Thursday, 22 September 2016

The Firefighter’s Uniform:

Firefighters risk their lives daily to save our lives and properties. They face many hazards including the exposure to fire and therefore they need a protective uniform to help them perform their job. The uniform is composed of:
Firefighters wear a helmet to protect their heads from fire and from any falling things like debris. The helmet is made of Kevlar which is a very hard plastic. Helmets are equipped with a face shield. The color, number and wording on the helmet identify the rank, department and the fire company. A torch or a helmet light may be used by the firefighters in dark places, at night or to help them keep in contact with each others.
Jacket and trousers:
They are made up of NOMEX which is strong, light and easy to wear. The clothes are fire proof. They are called turnouts. The trousers are turned inside out and the boots are attached to it, in case of an emergency, the firefighter quickly jumps into the boots and pull the trousers up, these trousers have snaps and Velcro, they also have side pockets to put equipment, gloves and other things that the firefighter needs. These trousers have reflective stripes so that firefighters can be seen at night.
They are thick gloves made of fire resistant material that protect the hands of the firefighters from heat and from sharp objects like broken glass.
Firefighter’s boots are made of rubber material. These boots have a steal toe covering to protect the toes of the firefighters; the shank in the sole is very thick and made of steel to protect the firefighters if they step on sharp objects such as nails. The boots have rubber handles at the top in order to help the firefighter pull the boots on very quickly.
Self contained breathing apparatus:
It is a cylinder filled with air carried on the back of the firefighter and made of fire resistant material. This cylinder is attached to a tube that runs to a rubber face mask twitch allows the firefighter to breath fresh air in cases where there is hazardous materials in the environment such as toxic gases and smoke.

Thursday, 15 September 2016

Crowd Security

Controlling a crowd is one thing. Managing a crowd something entirely different.
We at PLN9 Security do not want to make a standardized product out of our activities. One size fits all does not work in our industry. Profiling the event, the audience and the venue itself always leads to a Security Management plan fit for the task. Our management plan will go far beyond the numbers of staff, but will lead to a dedicated structure, solid channels of communications, expert briefings as to security-visitor relationships and most important of all, always remembering we are there as hosts on behalf of the organizer, making people feel welcome and safe at your event on your behalf.

Having looked at the risk of the event, we will then look at establishing our managerial needs towards representing you as hosts and how crowd control can become integrated as the crucial spear-point of our activities, from the permanent vigilance throughout the event to decisive calm action when the crowd or individuals are at risk.

PLN9  Security staff are committed to the Safety and Security of the Event itself and of your guests, with a smile and comfort inspiring confidence.

Monday, 12 September 2016

Security at Monuments:

Security of a site or a monument is integral to its protection. The Security Agency is also assigned the responsibility of security of the centrally protected monuments from the risk of encroachments, unauthorized access, damage of the site and theft of parts. Many of these protected sites are symbols of our nation and are therefore vulnerable to attacks and damage by miscreants. These monuments have varying security needs. The ASI (Archaeological Survey of India) should make rules and issued several notifications to avoid any unauthorized construction in and around the monuments.

Besides threats from persons who had carried out the unauthorized construction, the ASI was also required to safeguard from risks arising from visitors to the monuments. These sites were also vulnerable to terrorist attacks and such other destructive activities. To fulfill this objective, the ASI (Archaeological Survey of India) provided security to the monuments through 

(i) The monument attendants, watch and ward staff; 
(ii) Government security agencies e.g.CISF; 
(iii) State police forces; and 
(iv) Private security guards appointed.

There should be regular monitoring of existing encroachment cases by the Ministry at the highest level. Encroachment by State Government agencies or other Government of India agencies should be sorted out in a time bound manner by raising the matter at higher levels.

Airport Security

Airport Security is a necessary nuisance travelers must accept if they wish to be able to fly around the world safely. The best any flier can hope for is to get through security as quickly and painlessly as possible. That means being prepared and avoiding mistakes that will slow you and everyone else down, and maybe even get you into trouble with the Transportation Security Administration.

Our 10 suggestions of what not to do at the security checkpoint will make a savvier flier, capable of breezing through airport security like a pro.

1. Don't bring more than 3.4 ounces of any liquid.
2. Don't leave liquids and gels deep in your carry-on.
3. Don't forget to have your boarding pass and ID in hand.
4. Don't wait to take off your belt, watch, jacket and shoes.
5. Don't remove items you don't need.
6. Don't choose the wrong security lane.
7. Don't overlook less busy checkpoints.
8. Don't give the security folks a hard time.
9. Don't joke about national security or bombs.
10. Don't forget about the Pre-Check program.

Saturday, 10 September 2016

Tie up Strategy of Physical Security Solutions:

PLN9 Security Services provide a distinct edge above the rest due to its Strategic Tie ups:
  • Converged Access Services: This framework allows client to access all services from a single smart card. Services like physical access, domain access, web application access, HRIS access, VPN access etc. All PKIs, Digital Certification gets stored on the card level. This framework increases efficiency in an organization from user enrollment to application access to log assessment to user de-provisioning. 
  • Command & Control Services: This framework allows customers to control all their existing or future planned physical security controls from various vendors into a single application. This system supports customer's ground staff by enforcing automated rules from various systems to fight terrorism, incidents by enforcing automated pre-defined workflows based on threat perception, regulatory requirements or business requirements. 
  • Video Analytics Services: This framework helps customize to optimize their current or planned IP-CCTV investments by building an intelligent video management system. This system helps customers to focus on incident in a real-time using artificial intelligence as enforced by video analytical engine.

Friday, 9 September 2016

Physical Security Measures

Physical security measures aim to either prevent a direct assault on premises or reduce the potential damage and injuries that can be inflicted should an incident occur.

For most organisations the recommended response will involve a sensible mix of general good housekeeping alongside appropriate investments in CCTV, intruder alarms and lighting that deter as well as detect – measures that will also protect against other criminal acts such as theft and vandalism and address general health and safety concerns.

In some locations these measures may already be in place to some degree. However, external and internal threats to organisations (and their staff) will constantly evolve and so all procedures and technology should be kept under constant review.

Before designing a physical security scheme, it is recommended that security practitioners read the "Guide to producing operational requirements" . An Operational Requirement (OR) is a statement of need based upon a thorough and systematic assessment of the problem to be solved and the hoped for solutions

Wednesday, 7 September 2016

Guidelines on Security zones and risk mitigation control

The Government physical security management guidelines—Security zones and risk mitigation control measures provide guidance on achieving a consistent approach to determining physical security controls in agency facilities.
These guidelines cover:
  • risk mitigation and assurance measures
  • security zones
  • individual physical security control elements including:
    • building construction
    • security alarm systems
    • access control systems
    • visitor control
    • guards and receptionists
    • locks and door hardware
    • Closed-circuit television (CCTV)
    • perimeter access control
    • security containers and cabinets
    • security rooms, strongrooms and vaults
    • mailrooms
    • technical surveillance countermeasures and audio security
  • physical security elements in administrative security.