard. The operator behind the monitor screen is already
in the past, the robots themselves detect the intrusion. A security guard will only be
required to physically counteract a potential intruder. (AI is incorporated into Robotics)
Smart technologies - The term SMART is an acronym for Self-Monitoring Analysis and
Reporting. This implies that smart home technology incorporates all devices and
appliances connected to the Internet and can be remotely regulated, monitored, and
accessed to provide a spectrum of services that directly responds to the needs of the
people. Simply put, smart home technology allows you to seamlessly control and
monitor your connected home devices from smartphones, smart home applications,
and any other connected digital device.
Video integration - Digital messages from any IP device, such as an IP door reader, are.
passed through the network to the C2P database server. This information is then
converted to a video stream that is integrated with the camera video. The timestamps
provide an automated correlation between the video and door information. Since it is
totally integrated, all the information can be reviewed on a single display.
Security professionals must monitor and review new technology to identify and secure
system vulnerabilities. Sources of information can be sourced from associations:
The manager would call in to the control room via telephone and the CRO would
communicate via radio to the security officer the SOP’s. Typical duties of the security
officer would include observing the manager place the days taking in the night safe bag
and escorting the manager to a night safe or ensuring the takings were secured in the
local safe or vault. During the above assignment the CRO may monitor activities
remotely via the CCTV / VSS from the control room. Breaches of security may be
indicated on the CCTV / VSS monitors as a video image, or via an alarm triggered by
the staff in the bottle shop.
Upon receipt of an alarm the CRO would assess the alarm verify it if possible, with CCTV
/ VSS systems assess the nature of the risk and arrange support from either another
security officer and / or police as required by the identified risk.
The above procedure would be repeated for each officer until all officers are accounted
for. The process must be recorded in accordance with SOP’s either paper based or
electronically. Many systems now incorporate electronic monitoring of staff and
include officer down systems, these will trigger an alarm on the screen which requires
attention of the CRO to resolve it.
My 10/20 is
Managers Office
Over
Sierra Golf Wun
What’s your 10/20
Monitoring centre owners design the operator inactivity system and document the
procedures in the SOP’s. Variations will exist between different monitoring centres,
but as a minimum, the following procedures usually apply.
55 AS 2201.2:2022 Intruder alarm systems monitoring centres – 4.3.2 Remote monitored alarm systems & 5.2 Operator
numbers.
Some monitoring centres may use the computer software operating in conjunction
with movement detectors within the monitoring centre, so as long as you are moving
around or activating the keyboard, activity is occurring.
This is for the safety of the operator, and integrity of the monitoring centre, as if one
operator was working alone and became sick, was attacked etc., the operator inactivity
alarm would be forwarded to another monitoring centre who would arrange for an
appropriate response in accordance with SOP’s. The integrity of the monitoring centre
is maintained as the operator cannot fall asleep and let alarm activations remain
unanswered.
Grade 1 Monitoring centres are required to have at least two (2) staff on duty at all
times, whilst grades 2 and 3 are only required to have one (1) person on duty at all
times.
56Screen shots of log on screens courtesy of NASKAM Security, variations to these screen shots will vary at other monitoring
centres depending on monitoring software in use.
Video Verification
When a passive infrared or other sensor is triggered in the clients premises a
designated number of video frames from before and after the event are sent to the
monitoring centre, usually via an IP (Internet Protocol) network, for interpretation by
the operator. The information is recorded to an event file, which can be retrieved at a
later date as evidence if required.
A second video solution can be incorporated into to a standard panel, which sends the
monitoring centre an alarm. When a signal is received, the operator accesses the on-
site digital video recorder (DVR) through an IP link to determine the cause of the
activation. For this type of system, the camera input to the DVR reflects the alarm
panel's zones and partitioning, which allows personnel to look for an alarm source in
multiple areas.
Category A
Category B
Category C
Any alarm other than those listed above e.g., portable wireless devices, including
pendants.
Category D
• Multiple Sector Alarms, where there is no ready access to the premises.
• Single Sector Alarms – Non-High-Risk Premises
• Flashing Blue Lights
• Unmonitored Alarms
• Vehicle Alarms
• Fire or Smoke Sensor alarms
• Medical Alarms
• Power Failure/Low Battery
Backing up Data
Operators process vast amounts of confidential data, and information. All information
processed by operators of security systems is classified. This means that it is not to be
discussed with any unauthorised people - even members of your own company who
do not need to know.
It is important to save and store all data in accordance with SOP’s. Following SOPs in
relation to data storage will ensure that data is available to restore in case of a system
failure. Data is usually automatically backed-up in accordance with SOP’s, either hourly
or at a fixed time, each day.
For employees and contractors of the monitoring centre, this is easily covered by
ensuring all staff and contractors are aware that all inbound and outbound telephone
calls are recorded at induction and ensuring that employees and contractors consent
in writing to being recorded. Contracts with clients, should clearly detail in the terms
and conditions of acceptance that they consent to all communications being recorded.
57 AS 2201.2:2022 Intruder alarm systems monitoring centres 4.3.3 Voice recording equipment (Grade 1)
58 Industry Guideline– Participant Monitoring of Voice Communications First published as ACIF G516:1998, ISBN: 1 74000
264 4, ©Copyright Australian Communications Industry Forum PO Box 444, Milsons Point NSW 1565
59 Telecommunications (Interception) Act 1979 (Cth)
60
AS 2201.2:2022 Intruder alarm systems monitoring centres – 4.4.3 Mean time to detect.
Processing alarms
Monitoring Centre Operators (MCOs) are required to commence the alarm action
within the parameters contained in the Australian Standards,
Monitoring Response Time is the time between the activation of the alarm and
notifying the patrol response organisation of the response details.
Patrol Response Time is the time elapsed between the response/patrol organisation’s
control room being advised of the alarm details and the arrival on site of a patrol
officer. Total Response Time is the time elapsed between activation of an alarm and
arrival on site.
61
AS 2201.2:2022 Intruder alarm systems monitoring centres –4.4.5 Alarm processing time and AS/NZS 62676.1.2:2020]
Video surveillance systems for use in security applications, Part 1.2: System requirements Performance requirements for
video transmission (IEC 62676-1-2:2013, MOD)
Data integrity
There shall be no loss of data as a result of a period of non-availability of indicating and
recording equipment.
Records 62
Monitoring centres shall record and retain the following time-and date-stamped
records:
• Events received.
• Actions taken by operators.
• Actions taken by indicating and recording equipment.
• These records shall be retained in a manner that maintains data integrity.
Retention of records
The retention period for records shall be in accordance with the following table
Retrieval of records
Individual records shall be retrievable within the parameters given in
63AS/NZS 62676.1.2:2020 Video surveillance systems for use in security applications, Part 1.2: System requirements —
Performance requirements for video transmission (IEC 62676-1-2:2013, MOD)
• Cameras
• Cables (or wireless connectivity)
• Recorders, and multiplexers
• Monitoring unit
The operator could control the system by using a mouse and keyboard to operate
controls built into the system software and being visible on the screen, or an external
CCTV system controller.
64
The SOP’s will specify the format to be used, what is important is that files are labelled and stored in as per SOP’s
This test system helps with common problems like video compression, changeable
viewing resolution and variable transmission bit rate/bandwidth, which can all
result in the unpredictable quality of your digital CCTV images. It is designed to be
simple to use. (The above patterns should be printed in A3 size)
65Reproduced with permission of the copyright owners - The Centre for Applied Science and Technology Woodcock Hill
Sandridge St Albans Hertfordshire AL4 9HQ.
Test Pattern
Other test targets included in the system are A3 sized versions of the legacy Rotakin™
test pattern which allows system testers to use the updated guidance and methods to
establish system integrity.
Once the alarm panel is armed, the security officer should then enter the alarmed
premises, whilst maintaining radio contact with the control room operator, and walk
through the premises activating the alarm. The control room operator should be able
to radio through to the security officer, the results of the alarm activations as they are
recorded in the control room.
The results of all tests conducted should be recorded in the control room logs.
The action could be to despatch a security officer and back up if available and deemed
necessary, the control room operator must assess the alarm and if it is verified, for
example.
• Door alarm is activated, and the door is in a zone covered by CCTV, if the
operator has a visual of an offender or offender(s) on site, the control room
operator may dispatch a security officer and / or police.
• If the door is in a zone not protected by CCTV coverage, the control room
operator may dispatch a security officer to verify if an offender is on site, and
after verification contact the police.
Security officers employed on site must be monitored to ensure their health and safety
at work, this includes maintaining regular communications via radio or other means
(visual CCTV etc.) systematic checks should be conducted (In accordance with SOP’s)
to ensure staff are ok, for example a radio check call each half hour.
Example “Control to Sierra Oscar One” radio check, and Sierra Oscar One to Control
10/4 66, where irregular or non-responses from field staff are identified, these should
be promptly responded to in accordance with organisational procedures.
Responding to incidents
The range of incidents that a control room operator may be required to respond to is
endless, however these could include:
• Shoplifters
• Fire, flood or natural disaster
• Armed robbery
• Break and enter.
• Assaults
66 Where Sierra Oscar One is the security officers call sign and 10/4 is message understood.
During any response action by security officers, the control room operators must
maintain radio communications with the security officers, and visually by CCTV system,
if possible, to ensure the safety of all personal and customers. If the situation was a
serious response, fire, armed robbery, etc. communications with police would also be
maintained throughout the response.
If the incident is continuing at a shift change, the control room operators should seek
further instructions from supervisors or refer to SOPs for guidance, as if they are
required to provide statements to police or complete other reports, they may need to
stay back, alternatively the incoming control room operator must be briefed on the
status of the outstanding incident.
Upon completion of the situation, the control room operator would need to ensure all
reports and other documentation is completed. This could include incident reports,
logbooks, CCTV logs, ensuring that CCTV digital recordings are filed and archived for
retrieval later if required. The digital recordings from the DVR may be required as
evidence in court, later.
The monitors are what the security officer will view in either real time (watching the
screens), or whilst reviewing footage later. There may be one or more monitors and
each monitor may have the capacity to view several cameras at once. The control
room operator has the options of changing the screen layout (see examples of split
screens below of single image 4 images and 8 images) and controlling the PTZ
characteristics of a PTZ enabled camera to follow or zoom in on a target, using the
computer keyboard, or special keyboard with toggle devices.
Operators should not use cameras to infringe an individual’s rights of privacy. Where
privacy zones are programmed into the system in order to ensure that the interior of
any private properties within the range of the system is not surveyed by the cameras,
operators should not remove or bypass these privacy zones.
When exporting images of an intruder with individuals and/or their property by which
those individuals could be recognized in the field of view. Identifying images should be
masked, for example, if a car with a clearly visible number plate is parked in an area
where an intruder is recorded, it should be possible when making a copy of such an
image to have the number plate of such a vehicle masked to protect the identity of the
vehicle’s owner.
Operators should be made aware that use of the cameras for purposes other than
those for which they are intended will bring the system into disrepute.
At any time, the operators may be required by the manager or auditor to justify their
decision to view or record any individual, group of individuals or property.
67Commonwealth Legislation
Telecommunications Act 1997
Telecommunications (Consumer Protection and Service Standards) Act 1999
Telecommunications (Interception) Act 1979
Privacy Act 1988
State and Territory Legislation
Invasion of Privacy Act 1971 (Qld)
Listening Devices Act 1992 (ACT)
Listening Devices Act 1984 (NSW)
Listening Devices Act 1991 (Tas)
Listening and Surveillance Devices Act 1972 (SA)
Surveillance Devices Act 2000 (NT)
Surveillance Devices Act 1999 (Vic)
Surveillance Devices Act 1998 (WA)
A Security guard was sacked from Darwin International Airport for using the CCTV
system to perve on women, the pervert was among a group of other security officers
who allegedly gathered around the screens in the security room - but instead of looking
out for suspected terrorists or criminal activity inside the airport they checked out
women's breasts69
The allegedly inappropriate use of CCTV camera’s (to perve on schoolgirls) by Police
Officers in the Darwin Police Station, resulted in the cameras filming Cavanagh Street,
Darwin being turned off whilst an investigation was underway70, during the period the
cameras were turned off a person fire-bombed an insurance office in Cavanagh Street
Darwin, resulting in 19 people being injured, police were not monitoring the camera’s
and an opportunity to prevent crime passed by.
Breaching privacy issues therefore can be seen to possibly initiate legal action against
the operatives, the owners of the system and reduce the safety of those the systems
were designed to protect.
Deterrence v Evidence
It is important for operators of CCTV monitoring systems to realise that whilst most
people believe that installing highly visible CCTV cameras and appropriate signage
warning of the installation of the cameras will act as deterrence to crime, they are
more likely to provide valuable evidence of the commission of a crime.
John Howard (Former Australian Prime Minister) was in London in July 2005 and
witnessed firsthand the UK’s response to the second of two bombings on the London
transport system. He was so impressed with the authority’s response he declared ‘I
The presence of CCTV cameras does not always prevent incidents from occurring.
Indeed, in expressing his doubts that more surveillance cameras would help protect
Australia from terrorism, Chief Minister of the ACT, Jon Stanhope, said in relation to
the July 2005 London bombings that ‘Surveillance cameras, as seen in London, help
after the terrorists have struck but the surveillance cameras in London did not stop the
bombings’72.
The above statements should act as a timely reminder to all CCTV operators (and
owners of CCTV systems) about the evidentiary value of the records of recordings and
chain of custody requirements.
Owners of CCTV systems should ensure that where possible equipment is installed and
operated, in accordance with the Australian Standards 73.
Operators of CCTV systems should ensure that always they follow the employer’s SOP’s
in relation to the operation of CCTV systems.
For CCTV vision to be useful to investigators and accepted in a court of law, its integrity
needs to be ensured. Evidence is required to show that the CCTV system has been
maintained, and the data appropriately managed per the following guidelines.
Maintenance
All systems need to be maintained in accordance with SOP’s (these are usually based
on the manufacturer’s instructions,) the checks should include:
• Checking the systems time and date recording against a known accurate clock
(e.g., Telstra’s talking clock by calling 1900 931 239)
71 Transcript of the Prime Minister the Hon John Howard MP doorstop interview, Claridge Hotel, London, 23 July 2005,
http://www.pm.gov.au/news/interviews/Interview1477.html (9 September 2005).
72R. Peake and B. Doherty, ‘Touch of hysteria in reaction: Stanhope’, Canberra Times, 25 July 2005, p. 1.
73AS/NZS 62676.1.2:2020 Video surveillance systems for use in security applications, Part 1.2: System requirements —
Performance requirements for video transmission (IEC 62676-1-2:2013, MOD)
Data Management
• Recorded vision will only be useful in evidence if its integrity can be assured.
• Therefore, recorded vision must not be manipulated, changed or enhanced
in any way.
• The number of employees who have access to the CCTV equipment and the
vision data should be limited to those essential for the system’s maintenance.
• Provide training on the operation of the system to key staff who will be
providing police with the recorded vision. Where possible, it is preferable the
staff members selected for this role are likely to be on site or readily
contactable in the event of an incident so that video footage can be quickly
provided to police.
• It is important to have the CCTV system documented and a user manual on
hand that describes how the system operates. These can be kept with the
maintenance log.
• The person who provides the vision data to police will become a witness.
They should have a good understanding of the CCTV system and can give
evidence in court on the steps they took to make a copy of the data for the
police.
Physical security measures involve the user of multiple layers of protection that could
include a range of measures, including:
Fences, gates, locks, security officers, CCTV / VSS, access control systems, perimeter
intrusion detection systems. The higher the level of security required; the more layers
are deployed.
• Card reader
• Key fob
• Biometrics
• Keypad
Operational principles
The user simply either swipes their access card, or key fob or enters a pin code, more
sophisticated systems may use biometrics such as fingerprints or iris scanning
techniques.
Entering the data sends a message to the electric strike to open the door, gate etc.
Privacy Legislation74
The organisations SOPs on use of body cameras will be based upon the jurisdiction’s
privacy legislation and client’s requirements. Camera footage is personal information
if it is capable of recording information about an individual whose identity is apparent
or can reasonably be ascertained from the gathered surveillance footage, mad the
privacy principles will apply.
74
Privacy Act 1988
NT Information Act 2002
NSW Privacy and Personal Information Protection Act 1998
QLD Information Privacy Act 2009 and Invasion of Privacy Act 1971
SA Listening and Surveillance Devices Act 1972 and Telecommunications (Interception) Act 1988
TAS Personal Information Protection Act 2004, Listening Devices Act 1991 and
Telecommunications (Interception) Tasmania Act 1999
VIC In fo rma tion Priva c y Ac t 200 0, S u r v e i l la n c e De vic e s Act 199 9 and Telecommunications (Interception)
(State Provisions) Act 1988
WA Surveillance Devices Act 1998, Telecommunications (Interception) Western Australia Act 1996
Extract from Australian Government – Protecting Information Rights www.privacy.gov.au
75
National Privacy Principles 4
1. Ease of Use
Are the cameras easy to use, on/off switches easily accessible, and how are they
downloaded, (individually or automatically via a docking station)
3. Placement
Body cameras can be mounted on a number of locations including the chest, shoulders,
and on helmets or eyewear. Different positions come with different challenges. For
example, a chest-mounted camera’s view could be blocked by your arms if you’re in
shooting stance. Similarly, a shoulder-mounted camera wouldn’t be able to follow your
line of site if you were peering around a corner with your back against a wall.
Regardless of placement, it should be understood that cameras won’t always capture
100% of the action.
4. Recording capabilities
Is the camera going to be in continual use, if so, is the recording time suitable for the
shifts where it will be worn, (example if 8-hour shifts are worked and cameras only
record 4 hours then consideration of procedures for downloading stored data must be
considered? Certain models of body cameras can record a buffer of anywhere from 30
seconds to 20 minutes of video. This is particularly useful if an officer hits the record
button after an incident has already started.
7. Encryption is Essential.
From initial capture to final storage, strict encryption systems should be in place to
protect sensitive data.
9. Support
Does your security organisation have IT support, or will training of each officer be
required? Managing hardware, software and storage, among other things, is no small
task. If you don’t have internal support resources, you should determine what level of
support the bodycam company can offer you.
More sophisticated systems include docking stations with built automatic download
facilities, and
Facial recognition
Scans faces and compares against stored data and alerts the user of a match on the
built-in body camera screen.
Live tracking
Control rooms can live track devices with built in 4G technology, as well as obtaining
historical data from proprietary software systems.
Panic alarm
By pressing the panic button on the body camera, the user can send an alarm activation
to the control room who can then respond with appropriate prompt assistance. With
GPS tracking the location of the security officer is already known and facilitates a
prompt response by other members of the security team or police.
Summary
The use of body cameras can assist in the collection of evidence to assist in prosecuting
criminal activity, and as security officers are aware of the camera’s presence, they
encourage professional behaviour.
12 Port recharging station with automatic 8 Port recharging station with automatic back
backup and storage on built in hard drive up and storage on built in hard drive