日本財団 図書館


6.3
Security measures to be considered
 
6.3.1
The following on-scene security measures shall be considered:
 
.1 restricted areas;
 
.2 security barriers ;
 
.3 security lighting;
 
.4 security alarms and communication systems;
 
.5 access control and identification; and
 
.6 Security personnel
 
6.3.2
Restricted areas
 
The establishment of restricted areas helps control and channel access, improves security and increases efficiency by providing degrees of security compatible with the port facility's operational requirements. Restricted areas may be further subdivided depending on the degree of restriction or control required to prevent unauthorized access.
 
6.3.3
Security barriers
 
6.3.3.1
The boundary between restricted and uncontrolled areas should be clearly defined. This can be achieved by security barriers which prevent access except at authorized points. Where permanent security barriers are appropriate, security fences have proven effective.
 
6.3.3.2
The purpose of security barriers is to:
 
.1 delineate the area to be protected;
 
.2 create a physical and psychological deterrent to persons attempting unauthorized entry;
 
.3 delay intrusion, enabling operating personnel and security guards to detect, and, if necessary, apprehend intruders; and
 
.4 provide designated and readily identifiable places for entry of personnel and vehicles into areas where access is restricted.
 
6.3.3.3
Openings in security barriers should be kept to a minimum and secured when not in use.
 
6.3.3.4
Security fences and other barriers should be located and constructed so as to prevent the introduction of dangerous substances or devices, and should be of sufficient height and durability to deter unauthorized passage.
 
6.3.3.5
Security fence lines should be kept clear of all obstructions.
 
6.3.3.6
The effectiveness of a security fence against penetration depends to a large extent on the construction employed. The total height of the security fencing should be not less than 2.50 metres.
 
6.3.3.7
Natural barriers such as water, ravines, etc., can sometimes be effectively utilized as part of the control boundary. However, they may require supporting safeguards (i.e. fencing, security patrols, surveillance, anti-intrusion devices, lighting) especially during high threat periods.
 
6.3.3.8
The roofs of buildings may also provide a possible route for unauthorized access to the restricted area. Safeguards should be taken to prevent such access by these routes.
 
6.3.3.9
Restricted areas partly surrounded by water may require security barriers with sufficient illumination during night hours and, if on navigable waters, frequent and unscheduled patrols by boat or ashore on foot, or both. Illumination of these areas must be of a type and so placed that it does not interfere with safe navigation.
 
6.3.4
Security lighting
 
6.3.4.1
Security lighting with uninterrupted power supply is an important element in a security programme.
 
6.3.4.2
The primary system should consist of a series of lights arranged to illuminate a specific area continuously during the hours of darkness or restricted visibility. In some circumstances, it may be preferable to use such lighting systems only in response to an alarm.
 
6.3.4.3
Floodlights may be used to supplement the primary system and may be either portable or fixed. Floodlights when used should have sufficient flexibility to permit examination of the barrier under observation and adjacent unlighted areas.
 
6.3.4.4
Multiple circuits may be used to advantage in the security lighting system. Circuits should be so arranged that the failure of any one lamp will not affect a series of others.
 
6.3.4.5
Controls and switches for security lighting should be protected at all times.
 
6.3.4.6
Where fences and other barriers are to be illuminated, it is important to ensure that the intensity of illumination is adequate for the purpose.
 
6.3.5
Security alarms and communication systems
 
6.3.5.1
Intrusion detection systems and alarm devices may be appropriate as a complement to guards and patrols during periods of increased threat.
 
6.3.5.2
Immediate response capability by guards to an alarm from an intrusion detection system or device is important if its use is to be effective. Alarms may be local, i.e. at the site of the intrusion, provided at a central location or station, or a combination of both.
 
6.3.5.3
A wide variety of intrusion detection systems and devices are available for possible use. These systems include those which are sensitive to:
 
.1 breaking of an electrical circuit;
 
.2 interruption of a light beam;
 
.3 sound;
 
.4 vibration;
 
.5 motion; or
 
.6 capacitance change in an electrical field.
 
6.3.5.4
In view of the wide range of technical matters which must be taken into account in deciding upon the device or system best suited for application in each environment and for each task, it is prudent to obtain the advice of a qualified expert before a decision is made on the system or device to be used.
 
6.3.5.5
A means of transmitting discreet or covert signals by radio, direct-line facilities or other similarly reliable means should be provided at each access point for use by the control and monitoring personnel to contact police, security control, or an emergency operations centre in the event assistance is required. An additional public or overt communications system would be useful to obtain information or advice on routine matters.
 
[to be further developed]
 
6.4
Guidelines for the Inspection, control and monitoring of port facility [and fixed and floating platform] security plans, including drills and exercises.
 
[to be further developed]
 
6.5
Guidelines for the training of port facility [and fixed and floating platform] security officer
 
[to be further developed]
 
6.6
Guidelines for the training of port facility [and fixed and floating platform] security personnel
 
6.6.1
Port facility security personnel who are assigned either to specific fixed locations or to patrols for the purpose of preventing unauthorized access to areas should receive a general briefing on the training subjects recommended for the port facility security officer. Initial and subsequent training should emphasize techniques for
 
.1 entry control;
 
.2 patrols, observation and communications;
 
.3 inspection, identification and reporting;
 
.4 person, building and vehicle searches;
 
.5 apprehension of suspects;
 
.6 self- defence;
 
.7 recognizing dangerous substances and devices;
 
.8 human relations; and
 
.9 first aid
 
[to be further developed]
 
6.7
Guidelines for the familiarization of all port facility personnel in matter of maritime security.
 
[to be further developed]







日本財団図書館は、日本財団が運営しています。

  • 日本財団 THE NIPPON FOUNDATION