CSS 246
CSS 246
1
COURSE
GUIDE
NOUN
NOUN
Mr. Igwe, D. O.
NOUN
NOUN
2
National Open University of Nigeria
Headquarters
14/16 Ahmadu Bello Way
Victoria Island
Lagos
Abuja Annex
245 Samuel Adesujo Ademulegun Street
Central Business District
Opposite Arewa Suites
Abuja
e-mail: [email protected]
URL: www.nou.edu.ng
ISBN: 978-058-949-X
Printed by …………………
For
National Open University of Nigeria
3
TABLE OF CONTENTS page
Introduction ………………………………………………….……….ii
Course Aims ………………………………………………..................ii
Course Objectives …………………………………………….………ii
Working Through This Course ……………………………….………iii
Course Materials ……………………………………………….…… iii
Study Units…………………………………………………………...iii
Assessment …………………………………………………….……..iv
Tutor Marked Assignments (TMA)………………………………......iv
Final Examination and Grading …………………………...................iv
Course Marking Scheme ……………………………………….…….iv
Course Overview/Presentation Schedule ………………….….…..….v
How to get the most from this course ………………………….…….vi-vii
Tutors and Tutorials ………………………………………….………vii
Summary ……………………………………………………….…….vii
4
Introduction
This course is a three-credit unit course for undergraduate students in the arts and social sciences.
The materials have been developed within the Nigerian context. It serves as an overview of what
you will be taught and also provides you with information on the organization and requirements
of the course.
Course Aims
The aims are to help you to understand the nature of crime, theories of crime and crime control
and the practical implications of crime in society. It also empowers you in understanding of the
preventive mechanism put in place by government and civil society in combating crime as well
as to appreciate the sophisticated trends of crime prevention strategies from a global perspective.
These broad aims will be achieved by:
(i) Introducing you to the general concept of crime, and its crucial precursors,
consequences (cause and effect), cost implication and prevention mechanisms.
(ii) Expatiating on the theories of crime and crime control.
(iii) Extrapolating the trends in crime theorisation to crime reduction.
Course Objectives
To achieve the aims set out above, CSS 246: Legal and Social Framework of Private Security
Services in Nigeria has been divided in several different modules, each with its own specific
objectives. It is advisable that you read them before you start working through the unit. You may
want to refer to them during your study of the unit to check your progress).
Here are the wider objectives for the course as a whole. By meeting the objectives, you count
yourself as having met the aims of the course. On successful completion of the course, you
should be able to:
5
Working through this Course
To complete the course, you are required to read the study units and other related materials. You
will also need to undertake practical exercises for which you need a pen, a note – book, and other
materials listed below. The exercises are to aid you in understanding the concepts being
presented. At the end of each unit, you will be required to submit written assignments for
assessment purposes. At the end of the course, you will write a final examination.
Course Materials
The major materials you will need for this course are:
(i) Course guide.
(ii) Study units.
(iii) Assignments file.
(iv) Relevant textbooks including the ones listed under each unit
(v) You may also need to visit the varied arms of the criminal justice system.
(vi) As a beginner, you need to read newspapers and interact with other mass media as often
as possible.
Study Units
In this course there are twenty units, divided into four modules, (five in each module). Below are
the units:
Module 1
Unit 1: Definition of Security
Unit 2: Types of Security
Unit 3: Meaning of Types of Private Security
Unit 4: Origin and Development of Private Security
Unit 5: Reasons for the growth of Private Security Sector
Module 2
Units 1: Legal framework of Private Security Company
Units 2: Organisation of Private Security Company
Units 3: Prospect and Limitations of the Private Guard Companies Act (1986) To the Effective
Operations of Private Security Companies In Nigeria.
Units 4: Training and Development
Units 5: Equipments and Other Accessories
Module 3
Unit 1: Functions of Private Security
Unit 2: Risk Analysis and the Security Survey
Unit 3: Challenges and Problems of Private Security Service
Unit 4: Computer and Information Security
Unit 5: Nigerian Security and Civil Defence Corps (NSCDC ) ACT NO 2 of 2003
Module 4
Unit 1: List of Private Security Companies in Nigeria
Unit 2: Conflict Management in Private Security Service
Unit 3: Relationship between Police and Private Security Operatives in Nigeria
Unit 4: Regulation and Recommendation of Private Security Service in Nigeria
6
Unit 5: Specific Security threat
Assessment File
An assessment file and a marking scheme have been made available to you. In the assessment
file, you will find details of the assignments you must submit to your tutor for marking. There
are two aspects of the assessment of this course; the tutor marked assignment (TMA) and the
written examination. The marks you obtain in these two areas will make up your final marks.
The assignment must be submitted to your tutor for formal assessment in accordance with the
deadline stated in the presentation schedule and the Assignment file. The work you submit to
your tutor for assessment will count for 30% of your total score.
You will have to submit a specified number of the Tutor Marked Assignments (TMAs). Every
unit in this course has a tutor marked assignment. You will be assessed on four of them but the
best three performances from the Tutor Marked Assignments (TMAs) will be used for your
continuous assessments (C/A) which is 30%. When you have completed each assignment, send it
together with a Tutor Marked Assignment form, to your tutor. Make sure each assignment
reaches your tutor on or before the deadline for submissions. If for any reason, you cannot
complete your work on time, contact your tutor for a discussion on the possibility of an
extension. Extensions will not be granted after the due date unless in exceptional circumstances.
The final examination will be a test of three hours. All areas of the course will be examined. Find
time to read the unit all over before your examination. The final examination will attract 70% of
the total course grade. The examination will consist of questions, which reflects the kinds of self
assessment exercises and tutor marked assignment you have previously encountered. And all
aspects of the course will be assessed. You should use the time between completing the last unit,
and taking the examination to revise the entire course.
7
Final Examination = 70%
Total = 100%
Presentation Scheme
The dates for submission of all assignments will be communicated to you. You will also be told
the date for the examinations.
Course Overview and Presentation Schedule
Unit Title of work Weeks Activity
Module 2
4 Week 6 Assignment 4
Module 3
8
3 Challenges and Problems of Private Week 8 Assignment 3
Security Service
Module 4
9
How to Get the most from This Course
In distance learning, the study units replace the university lecture. This is one of the great
advantages of distance learning; you can read and work through the designed study materials at
your own pace, and at a time and place that suits you best. Think of it as reading the lecture
instead of listening to the lecturer. In the same way a lecturer might give you some reading to do,
the study units tell you where to read, and which are your text materials or set books. You are
provided exercises to do at appropriate points, just as a lecturer might give you an in-class
exercise. Each of the study units follows a common format. The first item is an introduction to
the subject matter of the unit, and how a particular unit is integrated with the other units and the
course as a whole. Next to this is a set of learning objectives. These objectives let you know what
you should be able to do by the time you have completed the unit. These learning objectives are
meant to guide your study. The moment a unit is finished, you must go back and check whether
you have achieved the objectives. If this is made a habit, then you will significantly improve
your chances of passing the course. The main body of the unit guides you through the required
reading from other sources. This will usually be either from your set books or from a reading
section. The following is a practical strategy for working through the course. If you run into any
trouble, do not hesitate to call and ask your tutor for help. Always remember that your tutor’s job
is to help you when you are in need of assistance.
10
returned, pay particular attention to your tutor’s comments, both on the tutor-marked
assignment form and also the written comments on the ordinary assignments.
11. After completing the last unit, review the course and prepare yourself for the final
examination. Check that you have achieved the unit objectives (listed at the beginning of
each unit) and the course objectives (listed in the Courses Guide).
Information relating to the tutorials will be provided at the appropriate time. Your tutor will mark
and comment on your assignments, keep a close watch on your progress and on any difficulties
you might encounter and provide assistance to you during the course. You must take your tutor-
marked assignments to the study centre well before the due date (at least two working days are
required). They will be marked by your tutor and returned to you as soon as possible.
Do not hesitate to contact your tutor if you need help. Contact your tutor if:
• You do not understand any part of the study units or the assigned readings
• You have difficulty with the exercises
• You have a question or problem with an assignment or with your tutor’s comments on an
assignment or with the grading of an assignment.
You should try your best to attend the tutorials. This is the only chance to have face-to-face
contact with your tutor and ask questions which are answered instantly. You can raise any
problem encountered in the course of your study. To gain the maximum benefit from course
tutorials, prepare a question list before attending them. You will learn a lot from participating in
discussion actively.
Summary
The course guide gives you an overview of what to expect in the course of this study. The course
teaches you the basic principles of news reporting and writing, and how these principles can be
applied. It also acquaints you with the legal and ethical rules guiding your job as a reporter.
We wish you success with the course and hope that you will find it both interesting and useful.
11
MODULE 1
Unit 1: What is Security?
Unit 2: Types of Security
Unit 3: Meaning and Types of private Security
Unit 4: Origin and Development of Private Security
Unit 5: Reasons for the growth of Private Security sector
1.0 Introduction
The issue of security remains important to the continued socio-economic survival of any people
(Hyden, 1995). It is for this reason that there have been different efforts by stakeholders
especially government to develop frameworks in advancing the security of people and mitigating
various threats both human and non-human that can undermine the wellbeing of the people in
any community. The issue of security management has nevertheless experienced a shift from its
traditional conception as an exclusive function of government (Hobbes, 1962) to a more
accommodating security sector that encourages participation of private security organization and
citizens in security planning and practice.
2.0 Objectives
At the end of this unit, you should be able to:
• Define the term security
• Examine concepts in security
• Discuss importance of security
12
3.0 Main Content
3.1 Definition of Security
The word security emanated from the Greek word se-cura, meaning to be in a state of no fear.
Security is the protection of life and property of a person. The concept of security keeps
changing from its original conceptualization. Traditionally, the state is the custodian and ultimate
beneficiary of the monopoly use of violence especially if we consider the intellectual view(s) of
some theorists like Thomas Hobbes (1962), Max Weber etc. Thomas Hobbes (1962) argued that
the essence of a state is to guarantee the security of lives and property and ensure law and order
through its political sovereignty and monopoly of violence. Security is the degree of protection
against danger, damage, loss, and criminal activity. Security as forms of protection is structures
and processes that provide or improve security as a condition. The Institute for Security and
Open Methodologies (ISECOM) in the OSSTMM defines security as "a form of protection
where a separation is created between the assets and the threat". This includes but is not limited
to the elimination of either the asset or the threat. Security as a national condition was defined in
a United Nations study (1986), so that countries can develop and progress safely. But in
contemporary times, the definition of security goes beyond the traditional military ways of
protecting the state against internal and external aggression. The fact is that since the end of the
cold war, security management has assumed a new dimension.
External threat to security resulting from international hostilities and aggression that
characterized the cold war era has been replaced with non-traditional security threats like
information warfare, drug trafficking, nuclear pollutions, disease epidemics like HIV-AIDS,
corruption, human trafficking (internal) insurgency, among others (Kasah, 2009). Although the
term security has been used in previous pages without question, there is no universal agreement
on a definition. But there is basic meaning of security among them, simply denoting the
protection of lives and property. The following definitions of security considered important:
(1) It is an all-encompassing condition in which individual citizens live in freedom, peace and
safety; participate fully in the process of governance; enjoy the protection of fundamental rights;
have access to resources and the basic necessities of life; and inhabit an environment which is
not detrimental to their health and well being (South Africa while Paper on Defence, 1996).
13
(2) It is also the degree of protection against danger loss and criminals.
(3) It is the protection of a person, property or organization from an attack. There are people
who have distorted motivations to perform such attacks. The types of protection include
prevention, response and pre-emptive attacks.
Security concepts
Certain concepts recur throughout different fields of security:
• Assurance - assurance is the level of guarantee that a security system will behave as
expected
• Countermeasure - a countermeasure is a way to stop a threat from triggering a risk event
• Defence in depth - never rely on one single security measure alone
• Exploit - a vulnerability that has been triggered by a threat - a risk of 1.0 (100%)
• Risk - a risk is a possible event which could cause a loss
• Threat - a threat is a method of triggering a risk event that is dangerous
• Vulnerability - a weakness in a target that can potentially be exploited by a threat security
1. The objective of human security is to protect the vital core of all human lives. (instead of
the word ‘protect’ we can also use shield, guarantee, defend, maintain, uphold, preserve,
secure, safeguard, etc).
2. The objective of human security is to protect the vital core of all human lives from critical
pervasive threats in a way that is consistent with long-term human fulfillment. (initial
definition was this).
3. The objective of human security is to guarantee a set of vital rights and freedoms to all
people, without unduly compromising their ability to pursue other goals.
4. The objective of human security is to create political, economic, social, cultural, and
environmental conditions in which people live knowing that their vital rights and
freedoms are secure.
14
5. The objective of human security is to keep critical pervasive threats from invading the vital
core of human lives (Alkire, 2003).
4.0 CONCLUSION
From this unit, student of criminology should have a broader knowledge of what is Security. The
concept of security has undergone a change from its original conceptualization. Traditionally, the
state is the custodian and ultimate beneficiary of the monopoly and usage of violence as a form
of security. The use of violence by the state however has proved less effective in the
management of security, as focus in now being shifted to providing empowerment for the people
as an alternative strategy which guarantees a wider range of security.
5.0 SUMMARY
We have been able to explain the meaning of security. We highlighted various definitions of
security as given by different scholars and both concepts and importance of security were
explained.
15
UNIT 2: TYPES OF SECURITY
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Security is the requirement to maintain the survival of the state through the use of economic,
military and political power and the exercise of diplomacy. The concept developed mostly after
World War II. Initially focusing on military might, it now encompasses a broad range of facets,
all of which impinge on the military or economic security of the state and the values espoused by
the society. In order to possess national security, a nation needs to possess economic security,
energy security, environmental security, etc. Security threats involve not only conventional foes
such as nation-states but also non-state actors such as terrorist organizations, narcotic cartels and
multi-national organizations; some authorities including natural disasters and events causing
severe environmental damage are in this category.
2.0 OBJECTIVES
At the end of this unit you should be able to:
Understand the various types security.
.
There are different types of security as listed below:
IT realm
• Application security
• Computing security
• Data security
• Information security
• Network security
16
Physical realm
• Airport security
• Port security/Supply chain security
• Food security
• Home security
• Hospital security
• Physical security
• School security
• Shopping centre security
• Infrastructure security
Political
• Homeland security
• Human security
• International security
• National security
• Public security
Monetary
• Financial security
1. Physical Security
Physical security concerns itself with those means by which a given facility protects itself against
theft, vandalism, sabotage, unauthorized entry, fires, accidents and natural disaster. A faculty
means a plant, building, office, institution or any commercial or industrial structures and
functions that are part of integrated operations. It is defined as the measures used to provide
physical protection of resources against deliberate and accidental threats. It can be defined as the
protection of personnel, hardware, programs, networks and data from physical circumstances and
events that could cause serious losses or damage to an enterprise, agency or institution. This
includes protection from fire, natural disasters, burglary theft, vandalism and terrorism. In this
century, it is very clear that old devices may be functional but the use of the burglar alarm and
padlocks may not be enough in a good security program. Good systems combine access controls
with advanced security technologies such as intrusion detection, video monitoring, smart cards
17
and biometrics which are integrated systems within a company’s computer network. These give
an excellent total asset protection program.
Physical security planning includes protection of
(1) the grounds around the building
(2) the buildings perimeter
(3) the building’s interior and
(4) its contents.
2. Information Security
Information security can be defined as a means of protecting information systems from any
illegitimate access and use, theft, amendment or malicious attacks or penetration. It can also be
described as the process by which an organization protects and secures its systems, made and
facilities that process and maintain information vital to its operations.
The increasing complexity of the modern state and sophisticated nature of contemporary
business environment and corporations underscore the importance in mounting relevant
mechanisms towards the protection of information and information system.
3. Infrastructure Security
Infrastructure security can be described as that aspect of security designed purposely to provide
protection for specific infrastructure particularly those infrastructure considered critical. The
examples of critical infrastructure may include airports, seaports, railways, network
communications, general hospitals, banks, central banks, armoires, dams, oil refineries,
highways and bridge. It is important to note that any damage done to these critical infrastructures
will have far-reaching effects on the economy and overall security of a country. Threats which
can damage infrastructure are (1) sabotage, (2) terrorism (3) natural disaster (4) information
warfare.
With the events of September 11, 2011, the U.S. and world community became aware of the
power of terrorism as a tool of war. The magnitude of the attack on the world trade Centre has
proved that there is need for protection of critical infrastructure. In the Niger- Delta areas of
Nigeria, adequate infrastructural security provided for the pipeline and refineries by the federal
government have reduced subsequent threats and attack.
18
4. Computer System Security
Along with computer software, the security of hardware and its components is also essential for
overall data protection. Even if the computer is not in use or plugged into a network, as anyone
can access the hard disk, which can later be used on some other computer for the theft of data
5. Economic security
Assured basic income: access to employment and resources.
6. Food security
Physical and economic access to food for all people at all times: Hundreds of millions of people
in the world remain hungry either through local unavailability of food or, more often, through
lack of entitlements or resources to purchase food.
7. Health security
Access to medical treatment and improved health conditions: Poor people in general have less
health security and in developing countries, the major causes of death are infectious and parasitic
diseases.
8. Environmental security
Living in a healthy physical environment, spared from desertification, deforestation and other
environmental threats that endanger people’s survival.
9. Personal security
Individual security from physical violence: Threats can take several forms, for example: threats
from the State, foreign states, other groups of people (ethnic tension), individuals or gangs;
threats directed against women or children based on their vulnerability and dependence; threats
to self (e.g. suicide, drug use, etc.).
10. Community security
Most people derive their security from membership of a social group (family, community,
organisation, political and ethnic group, etc.). Tensions often arise between these groups due to
competition over limited access to opportunities and resources.
11. Political security
Living in a society that guarantees basic human rights and freedom of expression.
19
4.0 CONCLUSION
From this unit, students of criminology are expected to know the types of Security. During the
cold war, majority of war at that time were international but now political strife, insurgencies and
civil wars plague most of the countries. The truth is that most of these internal wars are created
by economic deprivation; inter religious violence, ethnic rivalry, maladministration among
others.
5.0 SUMMARY
From this unit, students of criminology should be able to know the various types of Security
ranging from Computing security, Data security, Information security, Network security, Airport
security, Port security/Supply chain security, Food security, Home security, Hospital security,
Physical security, School security, Shopping centre security, Infrastructure security, Homeland
security, Human security, International security, National security, Public security, and Financial
security.
20
UNIT 3 MEANING AND TYPES OF PRIVATE SECURITY
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor Marked Assignment
7.0 References / Further Reading
1.0 Introduction
The private security industry comprises those actors who provide security for people and
property under contract and for profit. Worldwide, the industry is experiencing a period of rapid
growth, with valuable contribution to the provision of security. It is important to understand the
term private security and the different types therein.
2.0 Objectives
At the end of this unit, you should be able to:
Define the term Private security
Mention types of Private Security companies
Private security according to Howe (1998) is a board grouping. It is an industry that operates
only on a global market, organized along corporate lines and showing signs of growth rather than
21
contraction (Small, 2006). In other words, private security is an industry that operates along
corporate lines and provides security services that are largely independent of the state. Private
security seeks to protect against hazards which are commonly divided into man-made and
natural. Natural hazards may include fire, windstorm, flood, earthquake and other acts of nature
that could result in building collapse, equipment failure, accidents and safety hazard. It should be
noted that fire is also quite often man-made, intentionally or unintentionally, while man-made
hazards may include crimes against the person (for example, robbery or rape) or crimes against
property (theft and pilferage, fraud and embezzlement). In addition, man also creates problems
through espionage and sabotage, civil disturbances, bomb threats, fire and accidents. The term
private security refers to security services provided to clients by non-state agencies. It is a new
concept in Africa and its growth has been facilitated by the desire to reduce the burden on state
agencies of protecting their citizens. Inadequate resources to equip state organs for their principal
role of protecting the security of their citizens have also been a major decision driver in the
growth of the sector. Another reason has been the increase in numbers of the propertied class that
need a secure environment in order to continue investing.
An examination of the circumstances of the growth of the private security sector reveals that
private security has benefited only wealthy people and business that can afford to pay the bills of
the forms or personnel that provide the security. People in rural area are still exposed to the
security dangers and risk that prevailed before its privatization. The privatization of security has
now become a global phenomenon. From the beginning of the 21st century the world has
witnessed an accelerated break down of the nation state monopoly on violence and the
emergence of market place purveyors of armed forces (Shreier and Caparin, 2005). This is
owning to a number of factors, including general human insecurity, the end of the cold war, the
globalization phenomenon, the marketisation of the public sphere, the downsizing of armed
forces, the professionalization of armed and police force, the drive for profit maximization, the
liberalization of the arms trade, the general unending African conflicts and the events of 9/11. In
the contemporary world, the privatization of security has swept throughout the globe to an
unprecedented magnitude that is no longer possible to ignore, let alone comprehend.
22
Types of Private Security
The Private Security Sector is divided into two categories Private Military Companies (PMCs),
sometimes referred to as Privatized Military Firms (PMFs) and Private Security Companies
(PSCs). According to Small (2006:14), PMCs and PSCs represent the contemporary forms of
private security. Schreier and Caparini (2005:2) define PSCs as ‘companies that specialize in
providing security and protection of personnel and property including humanitarian and
industrial assets. To Small (2004:7), PSCs may be defined as having the ability to provide a
proximate capacity for violence, that is, they provide defensive security service, equipment and
training to (mostly) Multinational Corporations, businesses humanitarian agencies and
individuals. Singer (2003:8) who prefers to call them ‘Corporate Warriors’ defines PMFs as
‘business organizations that trade in professionals services intricately linked to warfare’. PMFs
therefore constitute private business-oriented and profit driven warriors who offer diversified
professional services bordering on security issues. Schreier and Caparini (2005:2), PMCs are
private companies that specialize in military skills, including combat operations strategies
planning, intelligence collection, operational support, logistics, training, procurement and
maintenance of arms and equipment. Small (2008:8) further argues that PMCs ‘possess an’
immediate capacity for violence, that is, they offer more active offensive or tactical military and
security service, equipment, advice and training. Furthermore, they are more combat oriented
and are contracted mainly by states or recognized governments to augment their national military
capabilities and specialization.
Wairagu et al (2004:17) state that PMCs are better described as private mercenary contractors,
which are corporate entities comprising military and intelligence entrepreneurs whose activities
incorporate the provision of multi-purpose security-related products and services. PSCs are
sometimes subsidiaries of PMCs, and the relationship between firms is interwoven. Small
(2006:8) contends that the division between the services offered by PCSs and PMCs is somewhat
flexible because they are often affiliates of one another. For the reason PSCs and PMCs are
frequent treated as one grouping, the private security industry, which is capable of operating at
domestic and international level independent of the state. Therefore PSCs cannot be treated in
isolation from PMCs. What determines their specific nametag is their level of engagement and
the common dominator remains the promotion of security. By the same token, as soon as the
23
common denominator ‘flips’’ they become something else, as the promotion of security is no
longer present. The private security sector is also characterized by what many writers refer to as
private policing. In an attempt to shed some light on what private policing entail. John (2005:
378-279) divides it into four categories: protective policing; intelligence policing; publicly
contracted policing and corporate policing.
Mercenaries
This is another type of private security. A mercenary is a person who takes part in an armed
conflict or hostilities essentially by the desire for private. It is defined as anyone who, not being
national of the state against which his actions are directed; is employed, enrols or links himself
willingly to a person, group or organization.
There is another type of private security called hybrid systems. Hybrid system is the combination
of propriety management and contractual line services. For hybrid programme to be successful
according to Fischer and Green (2004), all parties to the contract must be willing to communicate
openly with each other. A good hybrid security operation consists of four components. (1)
incorporation (2) consistent contract management support (3) periodic reviews (4) accurate
quality measurements.
The choice between the first two types of services (proprietary security operations and contract
security services) can be made by considering the advantages of each of them.
24
Advantages of Contract Services
1. Cost
It is economical compare with proprietary security services. Liability insurance, payroll taxes,
uniforms and equipment and the time involved in training, sick leave and vacations are all extra
cost factors that must be considered in deciding on whether to establish a proprietary force.
Contract guards generally received fewer fringe benefits.
2. Administration
Hiring contract guards helps in the development and the administration of a recruitment program,
personnel screening procedures and training programmes. Hence there is little question that the
administration chores are substantially decreased when a contract services is employed.
3. Staffing
In-house forces rarely have flexible staffing. But it easier to have contract guards and lay them
off when the need arises.
4. Unions
Contract guards do not have union and not likely to go out on strike, are less apt to sympathize
with or support striking employees but most unionized guards are proprietary personnel.
5. Impartiality
It is often suggested that contract guards can more readily and more effectively enforce
regulations than in-house personnel. Hence it produces a more consistent and impartial services.
6. Expertise
When clients hire a guard service, they also hire the management of that service to guide them in
their overall security program, thereby providing expertise advice to the management.
25
guards and client management can interfere with the rapid, accurate flow of information either
up or down.
3. Loyalty
It is argued that in-house guards develop a keener sense of loyalty to the firm they are protecting
than do contract guards.
4. Prestige
Many managers simply prefer to have their own people on the job. They feel that the firm gains
prestige by building its own security force to its own specifications rather than by renting one
from outside.
4.0 CONCLUSION
Inability of the government to adequately provide for the security of all and sundry brought
about the development and the growth of private security companies. Although the main motive
of Private Security Companies like other business ventures is to make profit. It has become a
global phenomenon although its growth reveals that it has benefited only the wealthy people and
business empires that can afford to pay the bills of the personnel or companies that provide the
security.
5.0 SUMMARY
In this unit, we have been able to define the term private security. We also mentioned the types
of private security companies. Attention was given to the advantages of the contract services and
that of propriety guards.
26
Fischer, R. J and Green, G. (2004) Introduction to Security. Burlington, Butter worth
Heinemann.
Shreier, F and Caparini, M (2005) Privatising Security, Law, Practice and Governance of Private
Military and Security Companies: Geneva Centre for the Democratic control of Armed
Force. Occasional paper No 6 (march 2005)
27
UNIT 4 ORIGIN AND DEVELOPMENT OF PRIVATE SECURITY SERVICE
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
“Security is now the second largest money-spinner in Nigeria, surpassed only by oil and gas”.
This statement by a long-standing observer of Nigerian politics is striking, especially given that
Nigeria is Africa’s most populous country and the world’s seventh largest oil producers. While a
lack of statistics and information make this claim impossible to verify completely, there is no
doubt that the private security industry has grown rapidly in recent years. Private security
personnel are highly visible around the country, guarding businesses, homes and neighbourhoods
and advising transnational companies and embassies on risks and dangers to their assets and
employees. Security has thus become a major part of the nation’s economy (Abrahamsen and
Williams 2005).
2.0 OBJECTIVES
At the end of this unit, you should be able to give brief history and development of private
Security Service in Nigeria.
3.0 Main Content
The Development of Private Security Service in Nigeria.
The involvement of private players in the management of security locally and internationally has
become phenomena in recent times. Considering the historical development of private security
companies in Nigeria, one will not agree that the presence and activities of private security
guards laid the foundation for the emergence of private security companies in Nigeria. The use of
guards working individually or those commissioned by unregistered private security companies
had been in existence prior to the nation’s independence. The use of thugs or some party
members for private security became noticeable at independence and this habit has continued till
28
date in Nigeria. Nigeria Investigation and Security Company (NISCO), the first private security
outfit providing uniformed guards in Nigeria came into being in 1965, and since then the number
of existing private security firms has drastically increased. The recruitment of party thugs as
personal security by politicians prior to 1966 coup (led by Major Kuduna) and their brutal
operations ( excessive use of force) necessitated the clamour to dissolve them. Ohonbamu (1962)
describes the situation thus “in the Western Region there were mass recruitment into the local
force of party thugs and stalwarts for security people against the police whom were supposed to
be giving protection to law abiding citizen’’.
The expansion of private property in Nigeria and African generally is a key factor in the growth
of private security in both size and profile, as property owners have recognized the commercial
benefits of employing their own security forces. They are not only able to specify the functions
performed by the security staff, but to empower them to uphold conditions of access to their
properties and to exclude any unwanted visitors. This is permitted in common law countries as
the law bestows on property owners the right o decide who may have access to their properties or
premises. For the mass private property owner, efficient use of private security services can be
made due to economies of scale and a relative immunity to a free rider effect in their investment
in security. Apart from this, as Stemming (1988) argues, for the commercial user of private
security, any policing strategy must be proven cost-effective, since a business will not adopt a
security solution more costly than the problem. In general, therefore, corporations will seek to
prevent a loss rather than try to recover the loss after it has occurred and to change the situation
in which any problems occur rather than to draw on the slow and costly criminal justice process
in pursuit of sanctions. Thus, private security personnel and the security hardware that they have
at their disposal (such as radio communication and closed circuit television (CCTV) technology),
have become fundamental to the successful governance of such territories, enabling a pre-
emptive approach to security in contrast with the reactive style of state police agencies.
The demand for security and inability of the public security agents to meet the security needs of
various segments of the public have necessitated the growing acceptance being enjoyed by
private security guards in the country. The services of private security guards have continued to
be sought by individuals and corporate bodies to safeguard the security of their lives and
29
properties. Paucity of funds has made it difficult for government in Nigeria to have adequate size
of police and armed forces. The size of police personnel is highly insufficient to meet the
security needs of the people. This situation has led to the privatization of public security agents
especially the police. The commoditization of police services in the country has further
complicated the problem of inefficiency of the police in the discharge of their duties. This
situation reinforces the disconnection between public safety and policing in Nigeria. The interest
and security of the elite, a few wealthy individuals and organizations have remained basic
preoccupations of Nigeria police.
It is worrisome that despite government ban on militia groups, they have continued to be popular
among several ethnic groups especially in South-Western Nigeria; proving for the security needs
of the people. Many wealthy individuals, organizations and communities often seek the services
of Oodua Peoples Congress (OPC) guards to provide alternative security for them when the
public security sector has failed to live up to expectations. It was even an indictment on Nigerian
Police and Federal Government by a former Lagos State Governor, Bola Tinubu. In reacting to
the armed robbery attack of retired Justice Fatai Williams, declared that ‘if Nigeria Police Could
not address the problem of rising incidences of violent crime, particularly armed robbery and
assassination, he would have no choice other than employing the services of Odua Peoples
Congress to Mitigate various activities of Criminals (The Post Express, June 14, 2000).
Nevertheless, security has thus become a major part of the Nigerian economy and it is estimated
that there are currently between 1500 and 2000 Private Security Companies (PSCS) in Nigeria,
with more than 100,000 on their pay roll serving as guards (Abrahamsen and Williams, 2005).
As it were, there is no adequate official record concerning the number of Private Security
Companies existing in the country till date. The reason is that many of the existing private
security outfits are not registered and their activities are not regulated.
Statistically, the major private security companies in Nigeria include prudential security (having
almost 9000 guards with operation covering the entire country). Halogen security (having nearly
4, 000 guards) as well as few other companies like Bemil security and Corporate Guards. The
largest non-indigenous or foreign Private Security Company in the country is group 4 securicor’s
partner Outsourcing Services Ltd (OSL) having its operation in all states of the federation with
30
staff strength of about 3, 000 guards. Apart from the large retinue of police and armed forces,
many oil companies often contract the services of number of private security guards from both
within and outside the country to argument the activities of public security agents, with the aim
of adequately reducing the impact of the risks that may emanate from any unforeseen attack that
can pose a threat to the general security of these companies. The importance of the
complementary roles being played by private security guards is emphasized by many of these oil
companies. For instance, oil companies like Exxon Mobile and Shell usually employ a sizeable
number of private guards who are trained by the Nigeria Police as Spy police (Abrahamsen and
Williams 2005). Apart from intelligence activities, trained guards may be mandated to perform
some other tasks including security of infrastructural facilitates of their employers. The spy
police in Shell, Exxon Mobile and Chevron Texaco alone are more than two thousand.
Due to non-permission of private security guards to carry arms like gun in Nigeria, a number of
clients often employ the services of public security agents to the relevant authorities, so that they
can have armed-unit that will fortify the activities of private security. Many embassies, oil
companies and other organizations complement the services of private security guards (which do
not involve the use of arms) with that of the police. Often they also seek the services of mobile
police to provide armed support for the general security operations. For instance, in Shell alone,
there is nothing less than 600 Mobile Policeman in its operations to complement activities of
private security guards on its pay-roll (Abrahamsen and Williams, 2005). The growth of Private
Security Companies as well as the number of personnel therein is very much evident not only in
Nigeria but also in other part of the globe particularly in Eastern Europe, Middle-East and other
Africa countries (Howe, 1998).
4.0 CONCLUSION
It has been agreed globally that the development of private security companies in world has been
beneficial to most people, corporate bodies and civil societies. This is not to say that the security
situation has improved drastically. Security is therefore a continuous process.
5.0 SUMMARY
From this unit, students of criminology should be able to give brief history and
development of private Security Service in Nigeria .The development started with use of guards
31
working with individual to the current status of registered private security companies in Nigeria
today.
6.0 TUTOR-MARKED ASSIGNMENT
Discuss the development of private security services in Nigeria.
7.0 REFERENCES/FURTHER READINGS
Abrahamsen R. and Williams, M. C. (2005), The Globalisation of Private Security. A Country
Report of Nigeria. Globalisation of Security Research Project (Department of
International Politics, University of Wales, Aberyswyth) and the New Security Challenge
Programme (ESRC, U. K.).
Keku, P. and Akingbade, T. (2003) Industrial Security in Nigeria, Challenges and Prospects for
the 21st Century, (Lagos).
Ohonbamu, O. (1972) The Dilemma of Police Organisation under a Federal System: The Nigeria
Example The Nigeria Law Journal (6): 73-87 The Post Express, June 14, 2000.
32
UNIT 5: REASONS FOR THE GROWTH OF PRIVATE SECURITY SECTORS
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
In the last decade, commercially organized security personnel have become an increasingly
common sight around the world, from protecting shopping malls, to providing convoy security
for banks and other financial companies. They are increasingly visible in major companies in
urban centres. They form a complex web of commercial providers of protection services,
operational support in combat, intelligence, interrogation. In this unit we will deal with special
aspect of private security service, the reason for the growth and increasing expansion of private
security.
2.0 OBJECTIVES
At the end of this unit, you should be able to:
Give reasons for the growth of private Security Service in Nigeria
33
wars, foreign domination, post-colonialism, apartheid etc. General insecurity at the domestic
level is usually in the terrain of PSCS while the PMCS addresses insecurity at the international
level.
34
Schveler and Caparini (2005:4) stated that, owing to financial constraints, many western forces
have focused on redefining and maintaining only core competencies and resort to outsourcing
non-core activities to the private security sector. This trend has been followed in Africa
especially where the state lack the technical know-how so far as security matters are concerned.
The practice of outsourcing services meritably leads to the armed forces being downsized. The
downsizing of the armed forces to a large extent has inevitably affected the military structure in
some countries. In the South African Defence Force (SADF), for instance, a considerable
number of white defence personnel were left unemployed and were later absorbed into the
private security sector.
(6) Profit Maximisation
The private sector is organized along the capitalist mode of production. The purpose of any
private security company or any private institution is first and foremost the concern on how to
ensure profit maximisation. But public security has sharp contrast, from Private Security
Company, which is normally paid through the collection of income tax, among other things.
Zedner (2006:84) notes, ‘vast security companies seek to exploit market opportunities, expand
their turnover and maximize returns to their shareholders. For this reason, some Marxian
approaches have focused on the private security sector as an industry that provides ‘a
legitimating’ or “buffer” function for the bourgeois state and the fiscal crisis of the state is thus
considered to result in recrudescence of policing for profit. Jones and Newburn (2002:129) refer
to the private sector as commercial policing since their activities are strictly commercialised, as
opposed to mainstream policing. Rigado and Greener (2000:150) note that large corporate
entities thus become legally responsible for the safety and security of “denizens” passing through
their particular “bubbles of governance”. If these large corporations did not provide security to
their customers, business would crumble. The more secure their premises the more business they
get. The use of the Private Security Sector therefore, considerably increases their profit margins.
(7) The Liberation of the Arms Trade
Another important reason for the growth of Private Security Sector is that of arms trade
liberation. International arms trade has opened up to an increasing number of buyers and sellers,
which has not only permitted a larger number and broader variety of actors to access weaponry,
but has also provided more and easier ways for PNICS to profit from conflicts through their
involvement in the arms trade, thus facilitating arms proliferation.
35
Private security industries have often been accused of supplying weapons to African countries,
participates and takes sides in conflicts (as supporters of state government or rebels in
opposition). Others, participates in rendering humanitarian assistance to the victims, participates
in the peacekeeping process and also readily avail themselves in the disarmament,
demobilization and reintegration processes. The involvement of the private security industry in
conflict zones thus become a vicious circle with far reaching implications as a force of
destruction or rather fostering insecurity in many countries i n Africa and other developing
countries.
36
nation-state with its monopoly over the legitimate use of force has not always proved to be an
appropriate way of providing security to the citizens of African states.
Further reasons for weak state capacity and its decline from the late 1980s onward and
throughout the 1990s are the failure of economic liberalization and structural adjustment
programmes that were imposed by international donors such as the World Bank and International
Monetary Fund (IMF) on developing countries. When state capacity is lacking and country’s
legitimate security forces are unable to provide security, alternative security structures must be
put in place.
( 11) Oil Boom
With oil boom in 1970s, a lot of private properties were acquired by individuals and private
organizations. Since then, many people have become involved in economic activities. Crime
increased in such an environment and the need to protect lives and properties intensified. Fear of
crime has driven the demand for private security services. Analysis has proved that companies
using the services of PCSs have a lesser chance of being victims of burglary. The police
population ratio remains very low.
( 12)The Police
It has been seen that numbers of the police and population ratio is below the international ratio
which is 1:400. With such a ratio coupled with inadequate resources in the police force, crisis of
police inefficiency and ineffectiveness were rife, especially from the property owners. It was
therefore necessary to relinquish some police functions to private security organizations as one
way of addressing the problem.
( 13 )Supply and Demand Dynamics
Supply and demand dynamics are fuelling the growth of the private security sector. As crime
remains a high priority issue, many turn to PSCs for their protection. PSCs currently protect
private homes, airports, harbours, banks, transport systems, industries and other critical areas.
Given its growing dependence on the sector, as it is no nation can survive without it.
4.0 CONCLUSION
Recent years have seen growing concern over the proliferation and growth of the private security
sector. Africa was familiar with isolated colonial mercenaries who were hired by colonial
regimes to fight against liberation movements. The Post-Cold War era has awaken the reality of
37
highly organised, corporate type companies that provide military and police services to any
entity with the financial muscle to pay for their services. This reality dawned in tandem with the
post-Cold War liberalisation and privatisation processes. African states, like any other state, had
enjoyed a degree of control over the means and resources of violence hence are now challenged
directly by the proliferation and growth of the private security sector. As a result of this
development that has caught Africa napping and without a functional legal framework to curtail
it, serious efforts are being made to determine the causes of this proliferation and growth as well
as innovative ways to regulate it. The present study focused on how weak states and their rulers
have deliberately invited the private security sector to be part of their innovative strategies for
survival and compensation for weakness.
5.0 SUMMARY
This chapter looks at the reasons for the proliferation and expansion of the private security sector
in Africa. It focuses on general human insecurity, the end of the cold war, globalization, and the
commercialization of the public sphere.
Sabelo J Ndlovu-Gatsheni (2007) Weak states and the growth of the private security sector in
Africa: Whither the African state? Monograph No 139: Private Security in Africa,
Manifestation, Challenges and Regulation, Institute for Security Studies
38
MODULE 2
Unit 1: Legal Framework of Private Security Company
Unit 2: Organization of Private Security Company
Unit 3: Prospect and Limitations of The Private Guard Companies Act ( 1986) To The Effective
Operations Of Private Security Companies In Nigeria
Unit 4: Training and Recruitment
Unit 5: Equipments and Other Accessories
1.0 INTRODUCTION
This module examines the extent to which Private Security Companies (PSCs) are currently
controlled by national regulation. In Nigeria there has been disregard for the Private Guard
Companies (PGCs) Act (Cap 367) of 1986 which guides the licensing, control and
administration, and Prohibited Activities, Offences and Penalties regarding PGCs. More than two
decades ago, the government of Nigeria set in a motion, and passed an Act that regulates the
establishment of the private guard company. Various elements of the current Act concerning the
licensing process, staff identification, the weapons used and general requirements for PSC
owners and staff. are obsolete and have not been reviewed.
2.0 Objectives
On completion of this unit students should be able:
• To examine legal framework guiding the licensing of PSCs
• To develop an understanding of the features of the PGCs Act
39
3.0 Main Content
Most private security companies are like any other corpotration, they have conventional
corporate structures, operate as legal entities, and maintain Registered Office Address(es),
Internet sites and corporate ties. The frequency with which concerns are raised about the
legitimacy of PSC operations signals a seemingly instinctive reluctance to relinquish the state’s
role as the provider of security. In the words of former UN Secretary-General, Kofi Annan, ‘the
world may not yet be ready to privatise peace’. The roots of that scepticism cannot, however,
simply be reduced to knee-jerk protectiveness about state power and sovereignty.
Apprehensiveness about the provision of private security services relates in principle to two
legitimate and interrelated concerns. First, state dominance of security relations has been
challenged by a variety of non-state actors, the impact of private security actors on the state’s
primacy in the provision and guaranteeing of security raises new questions. States have not
recognize and increasingly accept that they are not the only actors to address international and
national security threats; nor is it perhaps fruitful for them to retain a monopoly in this realm.
Efforts to tackle ‘new threats’—such as transnational crime, environmental hazards or the
proliferation of weapons of mass destruction—require states to act largely through or with
international or regional organizations and NGOs within a broader structure of security
governance. This has taken place without a fundamental redefinition of state capacity. States still
enjoy the leading role in the national/international system and are seen as the sole source (if no
longer the sole object) of legally binding international regulation.
In the realm of security affairs, states still claim the prerogative of creating and judging political
legitimacy. If the state is undercut or marginalized in this respect, there is a risk that one of the
traditional cores of security governance—states’ collective as well as general control of the use
of force—will be destabilized, affecting not only the state actor but also the international system
itself. For the role of the state in security affairs to be maintained in the face of ongoing
‘privatization of security’, the use of private security providers needs to take place within agreed
structures and processes designed to safeguard legitimacy and accountability in security affairs.
Multinational Companies (MNCs) such as Shell and Chevron have contracted private security
firms in Nigeria. At present the legal structures are not effective and efficient; this is visible in
40
the disregard of the PGCs Act Cap 367 laws of the federation by Multinational Companies in the
restive Niger Delta Region and other parts of the country.
Second, the private provision of security sector functions strikes at the core of the debate about
security sector reform (SSR). In striving to uphold the role of the state as the guarantor of
security, the question of what kind of security is to be upheld is crucial? The establishment of
functioning law-and-order and security institutions (military, police and intelligence) is often
cited as a minimum requirement for stability in states. However, when the objective is broadened
to ensuring an equitable distribution of security, the democratic credentials of security
institutions becomes central, recognising that ‘security’ is not merely a question of protecting the
state but also of protecting its citizens. In this sense, the use of private sector actors for providing
security services represents a particular challenge. PSCs are responsible to shareholders rather
than to voters and making fundamentally apolitical actors contribute constructively to the
establishment of democratic and accountable security institutions is a tough circle to square. The
extent to which private security providers can fit into new forms of national security governance
will ultimately depend on the extent to which their capacities can be directed towards a higher,
long-term goal—one that is governed by politics and law rather than simple economics.
The crux of the private security sector’s capacity to be a legitimate actor on the national scene
thus lies in the relative capacity of states to manage the use of private companies and to ensure
that it is compatible with the promotion of good governance, both domestically and
internationally. The effective use of private security companies remains partially blocked as long
as this challenge is unresolved. The need to take account of the context in which private security
actors operate also arises from the basic, significant point that the ultimate consumers of the
services at the end may not be the actual contract holders or clients of private security firms, but
rather the local populations. The consequences of the provision of security by the private sector
are global, involving the formulation of basic premises of international security politics.
41
categories: (1) proprietary or corporate security; and (2) contract or private security firms.
Corporate security generally refers to the security departments that exist within businesses or
corporations. Contract security firms by contrast sell their services to the public, including
businesses, homeowners, and banks. Private security is not a monolithic entity. Just as
differences exist between state and local law enforcement, private security performs functions
that are differ considerably. IACP’s (2004) summit report notes that “A security practitioner
could be an experienced director of security at a major multinational corporation, a manager of
contract security officers at a client site, a skilled computer crime investigator, an armed
protector at a nuclear power plant, or an entry-level guard at a retail store.
However the legitimacy of any private security company is defined by the Private Guards
Companies Act Cap 367 of 1986 Laws of the Federal Republic of Nigeria. Section 1(1) of the
Private Guard Companies Act which states that:
As from the commencement of this Act, no organisation shall perform the service of watching,
guarding, patrolling or carrying of money for the purpose of providing protection against crime
unless the organisation concerned –
(a) is registered as a company under or pursuant to the Companies and Allied Matters Act;
(b) has applied for and has been granted a licence by the Minister in accordance with the
provision of this Act; and
(c) is wholly owned by Nigerians in accordance with the Schedule to the Nigerian Enterprises
Promotion Act.
This implies that any organisation which performs the services of watching, guarding, patrolling
or carrying of money for the purpose of providing protection against crime and meets with the
requirements of subsection of the Act is free to operate. However, the statue of a private security
companies is further clarified by the Part IV – Supplementary Section 36 subsection 3 which
states that:
(1) This Act shall not be construed as requiring any of the following persons to hold a licence
under or to observe any of the conditions of this Act, that is to say –
(a) any legal practitioner while acting in the ordinary course of his profession or any of his
employees while acting in the ordinary course of his employer’s profession;
42
(b) any inspector, guard, watchman or other person employed to do inspecting, guarding,
watching or inquiring work for one employer only (such employer not being a private guard
company) in respect of inspecting, guarding, watching or inquiry, work done for that employer
for the protection of persons or property arising out of the function or business exercised or
carried on by the employer; or
(c) any person whose duties when employed by a private guard company consist of no more
than clerical or secretarial work, the giving of information over the telephone on request on
matters obtained from existing records of the company or the receipt in the office
The “proprietary or corporate security” has been exempted by subsection 1b of the Act for the
definition of “Corporate security generally refers to the security departments that exist within
businesses or corporations” matches the criteria of exemption in the subsection 1b.
It should be noted however that new security structures and legal regimes are potentially
evolving, yet traditional structures are slow to adapt. The security framework is more
sophisticated today than in the past. It has been observed that the Nigerian Police Force could not
always guarantee Nigerians security as an important part of proactive crime prevention because
of inadequate manpower, advanced technological and programmatic means for fear reduction;
therefore the continuous agitation for Corporate Private Security Organisations to assist the
Nigeria Police in safety business (Ekhomu, 2004). Reasons are not farfetched as evidences are
bound showing the technological means under their kitty for proactive crime control such as
intruder alarms, close circuit monitors, access control to mention just a few. There is the need to
review the legal framework of the Private Security Companies.
43
The regulation and licensing of PSC fall under the jurisdiction of the Ministry of Interior.
However, the recommendation of licensing of PSC has to be made by the Nigeria Security and
Civil Defence Corps as stated in its Mission by the enactment of the Act called “the Corps” to:
a) recommend to the Minister the registration of private guard companies;
b) inspect the premises of private guard companies, their training facilities and appliance
designed for their use;
c) supervise and monitor the activities of all private guard companies and keep a register for
that purpose;
The stipulated requirement for the licensing of Private Guard Companies is stated in Section 1
subsection (1) and (2) of the Private Guard Companies Act that:
1. (1) As from the commencement of this Act, no organisation shall perform the service of
watching, guarding, patrolling or carrying of money for the purpose of providing protection
against crime unless the organisation concerned –
(a) is registered as a company under or pursuant to the Companies and Allied Matters Act;
(b) has applied for and has been granted a licence by the Minister in accordance with the
provision of this Act; and
(c) is wholly owned by Nigerians in accordance with the Schedule to the Nigerian Enterprises
Promotion Act.
(2) Notwithstanding subsection (1) of this Section, where on the coming into operation of this
Act, any company in carrying on private guard business in Nigeria, such company may apply
within 6 months thereafter to be licensed but shall cease to carry on private guard business of any
description in Nigeria after the expiration of 12 months from the coming into operation of this
Act unless, prior to the expiration of the said period such company, being a registered company,
is licensed to continue the particular class or classes of private guard business in respect of which
application had been made by the company concerned.
The core of the application for licensing is elaborated in Section 2 subsection (1), (2), (3) and
(4) which states that:
2. (1) An application for licence shall be made in writing through the licensing authority to the
Minister in the manner and giving such particulars as specified in Form A in Schedule of this
Act.
44
(2) The Minister may, before considering any such application require from the applicant –
(a) further evidence, as the Minister may specify, concerning the good character, competence
and integrity of any director or other person responsible for or in charge of the operation of the
company concerned;
(b) where Alsatian or other guard dogs are to be employed in the services of the company,
sufficient evidence that all existing regulation relating to animal health and certification have
been complied with; and
(c) such further information as the Minister may specify.
(3) An application for licence shall be accompanied by such fee as the Minister may prescribe.
(4) An application for a licence shall be accompanied by a statement setting out the conditions of
service (including salaries) of the employees or prospective employees of the company making
the application.
The consequence of this neglect is that the legal authority, rights and powers of private security
providers is determined more by a piecemeal array of legal privileges and assumptions than by
clear law. True, there has been legislation passed concerning the registration, licensing,
identification and training of private legal personnel. However, the main aim of this legislation is
45
to regulate those who operate within the industry, and to check those who wish to enter it against
certain criteria and minimum training standards. The legislation does not deal with powers per
se. There is very little in Nigerian legislation, and even less in the common law, that permits
security guards, even licensed guards, to wield specific powers. Indeed, in two jurisdictions this
fact is specifically mentioned in security licensing legislation. Section 1 of the Private Guard
Companies Act 1986 (PGC) says that the holder of any licence can carry out the functions
authorised by the licence.
The lack of legislation is confusing for security personnel and the public alike. Nowhere do
specific ‘policing’ laws directly and consistently focus on the way that private security personnel
are empowered to act or to be given immunity from civil suit or criminal charges. Moreover,
there are few legal decisions and precedents emerging from the courts. Hence it is difficult for
anyone to find a satisfactory body of law on the subject. In contrast, public police have coercive
and intrusive powers that are delineated ‘in more or less clearly defined circumstances.’ These
delineations reveal distinct differences between the powers of public and private officers and
agents. For example, public police are given statutory immunity from civil suit in circumstances
where their beliefs and acts are ‘reasonable.’ Private personnel are afforded no such luxury.
Indeed, private security remain vulnerable and constantly run the risk of being sued in the torts
of assault, false imprisonment, intentional infliction of mental distress, defamation, nuisance and
trespass to land and to person. This is not to say that police do not run these risks, but because
they have immunities in place, the police are far less likely to find themselves on the losing end
of a civil suit brought by an aggrieved person. Moreover, public police may act to prevent the
commission of an offence before it actually happens (acting upon a suspicion). This concession
is not granted to private security personnel (or anyone else for that matter). Public police powers,
duties, rights, responsibilities and immunities have been so often debated in the courts that there
is now a large and continually expanding body of law on these issues. The same cannot be said
for private security law.
Legal Authority
The legal powers, rights and immunities of private security personnel are obscurely and
confusingly located across a range of fields: the criminal law; the law of property; the law of
46
contract (both in terms of contracts of employment, and the contracts that apply to paying
customers whenever they enter a private sports or entertainment venue); and employment law.
The consequence of this is that there are many bits and pieces of common law, general law and
legislation that come together to form what could loosely be referred to as ‘the law of private
security.’ The law of property, for example, grants to the owner of private property the power to
require visitors to leave the premises (using reasonable force if necessary), or to subject visitors
to stipulations (such as a search) prescribed and advertised by the property owner. Similar
powers exist for employers over employees. Each of these powers can be delegated to agents
(private security) who are entitled to wear uniforms, and even to carry a firearm if they have the
correct training and licence. Other possibilities for confusion emerge from the common law
rights of persons to sue others for breach of their rights of liberty. For example, store detectives
who detain shoplifters and thieves upon reasonable suspicion of theft have had damages awarded
against them (paid to wrongly accused suspects) in some cases, but not in others. The outcome, it
seems, depends upon the level of restraint, the length of time involved, and the extent to which
the accused person was given an opportunity to allay suspicion. Sometimes the courts protect the
public against invasions of privacy by private sector security personnel, but in other
circumstances they do not. The legal reasoning is often unclear.
The confusion generally stems from the fact that the laws that apply to private personnel have
developed over the years to apply not to those doing similar work to the police but to private
citizens, landowners and employers. They translate into something potentially quite different in
the hands of the agents of these individuals. There are thus some justifiable concerns such as ‘If
private security personnel are in reality no different from ordinary citizens, a law which treats
them alike seems most appropriate. But if in reality they are not, and the law still treats them as
they are, it becomes inappropriate.’ Private security personnel are different from the public in
general. On a daily basis they search bags, forbid entry, bar exits, ask probing questions, detain
people, confiscate property, carry out inquiries and operate covert surveillance equipment, most
significantly CCTV. Yet the powers under which they operate were designed for other purposes.
Is there another way forward that can remedy the malaise? These are questions for thought.
47
Manifestations of Empowerment
There has been, in the past decade or so, some attempts by governments to grant powers to
persons other than to the sworn officers. Some of these may be able to provide a model of
legislation that could settle some ambiguities. A common manifestation of empowerment is
where a parliament or legislative body creates specific legislation giving the right to certain
trained operatives, who have been employed for specific tasks, to engage in a particular state-
sponsored task or role. These tasks carry with them specific, albeit limited, powers. There are a
number of current examples that come to mind internationally as well as nationally.
4.0 Conclusion
As policing moves more and more into private hands, the traditional legal powers that apply to
‘policing’ are becoming outdated. The powers and immunities of private security personnel are
often unclear and inconsistent, dependent upon fine distinctions and differ remarkably from
those of the public police even though they are often carrying out many of the same tasks. What
should be done to remedy this situation? There is a good argument to continue to explore the
development of private security laws with specific powers and immunities granted to certain
personnel who have been suitably trained, whether Community Support Officers or Contracted
Protective Security Officers. Whatever path is chosen, the exercise in making the choices and
debating the required legislation would, arguably, lift the profile of private operators and their
associations, bolster training standards and accountabilities, improve public confidence, and
enhance policing effectiveness and cooperation generally.
5.0 Summary
Private security personnel and private operatives are now undertaking some of the roles
previously and solely in the realm of public policing, but the laws that apply to empower and
restrict them are not in the same league. They are, for the most part, vague and inconsistent.
Private security/ legal issues rarely come before the courts and there is little legislation that
applies. This situation creates a rather opaque ‘policing’ world. There is no broadly based
legislation giving specific powers to all licensed guards. Parliaments have avoided legislation
other than to set up licensing regimes. They have not specifically set out immunities, preferring
to infer that they apply once the powers under legislation have been exercised appropriately. It is
48
a difficult task to specify private guard powers across the board, given the many forms and
varieties of private operatives and the multitude of activities in which they may be engaged at
any one time or over a period of time. The most common option for private guards is the ‘do
nothing’ option. There are common law provisions and ad hoc legislation that applies to issues
such as use of force, trespass to land, defence of property, search and seizure, and breach of
privacy which apply now to all people including security personnel. Leaving these areas legally
ambiguous encourages fewer suits against ‘private’ police, forcing those aggrieved to negotiate
more and litigate less.
49
Odinkalu, C.A. 2004, “Changing Roles of Civil Society in Nigeria: Crime and Policing in
Nigeria: Challenges and Options”. Eds. Ikeja Malthouse Press Limited. Chapter 20: 349-
366. (ed.) Nigeria.
Private Guard Companies Act, CAP 367 of 1986 by the Law of the Federal Republic of Nigeria
Sarre, R. 1995, “Keeping an Eye on Fraud: Proactive and Reactive Options for Statutory
Watchdogs”
Van Steden, R. 2007, “Privatizing Policing”. BJU Legal Publishers
Wakefield A. 2003, “Selling Security: The Private Policing of Public Space”. Willan Publishing.
Zedner, L. 2006, “Liquid Security: Managing the Market for Crime Control” (2006) 6(3)
Criminology & Criminal Justice 267
50
UNIT 2: ORGANIZATION OF PRIVATE SECURITY COMPANY
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor Marked Assignment
7.0 References / Further Reading
1.0 Introduction
Private security is different from public security in several significant ways. Private security is
provided to clients for a fee, and except in special circumstances, has its jurisdiction limited to
the property owned by the client. Rather than service provided in the interests of the public,
security is provided to protect the interests of the client. Traditionally, legislation in Nigeria has
recognized these differences and has not extended the same powers of detention, arrest, search
and seizure to security service providers as the police. Private security includes measures taken
by individuals, partnerships and corporations designed to protect their interests. Generally
speaking, these measures involve the protection of property (such as the things produced by the
client and the facilities and equipment used in its production), personnel (including both the
people that work on the site and members of the public having access to it), and information
about the products, property, facilities, process and so on (industrial security is rapidly becoming
one of the most important aspects of private security).
Companies wishing to have private security without the costs associated with developing their
own security unit will often choose to contract the services of an outside security company. By
contracting the services of these agencies, a company avoids incurring the costs associated with
managing and administering the function. For example, the costs associated with monitoring the
performance of individual security guards, training, providing benefit packages, and so on, are
avoided. These administrative and other costs are divided among all of the clients of the security
firm, decreasing the cost of providing these services to any one client. Companies choosing to
employ contract security also can avoid any difficulties that may be encountered through union
51
and employee contract negotiations. These concerns remain with the owners of the private
security firms.
Private security firms also operate independently of the politics of the host company. Employees
may feel that they can trust a security guard from outside the company, and therefore the
employee may be more cooperative during investigations than they would be if internal agents
were used. Finally, independent security companies may be able to develop expertise beyond the
range of experiences usually associated with in-house security operations. Depending on the
nature of the security needs of the host company, it may be more beneficial to go to the experts
rather than use in-house or general contract personnel. The organisation and category of Private
Security differs from organisation to organisation.
2.0 Objectives
The aim of this unit is for student to:
• Understand the structural organisation of PSCs
• Understand the job specialisation
• Understand Staff Overturn and Job Equalities
3.0 Main Content
Organizing is the process of structuring human and physical resources in order to accomplish
organizational objectives, which involves dividing tasks into jobs, specifying the appropriate
department for each job, determining the optimum number of jobs in each department, and
delegating authority within and among departments. One of the most critical challenges facing
security managers today is the development of a responsive organizational structure that is
committed to quality. The framework of jobs and departments that make up any organization
must be directed toward achieving the organization’s objectives. In other words, the structure of
a security business must be consistent with its strategy. Managers give structure to a security
firm through job specialization, organization, and establishment of patterns of authority and span
of control.
The Organizational chart describes the command structure and responsibilities of officers of a
limited-service security firm. As their client grow in size, security managers are faced with the
need to specialised jobs in order to ensure efficient coordination and control of activities. These
52
job groupings are usually called departments. In general, departments might be grouped as
Office (those departments in which employees have contact with client, such as supervisory
staff), and field (where employees have little client contact, such as mechanical and electronic
unit). However, separating departments by function is the most common method of organizing a
security business. Figure 1a and 1b outlines the departmental structures of a limited-service
security firm and a multi-service security firm with more than 500 operational staff. There may
be as few as 2 or as many as 50 employees in a particular department.
Chairman/ Managing
Director
53
Chairman/Chief Executive
Officer
Managing Director
Monitoring Guarding
Scheduling Patrolling
Head, Human Head, Marketing Head, Head, Technical
Resource and Sales accounting
Response Escorting and Maintenance
Department Department Department Surveillance Department
Recruitment
Training
Labour relations
Payroll
Benefits
Figure 1b: Multi-Security Service Firm Structure
54
There are also provisions made for transport and clothing maintenance of. In this way, for the
categories mentioned, the total salary package, i.e. basic wage plus adjustments for danger,
armoured vehicle, activity, transport and clothing are:
Health and Safety
Uniforms are compulsory.
The carrying of arms is not authorised. It is reserved for public police in certain cash or
valuables in transit operations and for surveillance and protection of high-risk facilities.
Shooting practice is compulsory for public police.
The primary responsibility of the heads that make up the marketing and sales department is
sales, or the selling of the security equipment and services to individuals and groups. Sales
managers sell equipment and services to potential clients through advertising, attendance at
association and conference meetings, and direct contacts. The marketing and sales
department is also removed from most of the day-to-day operational problems faced by other
departments.
55
In many security firms, the accounting department combines staff functions and line
functions, or those functions directly responsible for servicing clients. The accounting
department’s traditional role is recording financial transactions, preparing and interpreting
financial statements, and providing the managers of other departments with timely reports of
operating results (line functions). Other responsibilities, carried out by the assistant controller
for finance, include payroll preparation, accounts receivable, and accounts payable (staff
functions). Another dimension of the accounting department’s responsibilities deals with
various aspects of operations, cost accounting, and cost control throughout the firm.
b) Supervisory Department
Typically, the supervisory Staff in a limited-security firm includes principally Chairman and
a team. Responsibilities of the supervisor include monitoring, staffing and recruitment,
training and orientation. However, in multi-security service firm the sole responsibility of the
supervisory department is to monitor the fielded security guards as well as electronic
surveillance unit. The department has subunits such as monitoring, scheduling and response
unit. The heads of these units need a good interaction with the heads of operations department
to effectively function.
c) Operations Department
The operations department carries the core responsibility of a security firm. The operation of
the guards is their key function. Their main responsibility is to field specialized and trained
guards for all purposes including general guarding, patrolling, escorting, surveillance and
responses to alarm breaking and entering. Other responsibilities are to draft a detailed
operation and scheduling/duty shift for fielded guards, and to liaise with the public police
whenever the need arises.
d) Mechanical and Electronic Security Department
Typically, the mechanical and electronic security department’s responsibilities include
preventive maintenance; repair; replacement; improvement and modification to equipment;
and ensuring uninterrupted provision of alarm and tracking system. Other responsibility
includes the notification of the operations department in events of alarm breaking and
entering as well as GPS tracking of properties or persons and CCTV monitoring.
e) Unitary Staff (Staff with various positions)
This includes secretaries and other generally staff who do not belong to specific department
but assist in the day-to-day running of the organisation. They are labelled secretaries,
56
personal assistant and public relations officers. Their responsibilities are diverse; however,
they usually assist the top management with secretarial, records and communication issues.
f) Subordinate staff
The primary function of subordinate staff is clerical and cleaning jobs.
g) Managing Director
In addition to being in charge of overseeing all of the departments that have been discussed,
the Managing Director (MD) is responsible for defining and interpreting the policies
established by top management i.e. the Owner/Chairman/Chief Executive Officer. The
general manager serves as a liaison to the owner or corporate parent, sets (or communicates)
the overall strategic course of the firm, sets goals, coordinates activities between departments,
and arbitrates interdepartmental disputes. The MD also has corporate-level responsibilities,
participates on civic boards and committees, and engages in industry-related activities such as
serving on the association. In addition to possessing a high level technical skill (i.e., a
thorough understanding of each operating department in the firm), the general manager must
also be decisive, analytical, and skilled with both computers and people. He or she must be
able to see the big picture and ensure all of the parts of the firm fit into the overall
organization.
3.2 Job Description and Specialisation
There are as many degrees of job specialization within the security industry as there are types
of organizations. This ensures total control over a project from beginning to end, and many
people find it motivating to see the results of their efforts. However, as the demand for
additional services increases (i.e., if additional clients are added or another area of security
service), it becomes more and more difficult for an individual to do his or her job well. One
benefit of the increased workload is increased revenue.
As a general rule, specialization increases workers productivity and efficiency. On the other
hand, delegating jobs increases the need for managerial control and coordination. A crucial
element of security management is coordinating the many specialized functions within and
outside the firm so that the organization runs smoothly.
Specialization has its own set of problems; it can result in workers performing the same tasks
over and over again. A point can be reached where the degree of specialization narrows a
job’s scope that the worker finds little or no satisfaction in it. Signs of overspecialization
include workers’ loss of interest, lowered morale, increasing error rate, and reduction in
service and product quality. One solution to this problem is to modify jobs so that teams can
57
perform them. Instead of a single security post attendant being assigned to a post, a work
team might be assigned to the post. Some establishments use teams regularly throughout the
organization; others use teams more selectively. Teams can be directed by a head or can be
self-headed. The idea behind self-headed work teams is for workers to become their own
managers, which increases their self-reliance as well as develops a talent pool. This brings
about the concept called ‘quality circle’-which emphasizes the belief that the people, who
actually do the work, rather than their managers, are the ones who are well informed in
identifying, analyzing, and correcting problems in the course of operation. The idea
originated in Japan in 1962. The quality circle is a group of employees, usually fewer than
ten, who perform similar jobs and meet once per week to discuss their work, identify
problems, and present possible solutions to those problems. For example, a quality circle
might be formed among front desk agents. The group forwards its findings and proposals to
management for evaluation and action. Quality circles are most successful when they are part
of an organization-wide improvement effort. Nigerian business organisations picked up on
the quality circle concept in the mid-1990s.
3.3 Pattern of Authority
The delegation of authority creates a chain of command, which is the formal channel that
defines the lines of authority from the top to the bottom of an organization. The chain of
command consists of a series of relationships from the highest position in the organization to
the lowest. The chain of command specifies a clear reporting relationship for each person in
the organization and should be followed in both downward and upward communication.
Following the chain of command enables new employee, no matter what his or her position,
to know exactly for whom and to whom he or she is responsible. Managers consider the
distribution of authority in this manner. Authority defined simply, is the organizationally
sanctioned right to make a decision. Authority can be distributed throughout an organization
or held in the hands of a few selected employees. Decentralization is the process of
distributing authority throughout an organization. In a decentralized organization, an
organization member has the right to make a decision without obtaining approval from a
higher-level manager. Centralization is the retention of decision-making authority by a high-
level manager.
Traditionally, security management has been very centralized, probably due to its roots in
small, owner-operate management style. In recent years, as the security industry has
expanded, decentralization has become a more frequent style of operation. Decentralization
58
has several advantages. Managers are encouraged to develop decision-making skills, which
help them advance in their careers. The autonomy afforded by this style of operation also
increases job satisfaction and motivation, especially when employees are encouraged with
free hands to perform their duties. In this case the profitability of the organization is bound to
increase. Many security organizations have begun to empower employees and supervisors to
make decisions that typically have been made by managers. Additional challenges, control of
the process, and quality assessment become part of everyone’s job, and each employee is
given the authority to take positive actions that will lead to high quality and improved
performance.
Span of Control
Span of control refers to the number of people who report to one manager or supervisor. A
wide span of control results in a flat organization— that is, a large number of employees
reporting to one supervisor. A narrow span of control results in a tall organization, in which a
small number of employees report to a supervisor, necessitating a larger number of
supervisors. Note that these different controls can be implemented with the same number of
employees. No formula exists for determining the ideal span of control. The following factors
determine the most appropriate span of control: task similarity, training and professionalism,
task certainty, frequency of interaction, task integration, and physical dispersion.
When a large number of employees perform similar tasks, the span of control can be
increased. When the employees perform very different tasks, the supervisor must give each
subordinate more individual attention in order to keep in touch with the different types of
tasks; this requires a narrower span of control. For example, the supervisory department
manager might easily manage the electronic surveillance agents and fielded operational staff
until the increase in complexity and the standards for the various types of services provided
increase. At this time, the supervisory department manager’s span of control must be
narrowed. The better trained and more skilled a subordinate is, the less supervision is
required. Task certainty refers to the predictability of a task. Routine tasks allow management
to devise standard procedures for subordinates to follow, minimizing questions about the job
and widening the span of control. On the other hand, close supervision is called for when
tasks are ambiguous and uncertainty is great.
4.0 Conclusion
The most important strength of a functional organization is efficiency. The performance of
common tasks allows for work specialization, which increases overall productivity. Workers
develop specialized skills and knowledge more rapidly. Training is easier because of the
59
similarity of tasks and the resulting opportunities for inexperienced workers to learn from
experienced workers. This helps new employees to quickly learn the skills and behaviour that
lead to success and promotion in an organisation.
Coordination of activities within functional departments is easier than in more broad and
complex organizations. A functional organization fosters efficiency, teamwork, and
coordination of activities within individual units. However, the functional organization’s
most important strength is also the source of its greatest shortcoming. The success of security
provision as a business is measured by its overall performance and not by the performance of
any one department. It is sometimes difficult for each department to fully appreciate its role
in the overall success of the organization. Some means must be found to coordinate the
activities of functional departments and to set strategies and goals. This suggests that a
functional organization demands strong leadership.
5.0 Summary
The four basic components of organizational structure include job specialization,
departmentalization, patterns of authority, and span of control. Job specialization includes
increased workers productivity and efficiency, the need for managerial control and
coordination. Work teams can be used to alleviate the routine caused by job specialization. A
similar concept, the quality circle, can also enhance employee productivity. The department
heads report directly to the managing director. In smaller security firms, all departments
might report directly to the Chairman. While patterns of authority remain centralized in many
security businesses, increasingly employees have become empowered to make decisions that
typically have been made by managers. Decentralization is the distribution of authority
throughout an organization. Centralization is the retention of decision-making authority by a
high-level manager. Span of control refers to the number of people who report to one
manager or supervisor. In a narrow span of control, fewer subordinates report to each
supervisor, resulting in a tall organization. In a wide span of control, a larger number of
subordinates report to each supervisor, resulting in a flat organization. Staffing is an ongoing
challenge in the security industry because of the high percentage of employee turnover.
Successful staffing depends on providing adequate job descriptions, including job
specifications, as well as realizing that job descriptions must be flexible. In some cases, it
becomes necessary to redesign jobs; this can involve job rotation, job enlargement, job
enrichment, and flex-time. Employees must be properly trained; effective training includes
problem solving, problem analysis, quality measurement, feedback, and team building.
60
6.0 Tutor-marked assignment
1. Compare and contrast the concepts of centralization and decentralization in a security
organisation.
2. Examine the relationship between span of control and chain of command a security
organization?
4. A customer notifies the management that the security officers are not at their post and
during which a force entry was made and goods stolen. List the departments to which this
information must be conveyed and the actions they must take.
Barton Cunningham J. and Ted Eberle, “A Guide to Job Enrichment and Redesign,”
Personnel (February 1990): 56–61.
Brian Dumaine, “The New Non-Managers,” Fortune, February 22, 1993, pp. 80–84; and “A
Checklist of Qualities That Make a Good Boss,” Nation’s Business (November 1984):
100.
Bruneau, Thomas C. / Tollefson, Scott D. (eds.). 2006. Who Guards the Guardians and How:
Democratic Civil-Military Relations. Austin, University of Texas Press.
Frank D. Borsenik and Alan T. Stutts, The Management of Maintenance and Engineering
Systems in the Hospitality Industry, 4th ed. (New York: John Wiley & Sons, Inc.,
1997).
John M. Ivancevich, Peter Lorenzi, and Steven J. Skinner, with Philip B. Crosby,
Management: Quality and Competitiveness (Boston: Richard D. Irwin, 1996), 254.
61
Richards, Anna / Smith, Henry. 2007. Addressing the role of private security companies
within security sector reform programmes. Journal of Security Sector Management.
5:1.
Schreier, Fred / Caparini, Marina. 2005. Privatising Security: Law, Practice and Governance
of Private Military and Security Companies. DCAF Occasional Paper, 6.
Singer, Peter W. 2003. Corporate Warriors: The Rise of the Privatized Military Industry.
Ithaca, NY, Cornell University Press.
Vines, Alex. 2000. Mercenaries, Human Rights and Legality. In: Abdel-Fatua Musah / J.
‘Kayode Fatemi. Mercenaries: An Africa Security Dilemma. Sterling, Pluto Press.
169-197.
62
UNIT 3: HUMAN RIGHT AND PRIVATE SECURITY COMPANY
1.0 Introduction
2.0 Objectives
3.0 Main Content
Fundamental Human Rights & Its Abuse
4.0 Conclusion
5.0 Summary
6.0 Tutor-marked Assignment
7.0 References/further readings
1.0 INTRODUCTION
Traditionally, state has monopoly and the legitimate use of force. But sometimes beyond the
state’s control of particular circumstances, private security organisations become more
helpful especially when it comes to providing security for corporate persons or entity.
Because these private security are big business and sometimes it becomes easier for state to
give up those responsibilities. The implications of this proliferation of private security
companies for international law and human rights are only beginning to be appreciated, as
potential violations and misconduct of their employees have come to light in Africa. This
Unit examines risk posed by private security company’s activity with respect to violation of
human rights.
2.0 OBJECTIVES
At the end of this Unit, you should be able to :
• explain the term Human Rights
• describe the types of Human Rights
• explain various ways in which human rights are violated by private security
companies.
63
or group made on society, some of which are protected by law, while others remain
aspirations to be attained in future. It also means the freedoms, immunities and benefits that
according to modern values, all human beings should be able to claim as a matter of right in
the society in which they live. Human rights means no more than that:
a) All states have a duty to respect the fundamental rights and freedom of all persons
within their territories.
b) States have a duty not to permit discrimination by reason of sex, ethnicity, religion or
language and
c) States have a duty to promote universal respect for human rights and to cooperate
with each other to achieve this objective.
The struggle for fundamental human rights dated back to the period of the great Magna Carta
of England (1215) the United State Declaration of Independence (1776), the French
Declaration of the Rights of man and the citizen (1789) and the American Bills of Rights of
1791, Universal Declaration of Human Rights (1948). The essence of these is the revolution
against authoritarianism, tyranny, slavery, discrimination and all other ways by which rights,
which are innate to all human beings have been suppressed.
65
right of access for the amount of compensation to a court of law or tribunal or body
having jurisdiction in that part of Nigeria - section 44
In Nigeria, the private Guards Act of 1986 prohibits private security companies from carrying
firearms. But private security companies are nevertheless able to provide an armed
component to their services through various arrangements with the Nigeria Police and most
PSCs of any size and standard have a number of mobile police officers (Mopol) permanently
seconded to their operations. Mopol Officers are equipped with fully automatic weapons
usually AK-47s or FNs.The reliance on Mopol for armed private security raises a number of
operational and ethnical challenges.
1. Right to life: The use of armed guards present particular risks in terms of legitimate
(i.e. in lawful self defence), illegitimate (e.g. use of excessive force and accidental
(e.g. negligent discharge), killing of local people and/or employees.
2. Right not to be subjected to torture, cruel, inhuman and/or degrading treatment
or punishment: Many private security companies have poor human right records;
they run a serious risk that they may be complicit in acts of inhuman treatment or
torture. Often times personnel of private security companies have been found wanting
in detaining and subjecting criminal suspects to torture before they are handed over to
the police.
3. Right to a fair treatment: Private security companies are likely to detain individuals
in the course of carrying out their duties. Sometimes, the detainee’s rights are likely to
be violated if they are held and placed in an inhuman environment or condition, for
example without food or water, or in extreme heat or cold environment.
4. Right to freedom of movement: In some cases, security companies may infringe on
people’s right to free movement. For example, illegitimately obstructing access roads
66
using check points and road-blocks, thereby making land inaccessible to the local
population. This could constitute an infringement to human rights.
5. Right not to be subjected to slavery, servitude or force labour (including sexual
and economic exploitation): In extreme case, private security companies may
forcibly enlist the local people, either for their own purposes (for example the
provision of food, domestic services or sex) or for purposes that indirectly benefit a
company (for example land clearance and other forms of unskilled labour). Private
security companies may also be posted to ensure that company’s employee are unable
to leave the factory, creating a situation of forced labour.
4.0 CONCLUSION
This Unit sees fundamental human right as the freedom, immunities, and benefits that
according to modern values, all human beings should be able to claim as a matter of right in
the society they live. Hence government has a duty to respect the fundamental rights and
freedom of all persons within their territories. And no person or persons have right to violate
these rights.
5.0 SUMMARY
In this unit we have discussed the meaning of the term Human Rights as well as the various
types of rights and how not to violate this rights as enshrined in the nation’s constitution.
7.0 REFERENCES
Brooks, D. (2002) Protecting People. The PMC Potential, comments and suggestions for the
UK Green paper on Regulating Private Military Services (Alexandria International
Peace Operations Association).
Sokefun et al (2008). Human Rights Law Lagos: National open University of Nigeria
67
UNIT 4: TRAINING AND DEVELOPMENT
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Training is intended to provide persons with the occupational and behavioural skills and
attitudes necessary to professionally function as a security guard as required by provincial
acts, regulations and in accordance with other legislation. Successful completion of basic
training should provide security guards with the concepts and knowledge that they may
function effectively and efficiently as security staff. The subjects covered should be intended
to provide security guards with a sound basis on which to deal with a myriad of on-the-job-
responsibilities in an appropriate manner. Many tasks performed are quasi law enforcement
in nature, where good public relations and awareness of the limits of legal powers and the use
of force are extremely important. On the successful completion of training, security guard
candidates should be able to properly:
a. deal with the public in a professional and ethical manner;
b. arrest/detain people within the limits specified under the Criminal Code (Nigeria),
and be aware of the rights and freedoms of individuals;
c. communicate effectively, both verbally and in writing;
d. present verbal and material evidence in Court;
e. write reports, protect evidence and conduct themselves appropriately in court;
f. direct traffic;
g. detect or prevent thefts and vandalism;
h. report and deal appropriately with perimeter protection systems, intrusion, fire,
carbon dioxide, water, smoke, alarms, etc.;
i. react and take appropriate measures in all emergency situations;
j. respond to bomb threats; and
k. perform other duties as required of security guards
68
2.0 Objectives
This unit will help the students:
• Understand the training criteria in security operation,
• Understand terminologies and content of training course for private security guards
• Examine the importance of basic training for private security guards in general
3.0 Main Content
In Nigeria, private security legislation is in place defining several criteria which must be
fulfilled before an individual is allowed to perform guarding activities and private security
services. Once these criteria are fulfilled, this individual is officially authorised by a
competent authority to perform such activities. One of these prerequisites is basic training for
private security guards, exclusively conducted by an officially licensed or recognised training
institute. This basic guard training covers chapters related to the basic legal framework,
security procedures, health and safety provisions, conflict management, customer care and
communication, quality, first aid and other indispensable information and skills.
69
In addition to providing the framework for effectively selecting private security officers, the
Ministry of Interior and NSCDC on Guidelines calls for a formal mechanism to establish
minimum training requirements certified by a regulatory body. Although the regulatory body
should mandate the minimum training requirements, there should be cooperative efforts by
these companies to mandate consistent requirements. All entities or persons providing
security officers training should also be certified by a regulatory body. Training Criteria are
the proposed training topics considered essential for proprietary or contract security agency to
consider in the training of their private security officers. This guideline prescribes specific
recommended hours of training and acknowledges different ways in which a security officer
may receive this training or demonstrate proficiency to perform the duties of a private
security officer. For example, training may be computer based, classroom, self-study, or other
methods of delivery. Consideration should be given to providing the appropriate length and
content of pre-and-post assignment training dependent upon each officer’s assignment. It is
further recommended that all training be accompanied by an appropriate assessment and
evaluation to measure the security officer’s knowledge of the training subject. Further, testing
should be appropriate to subject matter, that is, written or performance. The following
outlines are some of the envisaged criteria:
• Entry qualifications
For security guards:
– Primary education certificate, Secondary Education Certificate, Vocational Training
Certificate Level 1, or other equivalent or higher level qualifications.
– Meet the necessary requirements for carrying and using firearms.
For security supervisors:
– Secondary Education Certificate, completion of A levels, Vocational Training Level 2,
professional technician qualifications, or any qualifications which might be required, or
equivalent or of a higher level.
• Basic training
Both theoretical and practical is compulsory for security guards. They must work through a
series of vocational training modules in cycles. Once they have passed official knowledge
and skill tests, the relevant regulatory bodies confer the correct authorisation.
Continuing Vocational Training
The law sets down the provision whereby security companies have to guarantee the
organisation of refresher courses and the attendance of their staff in areas which have been
70
modified or substantially changed, or those in which a greater degree of specialisation is
advisable.
In-house vocational training or through registered training centres
For security guards, refresher or specialisation courses must be 20 study hours minimum.
Every security guard must do at least one course per year. This regulation is still to be
approved by the Ministry of Interior.
• Training bodies
Training centres (which can be set up by security companies themselves) must have the
necessary authorisation from the Ministry of Interior and State Security Department. The
centres must meet a series of requirements in terms of infrastructure and teaching staff
qualifications.
Vocational training during or outside working hours
Private security companies are obliged to pay their staff for hours spent on vocational training
outside working hours and these may not be compensated through reductions in the number
of hours worked.
• Financing training
Prior training is usually organised and financed by companies in the sector. In the case of
training carried out in registered training centres, the costs of training are met by the trainee.
• Training recognition/evaluation
There are official titles of security guard and security manager.
3.2 The content of training course for private security guards
There is need for private guards to know the basics so that they can work safely and carry out
duties in a professional way. The law in Nigeria states that they must receive adequate
training. This unit outlines all the important areas needed for this basic training. Training
courses are designed to help private guards pass the provincial exam and earn security guard
certificate. The course is written directly to trainees, the user. This means that trainees should
actively work with their books. Feel free to underline important ideas, write comments in the
white spaces, and answer questions right in the book. This will help remember the
information better than if it is just read for the sake of it. The course workbook should be
written in plain language, have a number of study aids that will help trainees learn faster and
absorb the content in the material.
Before the content of each unit:
71
• a list of the objectives for the unit should be outlined. These are the main things that
will be learnt in the unit;
• in some chapters a pre-test is designed so that trainees can already know about the
material in the unit;
• an outline of what’s coming up in the unit.
At the end of each unit:
• a review of the important points from the unit.
Content Outline and Proficiency Certification
For the various personnel to be properly certified in order to be enhanced in terms of
promotion and elevation, certificates, diplomas and degrees have to be awarded to trainees.
Researchers recommend the award of a bachelor degree, or master degree or even a doctor of
philosophy for anyone who occupies the position of Director of Security Management and
Head of Planning and Coordination division. In addition to these the award of a diploma and
certificate to any of the above personnel, through long-term courses and short-term courses
may be an added advantage. Conversely, private guards in law enforcement section,
patrolling, traffic control, monitoring units, schedule planning, design coordination and
customer care unit may have a bachelor degree from a relevant discipline or its equivalent.
Additional certificates and diplomas from long-term and short-term training courses may be
added advantage.
The Security Guard and the Legal System
An Introduction to Criminal Law
The Common Law and the Charter of Rights and Freedoms
Powers of Arrest
Use of Force
Common Offences
Common Defences
Access Control and Alarm Systems
Access Control Systems
Technology Used to Control access and Egress
Materials Access
Alarm Systems
General Operating Procedures
Traffic Control
72
Legal Authority to Control Traffic
Principles of Traffic Control
Correct Hand Signals
Note Taking, Reports and Evidence
Observation Skills of the Professional Security Guard
Powers of observation
How to Improve your Senses
Taking Notes
Introduction to Reports
Evidence
Protecting a Crime scene
Response to Immediate Crisis
Fire Safety
Fire Classification Symbols
Fire Extinguishers
Methods of Alarm Activation
Bomb Threats
Bomb Threats by Telephone
Written Bomb Threats
Evacuation
General Patrol Tactics and Techniques
Patrolling
What to watch for while on patrol
Liability for breach of duty
Labour Disputes
What is Labour Dispute?
Duties of a Security Guard During a Strike
73
Armoured Car Company – A company which, for itself or under contract with another,
transports currency, securities, valuables, jewellery, food stamps, or any other item that
requires secured and insured delivery from one place to another with armed personnel.
Armoured Car Personnel – An armed employee of an armoured car company who is
engaged exclusively by that company, and is liable for the safe transportation, care, and
custody of valuables.
Background Verification/Check – The process of checking an individual’s character,
general reputation, personal characteristics, or mode of living for consideration of
employment, promotion, access to sensitive assets (such as national information), or for
continued employment. Elements of a background verification/check can vary widely,
and may include information from credit bureaus, courts records repositories,
departments of motor vehicles, past or present employers and educational institutions,
governmental, occupational licensing or registration entities, business or personal
references, and any other source required to verify information that was voluntarily
supplied.
Computer Based Training – Any training that uses a computer as the focal point of
instructional delivery. Training is provided through the use of computer hardware and
software that guides the learner through an interactive learning program.
Contract Security Service – Protective services provided by one entity, specializing in such
services, to another entity on a compensated basis.
Criteria – The individual (criterion) or collective stated qualifications (criteria) to be
compared with an applicant’s or employee’s actual credentials, experience, or history in
determining suitability for an employment decision (hiring or otherwise).
Critical Infrastructures – The sophisticated facilities, systems, and functions, which include
human assets, physical and cyber systems, that work together in processes that are
highly interdependent to provide the foundation for national security, governance,
economic vitality.
Electronic Medium Based Training – Any training that uses an electronic technology as a
method of effectively conveying instruction and/or information. Electronic technology
includes but is not limited to video or audiocassettes and video conferencing.
Homeland Security – often referred to as internal security. This is the federal government
efforts, in partnership with state, local governments and the private sector, to develop,
coordinate, fund and implement the programs and policies necessary to detect, prepare
74
for, prevent, protect against, respond to, and recover from terrorist or other attacks
within Nigeria.
Private Security – An independent or proprietary commercial organization whose activities
include safeguarding the employing party’s assets, ranging from human lives to
physical property (the premises and contents), responding to emergency incidents,
performing other functions as outlined by the PSCs Act.
Private Security Officer – An individual, other than armoured car personnel or a public
employee (federal, state, or local government), employed part or full time, in uniform,
hired to protect the employing party’s assets, ranging from human lives to physical
property (the premises and contents). The definition excludes individuals who are not
employed in the capacity of a private security officer.
Public Safety – Support mechanisms that sustain the life and vitality of a community’s
health, safety, and social stability by performing such services as law enforcement, fire
prevention, personal and facility security, disaster preparedness, and emergency
medical assistance. In some instances, public safety may refer to law enforcement
officers, fire-fighters, rescue squads, and ambulance crews. In other instances, public
safety properly encompasses private security officers, as well.
Regulatory Body – Any state board, commission, department, or office, except those in the
legislative or judicial branches, authorized by law to conduct adjudicative proceedings,
issue permits, registrations, licenses, or other forms of authorization to offer or perform
private security officer services, or to control or affect the interests of identified
persons.
Selection – The act or process of choosing individuals who possess certain characteristics or
qualities.
Threat – An indication of something impending that could result in damage or injury.
Training – An act, method, or process of instruction; to teach so as to make fit, qualified, or
proficient.
3.3 Underlining the Importance of Basic Training for Private Security Guards In
General
From the outset, private security training has been a central concern for Civil defence.
Continuously training is one of the key components in raising workers’ performance, quality
standards, professionalism and also employment in the private security industry. The Federal
Government is determined to continue to build a professional service industry, providing
75
high-quality services to customers and high-quality employment to private security guards. It
is particularly crucial for an industry committed to a high level of quality that all entrants into
the private security profession receive at least a minimum level of basic training, which
provides them with the relevant skills required to adequately carry out their function. These
minimum training standards must be made compulsory and integrated into a sound regulatory
and licensing framework at the national level thereby ensuring that all private security
companies and employees meet acceptable quality standards.
Specialised training courses allow private security personnel having already acquired a solid
basic skill set to further fine-tune and expand their knowledge and expertise. In the interest of
fair competition, based not solely on price, but equally on considerations of professionalism
and the right level of service, it is also vital that the same rules and thus the same costs in
relation to high-quality training apply to all companies active in the private security industry
within a single national market. High-quality training standards must be safeguarded against
‘free riders’ benefiting from the investments made by others in private security training, but
refraining from investing in training themselves. The Government therefore calls upon the
Association of Private Security Practitioners of Nigeria (APSPN) and Security Institutions to
take these elements into consideration and reiterate and support the essential role of basic
guard training in general and for private security guards operating in the country.
4.0 Conclusion
Effective security today requires workers who are familiar with all aspects of a facility’s
security system for assessing and containing potential threats. Security officers are required
to be well versed in emergency procedures and able to work with an organization to ensure
that emergency procedures can be implemented successfully. They are also required to be
able to work closely and effectively with public safety and police personnel. The ability of
Nigeria companies to protect the nation’s critical infrastructure and contribute to homeland
security efforts depends largely on the competence of private security officers. Therefore,
private security officers and applicants for private security officer positions should be
thoroughly screened and trained, in accordance with outlined courses.
5.0 Summary
Private security officer selection and training criteria vary from company to company ranging
from comprehensive training requirements for every private security officer to basic training.
One of the main goals of the private security officer selection and training is to develop and
76
encourage the adoption of minimal national selection criteria for security officers. The
development of such minimum criteria has become essential for enabling the private security
industry to effective perform their duties to clients as well as meeting the demands associated
with new ever changing security initiatives.
6.0 Tutor-marked assignment
a. List and explain five core aspects of the private security guards training curriculum.
b. Examine the role of National Security and Civil Defence Corps (NSCDC) in the
training of Private Security Guards.
7.0 References/further readings
Anderson, Teresa. ‘‘Affairs of State.’’ Security Management. May 2001, pp. 83–84.
Castle, Reed A. A Study of the Security Officer. Commonwealth of Virginia, Department of
Criminal Justice Services: Schroeder Measurement Technologies, Inc., April 2002.
Conn. Gen. Stat. § 29-534 (2001). Private Detectives, Guard Services and Security Personnel.
Web site: http://www.cga.state.ct.us/2001/pub/Chap534.htm
Cunningham, William C., Taylor, Todd H. Private Security and Police in America: The
Hallcrest Report I. Portland, OR: Chancellor Press, 1985.
Cunningham, William C., John S. Strauchs, and Clifford W. Van Meter. Private Security
Trends 1970–2000: The Hallcrest Report II. Boston, MA: Butterworth-Heinemann,
1990.
Goodboe, Michael E. ‘‘The Development of an Entry-Level Model Curriculum, Optimum
Training Methodology, and Implementation and Evaluation Plans for Unarmed
Contract Security Officers.’’ Unpublished doctoral dissertation, Nova Southeastern
University, 1966.
Johnston, Les. ‘‘Regulating Private Security.’’ International Journal of the Sociology of Law,
Academic Press Limited. 1992, 20, pp. 1–16.
Ledward, A 2007, Private Investigator and Security Guard Training Manual
Pinkerton’s Center for Professional Development. Advanced Certification Training (ACT),
Volumes 1, 2, and 3. Arlington, VA: Pinkerton, Inc., 1997–2002.
Vocational-Technical Education Consortium of States. A Catalog of Performance Objectives
and Performance Guides For Security Guard. Detroit, MI: Wayne State University
College of Education and Michigan Department of Education Vocational-Technical
Education Service, 1978.
77
UNIT 5: EQUIPMENT AND ACCESSORIES
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
The demand for safety and the security industry in most urban centres, remains strong with
the increasing levels of insecurity by the population and the priority of improving commercial
and public safety. On the same vein demand for security and safety equipments in industrial
plants, commercial buildings, public facilities, oil/gas fields and mining operations, airports
and seaports has increased substantially.
2.0 OBJECTIVES
At the end of this unit you should be able to know the types of security equipment and
accessories in demand.
Audio Equipment: Includes Analog and Digital Recorders, Phone Recorders, Dictation
Pens, Watch Recorders, Audio Device Accessories, Digital MP3 Players Recorders,
79
Listening Devices and Microphones, Voice Changers, and White Noise Generators.
Cameras: Includes Body Worn Cameras, Bullet Cameras, Covert Cameras, Infrared, Internet
Cameras, Low Light Cameras, Nanny Cams, Night Vision Cameras, Photographic Cameras,
Pinhole Cameras, Security and Dome Cameras, and Wireless Cameras.
Detection Devices: Includes Bug Detection, Debugging Kits, Telephone Analyzer, Hidden
Camera Detectors, Metal Detectors, RF Signal Detectors, TSCM Equipment, Wire Tap
Detectors and Phone Security.
Personal Protection: Includes Detection Kits, Drug Test Kits, Infidelity Test Kits, Diversion
and Hidden Safes, Self Defence, M2 Flashcam, and MII Flashcam.
PI Kits: Includes DVR Kits, Surveillance Kits, Sunglass Kits, Hidden Camera Kits, and
Camera Detection Kits.
Phone Security: Includes Telephone Accessories, Telephone Recorders, Wire Tap Detection,
PI Audio, Voice Changers, and two-way Caller ID.
Recorders: Includes Audio Recorders, DVRs, Digital Video Recorders, Phone Recorders,
VCRs, Video Tape Recorders, and Time Lapse Recorders.
Spy Gear: Includes Novelty Gadgets, Specialty Items, Spy Gadgets, Computer Monitoring,
and Reverse Peep Hole Viewer.
80
GPS Tracker, Passive GPS Logging, iTrail w/ Magnetic Case
Introducing the Sleuth Gear iTrail:. A passive GPS logger, simply place the small iTrail unit
wherever you like - your car, children backpack, virtually anywhere! At only 1.5"x1.5" small,
the logger records location, speed, time, and displays this information on an easy-to-use
interface powered by Google Maps and Google Earth.
The H6001 includes both the iTrail and the Magnetic Car Case (Item #PGE1060)
Simply turn on the unit, and place it where you would like. The unit will constantly record up
to 120 hours of data. To retrieve the information, plug the unit into your computer via the
included USB charging cable. You can then download the information to a detailed printable
report and view in Google Maps or Google Earth. The iTrail is water resistant, meaning it can be
mounted outside as well. Strong magnetic box is available for vehicle mounting. When not in use, an
on-board motion sensor puts the unit to "sleep" to conserve battery power. LED status lights also
indicate when the unit is powered on, when it is tracking, and when the battery is low or the memory
is full.
Features:
• SMALL size (only 1.5" x 1.5")
• Motion detection to conserve battery life
• Up to 120 hours of data
• Multiple report formats (HTML, PDF, MS-Word, CSV, and more)
• Water resistant for outdoor use
System Requirements:
• PC with Windows 2000, XP, Vista, or 7
• USB 1.1 or 2.0
81
Specifications:
• Built-in motion detection
• 64MB memory
• Built-in rechargeable 750mAh Li-ion battery
• Cold start satellite acquisition time: <35 sec
• USB 1.1 and 2.0 compatible
• 2 LED indicators for power/status notifications
• Product size: 1.5" x 1.5" x 0.5"
• Product weight: 1.3oz
• Package size: 8.8" x 6.5" x 0.7"
• Package weight: 5.1oz
Includes:
• iTrail GPS Logger
• Magnetic Car Case
• Installation Mini-CD
• USB charge/transfer cable
Cell Phone Spy, Record Text Messages, Cell Phone Monitoring Device
The Cell phone Recon software allows you to covertly monitor all of the activities on your
cell phone. Log incoming and outgoing calls, incoming/outgoing text messages and emails,
and track phone location.
Features:
• Record all incoming/outgoing SMS messages
• Record incoming/outgoing/missed call log
• Record and track location of cell phone
• Record all incoming/outgoing emails
• Easy to install
• Secure control panel
82
• Possible to monitor multiple phones
The software has been designed to provide 100% confidentiality and to ensure that nobody
discovers that you are monitoring them.
Specifications:
• Cell Phone Recon is compatible with most smartphones, including phones using following
operating systems:
- Symbian OS 9.x
- Symbian OS 8.x
- Windows Mobile 6.x
- Windows Mobile 5.x/2003SE
- Android
- Blackberry
4.0 CONCLUSION
This unit shows that private security personnel need essential equipments to function
effectively. It includes simple equipment such as a handgun, handcuffs, a flashlight, handcuff
keys, other restraining devices, pepper spray, a baton, and other basic gear such as tape for
roping off a crime scene and a radio for communicating with other officers. Hence with
equipments the duties of providing securing lives and properties can be more efficient.
5.0 SUMMARY
We have been able to discuss the types and dimension of different security equipments and
accessories that are useful to private security. The types discussed here are not exhaustive.
John M. Ivancevich, Peter Lorenzi, and Steven J. Skinner, with Philip B. Crosby,
Management: Quality and Competitiveness (Boston: Richard D. Irwin, 1996), 254.
83
Richards, Anna / Smith, Henry. 2007. Addressing the role of private security companies
within security sector reform programmes. Journal of Security Sector Management.
5:1.
Schreier, Fred / Caparini, Marina. 2005. Privatising Security: Law, Practice and Governance
of Private Military and Security Companies. DCAF Occasional Paper, 6.
Singer, Peter W. 2003. Corporate Warriors: The Rise of the Privatized Military Industry.
Ithaca, NY, Cornell University Press.
Vines, Alex. 2000. Mercenaries, Human Rights and Legality. In: Abdel-Fatua Musah / J.
‘Kayode Fatemi. Mercenaries: An Africa Security Dilemma. Sterling, Pluto Press.
169-197.
84
MODULE 3
Unit 1: Functions of Private Security
Unit 2: Risk Analysis and the Security Survey
Unit 3: Challenges and Problems And Private Security Service
Unit 4: Computer and Information Security
Unit 5: Nigerian Security and Civil Defence Corps ( NSCDC)
1.0 INTRODUCTION
Private security firms are hardly likely to disappear, and have secured a substantial role, they
will need to be accommodated. Indeed, most security practitioners expect the role of private
companies to grow overtime. More thoughtful members of the industry argue that it needs to
prepare for these changes by providing better service to all communities. From the statement
above, if we all agreed that the private security has come to stay and in fact growing rapidly,
therefore it is important that we focus our attention at the functions, advantages and
disadvantages of private security companies.
2.0 OBJECTIVES
At the end of this unit, you should be able to:
Discuss the functions of the private security companies.
Explain the advantages and disadvantages of private security companies.
85
2. Security officers are often trained to perform arrest and control procedures (including
handcuffing and restraints), operate emergency equipments, perform first aid, take
accurate notes, write detailed report and perform other task as required by the contract
they are serving.
3. Many trained security officers carry weapons such as batons, firearms and pepper spray.
4. Many security officers are required to have bomb threat training and/or emergency crisis
training especially those located in soft target areas such as shopping malls, schools, and
any other area where the general public congregate.
5. The presence of security personnel tends to diminish theft, employee misconduct and
safety rule violation, property damage or even sabotage.
6. Security personnel also perform access control at building entrances and vehicle gates,
meaning they ensure that employees and visitors display proper possess or identification
before entering the faculty.
7. Security officers are often called upon to respond to minor emergencies (lost persons,
lockouts, dead vehicle batteries etc) and to assist in serious emergences by guiding
emergency responders to the scene of the incident inclining to redirect foot traffic to safe
locations and by documenting what happened on an incident report.
8. Armed security officers are frequently contracted to respond as law enforcement until a
given situation at a client location is under control.
9. Patrolling is usually a large part of a security officer’s duties. However, regular patrols
are, less accepted as an industry standard, as it provides predictability for the would-be
criminal, as well as monotony for the security officer on duty. Random patrols are easily
programmed into these systems, allowing greater freedom of movement and
unpredictability.
10. Armoured car guards (usually wear bullet proof vests) protect money and valuables
during transit. They pick up money or other valuables from businesses to transport to
another location.
Advantages of the Private Security Industry
a. It is an additional crucial resource in the fight against crime.
b. It is possibly more efficient than the police.
c. It has access to superior equipment.
d. It is a source of foreign direct investment.
e. It is an employer and therefore indirectly alleviates poverty.
86
f. The flow of skills transfer and skills upgrading and expertise can be transferred to
the local market.
g. They can indirectly be a source of intelligence gathering.
h. It has enhanced public security service especially where close working
relationships, formal or informal have been established.
i. PSCs have possibly assisted in stabilizing if not reducing, crime levels, though
empirical data is difficult to find.
j. PSCs have created another sector of the economy that makes a taxable turnover of
close to billions of naira per annum.
k. PSCs and PMCs as sources of employment generation may well have helped
lowering the unemployment rate in the country.
4.0 CONCLUSION
The future of the private security companies is bright. The more efficient private security
companies are in performance of their functions and duties, the greater the professional
88
development of the occupation since it is obvious that the state law enforcement agencies
cannot solely provide all the security needed in society.
5.0 SUMMARY
In this unit, we have been able to discuss the functions of private security companies. We
explained advantages of private security companies, after which we critically examined the
disadvantages.
Gumedze, S. (2007). The Private Security Sector in Africa: The 21st Century’s Major Cause
for Concern. Institute for Security Studies Occasional Paper 131 (December).
89
UNIT 2: RISK ANALYSIS AND THE SECURITY SURVEY
1.0 INTRODUCTION
2.0 OBJECTIVES
3.0 MAIN CONTENT
4.0 CONCLUSION
5.0 SUMMARY
6.0 TUTOR-MARKED ASSIGNEMNT
7.0 REFERENCES/FURTHER READINGS
1.0 INTRODUCTION
Among the hierarchical structure of a company is the security director. As a security director,
the responsibilities of protecting properties of company lie on him. Before the security master
plan is created, it is important to identify potential areas of loss and to develop and install
appropriate security counter measure. In this Unit, we will explain the need for security risk
assessment and security survey.
2.0 OBJECTIVES
At the end of this unit, you should be able to:
Explain Risks Management
Discuss Security Survey
Analyse Security Risk
Explain Security check list
90
A good risk management program involves four basic steps:
1. Identification of risks or specific vulnerabilities.
2. Analysis and study of risk, which includes the likelihood and degree of danger of or at
an event.
3. Operationalization of risk-management alternatives
a) Risk avoidance
b) Risk reduction
c) Risk spreading
d) Risk Transfer
e) Self-assumption of risk
f) Any combination of the above
4. Ongoing study of security programs
Risk is defined as (1) the possibility of suffering harm or loss and (2) the danger or
probability of loss occurring to one’s insured assets. Most of the risks affecting a given
enterprise or organization can be readily identified and therefore predicted. Risk should not
be confused with perils which are the causes of risk – such things as fire, flood and
earthquake. Nor should risk be confused with a hazard, which is a contributing factor to a
peril. While risk analysis is a management tool, the standards which are determined by
91
whatever management decides it wants to accept in terms of actual loss. To proceed in a
logical manner to perform a risk analysis, it is first necessary to accomplish some basis tasks:
1. Identify the assets in need of protection (people, money, manufactured products and
industrial process, to name a few).
2. Identify the kinds of risks that may affect the assets involved (internal theft, fire,
external theft).
3. Determine the probability of risk occurrence.
4. Determine the impact or effect on the organization in monetary values when possible
if a given loss does occur.
Risk assessment analysis is a rational and orderly approach, as well as comprehensive
solution to problem identification and probability determination. It is also a method for
estimating the expected loss from the occurrence of an adverse event. It provides
management with information on which to base decisions. The goal of risk analysis is to
strike an economic balance between the impact of risk on the enterprise and the cost of
implementing prevention and protective measures.
Risk analysis is not a task to be accomplished once and for all, it must be performed
periodically. The major resources required for performing a risk analysis is trained man
power. The time allocated to accomplish the risk analysis should be compatible with its
objectives.
RISK IDENTIFICATION
Risk identification is to make the task of risk analysis more manageable by establishing a
base from which to proceed. When the risks associated with the various systems and
92
subsystems within a given enterprise are known, the allocation of countermeasures
(resources) can be more carefully planned.
SECURITY CHECKLIST
Security checklists are used to facilitate the gathering of pertinent information. It takes
different forms: (1) Simple lists of Yes or No, questions (2) Open and questions (3) Narrowly
focused on the specific operations or activity. (4) Broader in scope and cover security
concerns common to all the company’s operation. The checklist is usually the backbone of
the security survey.
FACILITY EVALUATION
When analyzing security risks according to Fischer and Green (2004) the security manager
should look at a number of aspects of the company, giving consideration as potential security
problems to the following:
(1) The perimeter (2)The parking lot (3)All adjacent building windows and roof tops (4) All
doors and windows less than 18 feet above ground level (5) The roof (6)The issuance of main
entrance keys to all tenants in a building (7) Any shared occupancy, as in office building (8)
All areas containing valuables (9) The off-hours when the facility is not in operation and all
nighttimes hours (10) The control and supervision of entry into the facility (11) keys and key
control (traditional or electronic) (12) Fire (13) Computer access (14) video surveillance (15)
Computer systems.
93
The above list should contain some of sample questions that must be asked when conducting
a survey of any facility.
4.0 CONCLUSION
Security managers or directors must be adequately informed about risk management. It is the
basis upon which the security plan is developed. It reduces the money spent in the protection
of company assets. Assets which are vulnerable to destruction, theft or other vulnerabilities
are taken into consideration during the process of risk analysis and the security survey.
5.0 SUMMARY
From this Unit, we have learned that risk analysis is in management tool, the standard for
which are determined by whatever management decides it wants to accept in terms of actual
loss. While a security survey is essentially an exhaustive physical examination of the
premises and thorough inspections of all operational systems and procedures. We also learnt
what risk identification, security checklist is and how a security director can evaluate facility
and departments in terms of security risks.
7.0 REFERENCES
Broder, J. F. (2006) Risk Analysis and Security Survey, Butterworth Heinnemann.
Momboisse R. M. (1977) Industrial security for strikes, Riots and Disasters, Charles C.
Thomas Publisher
95
96
UNIT 3: CHALLENGES AND PROBLEMS OF PRIVATE SECURITY SERVICE
1.0 INTRODUCTION
2.0 OBJECTIVES
3.0 MAIN CONTENT
4.0 CONCLUSION
5.0 SUMMARY
6.0 TUTOR-MARKED ASSIGNMENT
7.0 REFERENCES/ FURTHER READINGS
1.0 INTRODUCTION
Inability of the state to adequately provide security for all and sundry and the global
economic crisis as brought about the witnessing of significant growth in private security
companies. Private Security industry is considered one of the fastest growing industries in the
world, with an expected growth rate of 17 percent by 2016 according to the U.S Department
of labour and crime. Despite its growth and profitability, private security companies are
facing many challenges such as lack of adequate training, the problem of poor wages and
working conditions, the cost of registration among others.
2.0 OBJECTIVE
At the end of this unit, you should be able to discuss the challenges and problems facing
private security services.
.
3.0 MAIN CONTENT
3.1 Challenges Confronting Private Security Guards in Nigeria
There are numerous challenges facing Private Security Guards in Nigeria. Some of these
problems are discussed below:
a. Lack of Adequate Training
One of the challenges of private security guards in Nigeria is lack of adequate training.
Most private security companies are always in the habits of recruiting people as guards
with very little or no training. Many of the private security guards undergo only physical
fitness as training while they have no knowledge of several other aspects of security
training including intelligence collection and analysis, martial arts, crowd control, riot
control, data mining and automated data analysis in crime mitigation, to mention a few.
This problem is not peculiar to unregistered private security firms but also many
97
registered and big security outfits show little interest in periodical training of their
guards all they care for is profit maximization. This problem has been responsible for the
incompetence and inefficiency in the activities of many private guards in Nigeria.
b. The Problem of Poor Wages and Working Conditions
It appears to be one of the leading factors militating against efficiency in private security
activities in the country. In spite of high cost of living, many private security guards earn
salaries as low as N6,000 per month (Abrahamen and Williams, 2005). It is unfortunate
that government has not considered in its regulation of private security activities the
importance of prioritizing the welfare of guards commissioned by various private
security companies in the country. Though, one cannot but agree with government if it
argues that it can prevail on all private security firms to improve the welfare of their
guards because it is not all of them that are registered, but the truth of the matter is that
both unregistered and registered companies are culprits of pauperization of guards. The
decisions of most unregistered private firms to “pay guards according to the value of
individual contracts, so that in effect guards at the same level and with the same
experience earn different wages depending on where the company deploys them”
(Abrahamen and Williams; 2005). Poor working conditions confronting a large number
of private security guards in the country are making many of them having low job
satisfaction, which has led to low job performance and lack of commitment of the job
among them.
99
Similarly the unlawful activities of Bakassi Boys in the eastern part of the country have
made the public acceptance of their role in security dwindle, making the public to doubt
its relevance in the management of people’s security. There is no doubt that when this
group first emerged it had good intentions but politization of the group has led to the
disbarment of its activities and it has no longer enjoyed any popular support in the
country. The guards working for registered companies have been accused of being
reckless in the discharge of their duties. For instance, many commuters and innocent
civilians have either been injured or killed by the reckless driving and overzealousness
of bullion van drivers and policemen attached to some Private Security Companies.
4.0 CONCLUSION
In conclusion, there are ways to solve or reduce the challenges facing the private security
companies. Probably one of the ways to go would be that private security companies start
minding other people’s business for a change and leave their own non security business to
professionals while taking security more seriously by raising the hiring criteria, initiating
communication with clients and employee and providing employees with proper training and
adequate working conditions.
.
5.0 SUMMARY
In this unit, we have been able to discuss challenges of private security companies. Various
challenges such as lack of adequate training, the problem of poor wages and working
conditions, the cost of registration, risk of violence attacks, politics of dichotomy, the
problem of overzealousness and brutality were adequately explained.
Taulbee, J.L. (2000) Mercenaries, Private Armies and Security Companies in Contemporary
Policy, Internal Politics
100
Abrahamen, R and Willam, M.C. (2005) The Globalization of private Security: A country
Report of Nigeria Globalization of Security Research Project ( Department of
International Politics, Aberystwyth and the New Security Challeges Programme
101
UNIT 4: COMPUTER AND INFORMATION SECURITY
1.0 INTRODUCTION
2.0 OBJECTIVES
3.0 MAIN CONTENT
4.0 CONCLUSION
5.0 SUMMARY
6.0 TUTOR-MARKED ASSIGNMENT
7.0 REFERENCE/FURTHER READINGS
1.0 INTRODUCTION
The essence of computer and information security is to prevent and detect the unauthorized
use of computer. It goes beyond this, computers have made possible video monitoring in the
area of facial recognition, fire and smoke detection and advanced alarm monitoring. In recent
times computers are used to process and store vast amounts of increasingly important
information. Hence there is need for computer data protection, which is of greater importance
for the security professional.
2.0 OBJECTIVES
.At the end of this unit, you should be able to:
Explain the concept of computer security and system protection
Discuss the need for computer security
Examine methods of computer crimes
Chief Information Officer (CIO) is saddled with responsibility of managing and controlling
of information but it is the Chief Security Officer (CSO) who is concerned about the integrity
of the information disseminated throughout the company system. Cooperation between these
two key positions is critical for adequate protection of company intellectual property.
Examples of cooperation between IT and security department are many. New electronic
surveillance systems require technology elements that call for technical expertise beyond that
of most security managers, such as computers and databases, Local Area Networks (LANS)
Wireless Local Area Network (WLANs), Wide Area Networks (WANs) and the internet. The
CSO has little choice but to learn the IT industry operations. The need for increased security
and safety while containing costs is obvious. Perceived security threats such as terrorism,
personal safety, asset protection and risk reduction cannot be ignored.
THE NEED FOR COMPUTER SECURITY
1. Computer security not only to protect computers and information from some type of
theft but also deal with natural disaster like fires, floods, accidents and so forth.
2. It protects the company internet services from hackers, from disgruntled employees
or competitors (The number of hacks in 2002 reached 87,000 worldwide with the
United States being the biggest target, followed in number of attacks is Brazil, Britain,
Germany and Italy (Fischer and Green 2004).
3. It secures thefts of proprietary information, insider abuse of computing systems,
sabotage of data networks, denial of service attacks, virus, system penetration and
telecom fraud.
4. E-Commerce online retailers also suffered losses from the cost of purchases made
with stolen credit cards (Identity theft).
103
Anyone associated with or having access to data on the computer can change the data.
Changing of data during or after operation into a computer system is the simplest,
safest and most common method of committing computer crime. Sometimes, insider
often sells data files to an individual who then uses the information to steal identities.
2. Salami Technique
This descriptive term implies trimming off small amount of money from many
sources and diverting these slices into one’s own or an accomplice’s account. This
form of crime is most common in banking environments with a large number of
savings and/or checking accounts and automated financial processing. By creating a
new program or altering an existing one, an employee can randomly deduct one to
five kobo from a few thousand different individual accounts. The accumulated sums
can then be withdrawn by normal methods from his or her receiving account.
3. Computer Viruses
They are computer programs that can replicate themselves and harm the computer
system on a network without the knowledge of the system. They are sets of unwanted
instructions executed on computers. Presently, there are appropriately 500 core virus
and about 3,000 variations (Fischer and Green 2004). Viruses spread to other
computers through network file system, through the network, internet or by the means
of removable devices like USB drives and CDs. Computer viruses are all forms of
malicious codes written with an aim to harm a computer system and destroy
information. There are four categories of viruses (a) Innocuous viruses (b) Humorous
virus (c) Altering viruses (d) catastrophic viruses. It is a criminal act to write
computer viruses that can crash computer system, thereby destroying all or greater
amounts of critical data.
4. Hacking
It is an unauthorized access or intrusion into a computer system. The act of defeating
the security capabilities of computer system in order to obtain an illegal access to the
information stored on the computer system is called hacking.
5. Identify theft: This is one of the most serious frauds as it involves stealing money
and obtaining other benefits through the use of false identity. While using false
identification is an old method of criminal activity. The ability to access all types of
information on the computer has given this old problem an entirely new life. Identity
cloning is the use of another user’s information to pose as a false user. Illegal
migration terrorism and blackmail are often made possible by means of identity theft.
104
The types of criminal activity caused by the identity theft are the following: (1) Cash
theft using ATM Machine (2) Electronic check fraud (3) Denial of credit (4) Financial
services charges for overdraft (5) Lost time in dealing with the aftermath. (6) Criminal
investigation, arrest.
6. Worms: Worms and viruses are very different although some people regarded as the
same type of program. Both worms and viruses have replication mechanisms,
activation mechanisms and objectives. While viruses just infect programs, worms take
over computer memory and deny its use to legitimate programs.
7. Trojan Horse: This is a destructive program that masquerade as a benign application.
The software initially appears to perform a desirable function for the user prior to
installation and/or execution but steals information or harms the system. Unlike
viruses or worms, Trojan horses do no replicate themselves but they are destructive. A
Trojan may allow a hacker access to a target computer system. In reality, Trojan horse
program are not software but viruses designed to penetrate a computer system so that
a program of the penetrator’s choosing can become active. It can inflict a computer
system with a virus, worm, bomb or trapdoor, etc.
8. Electronic Eavesdropping: Tapping, without authorization, into communication
lines over which digitized computer data and messages are being sent is electronic
eavesdropping. By using technologically advanced listening devices, eavesdropping
can be done on traditional telephone lines and even satellite transmission networks. If
data transmitted are not encoded, capturing and transforming the data is equivalent to
using a clandestine tape recorder to record a standard telephone conversation. (Fischer
and Green 2004).
9. Software Piracy: The companies or consultants who provide software make big
profit, this is because software programs cost from a few thousand naira to millions of
naira. Hence, some people are willing to copy software and resell it or give it away.
This unauthorized copying of copyrighted computer programs is referred to as
software piracy. These set of people deny vendors and software developers profits
that they should have accrued legally.
Security professionals therefore must protect information contained within the computer
system from damage or loss. Regardless of the type of system, the security professional’s
dilemma is how to balance convenience in using the system and from protecting the system
from disasters, systems failures, or unauthorized access. Disaster – recovery planning,
identification and access control of software and data, encryption and physical security are
the four facets of computer protection.
1. Disaster-Recovery Planning: Disaster such as fires, floods and earthquakes are
potential hazards to essential computer systems. Those threats are not predictable
hence there is need for businesses to develop contingency or disaster-recovery plans.
Recovery planning or contingency planning must cover all business functions such as
personnel resources, hardware back up, software and data file backup etc.
2. Identification and Access control of Software and Data: With increase in computer
knowledge, individual possessing basic computer skills can break into a computer
system. Hence, there is need for organization to protect their software and data.
Computer systems can use three methods to determine if a person has a legitimate
right to access the system. The three categories are:
1. What a person has: Cards, keys, and badges
2. What a person knows personal identification numbers (PINs), passwords and
digital signatures.
3. Who a person is, physical traits
3. Encryption
106
According to security expert, the best way to protect any type of data is to encrypt it.
Encryption scrambles the information so that it is not usable unless the changes are reversed.
There are five different methods for encrypting data:
a) Data Encryption Standard (DES)
b) Algorithm
c) Skipjack
d) Capstone (Clipper chip)
e) Privacy Enhanced Mail (PEM)
4. Physical security.
It describes measures that are designed to deny access to unauthorized personnel (including
attackers) from physically accessing a building facility, resource or stored information and
guidance on how to design structures to resist potentially hostile acts. Physical security is not
a modern phenomenon. It essentially exists in order to deter persons from entering a physical
facility. The use of technology for physical security has changed things. There are passive
infrared (PIR) based technology, electronic access control system, or video surveillance
system (VSS), Good physical security is a combination of defensive principles designed to
(a) deter (b) delay (c) detect (d) respond (and ultimately, deny access) to intrusion to critical
physical spaces.
There are three main components to physical security.
1. Obstacles can be placed in the way of potential attackers and sites can be hardened
against accidents and environmental disasters. Such measures can include multiple
locks, fencing walls, fireproof safes and water sprinklers.
2. Surveillance and notification systems can be put in place, such as lighting, heat
sensors, smoke detection, intrusion detectors, alarms and cameras.
3. Methods can be implemented to apprehend attackers (preferably before any damage
has been done) and to recover quickly from accidents, fires or natural disasters.
5. CONTENT MONITORING AND FILTERING
With the wide spread use of the internet, companies cannot ignore looking at who is using the
service and what they are doing. While on the network, employers have a right to monitor
their own systems, they have the right to be informed regarding such monitoring activities.
4.0 CONCLUSION
107
The progress achieved in this dynamic field has improved the general state of the world; there
are always those who use the technology for personal gain or criminal activity. The Chief
Security Officers must work hard to protect the companies and the individual that they serve.
5.0 SUMMARY
In this unit, we dealt with introduction to computer security, the need for computer security,
methods of computer crime and computer system protection.
108
UNIT 5: NIGERIA SECURITY AND DEFENCE CORPS (NSCDC)
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor- Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Security implies a stable, relatively predictable environment in which an individual or group
may pursue its ends without disruption or harm and without fear of disturbance or injury
(Fischer and Green 2004). To secure anything is to protect it from being unlawfully tampered
with or destroyed. It is the duty of some agencies of government to protect national
infrastructures. Protecting these infrastructures is essential to a nation’s security, public
health and safety as well as economic vitality. The particular focus of this unit is on the
efforts being made by the Nigeria Security and Civil Defence Corps (NSCDC) in
safeguarding national infrastructures in Nigeria.
2.0 Objectives
At the end of this unit, you should be able to:
- Explain the historical background of Nigeria Security and Civil Defence Corps
(NSCDC)
- State the functions
- Explain the organization structure
3.0 Main Content
3.1 Historical Background of Civil Defence
The origin of the Civil Defence Corps dates back to the era of Emperor Nero who reigned in
and ruled the Roman Empire. This marked the period when the Roman Empire ascertained
her political powers in the world with colonies scattered all over the world. This historical
development which brought about expansion of the Roman Empire coupled with acute
shortage of citizens of military age to carry out essential services such as defence, provide for
civilians affected by wars especially the aged, woman and children invariably demanded for
addition manpower, hence the creation of an organization charged with safeguarding the civil
populace (Abolurin 2003). Abolurin further said, that the periods of the First and Second
109
World War, saw various names such as, home-guards and Body of Air Road and Disaster
Protection etc. The name “Civil Defence” was adopted by the organization after the First and
the Second World War. Since this period, civil defence has attained the status of an
international organization embraced by many countries of the world, with similar function,
based on the needs, aspiration, interest and functional capability of host countries. For
example, the Swiss Federal Civil Defence is part of the Country’s National Defence saddled
with the responsibility of protecting, rescuing and providing relief for persons in complex
emergencies, including armed conflict situations.
The Nigeria Security and Civil Defence Corps (NSCDC) was established in Nigeria on May
23rd, 1967 during the Civil War, it was initially referred to as the Lagos Civil Defence
Committee with fundamental responsibility during the civil war. The charter of April 6, 1968,
however, made it possible for states that may wish to establish the corps within their
jurisdiction to do so. Hence the Lagos Civil Deference Committee was integrated and
renamed Nigeria Security and Civil Defence Corps (NSCDC) under the supervision of
Federal Ministry of Internal Affairs ( Abolurin, 2008). NSCDC is now a full fledged
paramilitary organization established statutorily under the Federal Ministry of Interior. The
Corp has undergone changes after attending paramilitary training in various federal security
agencies training institute throughout the federation. The former civilian president chief
Olusegun Obasanjo (GCFR) transform it from voluntary organization to full fledged
paramilitary organization through the Act of 2003 and as amended in 2007.
Functions of Nigeria Security and Civil Defence CCORPS (NSCDC)
The act of 2003 and as amended in 2007 bestowed upon the corps the following
responsibilities and functions, to:
1. Assist in the maintenance of peace and order and in the protection/rescuing of the
civil population during the period of emergency.
2. Recommend to the minister, the registration of private guard companies.
3. From time to time, inspection of the premises of private security guard companies.
Their training facilities and approve same if it is up to standard.
4. Supervise and monitor the activities of all private guard companies and keep a register
for that purpose:
i. Periodically organize workshop and training courses for private guards companies and
ii. Seal up any private guard company which operates without a valid license.
110
5. Maintain twenty-four hour surveillance over infrastructures, sites and projects for the
federal, state and local government.
i. Enter and search any premises and seize any material suspected to have been used in
vandalization or suspected process of vandalization.
ii. Enter and search premises of any suspected illegal dealer in petroleum products or
material used by Power Holding Company of Nigeria, Postal Services, Nigeria
Telecommunication or for any other public utility or infrastructure.
6. Have power to arrest with or without a warrant, detain, investigate and institute legal
proceedings by or in the name of the Attorney-General of the Federal Republic of Nigeria
against any person who is reasonably suspected to have committed an offence under this Act
or is involved in any:
I. Criminal activity
II. Chemical poison or oil spillage, nuclear waste, poisoning
III. Industry espionage or fraud
IV. Activity aimed at frustrating any government programme or policy
V. Riot, civil disorder, revolt, strike or religious unrest or
VI. Power transmission lines or oil pipelines, NIPOST cables, equipment, water board
pipes or equipment vandalization.
9. Monitor, investigate and take every necessary step to forestall any act of terrorism and
report same to appropriate federal security agency.
10. Provide necessary warring for the civilian population in times of danger.
11. Evaluate the civilian population from danger area.
12. Provide and manage shelters for civilians during period of emergency.
13. Assist in the decontamination and in the staking of precautionary measures during
any period of emergency.
111
14. Carry out rescue operations and control volatile situations.
15. Assist in the provision of emergency medical services, including first aid, during any
period of emergency.
16. Detect and demarcate any danger area.
17. Assist the federal and state fire service in fire-fighting operation.
18. Assist in the distributions of emergency supplies.
19. Provide assistance to restore and maintain order in distressed area in any period of
emergency.
20. Assist in repairing indispensable public utilities during any period of emergency.
21. Provide intelligence information to the ministry on any matter relating to:
i. Crime control generally
ii. Riot, disorder, revolt, strike or religions unrest
iii. Subversive activity by members of the public
iv. Industrial action and strike aimed at paralyzing government
v. Any other matter as may be directed by the minister
vi. Have power to arrange and mediate in the settlement of disputes among
willing members of the public.
There are Assistant Commandants General called Zonal Commandants in-charge of state
commands nationwide. Area Commandants are in-charge of senatorial district within the state
controlling about three, four or five divisional areas as the case may be. Divisional officers in
the state take charge of the 774 Local Government Areas. There are District Heads or
Officers who are in charge of all the districts within the division and reports to the divisional
officers of the local government. Lastly, the cells officers are in charge of the grassroots who
take control of the various ward and report matters to the district officers.
112
ORGANOGRAM OF THE NIGERIA SECURITY AND CIVIL DEFENCE CORPS
Commandant
General (CG)
Dep. Commandant Dep. Comm General Dep. Commandant Dep. Comm Gen.
General Int. and Administration General operations Int. Technical
investigation Service
Asst. Commandant
General
Commandant
Area Commandant
Division officers
District Heads
Calls Heads
113
4.0 Conclusion
This study unit has showcased NSCDC as one of the organizations for ensuring collective
security in Nigeria. Although there are several other agencies involved at ensuring that the
security of Nigeria is bettered. With proper management, it leads to drastic reduction in
crime, and effective disaster management.
5.0 Summary
In this unit, we have dealt with historical background of civil defence, and its functions.
Specific attention was given to the organizational structure of Nigeria Security and Civil
Defence Corps (NSCDC).
6.0 TUTOR-MARKED ASSIGNMENT
a. Describe the historical background of civil defence
b. Enumerate the functions of Nigeria Security and Civil Defence Corps.
114
MODULE 4
1.0 INTRODUCTION
Security is now the second largest money-spinner in Nigeria, surpassed only by oil and gas”.
This statement by a long-standing observer of Nigerian politics is striking, especially given
that Nigeria is Africa’s most populous country and the world’s seventh largest oil producer.
While a lack of statistics and information make this claim impossible to verify completely,
there is no doubt that the private security industry has grown rapidly in recent years. Private
security personnel are highly visible around the country, guarding businesses, homes and
neighbourhoods, and advising transnational companies and embassies on risks and dangers to
their assets and employees. Security has thus become a major part of the Nigerian economy,
and according to the best informed estimates, there are currently between 1,500 and 2,000
private security companies (PSCs) in Nigeria, employing in about 100,000 people
(Abrahamen and Williams 2005 ).
It is difficult to estimate the size of the private security sector in Nigeria with any degree of
accuracy. No reliable figures exist for either the number of companies or employees, as many
companies are unlicensed and unregistered. The most frequent estimates put the number of
PSCs at between 1,000 and 1,500, with the majority being small, individual, owner-managed
companies operating in only one town or locality. In personnel terms, the largest companies
115
are Prudential Security, which operates countrywide and employs nearly 9,000 guards, and
Halogen Security with approximately 4,000 guards. Other major companies include Bemil
Security and Corporate Guards. The major ‘foreign’ PSC, Group4Securicor’s partner
Outsourcing Services Ltd. (OSL), also operates nationally and has a total of approximately
3,000 personnel. While there is a long tradition of employing so-called ‘mai-guards’ as
watchmen in Nigeria, the first company providing uniformed guards was Nigeria
Investigation and Security Company (NISCO), founded in 1965 and still in business.
2.0 OBJECTIVES
At the end of this unit, you should be able to:
a. Mention key private security companies in Nigeria.
b. Discuss Halogen Security Company Limited as one of numerous private
security companies in Nigeria.
116
27. Continental Guards Limited
28. Corporate Guards Limited
29. Crest Security Outfit Limited
30. Damog Nigeria Limited
31. Daniel's Security Systems Limited
32. De Jaram Kong Security Limited
33. Destiny Electronic Security System Nig Ltd
34. Divine Security & Telecoms Limited
35. Doos Security
36. Douglas Veterans Security Limited
37. Dromour Guards Limited
38. Effanti Ltd
39. Eva Guards Limited
40. Express Security & Co.
41. Fap-Legend Security Services Limited
42 Flare Security (Nig) Limited
43. Foremost Security Systems
44. Fortifiers Protection Services Ltd
45. Fortress Guards & Security Services Limited
46. Frontier Guards Services Limited
47. Geekos Security Nigeria Limited
48. Gideon Guards Limited
49. Global Security Solution
50. Great Hope Security Limited
51. Grekos Security Nigeria Limited
52. Halogen Security Company Ltd
53 Hi-Tech Electrical & Security & Survellance Limited
54 Highcom Security Limited
55 Hogan Guards (Former Guardsmark)
56 Home Automation Security System Limited
57 Initial Security Nigeria Limited
58 Innovations Security Systems
59 Integrated Systems Devices Limited
60 Integrity Guards Limited
61 Inter-Falcon Security Services Limited
62 International Mechandise & Security Limited
63 J.S.H. Security Industries Nig. Limited
64 K-9 Security Limited
65 Kage Security Limited
66 Kal Security Limited
67 Kifha Guards
68 King David Security Limited
69 Kings Guards Nigeria Ltd
70 Kingsland Security Surveillance Limited
71 Kuban Security & Management Consultants
72 Kingstech Network Ltd
73 Lagen Systems & Security Limited
74 Lai Security & Investigation Services Limited
75 Lasis Security & Investigation Services Limited
76 Link-Stride Security Systems Limited
117
77 Mac Lion Security Services
78 Marksmen Security Company Limited
79 Markjacko Security Systems
80 Megaforce Security Limited
81 Mega Guards Services Limited
82 Men in Black Security Limited
83 Metropolitan Guards Limited
84 Mikado Security Services Limited
85 Molamak Security Services Limited
86 Montgomery Security Services Limited
87 Network Guards Limited
88 Niger Guards Security Company
89 Nigerian Investigation and Safety Company Limited.
90 Nogees Security Systems Equipment & Services Ltd.
91 Olart Security Services
92 Olasco Company Nigeria Limited
93 Omega Security Services Limited
94 Octagon Guards Limited
95 OTI Guards Limited
96 Pahek Security Services Limited
97 Papyrue Security & Communications
98 Pinnacle Investments Limited (Security & communications consultants)
99 Portcullis Security Nigeria Limited
100 Prime Guards Nigeria Limited
101 Profile Security Services
102 QED Advanced Technology Security Limited
103 Quality Electronic Security Systems
104 Rapid Vigil Security Company Limited
105 Reliance Security Solutions Nigeria Limited
106 Richie's Security Limited
107 Riggs Securites Ltd
108 Royal Guards
110 Samos Security & Services Limited
111 Santana Security Agency Limited
112 Secmek Security System Limited
113 Security & Allied Technology
114 Security Hazards Experts Limited
115 Security Swaps Limited
116 Serendipity Security
117 Servtrust Prudential Guards
118 Sheiksafety & Security Company Limited
119 Skilpak International Security Limited
120 Technocrime Security Limited
121 Trends Ventures Limited
122 Top Flight Security Company Limited
123 TTC Mobile Limited
124 Unache Security Services Limited
125 Unique Security & Investigation Service Limited
126 Utro Guard Security
127 Vanni International Security System
118
128 Villeworth Security Services Limited
129 Vision Security Services
130 Zitadel Security
Among the listed security companies, Halogen Security Company Limited is discussed in
details.
119
Vision
Is to remain the number one provider of professional security solutions in Nigeria, using
competent personnel and superior resources.
Halogen Security has different categories of operatives which includes but not limited to
guards, post leaders, supervisors and site managers spread across the country. They possess a
minimum qualification of Senior School Certificate and a considerable number of them are
Diploma Certificate and Degree holders. No matter their qualifications, they ensure they all
undergo basic and/or advanced security training in order to adequately equip them for the
new career they have chosen before deploying them to their various beats. In place is well
defined on-the-job training programme which ensures that their operations become adapted to
specialized safety. Their aim is to ensure that Halogen security operatives are the best
security officers in the industry. They are meticulously selected, extensively trained,
motivated and supervised by experienced officers. They provide well-trained security
operatives for residences, factories and corporate businesses all over the federation. Our
guards are trained to correctly interpret and effectively implement operating procedures
peculiar to their areas of responsibility. The number of guards to be deployed to each location
is determined by the result of security survey conducted by experts or as determined by the
client through a mutual agreement.
Services rendered are in three broad categories:
Corporate- PLATINUM
Industrial/Manufacturing - RANGER
Domestic (Residences/Estates)- HOMMIE
Platinum
This is the offering for Corporate Offices whereby their operatives are kitted to reflect the
image and ambience available within the guarded premises. The minimum entry qualification
for this category of operative is National Diploma or Equivalent.
Ranger
Our operatives also work in warehouses, Manufacturing plants, beverages and food related
conservation and processing companies, confectioneries and the likes. The doggedness
required on such facility determines the kind of personnel that would suit this category.
120
Special Events
They provide Security Cover for social events such as Musical Concerts, Wedding
Ceremonies, Launching, Funeral, Promotional Events, and Annual General Meetings
(AGMs) across various industries.
Guard Dogs
They make use and deploy security Dogs and Handlers to premises that require them. They
are trained to deter intrusion and are very useful for crowd control at events.
Technology
Halogen security is found effective in providing modern, reliable electronic alarm systems
backed by highly trained security specialists. This service covers the field of corporate,
industrial and domestic concerns. It involves installation, monitoring and maintenance of a
wide range of electronic security devices linked to 24-hour, state of the art control rooms
where distress signals received are processed and react teams dispatched to swiftly counter
the incident and ensure subscribers safety. They have developed an excellent working
relationship with the leadership of Nigerian Police through a bilateral agreement of
cooperation and mutual assistance for the enhancement of their collective ability to
effectively deal with crime within areas of interests in their jurisdiction.
121
When things go wrong, you need armed response - fast. Halogen is the only home security
service in Nigeria to feature GPS live tracking in every response vehicle. This innovative
satellite technology ensures that they know the exact location of every armed response
vehicle, so that in the event of an emergency they can easily send the nearest vehicle to its
rescue.
122
Integrated Services
Halogen combines Guarding, Armed Response, Electronic estate security systems and
individual pre-installed alarms with ongoing communication and liaison. Halogen Estate
Security offers a complete, integrated security solution.
State-of-the-art Technology
With Halogen most estates are said to enjoy the benefits of a wireless network, state-of-the-
art access control, an electronic occurrence book, electronic fencing, dual monitoring, and
CCTV. And when a response is needed, Satellite Tracking allows to verify where the closest
Halogen patrol vehicle is, ensuring the fastest response times.
Outsourcing
Outsourcing has been identified as one of the ways to address business challenges. The goal
is to outsource the management of support and ancillary categories of staff such as
secretaries, drivers, truck drivers, receptionist, control room operator, protocol personnel,
cashiers, bank tellers, technicians and many more. This has helped in strengthening client or
organisation’s ability to concentrate on its area of core competence and relieve it of the
burden of managing employees whose services are only peripheral to its core activity.
Obviously, this would require committing the management of such support and ancillary staff
to a competent and experienced team of outsourcing service providers.
Competence
Their strategic outsourcing service focused on advancing organisation’s business goals. They
have comprehensive and thorough process and procedures for finding the right people for the
right jobs.
Recruitment process
They provide a specialized service using expertise and proprietary tools in the identification,
assessment and selection of quality professionals. The process begins from the development
of the job descriptions until the personnel have been place. They invite corporate
organizations and individuals to enjoy their outsourcing services by allowing them take over
their burden.
Convoy Movement
They are also disposed Convoy Movement in the following ways:
Lead Team only
Back-up Team only
Lead and Back-up as a whole unit
Armed security personnel aboard a chauffeur-driven vehicle (Salon or SUV) only or in
conjunction with any of the above
Chauffeur-driven vehicle only or with any of the first three methods above
For covert movement, they could deploy unbranded vehicles for this service. The
services of armour vehicles are also available for severe security situations when
required.
124
Crowd Control, Traffic/Car-Park Management, VIP/Close Executive Protection, Guest
Management and Surveillance is unsurpassed in the industry.
Scope of Services
They are committed to working in partnership with special events managers to provide an
excellent and cost effective security coverage that complements their own standards of
service delivery. They honour and support this commitment by selective and thorough
training, competent supervision, constant management input and accurate deployment of
personnel. The essence is for customers to value their contribution, respect their judgement
and have peace of mind while the programme is ongoing. Their scope falls within:
Events Security Guard Services
Events Guard Dog Services
Crowd Control Services
Security Surveillance
Body Guard Services
VIP Protection
Provision of Armed Policemen
Investigations
Background check is due diligence. It is about looking up and compiling critical records,
commercial and financial records of an individual. It is crucial for any company desiring to
avoid hiring individual with a criminal record.
Risk Management
Risks are facts of life and every business enterprise is exposed to one risk or the other. Risks
can come from accidents, natural causes and disasters as well as deliberate attacks from an
adversary. In businesses, risk management entails organized activity to manage uncertainty
and threats and involves people following procedures and using appropriate tools in order to
ensure conformance with risk-management policies. Halogen is said to be adroitly positioned
to offer unequalled and up to speed Risk Management services to all highly discerning
clients. This entails identifying, monitoring and limiting risks profile in a particular
enterprise. In the public sector, they engage in activities to identify and mitigate risk to
critical infrastructure such as oil pipe lines, flow stations, power stations, military
installations, Earth stations, sea ports, airports and other public utilities of high vulnerabilities
and impact.
127
Summarizing planned and faced risks, effectiveness of mitigation activities, and effort
spent for the risk management
4.0 CONCLUSION
It is difficult to account for actual number of private security companies in Nigeria. No
reliable figures exist for either the number of companies or employees, as many companies
are unlicensed and unregistered. The need for its regulation becomes paramount for effective
security operations in the 21st century..
5.0 SUMMARY
We have been able to discuss the list of numerous private security companies in Nigeria. We
have also been able to take an in-depth look at Halogen Security Company Limited as one the
private security companies at its best in the nation as well as appraising their operations and
services rendered.
.
6.0 TUTOR-MARKED ASSIGNMENT
a. List 20 private security companies operating in Nigeria
b. discuss the services rendered by Halogen Security Company
128
UNIT 2: CONFLICT MANAGEMENT IN PRIVATE SECURITY SERVICE IN
NIGERIA
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor- Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
Conflict is endemic to all social life. It is an inevitable part of human beings, community and
organisation (public or private), because it is related to situations of scarce resources, division
of functions, power relations and role-differentiation. Conflict in Private Security Service
(PSC) refers to more than just overt behaviour. Concentrating only upon its behavioural
manifestation is an extremely limiting exercise. The three-dimensional conception of conflict
emphasizes the need to consider the situation in which PSC come to possess incompatible
goals, their structure of interaction and the nature of their goals with other security operatives.
It is important to consider emotion (e.g. trust and distrust) and cognitive orientations (e.g.
stereotyping) that accompany a conflict situation as well as the range of action undertaken by
any party in a situation of conflict. Both conflict management and a satisfactory solution are
easier to attain when it is accepted that what we normally call conflict is a complex,
multidimensional phenomenon. It is not caused by "inadequate" structures, nor is it
undesirable. It is natural and inevitable and, when properly managed, it is productive,
relevant and creative.
The effective management of conflict events, including scenario planning and risk assessment
is crucial to the running of public and private organization systems like private security
service. The process of conflict management consists of the following stages
• Identification of potential conflict
• Prioritisation of risks
• Conflict avoidance planning and risk forecasting
• Contingency planning
• Conflict recognition
129
• Containment and response
• Resolution
130
from a latent to a manifest phase, it proceeds towards its potential and realizes its constructive
values.
Analyzing Organizational Conflict
Three distinct criteria define the role of an administrator in an organization: planning,
resource allocation and conflict management. There is no doubt that managing conflict in
PSCs permeates every aspect of the administrative role. Awareness of the various forms of
conflict management that can be employed at different stages of conflict is vital, if
administrators are to organize efforts towards influencing the conflict situation positively. In
addition effective conflict management requires recognition of the sources that generate a
conflict. What, then, are the sources or bases of organizational conflicts?
Sources of Conflict in Private Security Company
Private security company conflict appears in a variety of forms and has varying causes. These
can generally be separated into several categories. Katz identifies three sources of conflict.
These are:
(1) Structural conflict (conflict arising out of the need to manage the interdependence
between different organizational sub-units).
(2) Role conflict (conflict arising from sets of prescribed behaviour).
(3) Resources conflict (conflict stemming from interest groups competing for organizational
resources).
Robbins identifies three sources of organizational conflict and indicates that an understanding
of the source of a conflict improves the probability of effective conflict management. The
main factors which serve as sources of conflict were identified as:
(1) Communicational (conflicts arising from misunderstandings etc.)
(2) Structural (conflicts related to organizational roles)
(3) Personal (conflicts stemming from individual differences).
3.2 Types of Conflict
3.2.1 Intrapersonal Conflict
Intrapersonal conflict is internal to the individual (though its effects can profoundly influence
PSCs functioning) and is perhaps the most difficult form of conflict to analyze and manage.
Intrapersonal conflict is basically a conflict between two incompatible tendencies. It arises
when a stimulus evokes two different and incompatible tendencies and the individual is
required to discriminate between these tendencies. In such a situation it is common for
individuals to experience frustrations and to allow their conflict situation to be expressed in a
range of behavioural strategies ranging from apathy and boredom to absenteeism, excessive
131
drinking or destructive behaviour such behavioural consequences are to be avoided, then it is
essential to diagnose individual perception and utilize some techniques that would reduce
anxiety-eliciting stimuli and increase consonance between individual behaviour and
organizational requirements.
a. Personal.
Individuals are not identical, constant or consistent. When two individuals are brought
together and kept together, each with a peculiar character, qualities, needs and skills,
obviously a conflict may ensue if their attributes are not meshed together in a coordinated
way. Interaction between individuals with different attitudes, values and needs can
produce conflict behaviour and affect PSCs performance.
b. Functional
PSCs have roles which are expected sets of behaviour associated with their position. In
theory, individuals are not expected to engage in any discretionary behaviour. Such
specification would be consistent with organizational preferences for consistency and
predictability. In practice, however, role specifications tend to be ambiguous and
incomplete, and in their interaction with others, some individuals often feel dissatisfied
with their role or position, or they may feel that their aspirations for higher positions are
being frustrated. Interpersonal conflict can be accounted for, to a great extent, in terms of
the incumbent’s roles and their expectations in particular situations.
These are the sources of conflict situations in PSCs. How a conflict situation will change over
time, how its interrelated components will alter the environment in which it occurs, and how
it will respond, is dependent upon the administrator's efforts to manage or influence it. This,
in turn, is related to one's understanding of the sources of a specific conflict situation.
133
134
3.3 Conflict Management
Ways of managing organizational conflict are as varied as its causes, origins and contexts. The
purpose of conflict management, whether undertaken by the parties in conflict or involving the
intervention of an outside party, the major issue is for it to affect the entire structure of a conflict
situation so as to contain the destructive components in the conflict process (e.g. hostility, use of
violence) and help the parties possessing incompatible goals to find some solution to their
conflict. Effective conflict management in any PSC succeeds in
(1) Minimizing disruption stemming from the existence of a conflict
(2) Providing a solution that is satisfactory and acceptable.
All PSCs, however simple or complex they may be, possess a range of mechanisms or
procedures for managing conflict. These are built into the organizational structure and are
consciously employed by administrators to influence the course and development of a conflict.
The success or effectiveness of such procedures can be gauged by the extent to which they limit
conflict behaviour and the extent to which they help to achieve a satisfactory solution. It is the
contention of this article that strategies of conflict avoidance, conflict prevention or
institutionalization of conflict will change or replace coercive behaviour, but that only the
injection of a behavioural social scientist, acting in a facilitative, non-directive and non
evaluative fashion, will achieve a resolution with respect to the basic issues, attitudes and
structure of interaction. If administrators care for optimal methods of conflict management, they
should give their strongest support to a strategy that can end a conflict in a satisfactory and self
perpetuating manner.
135
charged experiences. When a person experiences an inner conflict and feels that he cannot
master his situation, or change his environment, a number of methods of conflict management
can be employed.
These are conveniently divided into
(1) Cognitive strategies
(2) Behavioural strategies.
Cognitive strategies, often called defence mechanisms, help an individual to falsify, distort or
deny a particular conflict. Cognitive strategies represent an attempt to control or manage
negative and disturbing feelings associated with conflict and to allow an individual to carry on
with his normal activities. Cognitive strategies include repression (an attempt to push conflict out
of existence), rationalization (hiding the truth from oneself), fantasy or even denial of reality.
Behavioural strategies for coping with intrapersonal conflict include escape, withdrawal and
aggression (especially against convenient targets). These strategies cannot resolve intrapersonal
conflict in any permanent way. They can be successful in the short-run. They can help an
individual to reduce his level of anxiety and diminish his tension. They can prevent or avoid
disruptive behaviour, but they cannot generate solution. This can come about through the
involvement of an expert consultant, acting in an accepting manner and encouraging the
individual to evaluate his situation rationally and decide upon more effective responses.
136
Consultants may be internal to an organization, or they may be introduced by an administrator
when circumstances require it. They have several roles to play, all intended to aid a person to be
more effective in his organization. What characterizes all these roles is that they are enacted in
an informal and flexible fashion and in a facilitative and diagnostic manner. Techniques which
are congruent with implementing the consultant's role include (1) facilitative techniques (e.g.
facilitating individual exploration and self-observation, giving information, advice, reassurance
and encouragement), (2) behavioural modification techniques (e.g. establish, through negative or
positive reinforcement, contingencies of behaviour that should be decreased) and (3) cognitive
techniques (e.g. learn to undo old values and acquire a new perception of the self). When
organizations experience difficulties as a result of intrapersonal conflicts, administrators should
be well-advised to manage such conflicts by leading their organization to seek professional help
from persons who are trained to fulfil the role of organizational consultants. Successful
organizational change does, after all, depend upon a strong commitment to conflict resolution.
137
individual as well as organizational functioning, administrators need to identify the causes of
interpersonal conflict and take appropriate action to deal with it.
Under the prevailing influence of behaviourism, interpersonal conflict management has been
directed mainly towards the behavioural components of a conflict situation. Attitudes and
perceptions have been considered beyond the realm of conflict management. As a result of this,
conflict management has tended to force individuals to choose between fixed and simplified
behavioural alternatives, defined in terms of two rigid behavioural goals, winning or losing. The
choices and incentives associated with this orientation of victory versus defeat were strongly
constrained, forcing individuals into relatively primitive modes of interaction and providing
administrators with an untrustworthy vehicle for potential conflict management.
Of the five methods of managing interpersonal conflict it appears that problem-solving is the
only method that is directed towards the attitudinal, situational and behavioural components of
conflict. It is the only method that does not focus on relatively automatic, unthinking responses.
It is the only method which seeks to utilize higher mental processes to achieve a high-quality,
integrative and satisfying outcome. Organizations that can increase the use of problem-solving
method in interpersonal conflict can offer a better working experience, more constructive
consequences and a more creative conflict resolution. Problem-solving as a method of conflict
management is not a common experience. A number of elements or conditions have to be present
if problem-solving is to be realized. These conditions appear to be as follows:
Situational requirements (e.g. informality and flexibility of interactions, absence of time
pressures, power symmetry etc.).
Attitudinal requirements of the officers and management (e.g. trust and confidence in each
other, belief in conflict resolution rather than conflict avoidance etc.)
Perceptual requirements (e.g. individuals do not perceive threats or need to win or dominate the
other) and
138
In contrast to other methods of conflict management, the intervention of a behavioural consultant
accentuates the positive and highlights commonly held views of the actors. Applications of this
approach in the interpersonal sphere rest upon the following assumptions:
1. Deficiencies in perception are the main cause of interpersonal conflict.
2. Barriers to improved information prolong and aggravate a conflict.
3. Inadequate interactions between individuals prevent them from management of their conflict
constructively.
Techniques of intervention in interpersonal conflict are closely related to these assumptions and
include perceptual, informational and interactional procedures. Perceptual procedures involve:
(1) Identifying conflict issues
(2) Defining alternative issues
(3) "Reality-testing". Informational procedures involve
Clarifying issues
Encouraging and gathering information (through interviews, meetings or other
instruments)
(4) Increasing frequency, openness and accuracy of communication. Interactional procedures
entail:
Regulating the pace of interaction
Offering "process" observations to help individuals see how to be more effective
Injecting inputs in the form of concepts, models or principles which might be useful in
understanding a conflict and
(5) Helping in the design of implementation steps through which conflict resolution would be
possible. Through his interventions a behavioural consultant becomes the information-gathering
instrument and a "resource person". Administrators who are concerned about organizational
change and more productive results would be well advised to be aware of the strengths — as
well as limitations — of this approach to interpersonal conflict management.
139
new circumstances, the stage is set for incompatibility of goals or competition for scarce
resources. The resulting conflict between departments may have ambivalent consequences for an
organization. On the one hand it may have a dysfunctional and counterproductive effect on the
organization, and on the other hand it can be highly functional and stimulate intra-organizational
creativity. For conflict to be a vehicle for PSCs growth and creativity there must exist an
appropriate method of conflict management between departments. An administrator should know
when he is faced with interdepartmental conflict and be informed of the processes for coping
with it or resolving it.
Before exploring the methods and techniques for managing interdepartmental conflict, it is
pertinent to examine briefly the attitudes and behaviours which characterize interdepartmental
conflict. These can be described in terms of the following categories:
1. Effects within each department. When departments are in conflict, individual members
tend to bury their differences and display greater loyalty to their department. Departments
become more cohesive, more formal in their behaviour and more insistent upon individual
conformity and accomplishment of prescribed tasks.
140
Traditional approaches to managing interdepartmental conflict emphasized such methods as (1)
Conflict avoidance (separating departments by relocating them physically)
(2) Regulating a conflict by introducing new rules and procedures.
(3) Seeking a form of "legalistic" solution (by appealing to higher organizational authorities) (3)
Using departmental representatives to reach a compromise agreement or
(4) Seeking mediation or arbitration from an outside body.
Such conflict management methods may indeed produce an agreement. They may reduce the
level of conflict behaviour between departments and even legitimize new levels of performance.
They cannot, though, achieve a genuine conflict resolution because they merely reflect,
perpetuate and occasionally aggravate a win-lose pattern of interactions. Separation, withdrawal,
institutionalization, bargaining or legal approaches are essentially forms of a win-lose
confrontation. They all start with a polarized, adversary orientation, in which each department
tries to attain as much as possible by outsmarting the other. They bury a conflict, ignore it,
produce power-based decisions or allow departments to withdraw from it. They do not stimulate
a search for conflict resolution. A range of new approaches to managing interdepartmental
conflict may be suggested. These approaches acquire new significance because they become
integral parts of an interaction process between departments, because they move away from win-
lose type of strategies and make the need for conflict resolution more effectively. Blake and
Mouton accept that the most important aspect of a successful conflict management strategy is the
attempt to shift the behavioural and attitudinal components of a relationship from a competitive
to a cooperative orientation. They do, however, suggest that both the common enemy and the
super-ordinate goal approaches fall short of the need to achieve a genuine conflict resolution.
This is because both can be seen as
Being mainly temporary in character
Both are primarily defensive and
Both strategies may widen a conflict by externalizing it.
141
approach to conflict management which involves interventions by organizational consultants
(usually applied behavioural scientists), who have no vested interest in the conflict itself, but
who have the competence and experience to generate a productive mode of conflict management.
They avoid the pitfalls of adjudicating or evaluating which department is "right" or "wrong" (so
often the hallmark of traditional conflict management). Nor do they seek to impose a solution.
They intervene in order to generate creative thinking and to establish a problem-solving attitude.
142
allow local communities a greater say in the exploration and use of oil resources - although as of
yet there are few signs of positive change in policies towards the Delta communities or in the
‘politics of plunder’ more generally. Only 13 percent
of oil revenues are directed back to the communities in the Delta and the Niger Delta
Development Commission (NDDC) has still to prove its effectiveness. As such, Karl Maier’s
description of Nigeria as a country where the population “live in a criminally mismanaged
corporation, where the bosses are armed and have barricaded themselves inside the company
safe”, still captures the political landscape. Until these larger, underlying political causes of
conflicts is resolved, the Nigerian state will need the continued services of international private
companies to ensure its own survival in the face of domestic resistance.
4.0 Conclusion
Organizations are social entities segmented into hierarchies of departments and individuals. The
basic realities of organizational life cannot but stimulate comparisons, competitions and conflicts
between departments and individuals. Conflict is an omnipresent feature in any organization.
Since conflict may have functional as well as dysfunctional consequences, it is essential that
administrators explore various methods and techniques of conflict management.
Effective conflict management is indispensable if coordinated efforts and productive
achievements are to result. As it was suggested above that the planned intervention by
behavioural scientists represents the most effective method since it can produce organizational
change and a sense of personal accomplishment.
5.0 Summary
143
Conflict management — and indeed all forms of organizational behaviour — is determined by
the interaction of information, skills, values and situation. Each of these factors acts as a
precursor for consultation-based conflict management activities. Behavioural consultants provide
parties in conflict with more information and an understanding of the complexities of conflict
interactions. They promote social interaction skills (which should be recognized as important as
technical skills). They promote values of cooperation and help to create a situation in which
people can interact freely and feel that they are as important to an organization as are its
resources or products.
The sequence of consultation activities commences with upgrading individual skills and abilities,
moves on to team-building activities and then to restructuring intergroup and interdepartmental
activities. The institutionalization of these activities consists of four steps. The first step bringing
in the consultant — represents an administrative response to a felt need for effective conflict
management. The second step — entry — is associated with various information-giving
activities. The third step is aimed at attitudinal change through data-feedback, team-training,
sensitivity and T-Group training or Grid development. The final step involves a structural change
in the relationship between departments and a move towards integrative interactions and conflict
resolution. Effective conflict management is quite a major undertaking. There are not too many
guideposts to indicate where we are or how to move towards conflict resolution. It is, therefore, a
task which demands attention to attitudinal and behavioural elements, to outcome and emotional
needs and to interpersonal as well as interdepartmental requirements. The intervention strategies
of a behavioural consultant can, we have argued, move us towards that direction. We cannot be
certain that the intended effects will always be achieved. We can suggest, with some certainty,
that such interventions move us forward in the direction of effective conflict.
144
Abrahamsen, R. and M. Williams, (2006) Security Sector Reform: Bringing the Private In,
Conflict, Security & Development, 6:1 April.
Adejumobi, S., (2001) ‘Guarding the Guardian? The Obasanjo Regime and Military Reform in
Nigeria’, Development Policy Management Network Bulletin, Vol. XIII, No. 3
(September), pp. 17-19.
SDA (2006) ‘The Private Security Phenomenon: Policy Implication and Issues’. Security and
Defence Agenda (SDA) Roundtable, 7 December, Brussels.
145
UNIT 3: RELATIONSHIP BETWEEN POLICE AND PRIVATE SECURITY
OPERATIVES IN NIGERIA.
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor- Marked Assignment
7.0 References / Further Reading
1.0 INTRODUCTION
It has been noted that no government has the wherewithal to provide one hundred percent
security for nation; hence the need for corporate or private security organisations to supplement
efforts of state actors not only in petty crime prevention but also in the emerging acts of violence.
It is in this regard that criminologists and other experts in the field of security and conflict
studies have agitated for more advanced mechanisms of intelligence that place premium on
prevention of security crisis rather than post-hoc detection and responses. (Odinkalu, 2004). As a
result the scope of security needs include governmental, non-governmental, industrial, civil,
economic, communications, general infrastructural and environmental security within the new
security challenges which must be prioritise. Governmental security agencies face many
challenges today in accomplishing their missions and in providing value to their stakeholders.
What was once achievable by developing and implementing sound strategic and financial plans
is no longer guaranteed in a world where intimidation is fast spreading to all nooks and corners.
Instead, security organizations must join hands together to consider how best it is going to
succeed in the face of increasing organizational and technical complexity and in an ever-
changing risk environment.
Many significant PSCs in Nigeria have an armed police component seconded to their operations,
resulting into the 'privatisation' of public security forces to some extent. In the oil sector, the
privatisation of public security is so extensive that it can be difficult to distinguish public
policing from private security. Military forces are increasingly used to protect oil operations, and
146
are maintained by oil companies. The extension of private security, particularly in the oil sector,
alongside the privatisation of public forces, offers the possibility for a more professionalised
security structure. However, it also raises issues regarding PSCs involvement in complex
political struggles and the division of authority between PSCs and public security forces. While
there are some overlapping functions in the mission of public law enforcement and private
security operatives, yet the two groups are not the same. To explain how public law enforcement
and private security can better protect the country, this section starts by clarifying the difference
between public and private security. “Public policing” consists of services offered by local, state,
and federal agencies, i.e., local and state police as well as civil defence officers. These agencies
provide the bulk of policing services across the country. “For the most part, they are not
concerned with corporate internal problems; they are concerned primarily with street crimes
(Connors, 1999).
Private security services, on the other hand, fall into two categories:
(1) Proprietary or corporate security: Corporate security generally refers to the security
departments that exist within businesses or corporations.
(2) Contract or private security firms: Contract security firms by contrast sell their services to the
public, including businesses, home-owners, and banks. Private security is not a monolithic entity.
Just as differences exist between state and local law enforcement, private security performs
functions that can differ considerably.
IACP’s (2004) summit report notes that “A security practitioner could be an experienced director
of security at a major multinational corporation, a manager of contract security officers at a client
site, a skilled computer crime investigator, an armed protector at a nuclear power plant, or an
entry-level guard at a retail store. For local police and civil defence, some or all of these classes
of private security might be appropriate to incorporate into their homeland security strategies,
depending on the characteristics of their jurisdictions. Law enforcement and private security
have strengths and weaknesses that must be considered to form realistic expectations of what
each can bring as partners. Private security is often criticized for absent or inadequate pre-
employment screening, training, standards, certification, and regulation, and high turnover rates.
However, recent findings indicate that private security has made gains in these areas
147
(Cunningham, 2003.). Private sector security also has significant strengths. The sheer number of
private security officers makes it an important force. Often it is able to protect small geographic
areas with large numbers of officers or guards, something law enforcement cannot afford. Some
private security officers, moreover, possess specialized technical capacity, including the
knowledge and ability to protect computer networks, chemical plants, financial institutions,
health care institutions, and retail establishments. Public Law enforcement officers often do not
possess this knowledge.
Generally, the large and growing security industry “is armed with considerable and often
sophisticated resources to deter crime and prevent other losses. The public law enforcement
community is substantially smaller in size. Yet it is strong where private security is weak. To
begin with, public law enforcement powers are far greater than those of private security. The
selection process for becoming a deputy or police officer, moreover, is vigorous and includes a
thorough background investigation. Law enforcement officers are well trained, receiving
academy, field, and in-service instructions. Officers tend to stay at the same agency for the
duration of their careers, and officers in agencies that practice community policing are likely to
have established rapport and trust with local citizens and business groups that can share
information with them. Trust and information are invaluable for preventing terrorist acts. Law
enforcement agencies, however, like private security, have limitations. They sometimes lack the
financial resources of private firms because of tight budgets.
2.0 Objectives
At the end of this unit, you should be able to:
1. explain the benefits of law enforcement and private security partnerships
2. explain the relationship between private security and the MOPOL
3. know the relationship and differences in the operations of public security forces and PSCs.
148
challenge traditional security and intelligence structures. New security structures and legal
regimes are potentially evolving, yet traditional structures are slow to adapt. The security
framework is more sophisticated today than in the past. It has been observed that the Nigerian
Police Force could not always guarantee Nigerians security as an important part of proactive
crime prevention because of inadequate manpower, advanced technological and pragmatic
means for fear reduction. For these reasons, the continuous agitation for Corporate Private
Security Organisations to assist the Nigeria Police in safety business has soared (Ekhomu, 2004).
Reasons are not farfetched as evidences are bound showing the technological means under their
kitty for proactive crime control such as intruder alarms, close circuit monitors, access control to
mention just a few.
Another issue is the common knowledge of the ratio of the Nigeria Police to Nigerians, which is
put at 1:600. This has been found to be inconsistent with United Nations standard ration of 1:400
(UN, 2000). Thus the vacuum created by this inadequacy alone for government to provide
security will certainly be filled by private individuals, the private sector and ethnic militias in
some cases. The inability of the organised private sector to completely fill in the gap has been
attributed to their legal prevention from carrying arms. While the Corporate Private Security
Officers (CPSOs) are clearly here to stay, their existence and growth have created new
opportunities and challenges. For instance the mushrooming of private security groups with
inadequately trained personnel has the capacity of complicating the present security scenario.
This might be further compounded by the fact that unlike state actors, CPSOs are not directly
accountable to the public or the electorate but to a combination of weak regulators and the
corporate companies.
149
people, property, and information has continued, they are now also expected to be active
participants in the national effort to protect the country’s infrastructure.
Clearly, law enforcement and private security have much to gain from each other.
150
The benefits of law enforcement-private security partnerships are many; a chief executive must
know that these partnerships are not without obstacles such as:
i. barriers to information sharing,
ii. lack of trust,
iii. misinformation are the primary problems
151
Riot and conflict resolution: most communities and groups often engage in riots and
wanton destruction of properties and killings. In such cases it becomes necessary to use
arms in dislodging the rioters, and resolving conflict.
Modern age necessity: belonging to this modern era where small and heavy arms are not
difficulty to come-by as in the case of Niger-Delta Militants. There is therefore the need for
associating members of security organisations to be well prepared in the usage of more
sophisticated arms.
Joint operations and assistance: since it has been established that anti–terrorism campaign
cannot be effective without the collaboration of other security agencies, then there is no
way such organisations can combine with organisations that are armed in fighting
terrorism.
On the contrary, the argument has always been one - sided regarding that the private security
providers and personnel are not well trained in handling of arms. Others have also mentioned the
incessant accidental discharge for the conventional security officers, notwithstanding these
premises. It is therefore important to ask at this point, for how long are we going to remain on
these arguments, without giving the private security providers and other paramilitary agencies a
trial before being crucified.
The reliance on MoPol for armed private security services raises a number of operational and
ethical challenges. The MoPol has often been accused of using undue force, and while in the
company of PSCs, the exact division of authority between private security guards and the police
152
is difficult to establish. While the PSCs supervisor is in principle responsible for operations in
relation to clients, the police remain answerable to their commander and retain legal authority.
As one commander interviewed was eager to emphasise, “the police do not take orders from
anyone. We run our own operations”. Although many PSCs commend the MoPol for their
professionalism, not without some avoidable tensions which are curtailed through informal
arrangements between the two parties. The ability of PSCs to manage police officers depends to
a large extent on informal arrangements and their capacity to develop well-integrated procedures,
joint training, and close operational coordination with the MoPol.
4.0 Conclusion
The Private Guards Act of 1986 prohibits private security companies from carrying firearms.
Private security companies are nevertheless able to provide an armed component to their services
through various arrangements with the Nigerian Police, and most PSCs of any size and standard
have a number of Mobile Police officers (MoPol) permanently seconded to their operations. This
has resulted in a general ‘privatisation’ of the public security forces, seen in the day to day
operations of PSCs and more extensively in the security operations in most of private
establishment.
5.0 Summary
The residential market is as yet much more limited, and tends to be the preserve of smaller
companies and traditional night-watchmen or ‘gate swingers’ due to its relatively low
profitability. The main exception is the protection of the residences of employees of transnational
companies, embassies and international organisations, which are frequently part of commercial
contracts to secure business premises. The residential market is, however, undergoing rapid
change, and a number of companies are currently in the process of developing more extensive
residential security services, introducing panic buttons and rapid armed response services in
defined areas. At the moment, these services are limited to a relatively small number of
customers, but the introduction of more sophisticated technology and rapid response capacities
along the model found in many part of the country is perceived by many in the industry to
provide important new business opportunities. PSCs that are able to offer this service may in the
153
future be able to compete more effectively on price against the lower-end manned guarding
companies, while providing a superior service through an armed response capability.
Rahim, M. A. 1992. Managing Conflicts in Organizations. In: P. Fenn and R. Gameson eds.),
Construction Conflict Management and Resolution. London: E and FN Spon.
154
UNIT 4: REGULATION AND RECOMMENDATION OF PSCs IN NIGERIA
1.0 Introduction
2.0 Objectives
3.0 Main Content
4.0 Conclusion
5.0 Summary
6.0 Tutor- Marked Assignment
7.0 References / Further Reading
1.0 Introduction
The need to regulate the operations of private security providers, including private military
companies (PMCs) and private security companies (PSCs), has become a major policy concern
across the globe, which has in turn generated growing academic discourse since the turn of the
millennium. This concern has centred essentially on how to make sure that the private security
sector industry (comprising both PMCs and PSCs) does not threaten human existence (regimes
and citizens) in the course of their operation. Though these companies and their personnel are
legally authorised to carry out security functions nevertheless there are cases of misused of
power, which make them both a potential and real source of threat to human security
This concern is well placed because the mandate of the sector is to supply additional security
traditionally provided by the state. This threat is most ominous in Nigeria and some countries in
Africa, where human security falls far below the rest of the world, and where the bargaining
strength of the state in relation to the more powerful (Western) corporate security actors is
considerably weak. Thus regulating the sector in the country is essential to bringing the delivery
of private security into conformity with the overall goal of human security, by making their
corporate activities more transparent, accountable and subject to public control.
3.0 Objectives
Students are expected to understand the need to maintain standard in private security
through adequate regulations, guidelines and policies; with the ultimate aim of fostering
unity and trust between security operatives.
3.0 Main Content
155
3.1 Regulation of the Private Sector
As mentioned earlier, current efforts to regulate the private security sector has virtually treated
the sector in isolation and has approached regulation from a technical perspective through legal
control. Three main existing options for regulation are banning activities that are deemed illegal;
licensing of individual firms and sometimes approving particular contracts; and self-regulation
either by individual firms or industrial associations through self-imposed codes of conduct and
standards in the implementation of contracts. The first problem with regulation in Nigeria is that
governments are not necessarily unwilling to regulate the sector. Apart from Nigeria, deliberate
regulation of the industry as a state policy is not very much known to have taken place elsewhere
in the continent. It has been rightly observed that, under such conditions regulation may be of
low priority for regimes with more pressing concerns and limited capability for legislation. This
is because the weakness and instability of the state makes most regimes insecure and some of
them have even sought the assistance of PSCs to strengthen their relative positions of power in
the context of real threats from domestic opponents. The same weakness makes state regulation
difficult, particularly when institutions are too weak to deal effectively with foreign companies
originating from powerful countries.
However, most known efforts at regulating private security have tended to focus narrowly on the
private sector in isolation and on the technical issues of legal control. The broader gamut of
actors involved in the provision and regulation of security as well as the central political and
social context of the states in the country, within which the privatisation of security occurs have
been lamentably sidelined in regulatory calculations. The outcome of this approach has been the
obvious difficulty, if not failure, to achieve appreciable results in the regulation of private
security firms, particularly in Africa. One area where this capacity deficit is most crucial is the
provision of non-exclusionary, effective and accountable security for citizens. Regulation
therefore must be planned and implemented within an overall goal of making the state ensure the
delivery of such security. It has also meant that privatisation has reduced the scope of the state in
the performance of its most vital functions of providing security for all of its citizens. With this
in mind the state is bound to ensure that regulation is maintained.
3.2 The Industry, Standards and Regulatory Issues
156
There is a clearly expressed view across the private security industry in Nigeria that overall
standards and procedures are in need of improvement and that a higher quality service is
desirable. In a highly competitive market, this is however difficult to achieve, as contracts are
frequently won and lost by undercutting competitors’ bids. As a direct result, guards are often
very poorly paid, and services and standards remain low in large parts of the sector. The various
associations in Nigeria are currently clamouring for tighter regulation, sector wide standards for
training, and a minimum wage. In particular, the associations are keen to ensure that the sector is
rid of so-called ‘quacks’, that is, companies operating without licences, and without regard to
standards and basic security principles. It is a frequently expressed hope that a new regulatory
authority responsible for the oversight and regulation of PSCs will be set up within the next few
years. However, given the current inability of the Ministry of Internal Affairs to adequately
regulate the sector, and frequent charges that regulatory initiatives are too often linked to
particular competitive interests in the industry, a degree of skepticism is warranted concerning
the effectiveness and accountability of any new authority or initiative. In the absence of effective
regulation, improvement of standards is most likely to occur as a result of increased competition.
The pressures for higher standards is a sign that professionalization of the sector is underway,
which is currently being spearheaded by a few leading companies. To the extent that competitive
pressure is gradually forcing a number of companies to conform to minimum required standards.
The quality of service in a matter of time will no doubt increase.
Another aspect of the industry cum associations’ effort to instigate new legislation is the pressure
and continuous agitation for private security personnel to bear arms. PSCs are currently
prevented from doing their jobs properly, as unarmed guards frequently confront armed
criminals with serious casualties. Both associations regard this as a hindrance to the provision of
security, and currently lobbying the Federal Government for a change to this aspect of the
Private Guards Act. Such pressures might gain renewed force if the provision of MoPol armed
response services by a few leading companies succeed in limiting the share of the residential
market for the lower-end, manned by guarding companies. Crucially, any move towards arming
the private security sector is likely to be detrimental in the absence of an effective regulatory
framework, and it is important to stress that many industry participants as well as major clients
157
are strongly opposed to such legislative change, arguing that it would be seriously detrimental to
the general security situation in the country.
The attainment of democracy requires that both the public and private security services
accountable and responsive to citizens, and this can only be achieved through an inclusive
process of government that integrates private security providers within the security sector. The
context of Nigeria requires specific solutions that are suitable to the realities of security and
private engagement. The following recommendations are suggested for planning and
implementation of private security regulation into reforms that seek to improve access to
effective and accountable security for all:
Rethinking the notion of regulation is a crucial step in dealing with the problems
discussed in this paper. A more appropriate concept would be integration. This means
that rather than expending efforts on an inefficient approach to the private security sector,
the security sector should be redefined not only in theory, but most critically in practice.
This would require taking a broader view of the sector in a way that integrates corporate
actors into on-going SSR work in such places as Sierra Leone, Liberia and the DRC, and
into future SSR and parallel programmes in the region.
Reforming states must ensure the principles of transparency and parliamentary oversight
are applied to the private security industry. Regulation has emphasised executive control
and neglected parliamentary scrutiny, which is vital for ensuring transparency in the
industry
158
There is need for states to negotiate a division of labour that would allow private and
public actors to specialise in their areas of competence. Within such arrangements, the
core security functions of the state must not be privatised. These include combat duties,
intelligence work, criminal interrogation, detention, and prosecution. The capabilities of
the private sector in training and advising security forces as well as in providing
protection and needs are to be harnessed by the state to bolster security provision. The
sector cannot be approached simply in terms of regulation, but needs to be regarded
instead as part of a wider network of security provision, involving the state, private actors
and the civil society. The details of such specialisation must be left to local actors to work
out through dialogue.
Reforming states also need to strengthen their monitoring of the private security sector.
This can be done by setting up independent public complaints bodies that can entertain
and investigate allegations of misbehaviour on the part of private security companies.
At the federal level, there is need for formulation of a framework that provides strong
incentives for good governance in the security sector of its member states. This is mainly
because it is only when a state is ready to reform its security sector that the regulation of
private security becomes a viable option. In addition, the federal government needs to
establish regional enforceable standards for all security firms operating in the region and
codes of conduct for assessing firms and sanctioning erring ones.
Civil society at the national and state levels is essential for stimulating dialogue aimed at
fashioning innovative ways of planning the integration of private security into the
mainstream security.
Finally, where private security companies complement public security provision, civil
society organisations have a role in advising private operators on the norms of human
rights and democratic accountability
159
Society of Security Practitioners of Nigeria (SSPN), the Security and Safety Association of
Nigeria (SSAN) and the Association of Private Security Practitioners in Nigeria (APSPN).
The latter association was founded in April 2004, in direct response to the government’s decision
to increase the licence fees for guarding companies. The three other national associations were
all founded in 2002, largely in response to the arrival of Gray Security in the country. The
Society of Security Practitioners of Nigeria (SSPN) presently appears to be one of the more
active associations, with approximately 200 members (consisting of both individuals and
companies) and holding regular monthly meetings. The NPSA is also fairly visible and vocal in
arguing for increased professionalization of the industry. The SSAN currently has a smaller
membership of 12, but the aim is to have three chapters, in Abuja, Lagos and Port Harcourt
respectively.
The arrival of an international company in Nigeria in 2002 was presented by many local PSCs as
a threat to national security and a contravention of the Private Guards Act, which stipulates that
all PSCs must be wholly Nigerian owned. The main aim of the SSPN and SSAN is to oppose and
limit the activities of what they perceive as ‘foreign’ firms in Nigeria. While the initial hostility
to international involvement has subsided somewhat, and it is clear that international PSCs
operate within Nigerian law, it is fair to say that the leadership of these two associations remain
hostile to what they describe as “foreign infiltration”. While this opposition is formulated and
expressed in political and legal terms, it is clearly also underpinned by commercial, competitive
pressures. OSL entered the Nigerian market through a major, nation-wide contract with Nigerian
Breweries, and subsequently took on several contracts with banks and industries, before signing
an extensive contract with ChevronTexaco, thus acquiring several valuable and sought-after
clients and a substantial share of the security market.
Local companies fear the competition from international PSCs, which provide high levels of
professionalism and often have access to superior resources and technology and hence, as one
local company director puts it, “they get all the plum contracts”. According to the chairman of
SSPN, ‘foreign’ PSCs should not be allowed an operational role in Nigeria, but should act only
as technical partners to national business, in a support and advisory capacity. It must be stressed
160
that the international companies in the country are Nigerian-owned, and operate through
different management agreements with international companies. They thus operate within the
law and stipulations of the Private Guards Act. The various associations also seek to promote
higher standards and new legislation to regulate the sector. The existence of large numbers of
unlicensed companies is recognised as a major problem, and there is considerable concern to
cleanse the sector of what are commonly referred to as ‘quacks’. In particular, the associations
would like to see the establishment of a private security regulatory authority to ensure a tighter
regulation of the sector, including the establishment of guidelines and standards for training,
wages and working conditions. Similarly, the associations express concern over the lack of
adequate databases to check the criminal records of potential guards, as well as the absence of
any database listing guards who have previously been dismissed for misconduct by other
companies. Another lobbying issue is the right of PSCs to bear arms, and at least two of the
associations are of the opinion that the private security sector should be allowed to provide an
armed service. So far, lobbying to this effect has found little favour with the federal government.
It should also be stressed that there is no uniform opinion on this issue among the companies and
many fear that a move towards firearms would inevitably lead to a dangerous increase in arms in
society, and to greater insecurity due to the lack of regulation and training within the sector.
Many international clients, including oil companies, are also opposed to any move towards
arming the sector, a position that is reinforced by the oil companies’ endorsement of the
Voluntary Principles on Security and Human Rights.
4.0 Conclusion
Finally it should be recognised that to a significant extent the number and diversity of security
associations in Nigeria is representative of a multitude of competitive struggles within the sector,
including the right to represent the sector to government authorities, and to advance particular
interests in the process. Past security associations have been numerous and short lived, and the
sector’s persistent inability to speak through one association likely weakens its impact and
effectiveness vis-à-vis legislators and regulators.
5.0 Summary
Monitoring and Review
There appears to be little monitoring of standards in the sector. Licences have to be renewed by
written application to the Ministry of Internal Affairs every second year, but apart from this,
161
there is little regulation or oversight of the quality of service, standards and training. Many
companies continue to operate without a licence, a problem that is recognised by the legitimate
companies and the associations, but not acted upon by the Ministry. The main exception to the
relative lack of monitoring and review is the frequent inspections and audits of international
private security companies by various Ministries, including Labour, Immigration and Internal
Affairs, as well as the State Security Service (SSS). These checks ensure compliance with
Nigeria’s labour and immigration laws, including review of the proportion of Nigerians
employed in relation to expatriates. However, there also appears to be an element of harassment
and corruption to these inspections; directors of one international security company have more
than once been detained while the SSS searched office files and documents, without finding
anything amiss. Such occurrences significantly complicate the operating environment for
international PSCs, and there is suspicion that these inspections are on occasions instigated by
unfounded allegations and complaints by local companies hostile to international competition.
6.0 Tutor-marked assignment
1. Write a comprehensive note on policy option in PSC
2. In your own opinion, examine what can be put in place to ensure effective and efficient
service delivery by indigenous PSCs.
7.0 References/further readings
Abrahamsen, R. and M. Williams, (2006) Security Sector Reform: Bringing the Private In,
Conflict, Security & Development, 6:1 April.
Adejumobi, S., (2001) ‘Guarding the Guardian? The Obasanjo Regime and Military Reform in
Nigeria’, Development Policy Management Network Bulletin, Vol. XIII, No. 3
(September), pp. 17-19.
Alao, A., (2002) Privatisation of Security and Security Sector Reform in Uganda’, in Damian
Lilly and Michael von Tangen Page (eds) Security Sector Reform: The Challenges and
Opportunities of the Privatisation of Security. London: International Alert.
162
UNIT 5: SPECIFIC SECURITY THREATS
1.0 Introduction
2.0 Objectives
3.0 Main Objectives
4.0 Conclusion
5.0 Summary
6.0 Tutor-Marked Assignment
7.0 References/Further Readings
1.0 INTRODUCTION
This unit examines several security threats common to business organisations, such as white-
collar crime, burglary and robbery etc. These crimes are capable of collapsing any business
empire if adequate counter measures are not put in place. Although, there specific program that
can entirely guarantee protection against attack nevertheless business organisation can take
action to lessen its attractiveness as a target.
2.0 OBJECTIVES
At the end of this Unit, you should be able to:
a. Explain economic/white-collar crime.
b. Discuss burglary and robbery
c. Explain the effect of labour dispute on security
d. Discuss espionage
e. Discuss piracy
ECONOMIC/WHITE-COLLAR CRIME
It was first coined by Sutherland (1939). Sutherland defined white-collar crime as “an offence
committed by a person of a respectability and high social status in the course of his (or her)
occupation”. Edelhertz (1970) also defined white collar crime as an illegal act or series of acts
committed by nonphysical means and by traditional notions of deceit, deception, manipulation,
concealment or guile to obtain money or properties, to avoid the payment or loss of money or
property or to obtain a business or personal advantage. White collar crime therefore, overlaps
with corporate crime because of the opportunity for fraud, bribery, insider trading,
163
embezzlement, computer crime, copyright infringement, money laundering, identity theft and
forgery. It is a crime which is nonviolent but the end result could be violent. Individuals of
higher economic and social status commit more harms (white collar crimes) to the companies
and society than burglars and robbers but the justice system often treated them with more
lenience. Perpetrators have specialized knowledge that allows them to commit complex
transactions that are often difficult to identify. Law enforcement authorities rarely catch white-
collar criminal at the onset of their activities. In addition, the use of computers and electronic
financial transaction has complicated the detection and prosecution of white-collar crimes. A
lack of standard classification and definitions coupled with limited reporting of workplace crime
contributes more to the problem of accurate measurement. For this reason in Nigeria, the
economic and financial crime commission (EFCC) was set up by the federal government to curb
the menace of corruption and financial crime.
BURGLARY
Burglary is committing a crime through stealth by entering a building or other structure. Burglars
also commit rape and arson among other felonies. Burglary has been observed to be most
frequently occurring crime. It is essential that every business take particular care to protect itself
against this form of crime. Burglars enter through the doors, or windows, through the roof or
possibly from a neighbouring occupancy. Most successful burglaries are made without forced
entry. The greatest numbers are made through the front door or main entrance. While a
considerably smaller number of burglaries involve the stay-in who gathers the loot then breaks
out and is gone before the guards or police can respond to an alarm. Cash is naturally the most
sensitive asset and the most eagerly sought but because it is usually secured in some manner, it
represents the greatest challenges to the burglar. Blasting and carrying away of the entire safe are
the methods most commonly used.
164
2. Reducing the value of merchandise: It means marking company property with
company identification tags or recording serial numbers that are easily traced.
3. Alarms: Many houses and stores are attached with local alarm systems. Although
many police and security experts feel such alarms are ineffective because the
response to the signal is only by chance, and it that serves to warn the intruder rather
than aid in capture.
4. Safes: Safes should be located in a prominent, well lighted position readily visible from
the street where it can be seen easily by patrols or by the police. It should be located in a well-
secured and alarm rigged inner room and the floor and ceiling should be reinforced.
ROBBERY
Robbery is the crime of taking or attempting to take something of value by force and/ or by
putting the victim in fear. In common law, robbery is defined as taking the property of another,
with the intent of permanently depriving the person of that property, by means of force or fear.
Robbery differs from single theft in its use of violence and intimidation. The elements of robbery
are: (1) a trespassor (2) taking and (3) carrying away (4) of the personal property (5) of another
(6) with the intent to steal (7) from the person or presence of the victim (8) by force or threat.
Robbery remains a serious crime because of the potential harm to its victim. Private individuals,
retailers’ shops and banks take the brunt of these attacks. It has also been observed that less than
a third of all robbers are arrested.
The focus of this unit is robbery of stores. Robbers are typically criminals making a direct
assault on people for cash or properties. Their targets may be messengers or store employees
taking cash for deposit in the bank or bringing in cash for the day’s receipts, or they may break
into stores before opening and wait for the first employee, whom they force to open safes or cash
room. Delivery trucks and warehouse can also be targets for robbers. Probably the major cause
of robbery is the accumulation of excessive amount of cash. Hence it is important that only the
cash needed to conduct the day’s business be kept on hand and most of that should be stored in
safes. If the store has a cash room, it must be secured against unauthorized entry. The door to the
room must be secured and securely locked. It should be equipped with panic locks and have
alarms fitted to it. It is essential to any robbery prevention programme. For instance, storekeepers
165
and employees should be properly indoctrinated on the use of alarm as well as the need to
question persons loitering in unauthorized area etc. Also employees should be instructed to co-
operate and not to do anything that would make the robber to resort to violence. The primary
goal of robbery prevention programme is to make the store less attractive to potential robbers.
LABOUR DISPUTES
A labour dispute is a state of disagreement over a particular issue or group of issues over which
there is conflict between workers and employers. These issues may include conditions of
employment, fringe benefits, hours or work, tenure, wages etc. All security personnel should be
aware that their role is to protect personnel and property only and in case of labour disputes, they
are not to participate. A checklist of some possible measures before and after declaration of
labour dispute in order to protect properties:
1. Secure all doors and gates not being used during the strike and see that they remain
secured.
2. Remove all combustible from the area near the perimeter both inside and outside.
3. Remove any trash and stones from the perimeter that could be used as missiles.
4. Change all locks and padlocks on peripheral doors of all buildings to which keys have
been issued to striking employee.
5. Recover keys from employees who will go out to strike.
6. Nullify all existing identification cards for the duration and issue special cards to
workers who are not striking.
7. Check all standpipe hoses, fire extinguishers and other fire-fighting equipments after
striking workers have walked out.
8. Test sprinkler systems and all alarms-both fire and intrusion – after striking
workers have walked out.
9. Consider construction of barriers for physical protection of windows, landscaping and
lighting fixtures.
10. Move property most likely to be a damaged well back from the perimeter.
11. Be certain all security personnel are familiar with the property line and stay within
it at all times when they are on duty.
166
12. Guards are not to be used to photograph, tape or report on the conduct of the
strikers. The only reports will relate to injury to personnel or property.
13. Notify employees who will continue to work to keep the windows of their automobiles
closed and their car doors locked when they are moving through the picket line.
14. Consider the establishment of a shuttle bus to non-striking employee.
15. Establish, in advance, which vendors or service persons will continue to service the
facility and make arrangements to provide substitute services for those unwilling to cross
the picket line.
16. Keep the lines of communication open.
17. Because functional organizational lines may be radically changed during the
walkout, find out who is where and who is responsible for what.
ESPIONAGE
Espionage is a crime under the legal code of many countries. Espionage or spying involves
individual obtaining information that is considered secret or confidential without the permission
of the holder of the information. Espionage is usually part of an institutional effort by a
government or corporation, and the term is most readily associated with state spying on potential
or actual enemies primarily for military purposes. Spying involving corporation is known as
industrial espionage (Wikidepia, The free Encyclopedia). In this unit, we are concerned with
industrial espionage. The purpose of espionage is to gather knowledge about an organization(s).
It may include the acquisition of intellectual property such as information on industry,
production, ideas, techniques and processes, recipes and formulas or it could include
sequestration of the property or operational information, such as that on customer data sets,
pricing, sales, marketing research and development, policies. It may describe activities such as
theft of trade secrets, bribery, blackmail and technological surveillance. The problem of
espionage is increasing more and more due to corporate competition and computer based data
storage. Industrial espionage commonly occurs in two ways.
a. A dissatisfied employee appropriate information to advance their own interests or to damage
the company.
b. A competitor seeks information to advance its own technological or financial interest.
167
Insiders are generally considered the best sources for industrial espionage. Insiders can be
induced, willingly or under duress to provide information. Among the notable cases, was that of
Volkswagen. In 1993, car manufacturer Opel, the German division of General motors, accused
Volkswagen of industrial of espionage after Opel’s chief of production, Jose Ignacio Lopez and
seven other executives move to Volkswagen. Volkswagen subsequently threatened to sue for
defamation, resulting in a four-year legal battle. The case which was finally settled in 1997,
resulted in one of the largest settlements in the history of industrial espionage, with Volkswagen
agreeing to pay General Motors $100 million and to buy at least $1 billion of car parts from the
company over 7 years, although it did not explicitly apologize for Lopez’s behaviour.
PIRACY
Piracy as a criminal act is not a new problem. It is the copying of copyrighted materials by
unauthorized means. It can also be defined as the theft of one’s intellectual property. It has
become a major setback in development particularly in the entertainment industry in Nigeria and
world over. Advances in technology have made possible high-speed and high quality duplication
of pirates. Compact disks (CDs) either audio or video are the medium most often copied. Even
home computer owners have the ability to download and copy their own audio and video with
CD burners. According to the Nigeria Copyright Commission, (2007), film industry loses an
estimated N4.2 billion annually to illegal digital duplication, on-line piracy and unauthorized
rental of video works within the country.
Piracy refers to the illegal duplication and distribution of recordings. It takes three specific and
often confused forms:
1. Counterfeiting: The unauthorized recording of the pre-recorded sounds, as well as
the unauthorized duplication of original artwork, label, trademark and packaging.
2. Pirating: The unauthorized duplication of sounds or images only from a legitimate
recording.
3. Bootlegging: The unauthorized recording of a musical broadcast on radio, television or a
live concert. Bootlegs are known as undergo round recording (fisher and green 2004).
168
There have been series of efforts by the industry players to curb the activities of the practice in
Nigeria but it is yet to record any positive result. For instance, key players in the music and film
industries keep rallying round markets and campaigning against piracy. The cartel of pirates is
domicile in big markets such as Alaba international market in Lagos, Main market, Onitsha in
Anambra, and other markets in Kano and Borno. The recent use of materials from the internet
has increased the activities of pirates and the potential abuse of copyright laws.
CONCLUSION:
With the growing pace of technology and the use of internet, many of these crimes are changing
direction. Hence in order to combat these crimes, security and law enforcement will need to
enhance their tools by becoming proficient at monitoring and investigating crimes using
computers and related information technology.
5.0 SUMMARY
In this unit, we have been able to discuss burglary and robbery, explain the effect of labour
dispute on security. We also discussed espionage and piracy especially as they relate to the
entertainment industry.
Fischer R.J and Green, G (2004) Introduction to Security. Borlington, Elservier Butterworth
Heinemann.
169