National Academies Press: OpenBook

Responding to Threats: A Field Personnel Manual (2004)

Chapter: 7 How and What to Report

« Previous: 6 What to Look For
Page 10
Suggested Citation:"7 How and What to Report." National Academies of Sciences, Engineering, and Medicine. 2004. Responding to Threats: A Field Personnel Manual. Washington, DC: The National Academies Press. doi: 10.17226/13831.
×
Page 10
Page 11
Suggested Citation:"7 How and What to Report." National Academies of Sciences, Engineering, and Medicine. 2004. Responding to Threats: A Field Personnel Manual. Washington, DC: The National Academies Press. doi: 10.17226/13831.
×
Page 11

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

10 7 How and What to Report Your security manager will specify what and how to report. Some types of reports may be submitted in writing, others may be phoned in, and still others should be phoned directly to 911. When making a verbal report, follow the format specified by your security manager. Be careful to provide all the requested information or a “did not observe” comment for information that you do not have. Regardless of whether or not a verbal/telephone report has been given, the details of every observation should be written down as soon as possible, while they are fresh in your mind. A mnemonic such as “ALT-DD” may be useful in remembering what to look for. ALT-DD ⇒ Activity ⇒ Location ⇒ Time ⇒ Date ⇒ Description Descriptions are for people and any vehicles associated with them. Reports will always have at least one description of a person including: • Sex • Race • Age • Height • Build • Weight • Complexion • Distinguishing features Vehicle descriptions include the following: • License number and state • Color • Year • Make/model • Type • Number of doors • Distinguishing features Be aware that license plates are among the easiest things to change, obscure, or steal. Thus, it is important for vehicle descriptions to include features that are more difficult to change.

11 A disposable camera is always useful to quickly record a person or vehicle, but it should not be used in lieu of a verbal description. Timeliness, completeness, and accu- racy are critical factors in reporting. Report only what you are certain you saw. Add any guesses or impressions at the bottom of the report as a comment. Clarity can be enhanced with the following: • Nouns, not pronouns (i.e., avoid “he,” “she,” “they,” “it”) • Provide details • Write short sentences • Include only observations, not assumptions For example, it is better to write “Person 1 constantly looked toward the front gate. At 3PM, Person 1 left and the empty place was taken by Person 2, who also constantly looked toward the front gate,” rather than “Person 1 constantly watched the front gate. At 3PM, Person 2 replaced him, and did the same thing.” The assumptions, guesses, and intuitive notes, such as the gate was being “watched” and that one person “replaced” another, should be noted in the comment section rather than as an observation description. Other types of observations you should report consistent with your security man- ager’s policy include the following: • Loss/theft of ID’s, uniforms, vehicles, official decals, license plates • Loss of keys, keycards, or key codes • Any increase in false alarms on the security system • Indicators of domestic violence • Indicators of a pending workplace violence incident • All observations of road rage REMEMBER Observe and report. Do not allow the following excuses to stop your report: • “It is probably nothing.” • “This is none of my business.” • “This is stupid!” • “The security manager already believes I am an imbecile.” Will you make some ridiculous, useless reports? Absolutely!! Everyone practicing these skills makes ridiculous reports. After you have done it for a while, you will still make mistakes, but they will be fewer and much more sophisticated. All reports will be put into a database. The database will, over time, eliminate reports that are not useful. It will identify areas where your security manager may want you to direct more attention. Your reports will create a vigilant atmosphere that will cause poten- tial terrorists/criminals to pick another target. Your reports on incidents potentially involv- ing more common crimes may well save the lives of coworkers as well as your own. Never ridicule a report made by someone else!

Next: 8 When to Intervene »
Responding to Threats: A Field Personnel Manual Get This Book
×
 Responding to Threats: A Field Personnel Manual
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB’s National Cooperative Highway Research Program (NCHRP) Report 525: Surface Transportation Security, Volume 1: Responding to Threats: A Field Personnel Manual includes a draft template that contains basic security awareness training in a workbook format that can be redesigned as a pamphlet, glove-box brochure, or other user-specific document. This NCHRP manual emphasizes noticing and reporting behavior that may be part of the planning stages of an event, and explains how an increased level of attention on the part of all employees can deter criminal and terrorist plans prior to implementation.

NCHRP Report 525: Surface Transportation Security is a series in which relevant information is assembled into single, concise volumes—each pertaining to a specific security problem and closely related issues. The volumes focus on the concerns that transportation agencies are addressing when developing programs in response to the terrorist attacks of September 11, 2001, and the anthrax attacks that followed. Future volumes of the report will be issued as they are completed.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!