Skip to main content

Posts

Showing posts from 2022

Traffic Control Equipments

Traffic control equipment is used for smooth regulation of traffic involving human intervention and handling of traffic. These include signal flags, marshalling wands, signal batons, signal hand signs, helmets, traffic vests, traffic cones and barriers etc. as described below :- Signal flags : These flags are generally in three colours such as white, red & orange. Marshalling wand or a signal baton : A baton reflects light or lights up with in built battery backup system. Signal hand sign : A hand-held sign that has "shop" on one side and "slow" or "go" on the other side. Traffic helmet or a hard hat : Traffic police helmet is in white colour with red stripes, protecting the head from hazards. Traffic vests : Especially made of brightly colored which are designed to reflect light falling on these, also have built-in LED lights system when required. Traffic cones : Made of different colours and sizes are used for guidance and barriers etc. Traffic ...

Introduction of Traffic Plan & Equipment's

Traffic management inside any premises is an important activity, which improves movement of vehicles and reduces chances of accidents and mishaps. Definition of Traffic Traffic means a number of vehicles moving on public roads and commercial transportation of goods or passengers on roads and highways. Traffic Guards Traffic Guards are commonly employed to control traffic where accidents and traffic congestions for various reasons take place. They are also deputed to moderate the flow of traffic in an area to avoid traffic jams. Traffic Guards generally guide drivers to adhere to the traffic guidelines; but don't authorize the law. Mostly the traffic guards are detailed from security personnel and other employees of the organization. Parking and Gate Guards These traffic guards regulate motorists to leave and enter a parking complex. Their role involves helping pedestrians to cross or stop in front of the parking complex's entrance. They also act as additional pair of eyes to ke...

PARKING HANDLING & MANAGEMENT

Parking Handling : includes efficient handling of  vehicular traffic within a defined parking area facility  as per laid down procedures carried out by the  deputed security staff to ensure safety and security of  vehieles, personnel and stores/ equipment being moved  IN/ OUT.   Parking Management : includes a variety of methods  and policy framework formulated by the management  for efficient use of existing parking areas / facilities. The basic purpose of parking management is to provide  parking space and services to people who visit a  premises in a vehicle and need space and guidance for  parking their vehicles. Hazards and Defects : the following hazards and  defects can affect parking operations :   Defaced signages and markings.   Defective access control barrier/ equipment.   Electrical failure leading to darkness & chaos.   Spillage of lubricants, liquids, grease etc.   Damaged/ unfinish...

PARKING AREA & CONDITIONS

A parking area is a location that is designated for parking, which may be categorized as per its  surface Conditions as under : Paved : when parking space has hard surface all over.   Unpaved : parking space with an unfinished surface.   Covered : when parking space is under a cover like stilt parking etc.   Un-covered : open area parking in defined space.   Manually managed : when parking is controlled and operated fully by security guard and staff.   Auto-managed : when large parking areas/ lots are technologically controlled & operated through software & various hardware and by displaying auto-signages & ticketing but supervised by  security guards & staff for security & smooth  functioning.  Irregular Situations : as given below, will require  careful handling as part of duties and responsibilities  of parking and gate Guards:   Traffic congestion. Violation of parking instructions. Wrongly parked v...

Parking Control

Parking management is an important, activity in any premises. It becomes necessary to manage parking in premises. It premises where heavy movement of vehicles from IN/OUT gates is a routine. Security is an important aspect of this activity to ensure safety and protection of life and property. It is, therefore, a job normally assigned to security agencies for its day to day management to include  security and control of vehicles and material moving IN/OUT of the designated area. It therefore, makes it an important aspect that security personnel are well-trained in parking operations. CATEGORY OF VEHICLES IN PARKING SPACE   In general, vehicles falling under two wheelers, three  wheelers and four wheelers categories are given as  under :   Two wheelers such as mopeds, scooters &  motorcycles.   Three wheelers such as Auto-rickshaws, goods vehicles (half body), etc.   Four wheelers such as cars, Vans, Jeeps, SUVs, taxis, etc. Generally these vehi...

Routine & Detailed Search

Routine Search This is carried out as a routine activity at any as per the policy and SOP issued by the manage activity at any premises by the management : Look at the vehicle for anything strange from outside. Look inside for any suspicious, harmful of dangerous item kept/ hidden. Request the occupant to open the bonnet and the boot of the vehicle and search for any dangerous item kept / hidden away. Check spare wheel, whenever collapsed, search for any item reserved inside. Look under the dash board. Look under the seats. Search for any stole thing attached to the vehicle parts under by utilizing underside reflect.   Detailed Search It is carried out if an alarm has been sounded regarding some criminal activity or there is a strong suspicion about unauthorized items hidden in the vehicles. The occupant may be politely asked to move out of the vehicle : Request that the driver to open the bonnet and fundamentally examine engine and its part to search for any suspicious item kept /...

Sensitivity of Vehicle

Search Vehicle Search is generally not appreciated by the occupants, most of whom do not understand that screening and search of persons, vehicles and goods is primarily carried out to ensure their personal security and protection of premises and the properties therein. Searches are sensitive issues and cause inconvenience, if not done professionally. It should therefore, be ensured that they are carried out thoroughly but with minimum inconvenience to the persons and their vehicles under search. Maximum use of available technology & tools must be made to increase the efficacy of the search and to impress upon the person that it is for his security only.  During Search, Always be POLITE, but FIRM ! Vehicle Search at Entry Gate : The vehicles are stopped at an indicated/marked spot is at a distance before the IN Gate. The driver is asked to verify if the duty is correct and that the vehicle is required to go in. The vehicle is then searched as per the procedure.  Vehicle S...

VEHICLE SEARCH

As in the case of personal search, vehicle search is also a major deterrent for any wrongful activity by an individual trying to enter or exit any premises with wrongful intentions. Hence, it is important that it is completed properly and successfully. Vehicle search gains importance to make the persons or property safe from any miscreants having nefarious plans to attack a sensitive area. Vehicle search is thus a very important activity of physical security requiring special attention and care. Vehicle Search will have different purpose of checking a vehicle at IN Gate and at OUT Gate respectively. Reason of Vehicle Search at IN / OUT Door / Gate :- Deny access to prohibited / restricted articles. Deny section of any restricted synthetic compounds / drugs inside the reason. Prevent any pilferage of material goods. Prevent loss of classified / important document. Deter attempt of any crime by utilizing vehicle like kidnapping / rape etc. Check for any reported item as per report. Carry...

RULES OF SEARCH

Request authorization to look before initiation. Males will be looked by a male just and females by a female searcher only. Be firm however polite during search and don't engage in any contention/argument. Search start to finish in arrangement. Scan in a different space for security. When required,  it is very important to have an independent witness. Request that the individual be looked in advance assuming he is in control of any organization's property. Carryout search appropriately/properly and with complete focus. Make section to record assuming that anything is found and kept. Door Out Pass should be signed by an approved individual as it were. Blog ,   Facebook ,   Instagram ,   YouTube ,   Google Business ,   WhatsApp

POSSIBLE HIDING PLACES ON A PERSON

MALE BODY SEARCH Inside hat, cap, hair. Inside shoulder pads. Inside the collar. All pockets on shirt / pant. Behind neck tie. Under the shirt / jacket   Inside coat lining. Arm pits. Taped to arms.  Full back for anything taped. Inside waist band/belt. Cuff and under wrist watch. Inside the wallet. Around under a crotch. Ankles inside socks. Shoes and soles. In books / papers / stationary box. Key & pad. FEMALE BODY SEARCH Hair knot, inside hair. Shoulder pad. Inside the collar. Lapels. All pockets in shirt / pants. Inside lining of coat. Arm pits.  Bosom. Full back side and bra straps. Inside belt / waistband. Hips. Inside thigh, if anything taped. Behind the knees and thighs. Trouser hem, socks. Shoes and heels. Paper magazine and books / stationary. Hand bag. Blog ,   Facebook ,   Instagram ,   YouTube ,   Google Business ,   WhatsApp

Caution During Search / Frisking

Search / frisking of a person is a sensitive task and can cause embarrassing situations, if not carried out professionally. Following precautions will help in making the task easier and acceptable to the environment :- Search of Females Search  of females and their belonging must be carried out by a female searcher only. Search should be done in a separate enclosure. If trained female searched is not available then one of the female employees may be detailed for the task. Search of Headgear / Turban The headgear / turbans will be examined merely by pressing and not by removing it. If a searcher has reason to suspect that an article may be concealed in the headgear then that person should be directed to rigorous search room. Search of Security Staff / Employees They will be searched only if management especially orders to do so If ordered the security personnel will be searched at the time of leaving after duty hours. They will also be subject to search while entering the factory. ...

PERSONAL SEARCH & FRISKING

Personal search is a sensitive issue. It needs preparing/training of security personnel and their awareness about personal issues and sensitivities. A 'personal search' is a local authority search conducted by a private company, unlike an 'official search', which is done by the chamber. A senior security staff should be point by point to oversee such activity/operation. Certain sensitive / important establishments like government mints, strong rooms storing currency, bullion, jewelry, ammunition stores, currency printing press, pharmaceutical companies etc. have stringent policies for rigorous checking and searching of their employees. FRISKING OF PERSONS Methods of search / frisking following methods are techniques are carried out for checking / frisking :- Visual methods ask the person to display his belongings for observing and checking. Hand frisking is done by passing your hands over a person's body to search for hidden weapons, drugs or valuable etc. Using met...

SEARCH & SCREENING EQUIPMENT

Metal Detector : Metal detector /indicator is a portable device that responds to metal that may not be obviously visible. A metal detector is an electronic instrument which detects the presence of metal close by. Metal detectors / locators are useful for finding metal in corporations hidden within objects, or metal objects covered underground. These can be classified as Hand Held Metal Detectors (HHMD) and Door Frame Metal Detectors (DFMD) and are used to identify any metallic object like pistol / revolver, knife etc. hidden by a criminal on his individual or in his things.  These devices are principally utilized at passage of the premises of airport, hotels, malls, metro stations, security gates / offices of establishments etc. Door frame metal detector radiates sound and light when a individual carrying metallic object passes through it after which the individual is exposed to physical search and frisking. Screening Equipment / X-Ray Machines : At all airports, hotels, malls, m...

Screening and Search

The aim of screening and search is to prevent wrongful entry of persons and vehicles, inside the premises, deny prohibited/ restricted articles proposed to be carried inside. People screening is the act of searching people before allowing access to a protected zone, for example at airports, court houses, jails, or museums.  Individuals screening electronic items are utilized to identify hid weapons, explosives. Prohibited Items : These are commonly recorded things like weapons, firearms, ammunition, explosive, banned chemicals, inflammable material such as petrol, kerosene oil, gases etc. which are forbidden to be taken in a premises. Unauthorized / Restricted Items : These things are illegal by association's policies and instructions which may include mobile sets, cigarette, lighter, sharp edge tools, property and other material. It is imperative to ensure that the security guard has fair knowledge about the latest gadgets used in the electronic security system for inquiry, cont...

Situation Faced During Access Control

Access control operations at any premises may lead to difficult situations due to different reasons, requiring class and professionalism from security personnel in diffusing the situation. Some of these situations are specified below :- Lost, Expired and Defaced ID Cards : This situation is due to the carelessness on part of the staff, employee /representative  or a client. Anyway this can be resolved by the mediation of the ID card issuing authorities after verification at their end, when reported by a security guard through proper channel. Forged, Tampered and Unauthorized ID Cards : Thus is a serious security concern. These cards are made by questionable persons including duplication, copying of unique ID cards with intentions to carryout loathsome activities. At the point when defected the matter must be quickly brought to the notice of the superior and person may require than be given over to the police by them for further investigation and activity. Vehicular Traffic, Commun...

Road Blocker

Road blocker is designed to provide most extreme security for highly sensitive areas/ locations against unauthorized / forced entry of vehicles of all sizes and weights. A road blocker is a temporary installation set up to control or block traffic /square movement along a street. Blocker is designed to block / square and disable vehicles traveling at speed of 40 Km/hr and as heavy as 30 tons of weight. Vehicle road blockers are primary key component of our security plan, especially to prohibit forced and unapproved / unauthorized vehicle. Road blockers are especially designed to shield and keep break from unauthorized moving vehicles. Road Blockers furnish more higher levels of safety with worked in stopping / halting power, Road blockers are used comprehensively for premises, for example, banks, consulates, bullion stops, freight parks, ports and truck leaves. The Road Blocker can be interacted to any entrance control systems. Blog ,   Facebook ,   Instagram , ...

Security Bollards

A security bollard is mainly designed for high security vehicle entrance, expansive powerless areas or complexes and for an area that need to be closed for vehicular traffic at specific times. It is made of a heavy metal chamber worked from a distance by cylinder instrument game plan. When required these can be lowered and raised by command for operation by hydraulic means. A bollard is designed to take an effect of even a heavy truck crashing with it, therefore making it very suitable for high security areas requiring quick blocking of traffic when required. Bollards can be introduced as a single unit as well as in groups as shown in the picture. The principal elements of the bollards are to : Block the route of a gatecrasher during an attack / assault. Restrict the traffic temporarily. Prevent entry of heavy vehicles when required. Secure the routes in high security and helpless areas and complexes. Blog ,   Facebook ,   Instagram ,   YouTube , ...

Spikes Tyre Killer

These are long, thick, sharp-pointed pieces of metal or wood attached to metal sheet or wooden boards and spread over the width of the road or a path to fill in as an obstruction for an intruder. Spikes are collapsible, removable or fixed on the road generally 5-6 feet long along the section required to be guarded. These snags are basically designed to empty tires in a way useful to law authorization organizations when the security situation in undermined for various reasons. Fixed Spikes : The fixed type spikes are used at locations or installations where threat is recurring and are activated during the attack. Collapsible Spikes : Collapsible spikes are for temporary use and can be placed and removed from a location as and when required. Blog ,   Facebook ,   Instagram ,   YouTube ,   Google Business ,   WhatsApp

VEHICLE ACCESS CONTROL EQUIPMENT

Boom Barriers Spikes Tyre Killer Security Bollards Road Blocker Boom Barriers : It is also known as a boom gate. A boom barrier is a movable pole or a bar rotated to allow the boom to stop vehicular access through a controlled point. When operated the tip of a boom gate rises in a vertical arc to a near vertical position. Boom barrier is to control the flow of traffic / movement  and ensure security and hence, they have become epochal for any toll administration system. Boom gates are often paired either end to end or counterbalance suitably to block traffic / movement  in both direction. Boom gates are normally found at Level crossings, drawbridges, parking facilities, checkpoints to limited / restricted areas. They are additionally the typical strategy for controlling entry through tollgates. Its electronic control panel is designed to accept signals from different controls and safety accessories. Blog ,   Facebook ,   Instagram ,   YouTube ,...

Palm Vein Recognition System

Palm vein technology is the latest advanced and fastest biometric authentication system. Palm vein recognition is a biometric authentication method dependent on the unique patterns of veins in the palms of individual's hands. The palm vein technology sensor called as palm secure works by capturing a person's vein pattern image transmitting it with near-infrared beams. Palm vein recognition systems like many other biometric technologies, catch a picture of a target, procure and process picture information and compare it to a stored record for that individual. Every person has a unique pattern of palm veins. Each individual has a one of a kind example of palm veins. One of the greater advantages of palm vein structure is that it doesn't undergo any change during the life cycle of a person. A number of biometric based machines have been made indigenously using this palm secure technology which is either PC system dependent or PC system independent.   Blog ,   Facebook ,...

Voice Recognition

Voice acknowledgment is a technique developed to find the identify of "Who"  is talking rather than what they are expressing. Speaker acknowledgment is the identification proof of an individual from properties of voices. Voice recognition, also commonly alluded to a voiceprint, is the ID and verification arm of the vocal modalities. By estimating the sounds a user makes while talking, voice acknowledgment programming can measure the unique biological factors that, joined, make her voice. Recognizing the speaker can work on the undertaking of translating speech in systems that have been arranged on specific or specific voices or it can be used to authenticate or verify the identity of a speaker as component of a security system.  Voiceprints can be estimated passively as a user speaks naturally in conversation or effectively, on the off chance that she is made to talk a passphrase. Speaker recognition has a set of experiences going back approximately four decades and uses the ...

Hand Geometry

Hand Geometry is a biometric that identifies users by the state of their hands. Hand geometry readers measure a user's hand along many assessments and compare those assessments with assessments stored in a document. Hand geometry is very reliable when joined with various types of identification proof, such as ID cards or individual ID numbers. The systems are generally carried out for their ease of use, public acknowledgment and integration capabilities. They have the longest use history of all biometric modalities.  Hand geometry reading / scanning devices for the most part can be categorized as one of two classifications categories: mechanical or image-edge detection. The two techniques are utilized to measure specific qualities of an individual's hand for example length of fingers and thumb, widths, and depth. Blog ,   Facebook ,   Instagram ,   YouTube ,   Google Business ,   WhatsApp

Facial Recognition System

A facial recognition system is a technology capable of identifying or verifying a person from a digital /advanced image or a video frame from a video source. One of the best way to do this is by comparing selected facial features from the image and a facial information. Facial recognition system records facial features based on analyses of the relative position, size and shape of the eyes, cheekbones, nose and jaw.  It is commonly used in security arrangement of high security zones. It is also described as a Biometric Artificial Intelligence based application that can particularly identify a person by analyzing patterns based on the person's facial shape. Blog ,   Facebook ,   Instagram ,   YouTube ,   Google Business ,   WhatsApp

Finger Vein Recognition :

Finger Vein Recognition is a type of biometric confirmation that incorporates pattern-recognition techniques based on pictures of human finger vein patterns under the skin's surface. Finger vein technology is currently in used for a wide variety of applications, including attendance, credit card authentication, computer and system authentication end point security, automobile security etc. Finger vein ID is a biometric validation system that matches the vascular pattern in an person's finger to previously obtained information. Finger vein recognition is also called as vein matching or vascular technology. Finger vein recognition is a technique that specifies an individual using the vein pattern inside one’s fingers. Placing a hand or finger is less nosy contrasted with  other biometric technologies. Finger veins don't leave any trace during the authentication process and so cannot be duplicated. Blog ,   Facebook ,   Instagram ,   YouTube ,  ...

Fingerprint Technology

Every individual has a different set of fingerprints which don't match with fingerprints of some other individual in the world a fact that is scientifically proved. Even identical twins don't have a similar arrangement of fingerprints. The pictures below show biometric devices, such as finger scanner including a fingerprint reader. Common physical biometrics include fingerprints; hand or palm geometry; and retina, iris, or facial qualities. A biometric is the most secure and advantageous validation instrument. Biometrics can be integrated into any application that requires security, access control and identification or confirmation of individuals i.e. looks at the patterns found on a fingertip. There are a variety of ways to deal with fingerprint verification. Fingerprint systems translate illuminated pictures of fingerprints into advanced code for additional software such as enrollment (unique mark enrollment) and confirmation (validation or check of enlisted clients). Blog , ...