Bank Physical Security
Bank Physical Security
HUMANISTIC PARTNER
•Induction
•Leadership and communication
•Skills
development•Teamwork
LEGAL ASPECTS
PROCEDURES •
TECHNICAL AREA
•Technical
security •Surveillance
and counter-surveillance •Prevention of terrorism
•Information protection
•Firearms
knowledge•Practical shooting exercise
SOCIOHUMANISTIC AREA
Leadership
No supervisor or coordinator can accomplish all the work for which he or she is
responsible by his or her own efforts; he or she must delegate some of his or her work to
others. Those who are delegated tasks become responsible for the assigned part and the
supervisor ensures that the work is carried out satisfactorily. “Delegation includes giving
the employee the authority necessary to get the job done.” Delegation is
COMMUNICATION with the subordinate.
2.-Relations with the Authority.
It is not always necessary to resort to authority to achieve the fulfillment of the functions
that correspond to each subordinate. Its use on some occasions or opportunities is
appropriate, because the supervisor has the authority to require that subordinates follow
his directions.
The management process involves several important aspects such as: 1. Motivation, 2.
Leadership, 3. Communication, 4. Coordination. During the course we will only cover
Leadership and Communication.
There are various leadership styles, but on this occasion we will only refer to:
Authoritarian, Democratic and Condescending.
The Authoritarian: He is the one who dictates policies, determines tasks, establishes rules
and keeps distance between himself and his group and never allows participation.
The Democratic: Helps and encourages determining policies, delegates responsibilities
and determines the steps to follow to achieve objectives or goals. The leader is objective,
giving freedom to choose, suggesting alternatives and trying to be a member of the group,
instead of putting himself in a privileged position.
The Condescending: Participates very little in the group process, leaves individuals
completely free to act, remains in his position but rarely makes comments, praises or
criticisms about the group members' activities, and his intuition is to let things happen and
not participate.
In conclusion, the democratic style is considered the best for an effective leader and for
most groups, although some creative and entrepreneurial groups function perfectly without
having any leader at all.
Communication
Communication can be defined as the act that allows information to be shared.
Communication occurs in all animal species, although it differs from humans due to the
limited nature of their repertoire. We can also say that communication is the interaction of
two or more people whose objective is to share a meaning.
Effective Communication: It occurs when an expression that corresponds to the reality of a
subject is shared with another, through understanding.
Communicate: It is to share something about ourselves. It is a rational and emotional
quality that arises from a need to get in touch with others, exchanging ideas that acquire
meaning according to common previous experiences.
One of the things we neglect the most, not only in organizations but also on a personal
level, is the communication process. The most common mistake is to confuse
communication with information.
Communication is not about speaking, it is about listening, and this leads us to a totally
different paradigm, because instead of putting ourselves in an ACTIVE position, we
apparently put ourselves in a PASSIVE position and we say apparently, because it takes
much more courage, much more bravery, energy and discipline to listen than to speak.
When we act this way we are leaders; we are creating the foundations for communication,
which is learning to listen.
TEAMWORK
Banking specialization 4
Teamwork is one of the psychological working conditions that most positively influences
workers because it allows for camaraderie. It can yield very good results, as it usually
generates enthusiasm and produces satisfaction in the recommended tasks.
In work teams, rules are drawn up that must be respected by all members of the group.
They are rules of behavior established by team members. These rules provide each
individual with a basis for predicting the behavior of others and preparing an appropriate
response. They include the procedures used to interact with others. The function of norms
in a group is to regulate its situation as an organized unit, as well as the functions of
individual members.
The force that integrates the group and its cohesion is expressed in the solidarity and
sense of belonging to the group that its members manifest. The more cohesion there is,
the more likely it is that the group will share common values, attitudes and standards of
conduct.
Working as a team is beneficial not only for one person but for the entire team involved. It
will bring us more satisfaction and make us more sociable, it will also teach us to respect
the ideas of others and help our colleagues if they need our help.
Advantages of teamwork
Among the essential advantages that camaraderie and teamwork present, both for
individuals and for organizations, are:
For individuals
There is less stress in working by sharing the hardest and most difficult jobs.
Responsibility is shared when seeking solutions from different points of view.
It is more rewarding to be a part of a job well done.
Economic incentives and professional recognition are shared.
Others can be better influenced by the individual solutions that each individual has.
The feeling of a job well done is experienced more positively.
Decisions made with the participation of the entire team are more widely accepted
than decisions made by a single individual.
More information is available than any of its members separately.
Banking specialization 5
Group work allows for different points of view when making a decision. This enriches
the work and minimizes frustrations.
We can exchange opinions while respecting each other's ideas:
Achieve greater integration between people in order to understand the skills of the
members.
To form a work team, it is necessary to consider not only the intellectual capacities of its
potential members but also the socio-psychological and personality characteristics of each
component. Some teams are formed to perform specific tasks, others to advise, and
others to manage.
The role of leaders is important in teamwork and fostering camaraderie. They work to
ensure that there is agreement on the objectives and that these are clear, as well as that
everyone feels committed and involved with the tasks.1
LEGAL ASPECTS
OPERATION PROTOCOL FOR SURVEILLANCE IN FINANCIAL INSTITUTIONS
1. Introduction 1
2. Objectives 1
3. Responsibilities Application 2
4. Definitions 2
5. General Conditions for the provision of private surveillance and security services
Financial sector 3
5.1. Staff Selection .3
5.2. Accreditation as a Security Guard (Credential) 4
5.3. Accreditation as a Technological Media Operator (Credential) 4
5.4. Vigilantes Uniform 4
5.5. Functions of the Watchman 5
5.5.1 What a Watcher Should Do 5
5.5.1.1 Opening procedure 5
5.5.1.2 Access control 5
5.5.1.3 Main box opening procedure 5
5.5.1.4 Valuable Transport Collection Operation 6
5.5.1.5 Observation 6
5.5.1.6 Closing procedure 7
5.5.1.7 Interpersonal Relationships. 7
5.5.1.8 Duties of the Watchman 7
5.6. Elements of the Watch Post 8
5.6.1. Minute Book 8
5.6.2. Communication Equipment 9
5.6.3. Armament 9
5.7. Minimum characteristics of Surveillance Post 10
5.8. Customer Service or User Service 11
5.9. General Diagnosis - Security Study 11
6. Technological Media Operation 11
6.1 Alarm Monitoring 11
6.2 CCTV Monitoring 12
Banking specialization 7
1. Introduction
The Superintendency of Surveillance and Private Security is responsible for exercising
control, inspection and surveillance over the industry and services of surveillance and
private security, and therefore, establishing technical and legal criteria, as well as
procedures and policies that standardize the provision of surveillance and private security
services.
Decree Law 356 of 1994, in its article 108 establishes that "The National Government will
issue the operating manuals, uniform inspection manuals and others that are required for
the provision of private surveillance and security services."
The purpose of private surveillance and security services is to prevent, stop, reduce or
deter attacks or threats that may affect the safety of people or property under their care.
2. Objectives
The objectives of this Operating Protocol for the private surveillance and security service in
the financial sector are:
• Improve the quality of private security and surveillance services, ensuring an adequate
technical and professional level.
• Establish the minimum conditions for the provision of physical and electronic surveillance
services, aimed at the financial sector.
• That private security and surveillance services that provide services in the financial
sector adopt appropriate and sufficient prevention and control measures, aimed at
preventing their services from being used as an instrument for carrying out illegal acts, in
any form, or to give the appearance of legality to criminal activities or to provide services to
criminals or to persons directly or indirectly linked to drug trafficking or terrorist activities.
• Contribute to crime prevention by reducing opportunities for criminal activity and
discouraging the actions of criminals, in collaboration with the authorities of the Republic.
• Provide adequate protection to users of private security and surveillance services,
through clear rules for the provision of services, with qualified personnel, seeking to
optimize resources and improve the provision of the service.
3. Responsible Application
The persons responsible for the implementation of the Protocol for the Operation of Private
Surveillance and Security Services for the Financial Sector are:
Banking specialization 8
• The legal representative of private security and surveillance services in the financial
sector
• Director of operations or whoever takes his place
• The supervisor
• Technological Media Operator
• The watchman
4. Definitions
Protocol
It refers to the rules, the set of actions or the procedures established for the development
of an activity.
Security protocol for surveillance services in the financial sector implies, for the private
surveillance and security company or cooperative, the implementation of the minimum
quality standards that must be met and the aspects that must be taken into account in
order to provide a service.
Physical Surveillance of the Financial Sector
The private surveillance and security service of the Financial sector is that which is
provided in financial institutions and which can be provided with or without weapons (lethal
or non-lethal) and technological means.
Vigilant
It is the natural person who, in the provision of the service, has been entrusted with the
task of protecting, guarding, and carrying out identity checks upon access to entities in the
financial sector in order to prevent, stop, reduce or deter attacks or threats that may affect
their security.
Technological Media Operator
It is the natural person who, in the provision of the service, has been entrusted with the
task of interpreting the different signals such as (Openings, Closings, Motion sensors,
Panic buttons, Remote cameras, Magnetic contact break detectors, Glass break sensor,
Vibration sensors)
Electronic Surveillance
Electronic surveillance includes private security and surveillance companies and
cooperatives providing their services through technological means duly authorized by the
Superintendency of Private Security and Surveillance, and can be provided in residential
areas, companies, commercial, financial, and industrial establishments.
Alarm Monitoring
Permanent monitoring of electronic security systems installed in companies, commercial,
financial and industrial establishments and in the residential sector, which emit information
received and attended to by a Monitoring Center.
Closed circuit television CCTV
A closed circuit television is a means of active protection that allows remote and real-time
general control of areas and facilities, making it an effective means of external, perimeter,
internal and specific surveillance.
Closed circuit television CCTV
5. General Conditions for the provision of private surveillance and security services
in the financial sector
5.1. Staff Selection
Staff selection is the set of specific steps used to determine whether the candidate is
suitable to perform the tasks assigned, whether he or she meets the pre-established
profile and whether he or she can reach the performance levels required for each position,
in order to decide which applicants should be hired. The selection process within the
private security and surveillance company and/or cooperative must include:
Banking specialization 9
• Validation and verification of the data and documents provided in the CV (authenticity of
diplomas, work and personal references; review of background and public annotations).
• Security knowledge interview.
• Psychotechnical test.
• Selection interview.
• Companies must include tests of reliability and loyalty to rule out issues such as
participation in illegal activities, links with groups outside the law, possible manipulation to
participate in illegal activities, consumption of alcohol and/or psychotropic substances
within the framework of the Constitution and the law.
For the application of the loyalty and reliability test, there must be prior, voluntary written
authorization from the examinee. The person examined will have an interview with the
professional who administers the evaluation, where he will receive a prior explanation of
how the polygraph works and will be assured that this test will not, under any
circumstances, constitute an attack on his human dignity or fundamental rights.
• Home visit
• Medical examination (visual, auditory and muscular)
5.2. Accreditation as a Security Guard (Credential)
In order to carry out their duties and remain identified, the operational staff of private
surveillance and security services will carry the credentials issued by the Superintendency
of Private Surveillance and Security, in accordance with current regulations.
The credential must be valid and the position specified therein must correspond to the
functions performed, which implies that the guard has taken and passed the training
course in private surveillance and security at a Private Surveillance and Security Training
School or Academy.
5.3. Accreditation as a Technological Media Operator (Credential)
In order to carry out their duties and remain identified, the operational staff of private
surveillance and security services will carry the credentials issued by the Superintendency
of Private Surveillance and Security, in accordance with current regulations.
The credential must be valid and the position specified therein must correspond to the
functions performed, which implies that the Technological Media Operator has taken and
passed the training course in private surveillance and security at a Private Surveillance
and Security Training School or Academy with a License issued by the Superintendency of
Private Surveillance and Security.
5.4. Security Guard Uniform
To provide the service, the security guard must wear the uniform authorized to the
company by the Superintendence of Surveillance and Private Security, which must be in
accordance with the modifications and specifications of Resolution 5351 of 2007 and with
External Circular 25 of 2008.
Under no circumstances may uniforms be similar to those used by members of the Armed
Forces, the National Police, the DAS, the CTI, the Civil Defense, the Official Fire
Department and the International Committee of the Red Cross.
The security guard must wear a clean, complete uniform in good condition.
5.5. Duties of the Watchman
5.5.1 What a Watchman should do:
5.5.1.1 Opening procedure
Check the surroundings and entrance of the financial institution, observing the presence of
suspicious persons, vehicles or other elements that may pose a risk to the property being
monitored.
Upon receiving the job, the security guard must make a general tour of the facilities,
confirm that nothing new has occurred, and check that all the elements of the job are
present.
Banking specialization 10
The closure may be dual or only with the accompaniment of the surveillance company's
reaction group.
Take into account the conditions and/or policy of the Bank or banking establishment, if
any.
5.5.1.7 Interpersonal Relationships.
Security personnel in the financial sector, as in all services, must have an excellent
personal appearance, a respectful, friendly and cordial treatment both with officials and
clients and users.
5.5.1.8 Duties of the Watchman
The duties that the security guard must take into account when providing the security
service in the financial sector are:
• Respect the fundamental rights and freedoms of the community, refraining from engaging
in conduct reserved for the public force.
• Contribute to crime prevention by reducing opportunities for criminal activity and
discouraging the actions of criminals, in collaboration with the authorities of the Republic.
• Observe, in the exercise of their functions, compliance with the legal norms and
procedures established by the Government
National, as well as the orders and instructions issued by the Superintendency of
Surveillance and Private Security.
• Adopt dissuasive or alert attitudes when observing the commission of criminal acts in the
vicinity of the place where they are providing their services, immediately notifying the
authorities so that their effects can be prevented or reduced.
• Personnel comprising private security and surveillance services who are aware of the
commission of punishable offences during or outside their service must immediately inform
the competent authority and provide all the cooperation required by the authorities.
• Provide support when requested by the authorities, in order to address cases of public
calamity.
• Others established in current regulations.
5.6. Elements of the Surveillance Post
The minimum elements that must remain in a private surveillance and security post in the
residential sector are:
• Control or minute book.
• Means of communication (radio, avantel, cell phone, others).
• Armament (if applicable).
• Financial surveillance and private security security protocol.
• List of emergency contact telephone numbers for the coordinator of the respective
quadrant.
• Closed circuit television monitoring (if applicable.)
• Others that contribute to the control and improvement of the surveillance service.
5.6.1. Minute Book
This book should list everything that happens in the workplace on a daily basis, such as:
• Record of receipt and delivery of the position.
• Relate the objects found in the rounds or handed in by people as lost objects.
• Notification of orders issued prior to taking over service.
• New developments found during the surveillance service.
• Notes of incidents that occur in the workplace.
• Records of supervisor visits.
• Records of authorities' journals.
• Prevention instructions given by the security company.
• Record with names and time of maintenance workers entering the financial institution.
Banking specialization 12
The information and records recorded in the aforementioned book may be taken as
evidence in disciplinary and criminal actions in cases duly stipulated by the authorities.
State requires it.
5.6.2. Communications Equipment
• Every workplace must have a means of communication such as: radio, avantel, cell
phone, etc.
• The equipment must remain with the battery charged and enabled so that the guard can
request immediate support when required.
5.6.3. Armament
Security personnel carrying weapons must have the following documents:
• Current identification card, issued by the Superintendency of
Private Surveillance and Security.
• Legible photocopy of the permit for possession or carrying.
• Possession or carrying in places other than those where surveillance is provided by
virtue of a contract or the respective main office, branch or agency or outside the exercise
of the contracted functions, generates the seizure of the weapon without prejudice to any
applicable criminal sanctions.
• The weapon must remain at the workplace or be transported to authorized gun cabinets.
• The permit or safe-conduct pass must be valid, in the form of ownership in the name of
the company. Weapons with a personal use permit are not permitted for security services.
• To provide the contracted service, weapons of war or weapons for the exclusive use of
the public force, weapons of restricted use and prohibited weapons or accessories must
not be used. 2
• There must be an updated record of the location of firearms according to the signed
contracts.
• Under no circumstances should you lend your service weapon to another person.
5.6.3.1 Please note the following decalogue for the provision of firearms surveillance
services:
• Treat all weapons as if they were loaded.
• Keep the barrel of the gun pointed in a safe direction.
• When displaying or examining weapons, make sure they are unloaded.
• Make sure the barrel is not clogged and use suitable ammunition.
• When not in use, keep weapons unloaded.
• Do not pull the trigger until you are ready to do so.
• Never point a gun at anyone.
• Do not shoot at flat surfaces, water or hard bodies.
• Do not drink alcoholic beverages or use psychotropic or narcotic substances when
handling weapons.
• Store weapons separately from ammunition.
5.7. Minimum characteristics of the surveillance post
The workplace must have the minimum housing or sanitary resources so that permanent
or mobile security personnel can carry out their work in conditions that do not threaten
their own safety and dignity.
The workplace must remain clean, organized, and have lighting, access to a bathroom,
and some means of communication.
5.8. Customer Service or User Service
The procedure adopted by the private security and surveillance company and/or
cooperative to promptly resolve and address the client's concerns, needs or complaints,
which in some cases are considered to be affected by the operation of a private security
and surveillance service or by its operational personnel.
5.9. General Diagnosis - Security Study
Banking specialization 13
The aim is to create a direct link between the company and the client, and to carry out a
security study, risk assessment, and the client's needs and vulnerabilities, which aim to
establish the risks to which the contractor is exposed and to identify the threats.
Once the risks and threats have been identified, the means to be used in the provision of
the service and the required control points, as well as the service provision policies, must
be established.
The service provision contract must establish what the company and/or cooperative is
committed to and the means to be used for its development, such as:
• Closed circuit television CCTV
• Alarms
• Access controls
6. Operation of Technological Media
6.1 Alarm Monitoring
The main function of the technological media operator in the monitoring center is to
process the signals coming from the alarm systems, analyze them and classify them as
follows:
Alarm signals (panic, forced opening, sabotage, battery failure)
Verification signs (irregular opening, lack of closure)
Non-operational signals (opening, closing)
Once the signal has been qualified, the technological media operator proceeds according
to the established service protocol.
Confirm the alarm or verification signal via telephone with the assigned contact. Report the
incident to the supervisor so that he/she can confirm the event and appear at the financial
institution.
Report the event to the police officers in the corresponding quadrant and to the National
Police Citizen Support and Solidarity Network.
The supervisor evaluates the event and makes the report.
In the case of irregular openings, the technological media operator reports to the
supervisor so that he can appear on site and verify whether the security system has been
violated.
In the event that the financial institution does not close at the established time, the
technological media operator communicates with the financial institution's contact person
to corroborate the information and confirm that no irregular action is taking place.
When the opening and closing signals are made within the established schedule, they do
not generate any action on the part of the technological means operator of the monitoring
center.
6.2 CCTV Monitoring
This type of system is a complement to detectors or sensors, alarm monitoring, perimeter
fencing, security lighting, access controls and, in general, electronic systems and
surveillance, in relation to minimizing threats of theft and sabotage, by common crime,
subversion or employees.
The primary function of a technology operator at a CCTV monitoring center is to be alert
and identify suspicious behavior that may undermine security, and alert the physical
surveillance staff.
If criminal activity occurs within the establishment, you must immediately report the event
to the police officers in the corresponding quadrant and the Citizen Support and Solidarity
Network of the National Police.
Circular 52 of 2007 issued by the Financial Superintendence establishes that financial
institutions must have video cameras, which must cover at least the main entrance and the
areas of attention to the public.
Banking specialization 14
In financial institutions, records must be kept of the images taken during the 24 hours,
indicating the dates and times, as well as the custody and conservation of the media
containing the images for a minimum of one (1) year, for the purposes of future
investigations or requests from authorities.
Film recordings, photographs, videos or any other advanced means made by surveillance
cameras in closed areas or in public spaces, become probative material or physical
evidence in the case of events or crimes that are the subject of investigation or inquiry by
the State authorities.
6.3. Supervision and Control Points
In order to carry out adequate supervision by the private security and surveillance
company, the following must be taken into account:
• Check how the position is operating.
• Verify that the financial institution's ATMs do not have electronic devices installed, such
as magnetic stripe readers and wireless cameras, that facilitate card cloning.
• If the control book is kept properly.
• Determine whether there are unmet security needs encountered by the guard in the
course of his duties, or whether any irregularities or new developments occurred in relation
to the service.
• Carry out continuous inspection and verification through surveillance video, in
the event that the stand has closed circuit television.
• Hold a monthly meeting with the contractor to evaluate the provision of the service, as
well as the complaints and/or concerns expressed by residents.
• Check the security guard's emotional and service status.
• Verify that the service elements found in the workplace correspond to those assigned
and registered by the company (weapons, radio, among others).
6.4. Support Networks and Citizen Solidarity
Citizen Support and Solidarity Networks are understood as the set of activities organized,
channeled and led by the National Police, with the purpose of gathering information about
events, crimes or behaviors that affect or may affect peace and security, taking advantage
of the technical and human resources possessed by natural or legal persons who provide
the services referred to in Decree Law 356 of 1994, as established by the
Decree 3222 of 2002, article 2.
These networks are distributed in the Metropolitan Police Commands and in Police
Departments, where there are private security and surveillance services, under the
supervision of officers and non-commissioned officers coordinating this program, who
interact permanently with the delegates of the supervised services.
Its operation is simple and effective: when an event occurs that alters or may alter public
safety, the guards who are at the service posts must immediately communicate with the
radio operator of their security company, who validates the information and communicates
with the Police Headquarters (CAD), sending police patrols as a priority to deal with the
case.
With the implementation of the National Plan for Community Surveillance by Quadrants
(PNVCC), the guard must identify the quadrant to which he belongs, providing information
to the police personnel in the quadrant about events, behaviors or crimes that allow the
prevention or deterrence of crimes that affect citizen security in his sector.
7. Other particularities for the provision of private surveillance and security services
in the financial sector
7.1 Criminal Modalities
7.1.1. ATM Theft:
The criminal takes advantage of the excessive trust of card users. Manoeuvres such as
card swapping, open option and retention of plastic with acetates or through the
Banking specialization 15
installation of electronic devices, such as magnetic stripe readers and wireless cameras,
are carried out, illegally obtaining information that facilitates the donation of the card.
Another form of criminal activity is when a person enters the ATM and tells the previous
user that their transaction has been left open. The user then suggests that they enter their
PIN again and gives them instructions to press certain buttons until the screen displays
digits with zeros. The unsuspecting person leaves without knowing that what they did at
that moment was leave their account open to make a withdrawal.
7.1.2 Card Change:
The person is tricked into entering the ATM, where the criminals have previously installed
a device that makes it difficult to use the card, and they get the person to enter the PIN
again, which they carefully observe.
7.1.3. Box office hit:
Financial institutions, due to the amount of money they have in their cash registers or teller
windows, become targets for organised crime groups, who are looking for a contact who
can provide information on the different money movements carried out by the bank. As it is
a quick operation, they avoid confrontation with the police authorities as much as possible.
7.1.4. Suction cup or tunnel:
Using hydraulic tools, among others, holes are made in the wall or ceiling of financial
institutions to bypass security systems and enter mainly during non-working hours and
days.
7.1.5. Theft from cash transporters:
It is carried out by highly dangerous criminal organisations with availability of weapons,
means, logistics, communications, using violence and even explosives.
7.1.6. Freight:
In this modality, criminals use high-cylinder vehicles and motorcycles, taking advantage of
the cash withdrawals made by people and then surprising them when they arrive at their
residence or destination.
7.2. Procedure for theft within financial institutions
• Stay calm and observe descriptively, preserving the life and integrity of the people
present as much as possible.
• Avoid arguing with criminals, do not provoke them or make movements that may cause
aggressive or dangerous reactions.
• Activate the alarm or panic buttons without being seen by criminals.
• Identify the number of criminals, detail the physical characteristics and modus operandi
of the bandits.
• As soon as possible, notify the National Police (123, 112) and the Citizen Support and
Solidarity Network.
• Provide a detailed report of the events to the authorities handling the case, in order to
help the authorities identify the attackers and conduct investigations.
• Observe the direction in which they are fleeing, the description and, if possible, the
license plate of the vehicles used.
7.3 Procedures to follow after the occurrence of an assault
• Stay calm. In the event of violations of physical and moral integrity, specialized help must
be requested immediately.
• Immediately after the criminals leave the office, the alarms must be activated and the
police authorities must be notified of the bank robbery, if this has not been done.
• The office must be closed immediately and await the arrival of the authorities, avoiding,
as far as possible, the exit of clients and users of the entity, and the entry of curious
people and strangers.
• A temporary notice must be posted informing the public that service will be restored once
the situation is under control.
Banking specialization 16
• Upon arrival of the first police unit, they must be allowed to enter and be provided with
information related to the assault, such as physical characteristics, clothing, number of
assailants, class or type of weapons, vehicles and any details that may help the authorities
identify the criminals and conduct investigations.
• Cash areas must be protected in order to preserve fingerprints and other traces that may
help direct investigations by the authorities.
• After closing the office, accompany the authorities in monitoring
Judicial Police or Prosecutor's Office, the audit of the safes and the vault, safe or main
chest only in the areas affected by the robbery, to quantify the amount of money and other
stolen goods.
• Under no circumstances should tellers or bank employees leave the office once the
robbery has occurred, until the authorities allow it. Cases of force majeure and fortuitous
events are excepted.
• Officials, clients and users of the financial institution that was attacked have the duty to
collaborate with the authorities in those aspects that help to conduct the investigation of
the events (complaints, testimonies, spoken profiles and special characteristics).
• Entry must be permitted to the entity's control bodies (security chief, security analysts,
audit, comptroller) and the station commander of the respective area, the surveillance
officer, the bank reaction patrol officer, the Judicial Police authorities and the Prosecutor's
Office, after detailed identification.
• If the office that was attacked has a closed-circuit television, the head of security of the
entity must provide the Judicial Police and Prosecutor's Office authorities, after carrying
out the respective analysis, with a copy of the recorded videos, within the following three
business days.
• In all events, the private security and surveillance company must report the incident to
the Superintendency of Private Security and Surveillance.
7.4. Activities to be carried out to prevent criminal activities within a financial
institution
7.4.1. Carry out prevention campaigns with the National Police, officials from the financial
institution and its security company, where users are informed to observe the following
measures:
• Once you receive your password from the bank, memorize it and destroy the envelope
containing the information.
• Do not leave your card anywhere, always keep it in your possession, to prevent it from
being changed or stolen.
• Do not lend your card to anyone to carry out transactions.
• Do not leave the ATM until your transaction has been closed and completely cancelled.
• Do not allow assistance from strangers inside the ATM.
• If your card is blocked, do not leave the ATM until you recover it.
• Cover the keyboard with your hand when entering your password.
• When making purchases with a card, make sure that your own card is returned to you.
7.4.2 During verification rounds, carefully observe any strange elements installed in the
ATM, such as cameras, objects that hinder the normal entry of the card or the exit of
money.
7.4.3 Periodically check with those responsible for monitoring the cameras to see if those
installed correspond to what was contracted.
7.4.4. Make recommendations to the banking entity to improve security systems, reporting
any deficiencies found.
7.5. Activities to be carried out to prevent theft
Banking specialization 17
7.5.1 Carry out prevention campaigns with the National Police, officials from the financial
institution and its security company, where users are informed to observe the following
measures:
• Inform the entity's users not to tell anyone about the banking transaction they are going
to carry out.
• Carefully observe the people in your environment inside and outside the financial
institution.
• When you receive your money, keep it in a safe place and try to change its location on
the way to your destination.
• When leaving the bank, use main routes where there is police presence.
• When completing documents at the bank, write the address of the company or a family
member.
• When withdrawing large amounts of cash, ask the ATM for the escort service provided
free of charge by the National Police.
7.5.2. Do not allow the use of cell phones in the bank, whether for calls or messaging.
7.5.3 Keep under observation those individuals who suddenly begin to receive or make
cell phone calls.
7.5.4 Do not allow vehicles to park in front of the financial institution; request support from
the National Police.
through which measures are adopted to prevent, correct and sanction workplace
harassment and other forms of harassment within the framework of employment
relationships.
DECREES:
Article 1°. Purpose of the law and the rights protected by it. The purpose of this law is to
define, prevent, correct and punish the various forms of aggression, mistreatment,
harassment, inconsiderate and offensive treatment and, in general, any outrage against
human dignity that is exercised against those who carry out their economic activities in the
context of a private or public employment relationship.
The legal rights protected by this law are: work in decent and fair conditions, freedom,
privacy, honor and mental health of workers and employees, harmony among those who
share the same work environment and a good atmosphere in the company.
Paragraph: This law shall not apply in the area of civil and/or commercial relations arising
from contracts for the provision of services in which there is no relationship of hierarchy or
subordination. It does not apply to administrative contracts either. Underlined text
declared CONSTITUTIONAL by the Constitutional Court, through Ruling C-960 of
2007, on the understanding that if there is actually an employment relationship, Law 1010
of 2006 will apply.
Article 2. Definition and types of workplace harassment. For the purposes of this law,
workplace harassment shall be understood as any persistent and demonstrable conduct
Banking specialization 18
In the context of the first paragraph of this article, workplace harassment may occur,
among others, under the following general modalities:
1. Workplace abuse. Any act of violence against the physical or moral integrity, physical or
sexual freedom and property of someone who works as an employee or worker; any
insulting or abusive verbal expression that harms the moral integrity or the rights to privacy
and good name of those who participate in a work-related relationship or any behavior that
tends to undermine the self-esteem and dignity of someone who participates in a work-
related relationship.
3. Modified by art. 74, Law 1622 of 2013, Labor discrimination: any differential treatment
based on race, gender, family or national origin, religious creed, political preference or
social situation or that lacks any reasonableness from a labor point of view.
4. Obstruction of work: any action tending to hinder the performance of work or make it
more burdensome or delay it to the detriment of the worker or employee. Actions that
impede work include, among others, the deprivation, concealment or rendering useless of
supplies, documents or instruments for work, the destruction or loss of information, the
concealment of correspondence or electronic messages.
6. Lack of job protection: Any conduct that tends to put the integrity and safety of the
worker at risk through orders or assignment of functions without complying with the
minimum requirements for protection and safety for the worker.
c) Voluntarily try, after the conduct has been carried out, to reduce or eliminate its
consequences.
Paragraph. The state of excusable emotion or passion shall not be taken into account in
the case of violence against sexual freedom.
c) Carrying out the conduct for a vile, futile reason or for a price, reward or promise of
remuneration,
d) By concealment, or taking advantage of the conditions of time, manner and place, which
make it difficult for the injured party to defend themselves, or to identify the participating
author;
e) Deliberately and inhumanly increase the psychological and biological damage caused to
the passive subject;
f) The predominant position that the author occupies in society, due to his position,
economic rank, education, power, occupation or dignity;
h) When the conduct displayed by the active subject causes harm to the physical or
mental health of the passive subject.
Article 5. Graduation. The provisions of the two preceding articles shall apply without
prejudice to the provisions of the Single Disciplinary Code for the classification of offences.
Article 6. Subjects and scope of application of the law. The following may be active
subjects or perpetrators of workplace harassment:
The natural person who serves as a manager, chief, director, supervisor or any other
position of direction and command in a company or organization in which there are labor
relations governed by the Substantive Labor Code;
Banking specialization 20
The natural person who serves as a hierarchical superior or has the status of head of a
state agency;
The natural person who works as a worker or employee. They are passive subjects or
victims of workplace harassment;
Public servants, both public employees and official workers and public servants with a
special regime who work in a public agency;
Immediate bosses when harassment comes from their subordinates. The following are
involved in workplace harassment:
Any natural person who fails to comply with the requirements or warnings issued by Labor
Inspectors in accordance with the terms of this law.
Paragraph: The situations of workplace harassment that are corrected and sanctioned in
this law are only those that occur in a context of relationships of dependency or
subordination of a labor nature.
Article 7. Conduct that constitutes workplace harassment. It shall be presumed that there
is workplace harassment if the repeated and public occurrence of any of the following
conducts is proven:
c) Hostile and humiliating comments that disqualify the employee professionally expressed
in the presence of co-workers;
e) Multiple disciplinary complaints from any of the active subjects of harassment, whose
recklessness is demonstrated by the result of the respective disciplinary processes;
(i) The imposition of duties that are clearly unrelated to work obligations, clearly
disproportionate demands on the performance of the assigned work and the abrupt
change of the workplace or the contracted work without any objective basis relating to the
technical needs of the company;
k) The notoriously discriminatory treatment with respect to other employees regarding the
granting of labor rights and prerogatives and the imposition of labor duties;
l) Refusal to provide materials and information absolutely essential for the performance of
the work;
m) The clearly unjustified refusal to grant permits, sick leave, ordinary leave and vacations,
when the legal, regulatory or conventional conditions for requesting them are met;
n) Sending anonymous messages, phone calls and virtual messages containing insulting,
offensive or intimidating content or subjecting someone to a situation of social isolation.
In other cases not listed in this article, the competent authority will assess, depending on
the circumstances of the case and the seriousness of the reported conduct, the
occurrence of workplace harassment described in article 2.
Exceptionally, a single hostile act will be enough to prove workplace harassment. The
competent authority will assess such circumstances according to the seriousness of the
reported conduct and its capacity to offend human dignity, life and physical integrity,
sexual freedom and other fundamental rights.
When the conduct described in this article occurs in private, it must be demonstrated by
the means of proof recognized in civil procedural law.
Article 8. Conduct that does not constitute workplace harassment. The following do not
constitute workplace harassment in any of its forms:
a) The requirements and orders necessary to maintain discipline in the bodies that make
up the Public Forces in accordance with the constitutional principle of due obedience;
b) Acts intended to exercise the disciplinary power that legally corresponds to hierarchical
superiors over their subordinates;
c) The formulation of reasonable demands for job loyalty or business and institutional
loyalty;
e) The request to perform extra duties of collaboration with the company or institution,
when they are necessary for the continuity of the service or to solve difficult situations in
the operation of the company or institution;
g) The request to fulfill the duties of the person and the citizen, as referred to in Article 95
of the Constitution.
i) The requirements to comply with the stipulations contained in the regulations and
clauses of employment contracts.
j) The requirement to comply with the obligations, duties and prohibitions set forth in the
disciplinary legislation applicable to public servants.
1. The work regulations of companies and institutions must provide mechanisms for
preventing workplace harassment and establish an internal, confidential, conciliatory and
effective procedure to overcome harassment that occurs in the workplace. Bipartite works
councils, where they exist, may assume functions related to workplace harassment in the
work regulations.
2. The victim of workplace harassment may inform the Labour Inspector with jurisdiction in
the place of the incident, the Municipal Police Inspectors, the Municipal Ombudsmen or
the Ombudsman's Office, as a precaution, of the occurrence of a continued and obvious
situation of workplace harassment. The complaint must be submitted in writing, detailing
the reported facts and attaching summary evidence of the same. The authority that
receives the complaint in such terms will preventively order the employer to start the
confidential procedures referred to in numeral 1 of this article and to schedule educational
activities or group therapies to improve relations between those who share an employment
relationship within a company. To adopt this measure, the accused party will be heard.
Paragraph 9 .p.1 1°. Corrected by National Decree 231 of 2006. Employers must adapt
the work regulations to the requirements of this law within three (4) months following its
Banking specialization 23
Paragraph 2°. Failure by the employer or senior management to adopt preventive and
corrective measures in the situation of workplace harassment will be understood as
tolerance of the same.
See District Decree 515 of 2006, See art. 14, Min. Resolution. Protection 2646 of 2008
1. As a very serious disciplinary offence in the Single Disciplinary Code, when its author is
a public servant.
2. As termination of the employment contract without just cause, when it has led to the
resignation or abandonment of work by the worker governed by the Substantive Labor
Code. In such case, compensation is applicable under the terms of article 64 of the
Substantive Labor Code.
3. With a fine of between two (2) and ten (10) legal minimum monthly wages for the person
who does it and for the employer who tolerates it.
4. With the obligation to pay Health Care Providers and Professional Risk Insurers fifty
percent (50%) of the cost of treatment for occupational diseases, health problems and
other consequences arising from workplace harassment. This obligation is the
responsibility of the employer who has caused or tolerated the workplace harassment,
without prejudice to the timely and proper care provided to the affected worker before the
competent authority determines whether his or her illness was a consequence of
workplace harassment, and without prejudice to other actions enshrined in social security
regulations for administrative entities against employers.
5. With the presumption of just cause for termination of the employment contract by the
individual worker and exemption from paying notice in the event of resignation or
withdrawal from work.
Paragraph 1. The money from fines imposed for workplace harassment will be allocated
to the budget of the public entity whose authority imposes it and may be collected through
coercive jurisdiction with the appropriate value update.
Article 11. Guarantees against retaliatory attitudes. In order to avoid acts of retaliation
against those who have made requests, complaints and reports of workplace harassment
or who serve as witnesses in such proceedings, the following guarantees shall be
established:
1. The unilateral termination of the employment contract or the dismissal of the victim of
workplace harassment who has exercised the preventive, corrective and sanctioning
procedures established in this Law, will have no effect when issued within six (6) months
following the petition or complaint, provided that the competent administrative, judicial or
control authority verifies the occurrence of the facts brought to its attention.
2. The filing of a complaint of workplace harassment in a state agency may trigger the
exercise of preferential power in favor of the Public Prosecutor's Office. In such a case,
disciplinary jurisdiction over the whistleblower may only be exercised by the said
supervisory body while the labour action in which the situation is being discussed is being
decided. This guarantee will not apply when the accused is an official of the Judicial
Branch.
3. Other rights granted by the Constitution, the law, collective bargaining agreements and
collective pacts.
The above guarantees will also cover those who have served as witnesses in the
disciplinary and administrative proceedings covered by this law.
Paragraph. The guarantee referred to in paragraph one shall not apply to dismissals
authorized by the Ministry of Social Protection in accordance with the law, to disciplinary
sanctions imposed by the Public Prosecutor's Office or the Disciplinary Chambers of the
Superior or Sectional Councils of the Judiciary, or to disciplinary sanctions issued as a
result of proceedings initiated prior to the complaint or claim of workplace harassment.
Article 12. Jurisdiction. It is the responsibility of the labour judges with jurisdiction in the
place where the incident occurred to adopt the disciplinary measures provided for in Article
10 of this Law, when the victims of the harassment are private workers or employees.
When the victim of workplace harassment is a public servant, the jurisdiction to hear the
disciplinary offence corresponds to the Public Prosecutor's Office or to the Disciplinary
Jurisdictional Chambers of the Superior and Sectional Councils of the Judiciary, in
accordance with the powers indicated by law.
Banking specialization 25
Article 13. Sanctioning procedure. The following procedure shall be followed for the
imposition of the sanctions referred to in this Law:
When the authority to impose sanctions falls to the Public Prosecutor's Office, the
procedure provided for in the Single Disciplinary Code shall apply.
When the sanction falls within the jurisdiction of the Labor Judges, a hearing will be held,
which will take place within thirty (30) days following the presentation of the request or
complaint. The accused of workplace harassment and the employer who has tolerated it
will be personally notified of the initiation of the procedure within five (5) days following
receipt of the request or complaint. The tests will be carried out before or during the
hearing. The decision will be issued at the end of the hearing, which may only be attended
by the parties and witnesses or experts. An appeal may be filed against the judgment that
terminates this action, which will be decided within thirty (30) days following its filing. In all
matters not provided for in this article, the Labor Procedural Code shall apply.
Article 14. Recklessness of the complaint of workplace harassment. When, in the opinion
of the Public Prosecutor or the competent labor judge, the complaint of workplace
harassment lacks any factual or reasonable basis, the person who filed it shall be fined
between one-half and three legal monthly minimum wages, which shall be successively
deducted from the remuneration earned by the complainant, during the six (6) months
following its imposition. Underlined text declared UNCONSTITUTIONAL by the
Constitutional Court through Judgment C-738 of 2006.
The same sanction will be imposed on anyone who files more than one complaint or claim
of workplace harassment based on the same facts.
The money collected from such fines will be allocated to the public entity to which the
authority that imposed the fine belongs.
Article 15. Summons to the guarantee. In proceedings relating to nullity and restoration of
rights in which legal defects of false motivation or abuse of power are discussed, based on
facts that could constitute workplace harassment, the defendant may, within the term of
posting on the list, summon the perpetrator of the harassing conduct to the guarantee.
Article 16. Suspension of the evaluation and rating of work performance. Following a
report from the health promotion entity (EPS) to which the subject of workplace
harassment is affiliated, the performance evaluation will be suspended for the time
determined by the medical report.
Article 17. Procedural subjects. The person under investigation and his/her defense
attorney, the passive subject or his/her representative, the Public Prosecutor's Office, may
intervene in disciplinary proceedings brought for workplace harassment when the
proceedings are brought before the Superior or Sectional Council of the Judiciary or before
the Congress of the Republic against the officials referred to in Article 174 of the National
Constitution.
Article 18. Expiration. Actions arising from workplace harassment will expire six (6)
months after the date on which the conduct referred to in this law occurred.
Banking specialization 26
Article 19. Validity and repeal. This law shall enter into force upon its promulgation and
shall repeal or modify all laws that are contrary to or incompatible with it. intermediate or
final levels of the organization.
In Colombia, this conduct is classified in Law 599 of 2000, Penal Code, article 323
(Money laundering): “Anyone who acquires, safeguards, invests, transports, transforms,
guards or manages assets that have their immediate or indirect origin in extortion, illicit
enrichment, extortionate kidnapping, rebellion, arms trafficking, crimes against the financial
system, public administration, or linked to the proceeds of crimes that are the subject of a
conspiracy to commit a crime, related to the trafficking of toxic drugs, narcotics or
psychotropic substances, or gives the assets derived from such activities the appearance
of legality or legalizes them, hides or conceals the true nature, origin, location, destination,
movement or rights over such assets, or performs any other act to hide or conceal their
illicit origin.”
Money and goods of illicit origin will never be legal, even if multiple transactions are made
with them to hide or conceal their origin.
As a business owner, how can you become involved in money laundering cases?
Suppliers case: Natural or legal persons who informally sell products, materials or inputs
below market prices, without apparent profit margin.
Client case: Natural or legal persons who purchase all of a company's production or
several goods that are paid for strictly in cash with illicit resources.
Investor case: Natural or legal persons who select companies with financial difficulties
and offer themselves as investors (new partner who capitalizes the company) or as
lenders (in charge of paying the company's debts) with resources of illicit origin.
Superintendency of Companies
www.supersociedades.gov.
co Toll-free number: 018000 114319
Colombian
National Police www.policia.gov.
co Anti-corruption line: 018000 910600
Find out which are the most common typologies in the real sector:
1- “Peso Broker”
Refers to the use of an “informal intermediary” in the capital and currency market who is
responsible for relocating part of the profits of illicit origin obtained in the international
market to the local market.
A company can be a victim of this operation and be used without its consent in a money
laundering operation if it exchanges currencies through this mechanism, without verifying
the source of said resources.
Banking specialization 28
2- Acquisition of smuggled
goodsA supplier not sufficiently known to the company ends up supplying smuggled
goods, such that the company may be involved in a money laundering operation, without
realizing it.
External signs:
Intuition is a guide in many cases, but we must try to identify the reason that motivated that
feeling. To do this, it is important to study the external signs or body language in the
following parts: head, hands, legs.
Signs of nervousness:
- In the head: presence of sweat (abnormal), movement of the head and appropriate
blinking, tendency to touch the face a lot or touch the lips with the tongue, exaggerated
paleness, nerves (anxiety from fear is triggered).
- In the hands: he bites his nails, cannot find a position for his hands, closes his fists, does
exercises with his hands.
- In the legs: shaking.
Signs of lies:
- In the head: he lowers his gaze and does not hold it, he touches his lower lip repeatedly,
he makes unnecessary turns.
- In the hands: there is nothing to do with them.
Banking specialization 29
- If you hear the sound of breaking glass, gunshots, or dogs barking insistently, someone
may be trying to break into a property to rob you
. - If you hear terrifying screams, or someone calling for help: it may be a robbery on the
street or inside a home, or a physical or sexual assault.
- If you hear someone pushing “your” front door, or the handle being moved, or water or
smoke coming in from under the door, or you see suspicious people walking around the
street checking door to door trying to open them (trying to open the door): they may be
trying to enter a house with the intention of robbing you.
- If you notice that strangers pass by your block repeatedly on foot or in vehicles, or you
find parked vehicles with people inside who are not from the neighborhood (men and
women), they may be choosing a house, business, or vehicle to rob.
- If you see a person running around carrying valuable items, appliances, electronics, etc.
without proper packaging, it is possible that they have been stolen from a house or vehicle
in the area.
- If you notice unknown people hanging around schools or driving around in vehicles,
especially when students are leaving school: they may be drug dealers or sex offenders.
- If you see merchandise being taken out of a store through half-open shop windows or
shutters, at unusual times: possible theft or looting of a business.
- If you see people riding high-powered motorcycles, they may be well dressed, wearing
helmets, hanging around banking areas, riding in the wrong direction, or riding on
sidewalks, in squares or in public places: they may be “jaladores” (motorcycle thieves) in
action.
- If you are surprised to see workers working on a holiday with heavy tools, on the dividing
wall of an appliance store, or a bank branch, or removing large amounts of dirt: you may
be in the presence of “burglars.”
Banking specialization 30
- If you notice objects such as wallets, briefcases or weapons being thrown from a moving
vehicle: a possible attempt to dispose of evidence of a crime.
- If you see a person lying on the street with altered mental or physical symptoms: possibly
injured or under the influence of strong drugs. Ask for help from whoever is appropriate
(police, public assistance, etc.).
- If you find any abandoned bags, suitcases or packages in your garden or on the street,
DO NOT TOUCH THEM; they may have been forgotten, but they may also contain
dangerous items such as explosives, narcotics or products of illegal activities.
If you notice any activity like this, call the police immediately, stay in
communication with the operator by answering all their questions, and help when
the patrol car arrives by providing all the information you have memorized about the
suspects and their actions, such as:
- Description of the vehicle that was transporting them: make, color and license plate
number.
- If you heard abnormal sounds: gunshots, screams, the sound of broken glass, indicate
where they came from.
- Any other information that may be provided to help quickly clarify a criminal act.
Remember, prevention is the best weapon to reduce crime. Reporting any possible
commission of a crime is an effective action to reverse the feeling of risk and begin
to awaken insecurity in crime, given that the control of illicit acts by citizens
prevents the constant repetition of criminal acts of any kind.
Generalities:
In banking facilities, the personnel in charge of Access Control form the first circle of
security in the system with the support of physical barriers and electronic elements
designed to prevent, delay or delay the access of hostile elements or unauthorized
persons, who could violate the system, partially or totally altering it with their actions.
From the above, it follows that the proper functioning of the scheme provided for Access
Control to a facility will depend on its complete security and the degree of protection
provided to people, property or facilities.
Banking specialization 31
For all the above reasons, effective Access Control must be based on a study that clearly
determines the following stages:
a) Identity Verification.
b) Authorization.
c) Confirmation of authorization.
d) Access and registration.
e) Destination verification.
f) Departure
Each stage must be aimed at limiting the possibility of access by unauthorized persons
and channeling visitors through pre-established control points, which allow for the
examination of their need to enter the area they intend to visit.
The personnel in charge of Access Control must base their actions on the principle of
“never deviating from the establishment procedure”. Improvising often leads to confusing
and potentially dangerous situations.
The general mission of the staff in an Access Control must be framed within the following
basic purposes:
Access control points for people must have a way of recognizing each person who intends
to enter, has authorization to do so and at the same time must have a means of identifying
those people.
To optimize access control for people, it is advisable to design an identification card that is
as difficult to falsify as possible and combine its use with internal controls within each area,
based especially on the recognition of people.
Any type of ID card can be forged, but there are still many advantages to using them.
Once their trustworthiness has been determined, those persons who perform their duties
or who need to enter certain areas for reasons of their activities are allowed to pass
through the established protective barriers.
The authorization to enter that is granted to a person must be limited only to those areas
where their presence is necessary to perform their duties or satisfy the specific needs that
justify their presence in that place.
a) Identity verification:
As its name indicates, its purpose is to identify the person who wishes to enter the
premises. This must be done when the client enters the internal administrative offices of
the bank facility.
Identity verification is carried out by means of a physical inspection of the official identity
document, or failing that, the credential that accredits the person's civil service status,
depending on whether the person is a visitor or an employee of the company, respectively.
This verification is the first line of action in the access control process, therefore reliable
identity instruments will be those that contain at least a photograph of the bearer.
b) Authorization/Confirmation:
Its purpose is to verify internally whether the person is authorized to enter the premises. In
certain cases, it is done through computerized or manual lists, memorandums or other
documents. The alternative is to resort to an executive or person who is empowered to
authorize or confirm the entry authorization.
This step defines whether the income proceeds or not. It should be noted that if access is
denied to a particular person, this does not imply that the applicant will be detained or that
his or her personal effects, materials or belongings will be confiscated.
Each Security Office must determine the procedure to follow in the event that a person is
caught trying to enter with false identity documents or authorization credentials, which
must comply with the legal regulations related to the deprivation of liberty.
c) Access / Registration:
Once the previous steps have been carried out in the internally established manner, a
badge (credential, pass or card) will be issued, which must expressly indicate the area to
which the visitor has access (floors, sectors, dependencies, etc.)
Subsequently, your personal data must be recorded in the respective Registration Book,
indicating the time of entry and exit, as well as the name and position of the person who
issued the authorization/confirmation, if applicable. In the latter case, it is advisable that
said official sign the record or certify such authorization using a document or standard form
intended for that purpose.
d) Verification of destination:
Once the visitor has entered the premises, the destination must be verified. This
verification can be carried out through various procedures, including:
- Making a call via intercom or intercom, from the Access Control to the destination office.
Banking specialization 33
- Using a standard form in which the destination interlocutor notes the time when the visitor
left his office, signing it as a sign of agreement.
e) Departure:
Once the visit is over, the person passing through will return the access credential,
receiving their personal credential or the corresponding document.
The actual departure time from the facility will be recorded in the logbook.
- Manual.
- Semi-annual.
- Automatic.
a) Manual Controls:
These systems base their actions on people, whether they are security guards,
administrative staff and/or receptionists.
For this system to work efficiently, a high percentage of effort, planning and adequate
distribution of restricted areas are required, in addition to full compliance with the criteria
defined by management to allow or deny access to specific areas and zones.
Since this system bases its efficiency on visual observation carried out by the participants
in the process, the best method would be for the personnel in charge to know all the
people authorized to enter, but such a method would only work properly when the
authorized group is very small and the control personnel never changes.
b) Semi-manual controls:
These equipment or elements are incorporated at any stage of the process. The most
commonly used elements or devices are digital button panels.
However, the role played by the people who carry out this control is relevant, because no
stage can fail, since if a component or stage fails, it will affect the others and ultimately, the
entire system will fail.
c) Automatic controls:
Banking specialization 34
These are those in which the verification and access stages are carried out entirely by
electronic equipment or systems, which are preprogrammed to make decisions when
someone requires them.
IDENTIFICATION SYSTEMS
- Passes or credentials:
To optimize access control for people, it is advisable to design a credential or card that is
as difficult to counterfeit as possible and combine its use with internal controls, based
especially on the recognition of people.
The systems in place must ensure that only authorized persons are admitted into a facility,
and that unauthorized persons who may evade controls and are caught wandering in
restricted areas or zones are excluded from them as quickly as possible, or are kept under
security control while inside the facility or facility.
The extent of controls will vary in each particular case and authorization to access one
place does not necessarily imply that access will be permitted to others. It is also
necessary to make it clear that access or entry to a building does not mean that a person
has unlimited access to the entire interior of the building.
The entry authorization granted to a person must be limited only to those areas and/or
zones where their presence is necessary to perform their duties or satisfy their needs that
justify their presence in that place.
Access authorization systems cannot base their effectiveness solely on electronic means,
however complete and advanced they may be, since the information on which they
operate can be modified or adulterated. It is therefore essential that security personnel be
provided with appropriate procedures that allow them to satisfactorily complete the various
stages of the electronic system.
STATES OF CONTROL
1.All persons holding an approved credential or pass must be allowed access by security
personnel at each entrance or checkpoint.
Banking specialization 35
Every checkpoint must be equipped with specific instructions and have facsimiles of each
type of credential or pass approved and valid, which must not be visible to the public.
2.It is important that no security officer authorizes a person to leave or pass through a
checkpoint without being in possession of an approved pass. You should never assume
that anyone inside a facility has been authorized to be there.
3. When a person is caught inside the facility or in a restricted area or zone, without having
credentials or a pass and trying to leave, he or she should be politely prevented from doing
so by requesting the authorization document. If you do not present it, you should be asked
for your official identification document and asked in polite terms to explain and/or justify
your presence at that location. If such explanations are not satisfactory, you may be asked
to wait for the police to clarify the situation. Under no circumstances may he be forced to
remain against his will.
4. Access Controls will keep a record of all persons entering or leaving a building or
facility. The data to be considered will vary depending on whether it concerns employees,
clients or visitors, but in all cases the full name, time of entry and exit must be noted.
A facility or enclosure in which there is a technically planned Access Control must also
have a classification of these based on the importance of the activities carried out there or
the nature of the materials used, which will determine the level of access for people,
whether employees, clients, visitors or contractors. For this purpose, the site is divided into
areas.
- Public Areas.
- Employee Areas.
Each area in turn must be subdivided into Zones, which according to their operational
and/or strategic importance, are classified as:
- General areas.
- Restricted areas.
- Sensitive areas.
Public Areas:
a) General Zones:
General areas are those in which no authorization is required for entry. These are usually
the offices for sales of merchandise, payment of customer bills, etc.
Banking specialization 36
b) Restricted Areas:
These are those in which the public can use the facilities, but they must first consult with
an employee to see if it is possible to use them. Ex. the bathrooms.
c) Sensitive Areas:
These are those facilities that only certain members of the public, duly qualified by a pre-
established procedure, can enter, but always in the company of an employee. Access to
this area must be recorded both upon entry and exit. Ex. Managers' offices, vault areas or
safe deposit boxes, etc.
Employee Areas.
a) General Zones:
These are all those that an employee can enter simply by being an employee. Ex. casinos,
bathrooms, etc.
b) Restricted Areas:
These are those in which the employee requires prior authorization for entry. Eg-
Accounting Offices, Archives, Senior Executive Offices.
c) Sensitive Areas:
These are those whose stoppage causes interruption of the facility's activities. Ex.
Computer Centers, Electrical Panels, etc.
Access levels are the responsibility of management, which must determine them in
accordance with the general security policies applied by the company.
Its mission is to direct, coordinate, execute and control everything related to the protection
and defense of the company's personnel and assets.
In order to carry out this mission, the Surveillance Service is responsible for preparing the
necessary plans for the effective protection and defense of the company's assets and
personnel; it will be in charge of directing the actions leading to the aforementioned
defense, when appropriate; it must coordinate the established plans and procedures
internally and externally; it will be responsible for monitoring compliance with said plans
and the rules dictated by the company for their effective implementation; it will also be in
charge of investigating losses and taking steps to recover them.
General Rules:
Banking specialization 37
a) It is the obligation of all members, regardless of their position, that their actions be
surrounded by the greatest guarantee of equity, justice and correctness. Therefore, all
observations made must be made in correct, clear language, observing the strictest
standards that education imposes, without phrases that undermine the personality of the
person receiving them.
b) Consequently, under no circumstances should language be used that could irritate or
humiliate, since such conduct only provokes resistance, arouses antipathy and hostile
feelings, not only from the affected person but also from all the people who witnessed it.
c) Management will be much more meritorious when the consummation of a crime or
infraction is prevented than when the person who committed it is caught, since the main
function is to prevent rather than repress. It is an inherent right of the position to demand
respect and consideration, but all within correctness, avoiding falling into untimely
attitudes.
d) In his relationships, both in his private life and in his work sphere, he must adhere to
ethical standards, in accordance with the functions he performs; consequently, he must
maintain in all his acts an invariable rule of conduct that makes him invulnerable to
criticism.
Punctuality
He must attend his duties punctually, not miss his service without having previously
obtained leave, nor abandon his post before being relieved or receiving express orders to
do so.
Presentation
Your personal appearance will always be impeccable. Short hair, shaved, clean hands and
nails, neat and ironed clothes. You must use only the garments provided without modifying
their appearance or shape. You may not use them for any purpose other than providing
services to the company. In general and permanently, your appearance will be an example
of neatness and correctness.
Booking
He/she must keep confidential the orders and instructions given to him/her for the
fulfillment of his/her duties, as well as all circumstances that come to his/her attention in
the exercise of his/her functions. Also, as a general rule, all company operations must be
kept strictly confidential, and providing information on matters of any nature is absolutely
prohibited.
Below are some examples of general and specific instructions for security personnel at
different posts, taking as a guide the circumstances that normally occur in a typical
industrial company.
General Instructions.
- Avoid familiarity with the Company's staff and act correctly and firmly.
- Be informed of all the latest developments in the Service.
- Be convinced that the principle of discipline lies in compliance with one's superior and
mutual respect.
- Do not disagree with or criticize the orders received.
- Do not provide Company reports, of facts that are known to you, to persons outside the
Company and without being authorized to do so.
- Do not leave your post without first being relieved.
Loss prevention
- Repress the theft or robbery of products, tools, merchandise and/or items from the
establishment or from third parties stored therein.
- Control the tools, materials, etc., of contractors entering and leaving the plant, verifying
quantities, qualities and condition.
- Strict control of people or visitors who come to the plant for different reasons.
- Strict control of general vehicles entering and leaving the plant.
- Check the loading sectors of all products or materials and make the necessary
verifications.
- Adopt all measures aimed at clarifying, preventing and avoiding damage or losses,
irregularities or anomalies that harm the company's assets.
Accident Prevention.
Fire prevention.
General Prevention.
Private instructions.
The following model of private lockers has been developed based on a typical
establishment, where there is a main entrance covered by two guards. As in the previous
cases, these guidelines must be adjusted to the structural characteristics of each
establishment and to the specific needs arising from its specific vulnerabilities.
Main entrance.
Security staff.
Tasks:
- He/she will be responsible for examining the documentation proving the identity of the
persons who must enter the facility.
- Will collect from whoever is authorized to grant permission for people and vehicles to
enter the facility.
- Record the entry of people and vehicles on the corresponding form.
- Provide the identification card corresponding to the entry and exit of people and vehicles.
- Keep the job log up to date.
- Operate the door opening and closing systems and alarm.
- Will collaborate in the general surveillance of the access area.
Order Service.
It is advisable to provide in writing the special instructions that will govern the procedures
of the Security personnel in various situations that arise daily with employees and workers,
so that their actions are coherent and in accordance with legal regulations. This will
prevent conflicts with plant personnel that may arise from abuse or arbitrary actions
attributable to the security service.
Robberies or thefts.
One of the most important tasks of the Security Service is the control of access to people,
vehicles and merchandise.
Below are the rules that generally apply in these cases and that may be adjusted or
modified according to the characteristics and modality of each company.
Considering the importance of Access Controls, it is necessary that the rules established
in this regard are known by all the staff at the facility.
People Control.
The security service will be in charge of controlling access to the Plant, of all persons,
whether or not they are part of the facility, having primary responsibility for everything
related to the control, entry and exit of persons and vehicles.
Own staff.
- It will ensure that this personnel complies with the established regulations for their entry
and exit.
- Presentation of the identification card will be required upon entering the facility.
- The employee will proceed to search bags, packages, bundles, etc., upon entering the
establishment, in order to prevent the introduction of alcoholic beverages or items of any
kind unrelated to the employee's activity.
- Inspect bags, packages, bundles, etc., belonging to staff upon leaving the facility, in
accordance with current legal regulations.
Upon entering the facility, the Security Service will request the identification card, which
will prove the identity of the person and will inquire about the reasons for the visit.
- If the employee is a senior employee, the security employee will identify him/her and
accompany him/her to the office he/she wishes to visit.
- The plant's senior staff will be informed of the reason for the visit and its identity, for
subsequent authorization.
- The following must be recorded on the respective form: name and surname, identification
document number, company code, reasons for the visit, who is being interviewed, and
time of entry and exit.
Regular Visits.
People outside the establishment who visit it frequently for collection, maintenance and
other reasons.
- With prior authorization from the appropriate person, the Security Service staff will
provide the named persons with an identification card.
Banking specialization 42
- They must identify those named each time they visit the facility.
- In order to keep track of visits, the Security Service will have forms, recording every day
all the visits and their personal data, number of documents, name and surname, reason for
the visit, company they represent, who they will meet with and the time of entry and exit.
Unusual Visits.
The Security Service will proceed to identify the visitor, verify the reasons for the visit and,
with the prior consent of the Plant's senior staff, will grant access, accompanying them to
the area or department that authorized their entry.
The named persons will be provided with an identification card, which they will make
without omitting any data, and once the process is completed, they must hand it in to the
Security Office upon discharge. The document proving personal identity will not be
retained.
The Surveillance Service will use the same type of form mentioned above, observing the
same instructions.
Protocol Visits.
The Security Service, attentive to what the authorities decide in due course, will take the
precautions that circumstances advise, observing personal hygiene, education, courtesy
as a rule, and will ensure the proper sanitation of the building.
These visits will be communicated in a timely manner to the Security Service, indicating
the day and time of their entry, names and the executive who will accompany them.
Security personnel must ensure that they have easy access to the plant, carrying out only
visual controls on these people.
Visits by delegations.
With the prior consent of the facility authorities, you will observe the instructions given to
you from time to time.
These people will be politely informed of the prohibition and told that they can wait for their
potential clients at the exit of the premises.
The entry of recruiters or sellers will be permitted when they need to meet with an
executive and the latter expressly authorizes it, in which case a written record will be kept.
Banking specialization 43
People who solicit public charity, people who are drunk or under the influence of alcohol or
drugs, or people who engage in political proselytism or religious preaching are also strictly
prohibited from entering the premises.
Authorities: If any authority (Ministers, Mayors, Senators, Deputies, Mayors, etc.) carrying
out tasks related to their position, appears at the gate, the corresponding authority of the
facility will be immediately informed according to the instructions received, indicating their
name, position and reason for their visit.
The authority will be treated with the utmost deference and will be granted entry (in their
vehicle). It will be the concern of the Guards that your departure be expeditious.
Public Officials: When any public official (Labor Inspectors, Health Service Inspectors,
Internal Revenue Service, Municipal Inspectors, Customs Service Inspectors, etc.) needs
to enter the plant in the performance of their duties, the Group Leader will inform the
General Management. You will be treated kindly and once your entry is authorized, you
will be given the facilities to ensure that it is expedited, without having to hold your
Credential or Identity Card at the Gate.
During non-working hours and days, the shift manager will be informed and will be asked
to attend to them. The above is without prejudice to the request for the credential that
accredits his/her status as such.
Carabineros: As a general rule, Carabineros personnel on duty (or those who identify
themselves as such with their card) will have the facilities granted to them by the higher
levels of the Company.
Investigations: When this staff needs to enter to carry out judicial procedures (summons,
notifications, etc.) during administrative hours, they will be assisted by the Group Leader
who will request the corresponding credential. Once they have been properly identified,
they will be asked the reason for their visit.
When it comes to delivering summons or notification orders (from a Court), the Group
Leader will accompany you to reception, where the required person will assist you.
If arrest warrants are required, the appropriate contact or Security Chief will be informed
and must go to Access Control to deal with them.
In such case, the officer in charge of the investigation has the obligation, at the end of the
same, to draw up a report stating the circumstances that motivated it, a list of the damages
caused to the property during the same (if any), identification of the officer in charge
(Name, rank and Police Unit to which he belongs), Party number and Court to which the
action will be reported.
When Carabineros or Investigations must enter a closed area by virtue of this legal power
(regardless of the time), the Surveillance Service Personnel must not oppose it and will
limit themselves to requesting the respective Institutional Credential from the police
officers.
Entry into the Fire and Public Assistance facilities will be necessary when an emergency
occurs, for which reason the Shift Manager and the Guards must provide all necessary
facilities to ensure that their entry and exit is as expeditious and rapid as possible.
No special authorization will be required and they will not be identified.
Identification Credentials.
They are an important link in the security system, in order to be able to effectively control
the access and exit of personnel to plants, warehouses or other company facilities.
The availability of a computer with the lists of personnel allows for the quick preparation of
credentials and they will only be completed with the photograph and signature of the
bearer.
The Human Resources Department, together with the Security Service, has primary
responsibility for everything related to the preparation, authorization, delivery and control
of the same.
Normal or definitive.
Temporary.
Contractors.
Visits.
Normal or definitive.
Temporary.
It will be delivered to newly hired personnel while their normal or definitive credential is
being prepared.
Banking specialization 45
Visits
The Security Service, after complying with the provisions of current rules and procedures,
will provide visitors with the corresponding credentials.
At the end of the procedures, the credential must be collected when leaving the Plant.
The Security Service will verify that all personnel at the facility use the corresponding
credential, requesting it upon entry of personnel.
It will ensure that all personnel, whether or not they are part of the company, use the
credential in a visible place during hours of activity or when they are on the premises.
Contractors.
These credentials will be provided to persons outside the Company who must enter the
Company for service reasons.
The Security Service will provide credentials upon entry, which will be withdrawn upon exit
for better control.
After delivery, the Plant Surveillance Service will request the personal records of the
persons responsible for registering them.
All areas of the Company that, for work reasons, require the services of external
personnel, will indicate in writing to the Surveillance Service who are the persons or
Companies authorized to enter the Plant and the tasks to be performed.
The credential for contractors will be granted to persons with whom there is a service
contract for a period of more than 14 days or whose presence on a regular basis occurs at
least twice a week.
Vehicle Control.
The driver's name and surname, passengers, vehicle make, license plate, entry and exit
time will be recorded on the form.
Strict control will be exercised over their entry and exit to the plant.
It will identify the driver and passengers.
It will indicate parking, loading, etc. locations and speed limits.
It will control the loading sectors of merchandise or any other product.
The driver and passengers must be entered into the form with their full name, document
number, vehicle make, license plate, reasons for entry, who authorizes entry, time of entry
and exit.
He will inspect all the vehicles mentioned above in any place in the facility and by surprise,
checking specifications, receipts, merchandise, packages, tools, etc.
Object:
Establish the procedure to be followed by Company personnel upon leaving the Plant to
comply with the review. This obligation must be indicated in the Internal Regulations.
Establish the procedure to be followed by the Security Personnel for the purpose of
inspecting the facility's personnel, their briefcases, packages and bags. To do so, it is
essential to prepare an Operations Manual.
This inspection must be carried out in accordance with existing legal regulations, which
means that the person carrying out this work may not, under any circumstances, touch the
person's body with their hands; any packages, bags or briefcases carried by the person
being checked must be checked. The contents of the aforementioned items must be
removed in their entirety in order to inspect everything. It is not enough to look inside the
package or bag. In this case, the person being inspected is asked to remove the items
inside.
When the person inspected carries any element belonging to the Company or its property
that should not have entered the Plant, it will be removed and deposited at the gate,
unless there is an exit authorization signed by authorized personnel. In this situation, the
Banking specialization 47
signatures must be compared with the register of authorized signatures. It should be clear
that each area at the supervisory level authorizes the exit of elements from its sector.
Unnecessary items are understood to be anything that does not correspond to the function
that the personnel entering the facility is to perform, for example: gifts, photos, clothing that
is not normal (newly purchased, bags containing sports items), radios, personal stereos,
records, etc., or for sale within the plant. Any unnecessary items must be deposited at the
Guard under a control number and removed upon leaving the facility.
Control must be carried out upon entry of personnel to avoid problems upon exit, with
security personnel paying attention to those carrying unusual packages, limiting
themselves to clarifying that they should not bring in unnecessary items and if they insist
on bringing them in, recording it in the logbook with the time, complete identification of the
subject and any other clarifications regarding the package that may be pertinent, and
informing their Supervisor.
Portable radios, pocket calculators, personal stereos, etc., will be authorized by the heads
of each area through written communication to the Surveillance Service. The removal of
these items will be through the corresponding authorization and if their removal is
necessary every day, the authorization must include in block letters the legend “In Transit.”
Photographic equipment, as well as any other equipment that must be brought in for use in
the facility, will only be authorized through the Security Service and will be indicated in the
logbook, with the number and brand of the equipment. The exit of these will be done with
the corresponding authorization with the legend “Your Property”.
This will be confronted with the sector responsible for the element that comes out, E.g.: the
workshop sends an engine from the installation for repair. Although the engine belongs to
the facility, it is the workshop that sends it for repair, therefore the workshop prepares the
document in question.
This authorization must contain the person to whom it is addressed, complete details of
the item being sent, equipment number, brand, type, quantity, especially the quality in
which it is being sent (on loan, for repair, return or whatever is appropriate), and the
signature of the authorized person that appears in the register intended for this purpose.
Items that come in and out every day, such as suitcases, pocket calculators, etc., must
have the corresponding authorization with complete details and the legend in transit, thus
avoiding the need to carry them out every day.
Any item that is not authorized must be deposited in the security office.
Metal detector.
Banking specialization 48
It is an extremely useful element for the inspection of people, offering great advantages
over the manual palpation system, which should be reserved for the case of control over
non-metallic elements, such as fabrics, plastics, etc.
It is best to use a battery-powered metal detector, as this allows it to be used in any area
of the plant, regardless of the electrical connections to the general network.
Its use must be made known to all staff. Legally, it should never touch the body of the
person being searched.
In order to ensure that all personnel are properly informed and instructed about the metal
detector, its characteristics and use, it is recommended to strictly comply with the following
rules:
Upon entering, staff must bring the minimum number of essential metal items (watch,
keys, coins).
All personnel who carry out tasks bringing items for personal use must report this to the
security staff.
Upon discharge, if any person is detected as carrying metallic elements, he or she will be
invited to go to the examination room in order to establish his or her situation.
Visiting ticket.
It is filed daily in a consecutive manner according to its number and is kept in the
surveillance service for two calendar months. After this period, it is sent to security for
central archiving for twelve months.
It is filed daily in a consecutive manner for three calendar months. After this period, it is
sent to Security for central archiving for twelve months.
It is archived under surveillance for one calendar month, at the end of which it remains
archived at the plant for twelve months.
Visitor log.
The same procedure as that indicated for the visit ticket applies.
Banking specialization 49
The original is delivered to the authorizer and the copy is filed in the Bank Facility
Management.
Exit permit.
The original is sent to the personnel office the following day or the first business day after
holidays.
Quarterly report.
Security will send Plant Management a quarterly statistical report on the number of people
received at the plants, the time spent serving them, vehicles entered, as well as other data
of interest arising from the analysis of surveillance documentation.
RISK ANALYSIS
INTRODUCTION
What was once fiction, in many cases today, becomes reality. Threats have always
existed, the difference is that now, the enemy is faster, harder to detect and much more
daring. This is why every organization must be alert and know how to implement security
systems based on a risk analysis to avoid or minimize unwanted consequences.
Risk analysis (also known as process hazards analysis or PHA) is the study of the
causes of potential threats and the damage and consequences they may produce.
This type of analysis is widely used as a management tool in financial and security
studies to identify risks (qualitative methods) and others to assess risks (generally of a
quantitative nature).
The first step in analysis is to identify the assets to be protected or evaluated. Risk
assessment involves comparing the level of risk detected during the analysis process with
previously established risk criteria.
Banking specialization 50
The results obtained from the analysis will allow the application of some of the
methods for risk treatment, which involves identifying the set of options that exist for
treating the risks, evaluating them, preparing plans for this treatment and executing them.
For example, you probably already know that if your operators move heavy loads
so their backs could be affected or there is a chance of slipping on their way, then you
have to take reasonable precautions to avoid these accidents.
When thinking about a risk analysis remember:
a) A hazard is anything that can cause harm, such as chemicals, electrical, working at
heights, etc.
b) Risk is the chance, high or low, that someone could be harmed by this or other
hazards, together with an indication of how serious this harm may be.
Step 1
Identify the hazards
Inspect the work site and see what might be expected from tasks that could cause
harm.
Talk to your employees or your representatives about what they think, they may
have noticed things that are not immediately obvious to you.
Check with local safety associations for practical guidelines on where hazards
occur and how to control them.
Review your accident and health records, they often help identify less obvious
hazards.
Remember to think about dangers and health damage that can occur in the long
term, for example: high noise levels, or exposure to hazardous substances.
Step 2
Deciding what could be damaged and how
Banking specialization 51
For each hazard you need to be clear about who could be harmed, this will help you
identify the best way to manage the risk.
Remember:
Some workers have particular requirements, for example: new and young workers,
people with reduced abilities may be at particular risk. Extra efforts will be necessary for
some hazards.
Cleaning staff, visitors, contractors, maintenance staff etc., who may not be on site
all the time.
If you share your workplace, you will need to think about how your work affects
others present, talk to your people and ask them if they can tell you about anything you
have forgotten.
Step 3
Evaluate the risks and decide on precautions
Having noted the dangers, one must then decide what to do about them.
So, after comparing your results with “best practices” see if there are more and
better things you can do to bring your work up to standard.
5. Provide first aid and cleaning supplies (first aid kit, eye wash, emergency showers,
etc.).
Improving health and safety does not need to be expensive. For example, installing
a mirror on a dangerous corner helps prevent a vehicle accident. The cost is low
considering the risks
Involve all staff in these practices
Step 4
Record your findings and implement them
Putting the results of your risk analysis into practice will make a difference as you
look after your people and your business.
Banking specialization 52
Write down your findings and share them with the staff.
The analysis does not have to be perfect but it must be appropriate and sufficient.
If you find that many changes and improvements need to be made to tasks, do not
try to do them all at once, make an action plan with the most important things done first.
A good action plan often has a mix of different things such as:
1. Some low-cost and easy-to-implement tasks, perhaps as a temporary solution until
a more reliable one can be performed
2. Long-term solutions for those risks with a higher probability of accident and/or
damage to health
3. Long-term solutions for those risks that potentially have the worst consequences
4. Training plan for employees on the main risks and how they can be controlled
5. Regular checks to ensure that control measures are in place
6. Clear responsibilities of who leads the action and when
Step 5
Review the risk analysis and perform an update if necessary
Few workplaces do not change over time; sooner or later new equipment,
substances and procedures will be introduced that could generate new hazards, etc. This
therefore makes it necessary to review them again.
Each year, you should formally review where you are with the analysis, to ensure
continuous improvement.
Have there been any changes? Are there any improvements that still need to be
made? Have workers identified a problem? Have you learned everything about accidents?
These are some questions we should ask ourselves to ensure that the risk analysis
is up to date.
When you are working, it is very easy to forget to review the risk analysis, until
something happens and it is too late. So why not do the analysis now? Put in writing that
risk review is an annual event.
During the year, if there is a significant change, then don't wait, check the risks and
make the necessary adjustments.
Banking specialization 53
If possible, it is much better to perform the risk analysis when changes are being
planned rather than afterward.
CONCLUSION
The results of the risk analysis once the risk analysis is carried out, the organization has in
its hands a powerful tool for the treatment of its vulnerabilities and a general diagnosis of
the security status of its environment as a whole. From this point on, it is possible to
establish policies for the correction of problems already detected, and the security
management of them over time, to ensure that previously found vulnerabilities are no
longer sustained or maintained, thus managing the possibility of new vulnerabilities that
may arise over time.
Once the recommendations are received, actions are taken to distribute them in order to
correct the environment and reduce the risks to which the human, technological, process
and physical infrastructure that supports one or more business processes of an
organization is subject. In this way, it is possible to implement corrective measures and
treatment of vulnerabilities in the assets analyzed, and also in assets with the same
characteristics as those analyzed.
Once the results are tracked and scored in relation to their criticality and relevance, one of
the final products of the risk analysis, the criticality matrix, indicates through qualitative and
quantitative data the security situation of the analyzed assets, by listing the vulnerabilities,
potential threats and respective security recommendations for correcting the
vulnerabilities.
Key concept Risk analysis results in security recommendation reports, so that the
organization can assess the risks to which it is subject and know which business process
assets are most susceptible to threats to the confidentiality, integrity and availability of the
information used to achieve the objectives.
It is not difficult to design a security plan. Here is the process outlined in just a few steps:
1. The components of the plan. The purpose of the safety plan is to reduce your risk.
Therefore, you will have at least three objectives, based on your risk assessment:
Reduce the level of threat you are experiencing; Reduce your vulnerabilities; Expand
your capabilities.
Preventive plans or protocols to ensure that daily work is carried out under safety
standards (for example, how to prepare a public complaint or visit a remote area).
Emergency plans to deal with specific problems, such as an arrest or a disappearance.
2. Responsibilities and resources to implement the plan. To ensure that the plan is
implemented, we must integrate safety into daily work activities:
Banking specialization 55
Regularly include an assessment of the context and security points in work agendas;
Record and analyse security incidents; Assign security responsibilities; Allocate
resources, i.e. time and funds, for security.
3. Design the plan – where to start. If you have performed a risk assessment of a
defender or organization, you will likely have a long list of vulnerabilities, various types of
threats, and a number of capabilities. It is practically impossible to cover everything at the
same time. So where to start? It's very simple:
Select some threats. Prioritize the threats you've listed, whether current or potential,
using one of the following criteria: Most serious threat – death threats, for example; OR
Most serious and likely threat – if other organizations similar to yours have been
attacked, this represents a clear potential threat to your facility; OR The threat that most
closely matches your vulnerabilities – because you are at greatest risk from that specific
threat.
Make a list of vulnerabilities that correspond to the threat list. You should focus on these
vulnerabilities first, and remember that not all vulnerabilities are related to all threats. For
example, if you receive a death threat, it won't be very practical to start upgrading the
doors to your downtown office (unless you can be easily attacked in the office, which is
usually not the case). It may be more practical to reduce your exposure during your
commute or on weekends. It's not that upgrading your doors isn't important, but this
particular action probably won't reduce your vulnerability to a death threat.
Make a list of the capabilities you possess that match the list of threats.
You are now in a position to focus on the threats, vulnerabilities, and capabilities selected
in your security plan, and you can be reasonably confident that you can reduce your risk
by starting in the right place.
Remember that this is an ad hoc system for designing a security plan. There are other
“formal” methods to do this, but this method is simple and makes you focus on the most
urgent security issues – as long as your risk assessment is correct – and get a “active”
and “real” plan, and that is the important part of security.
PROLOGUE
The security of financial institutions is a complex, novel and highly responsible issue, since
it involves ensuring the physical integrity of clients and bank officials, as well as
safeguarding the assets of the corresponding entity. However, this task is made difficult by
the absence of legislation that adequately defines the range of economic crimes to which
financial institutions are exposed due to their line of business (robbery, fraud and
kidnapping, among others), and by the absence of a framework that guides these entities
in terms of risk reduction within their facilities.
Banking specialization 56
This established security manual seeks to prevent the different risks that arise, in a
complex group with a high volume of activity, in the different areas of the banking facility,
where the offices are located, adopting the appropriate security measures that guarantee
the security of processes, facilities and, more importantly, of people, both employees and
customers.
In line with the above, the mission of banking security, seeking to assist in the
development of the financial system, and channeling the deep concern of its members on
the issue of banking security, and mainly that of its clients, has compiled the following
sound practices in terms of banking security, which constitute recommendations for
financial institutions to take into consideration and seek, to the extent possible and
reasonable, according to the nature and conditions of each entity, to put them into practice
in their security functions.
Since these are recommendations, they cannot be considered imperative mandates
whose compliance can be demanded, but rather, they are suggestions derived from the
experiences of officials in charge of the security function, both at national and international
level, with the intention that they can be used in a generalized manner by institutions, as a
technical input within their scope of self-organization.
It is recognized that the responsibility of the Security Department, with regard to the
personnel of the financial institution, is limited to safeguarding their integrity in the event of
crimes and accidents occurring in the facilities of the same, based on the premise that the
main function is the security of the Officials, Clients and the assets of the Banking Entity.
In accordance with sound security practices, it is considered that in order to efficiently fulfill
the mission of the Security Department, the functions that it should perform are, at least,
the following:
General
Banking specialization 57
a. Adopt measures aimed at compliance with banking security regulations and other
security-related regulations imposed by existing legislation, internal policies, and
the commitments assumed in insurance policies contracted by the financial
institution.
b. Propose standards, techniques and procedures for incorporation into the entity's
Security Policies and Procedures Manual, in accordance with the regulations of this
manual.
Specific
a. Implement standards, techniques and procedures that enable compliance with the
security requirements set forth in the Laws, regulations, Circulars and
Communications of the Central Bank of Paraguay and the national supervisory
bodies, as well as the provisions of the entity's own Administration.
c. Train the financial institution's personnel in the security standards, techniques and
procedures related to their functions, as appropriate, and supervise the level of
training of external and internal security personnel.
d. Develop plans to study the security conditions against theft, assault and fire of all
assets, both movable and immovable, of the financial institution (with particular
attention to the Computing Centers, the places where money is deposited and the
cash rooms, vaults and safe deposit boxes, among others), and implement the
corresponding protection measures.
e. Provide advice on the acquisition of security systems, equipment and devices (new
and improved technologies), as well as dictate rules for the use and operation of
this equipment to all user personnel, and monitor its proper maintenance. Likewise,
preserve or archive all information about it, in accordance with internal policies.
• Private Security.
• Radio alarms.
• Closed Circuit Television.
Banking specialization 58
i. Develop security procedures and draft the functions that security personnel, both
private and internal, must perform to ensure proper performance in each of the
assigned positions. Disseminate these procedures and functions among the
financial institution's staff and officials.
l. Maintain liaison and good relations with officials from the Ministry of Public
Security, the Judicial Investigation Agency, the Public Prosecutor's Office and other
authorities, as well as with the Security Chiefs of other financial institutions.
m. Plan, in the medium and long term, the renewal of security means and the
acquisition of new technologies, and raise them to the corresponding authority.
n. Keep track of the assignment of combinations, codes and keys to the buildings,
premises and facilities of the financial institution and establish cross-controlled
entry policies.
p. Plan and carry out safety audits, evaluate their results and prepare and distribute
inspection reports at least every six months.
q. Investigate the personnel who will enter the financial institution, in accordance with
the provisions of each Entity's policy.
s. Collaborate with other areas of the financial institution in the supervision of internal
and external services, provided that this does not interfere with the priority mission
of Security.
etc., safeguarding these for a minimum period of one year after any of the officials
are terminated from their duties.
v. Issue the corresponding policies and procedures and ensure that security
personnel are not used for functions other than those for which they were hired.
w. Prepare a Security Policies and Procedures Manual and ensure its proper
compliance.
In line with the previous recommendation, it is advisable that the institution assigns to the
Security Department the creation and control of specific procedures related to the following
aspects, but not limited to these:
b. The entry and permanence of officials, suppliers, and clients within them.
c. Weapons handling.
d. Transport of valuables.
e. The investigations.
g. Civil risk.
i. Crisis situations.
l. The annual training program for security and administrative staff on security
matters.
a. Professional ethics.
b. Weapons handling.
c. Job definition.
d. Availability.
e. Procedures for handling critical situations, which should not differ from those used
by police forces in terms of general principles and objectives.
f. Control to be implemented for public and vehicle access and
g. Behavior in the face of natural disasters and criminal events, among others.
For such purposes, it is recommended that a safety study be carried out by specialized
personnel prior to issuing the Manual.
The most important recommendation is that it be under the direction of the General
Management, an essential requirement for the fulfillment of the mission and in
attention to the functions and responsibilities that are incumbent on the person in
charge of the security department, it is considered convenient that it meets, at least,
the following requirements:
c. Have extensive knowledge of banking activity and everything related to the field of
security.
d. Have the ability to plan, organize, direct and control systems, procedures and
programs related to security, fraud and other issues, both in central and regional
offices.
g. Have the capacity to review and analyze the institution's operating systems in its
monetary transactions, as well as the operation of electromechanical equipment in
order to guarantee preventive security against crime and order changes based on
the security of the institution, employees and clients.
j. Ability to work as a team with the administrative and commercial authorities of the
Institution, with its own officials, with officials of other national or international
entities related to security, with members of the Ministry of Public Security, and the
Judicial Investigation Agency and the Public Prosecutor's Office.
b. The analysis of risk situations, the planning and programming of the actions
required to ensure that banking security is carried out in accordance with best
practices.
c. The proposal of the relevant security services, as well as the supervision of their
use, operation and maintenance.
d. Control of the ongoing security training that depends on them, proposing to the
bank's Administration the adoption of appropriate measures or initiatives to achieve
this purpose.
g. Coordinate with the Ministry of Public Security and the Public Prosecutor's Office
on training related to crisis situations (assaults, kidnappings, hostage-taking,
counterfeit currency, electronic crimes, etc.).
ROUTINE PROCEDURES
Coerced or Forced Access Key: This key will be used if the Official in charge of opening it
does so under threat
All access control systems and support equipment (panic buttons, communication
equipment, weapons) must be in perfect working order at the start of the day.
At the time of closing, the Security Personnel will provide the necessary coverage to the
Officer Responsible for the closing, the Officer will activate the alarm system and the total
closure of the Branch.
EMERGENCY PROCEDURES
These are situations that are not part of the daily routine, in which people's lives are
normally in danger. Use all means at your disposal to avoid or mitigate the event.
As a first measure, it is important to use the panic or emergency button.
Explain that there is no immediate access to the money due to the blocking of the
delay systems, and try to show the robbers the signs that exist in the premises that
warn of this.
Pay attention to the robber's features and characteristics that may help the police
and to the getaway vehicle (model, license plate, etc.).
Before making any type of complaint, consult the methodology with the Security
Department.
Alarm systems must have two communication channels, a ground line and a backup line,
either GPRS or radio.
It is recommended to have digital recorders that record in real time; cameras with good
day/night definition.
If the ATM does not give you the money or retains your card, report it immediately to the
Telephone Banking numbers: in Bogotá at 2417560 or in the rest of the country 0 18000
515872
Avoid ATMs that have messages or signs posted on them indicating that the instructions
on the screen have changed.
Try to use ATMs during the day and in crowded places.
TECHNICAL AREA
TECHNICAL SECURITY
ATM Security
ATM
ATM.
They usually have a small dot matrix or thermal printer to print transaction receipts and
update savings books.
Banking specialization 68
Using the ATM means savings for the bank, because it saves on staff who do not have to
serve customers to offer basic services. For this reason, many people find it abusive that
banks charge an annual fee for ATM cards.
Types of ATMs]
ATMs vary depending on the needs of each bank. They are mainly divided into two types:
full and cash.
Full ATMs are those that allow you to withdraw money as well as make deposits (usually
using envelopes). These ATMs are usually located inside banks, either alone or with
another ATM, another full or cash machine, but this is usually the main ATM at the branch.
Automated teller machines (ATMs) are electronic devices that allow bank customers to
withdraw cash and view their account statements, deposit cash or checks, transfer money
between different bank accounts, use a chip-based card, or even buy time for your cell
phone at any time of day, 365 days a year, without having to go to the bank.
The world's first ATM was produced by NCR and installed in London on June 27, 1967, by
Barclays Bank. The invention is attributed to John Shepherd Barron, but there is a record
of George Simjian filing for patent in New York as early as the 1930s. At first, the process
took a long time and did not require a special code, which was prone to fraud, which is
why current ATMs must authenticate customers using a numeric code called a PIN.
Banking specialization 70
How it works A
card reader captures the credit or debit card and reads the customer information
contained on the magnetic stripe on the back. The data is sent to a central computer.
With the receipt slot you have the option of printing or not the receipt of the operation. The
display informs you of each step of the process: Some ATMs use CRT monitors, others
use an LCD screen. Some have a speaker. It repeats instructions when a key is pressed
and also gives information concerning the bank. The on-screen buttons are what tell the
bank what type of transaction is required.
Electronic Eye. It is the mechanism that gives the cash. It has a built-in sensor that counts
each bill once the desired amount is requested. Another sensor evaluates the thickness of
each banknote: if the banknotes are stuck together or torn, they are retained. This count
and transaction data are recorded in an electronic journal.
1. When possible, use ATMs you are familiar with. Make sure you use well-lit ATMs in
good locations where you feel comfortable.
2. Take a close look at your surroundings before approaching an ATM. Do not use
the ATM if you see any suspicious individuals or if the area is very isolated or
dangerous.
3. Have your card ready in your hand before approaching the ATM.
4. Look for anything unusual or suspicious about the ATM indicating that it may have
been tampered with. Never use an ATM that has foreign materials in the card slots,
on the screen, keypad, and/or cash dispenser.
Banking specialization 71
5. If you suspect that someone has tampered with your ATM, go to another ATM and
inform the bank.
Avoid ATMs that have messages or signs posted on them indicating that the instructions
on the screen have been changed. You will never find posters, signs, notices, etc. from the
bank inside an ATM asking for personal or card information.
Never accept help from anyone who offers to assist you if the ATM malfunctions. If this
happens to you, cancel your transaction before withdrawing by pressing the Cancel key.
You should not let anyone distract you while you are at the ATM.
6. Make sure there is a safe distance between you and other people in line. Never
allow pressure from people in line and make sure they do not see your PIN
(secret code) when you enter it into the system. Wait until the cashier tells you that
your transaction has been completed.
7. Follow the instructions on the display screen, for example, do not enter your PIN
until the cashier tells you to.
8. Always make sure to finish your transaction by pressing the CANCEL key before
leaving the ATM.
9. If you feel that the ATM is not working properly, press the CANCEL key, remove
your card and go to another ATM. Please report this anomaly to your bank.
10. Never reveal your secret key, it is personal and non-transferable.
11. Never carry or write down your secret code, memorize it.
12. For your security, change your PIN frequently or immediately if you suspect that
someone has known it or that the ATM is retaining it.
13. Don't rush through the transaction and put your card and cash away carefully
before leaving the ATM. Always check before leaving the premises that you
have stored your card in the usual place and that you have not left any items on the
counters.
14. Never forget to withdraw or claim the receipt for proof of the transaction.
15. Never insert your card if the ATM is out of service.
16. Never assign dates of birth, document numbers, telephone numbers, addresses,
etc., for your secret code.
17. Check the ATM withdrawal limits authorized by your bank, these are defined by the
type of product (BIN) you have.
18. Check your account balance and statements regularly. By keeping receipts for
transactions and payments made at ATMs, establishments and offices for a
reasonable period of time, you will be able to resolve potential claims with your
financial institution more easily.
19. If you use an indoor ATM, which requires your card to open the door, avoid letting
anyone you don't know enter with you. If possible, never use your card to open
ATM doors.
20. Whenever the occasion warrants it, check that the ATM door is properly closed
before making any transaction; use the door latches that allow you to have privacy
and security when making your transactions.
21. Protect your cards as if they were cash. Keep your cards and/or personal
identification documents in a safe place and never leave them unprotected at
home, work, in your car or in public places.
22. Keep your wallet or purse containing your cards in sight in public places.
23. Prepare a list of your account numbers, cards and phone numbers to report if any
are lost or stolen. Keep the list in a safe place. Check your cards periodically to
make sure none are missing.
Banking specialization 72
24. Please read and make sure you understand the terms and conditions for using the
card issued by your financial institution. Please contact customer service if you do
not understand any of the terms.
1. Card jam. An ATM card reader is tampered with to capture the customer's card.
The criminal removes the card once the customer has walked away from the ATM.
2. Card cloning. An electronic card skimming device is used to copy the card's
security information onto its magnetic stripe so that the information can be
reproduced on a counterfeit card.
3. Card exchange. The customer's card is swapped for another card without their
knowledge during the ATM transaction.
4. Look over your shoulder. An individual stands nearby to watch as the customer
types his PIN into the keypad.
5. Expose the PIN number. The customer's PIN is observed by looking over the
shoulder or through binoculars or the PIN is illegally recorded by means of a
hidden camera.
6. Vandalism. The ATM machine is deliberately damaged and/or the card reader
becomes jammed, preventing the customer from inserting the card.
7. Physical attacks. The ATM machine is physically attacked to withdraw cash.
8. Distractions. Criminals use messages and signs attached to ATMs to make the
modifications they have made to the ATM appear less suspicious or to direct
customers to another nearby ATM that they have altered.
9. Robberies and/or assaults. People are confronted and robbed, usually by force.
Scams and tricks on Internet sites. A criminal sets up a fictitious website on the Internet,
which appears authentic to the user. This may come attached to an email with a link to the
fictitious site. The victim is asked for their card number, PIN, and other identifying
information which is used to replicate the card for use at ATMs.
BANK CARDS
Since January 2011, Spanish financial institutions have had to change their cards
from magnetic stripe technology to chip technology, all in order to achieve:
- Greater security, because by requesting the PIN to be entered in
operations, it eliminates the risk of fraud in case of theft or loss
- Faster, as you do not have to sign receipts or verify the purchase price
- Greater future applications, as the chip will be able to store information to
perform more services with the cards.
- The police officer (guard) must have a regular appearance, not outstanding in
any way. Any physical characteristic that stands out from the ordinary, such
as excessive height, short stature, obesity, etc., can attract the subject's
attention. The agent must have the ability to act naturally under all
circumstances, as if he belonged in the place where he is.
- The police officer (guard) must be very alert and must be able to respond
quickly to unexpected events that occur despite all preliminary planning. You
must have a good memory and be a good observer, because many times you
cannot write down all the events, descriptions of contacts, or the time they
occurred.
- Finally, the police officer (guard) must have patience and perseverance.
Specify the purpose of surveillance and this comes from studying the details of the
subject-crime interrelationship.
Conduct a preliminary inspection of the areas where surveillance is to be carried out,
taking into account the layout of the streets (possible escape routes), degree of traffic
and/or people congestion, ease of communication and transportation, that is, assess
the terrain in general.
Decide the type or combination of surveillance.
Obtain a photo or as much description of the subject as possible.
Provide yourself with the necessary equipment
Explain to the personnel involved the details of the surveillance, using plans,
sketches or photographs for this purpose, and in this act, you must:
(to) Provide a photograph or description of the subject.
(b) Make known the location of the surveillance posts or areas, mobile
surveillance posts and the communication post; the role of the security service, the
type of appropriate clothing to be worn, the circumstances in which a firearm should
or should not be carried and the way in which technical equipment should be used.
(c) Agree on how communications will be established. It can be by telephone,
radio transceiver (it is risky due to the interference that it can be subject to or also
due to the possibility that it exposes surveillance) or by the simplest means
through sign language, such as with handkerchiefs, hands, newspapers or others.
(d) Make sure that staff have a notebook to record surveillance updates, have a
watch, and have a clear understanding of instructions and responsibilities.
(and) Advise staff to be alert, as the person under surveillance may conduct
counter-surveillance, to be prepared to give a reasonable explanation for their
presence in the area if intercepted, and to be able to make an arrest or seizure of
property at any time during surveillance.
(F) Provide instructions regarding whether to continue or discontinue
surveillance upon discovery
b. Of Specific Character
(to) Fixed surveillance
- Prepare a place as a surveillance post, it can be a room, a warehouse, a house
under construction, etc. If there is no closed space, use a cover, such as a street
vendor's stand.
- Conduct direct research on the owner of the site or location to find out their
reputation and whether they can be trusted.
- Occupy the lookout post, preferably at night and discreetly.
- Draw up an emergency plan for cases where surveillance must be lifted without
leaving traces
- Use binoculars and/or preferably a camera "A photograph is worth a thousand
words"
- Check the operation of equipment, means of communication and transport
(b) Surveillance on foot
- Using teams of (3) men is best when personnel are available. At least one of them
must be an experienced guard.
- Dress conservatively and appropriately for the surveillance area; no flashy or out-
of-the-ordinary clothing should be worn.
- Change your appearance with simple variations in suit, tie, wearing or not wearing
glasses, etc.
- Try as much as possible to make the physical appearance of the guards similar to
the majority of the locals in the surveillance area; that is, to blend in.
(c) Vehicle Surveillance
Banking specialization 77
- Using public vehicles that do not have the official seal, that
are not conspicuous or easy to identify.
- Carry extra gasoline to supply the vehicle in case of
emergency.
- Assign an experienced driver who is knowledgeable about
traffic rules, and the watchmen must also have the same conditions.
- Equip your vehicle for emergencies such as fires, accidents
or severe weather.
- Designate at least two officers, one at the wheel and one as
a guard, who can get out of the vehicle if it is necessary to continue surveillance on
foot.
- Have at least two vehicles available, so you can change
them during surveillance, and if you have one, use your creativity to change its
appearance. For example, in night surveillance, a special multi-contact switch can be
used to dim or eliminate any of the headlights, giving the appearance of being
several cars. These precautions are necessary to prevent surveillance from being
discovered. Have a shortwave radio transceiver in each vehicle to communicate
surveillance updates.
Preparatory Phase.- General and specific recommendations. In case of fixed
surveillance. In case of surveillance on foot. In case of vehicle surveillance.
Investigators who have conducted surveillance can confirm that it takes great
perseverance to wait for a suspect to appear and then follow him every day as he
completes the same routine.
Before starting a surveillance, all investigators participating in the operation will be
responsible for the following activities: A study of all files related to the subjects, their
activities and crimes, their work and residence environment, vehicles involved in the
suspects.
Investigators should focus on the names and aliases of all suspects or those involved in
the case. Investigators must know the place where they will be conducting surveillance,
concentrating on aspects such as: type of people, manner of dress and speech.
The equipment that surveillance agents will use is at the discretion of each agent; as part
of their preparations to carry out surveillance, agents must study their own appearance;
these preparations and equipment must include cameras, binoculars, telescopes and
recorders, among others, when these are applicable.
Surveillance on foot by an agent. This type of surveillance is one of the most difficult and
should be avoided as much as possible due to the limitations faced by the agent carrying
out the surveillance. There are situations where an officer is forced to initiate surveillance
suddenly, but the distance between the officer and the subject is almost entirely dictated
by the number of people in the location.
Surveillance on foot by two officers. With this type, the chances of success are greatly
increased because the second agent has greater flexibility. When you have two agents,
the position of the agent immediately behind the subject can be varied frequently, allowing
the agent to be positioned relatively close to the subject.
Surveillance on foot by three agents or ABC method. This type is considered to be the
best and most common for foot surveillance. This method should be used whenever
possible because with three officers there is much less risk of losing sight of the subject
and there is greater security against the possibility of being discovered. This is because
agents have the ability to change position, allowing whoever is discovered to withdraw
without affecting surveillance.
Banking specialization 78
- When the subject suddenly takes a taxi, each guard must try to follow him on
their own.
- The team develops its own code of signals to communicate, such as touching
their ears, holding their lapels, looking at their watches, etc.
Surveillance in pairs
"A" is placed behind the subject and "B" behind of "A", which allows some
mobility, as:
- Switch positions alternately between "A" and "B" so as not to arouse suspicion in
the subject.
- Depending on the subject's attitude, "B" may place himself on the opposite
sidewalk and at his height to notify "A" of the subject's movement when turning
corners and, if they deem it necessary, change positions; that is, "B" behind the
subject, "A" after "B" or in line with the subject.
- If the subject throws a paper or stops suddenly on purpose to see if he is being
watched, "A" walks past and "B" takes charge of picking up the paper or
continuing to follow him.
- If the subject makes contact, surveillance is split, with one guard following each
subject.
- If the subject enters a place to make a phone call, "B" must enter and pretend to
be making a call in order to listen to the subject.
- If the subject enters a restaurant "B" he must enter cautiously and pay the bill
before the person under surveillance, to avoid surprises.
- When the subject enters the mail, "B" must follow him and pretend to write a
telegram and try to obtain the content of the message from the person under
surveillance or, otherwise, obtain the blank sheet of paper next to the one used
by the subject; there may be traces of the writing to reproduce them in the
laboratory.
- When the subject approaches a ticket office "B" he must try to see what it says,
and see what ticket he buys.
Surveillance of one and valid for the previous cases
- Avoid losing sight of the subject in crowded places, you should keep it about 3 to
5 meters away
- The guard should not stare at the subject, as this could attract his or her
attention. If this happens, you should not believe that you have been discovered,
but should react by behaving naturally, for example, buying a newspaper, looking
at shop windows, asking the time, etc.
- The security guard during his work should not be static, he should always be
pretending to do something other than surveillance.
- The guard must be ready at all times to anticipate the subject's movements.
- The guard has to adapt to the pace of the guard's walk.
- If the subject commits a misdemeanor or crime and what is being investigated is
more important, he or she should not intervene, but the incident must be
recorded.
- When the guard has lost sight of the subject, he must inform his immediate
superior and stop inventing movements that the subject has not made. They
would deviate or fail the course of the investigation.
- If the subject enters a public vehicle, the guard must enter through the door and
sit three seats back, without losing sight of him.
- The security guard should not follow the subject if he gets off a vehicle
immediately after boarding, but should instead get off at the next stop and wait to
Banking specialization 80
board the same public transportation line; he will probably locate the subject
again.
- When the subject enters an elevator and chooses the floor number, the guard
must remain silent and follow the subject as he exits. If the person under
surveillance does not indicate or mark the floor, the guard must request the floor
and follow the subject when he leaves.
- Protect yourself during nighttime surveillance by avoiding standing on corners
with lights or in open doorways. Be careful when crossing dark alleys, turning
corners, and any type of stalking.
- Identify the subject's way of walking, arm movement and other peculiarities to
facilitate tracking, especially in congested places.
- Security guards should not rush to end a surveillance quickly, as this could distort
the nature of the operation; rather, they should consider that it may last several
months.
- Finally, in one-man surveillance, he will follow the subject, secretly taking
notes of everything he has observed, such as the people he speaks to, the
places he visits, the time he spends in each place, the routes he follows, etc.
It is when the subject and/or convoy or campaign, adopts a series of actions in order to
expose surveillance. It must be taken into account that professional criminals always
act aware that they are being watched.
When subjects realize that they are being watched, they react in different ways
against the guard; thus we have:
to. The most serious thing is attacking their physical integrity.
b. Threaten you, harass you or report you for police harassment.
c. They usually act by preferring a known guard over an unknown one.
2. COUNTER SURVEILLANCE TACTICS
to. Under fixed surveillance.
The subject openly observes the surroundings and pretends to have noticed the
surveillance, in order to provoke the guards to expose themselves.
He appears to be waiting for someone at the entrance door in order to check if he
is being observed.
While the subject acts naturally, the convoy or bell is responsible for discovering
the surveillance:
(1) Posting counter-observation personnel at strategic points in the area under
surveillance.
(1) Making inquiries among the neighborhood about strange people they have
seen recently in the area.
b. On foot surveillance
(1) The subject suddenly stands up and appears to tie his shoes.
(2) The subject, turning the corner, suddenly stops.
(3) He throws down a piece of paper and turns to see if anyone picks it up.
(4) He walks around looking at the display cases and observes the reflection of the
moons.
(5) go back one or more times to see who does the same.
(6) Enter a dead end street.
(7) He walks through deserted streets and looks back.
(8) Get on and off a public vehicle.
(9) Uses various forms of transport, switching from one to another.
(10) The subject may suddenly intercept the guard to ask him about the reason for his
presence at that place.
c. In car surveillance
(1) The subject violates traffic regulations, that is, he runs a red light or drives against
traffic to see who is following him.
(2) It moves too fast or too slowly, or both.
(3) It stops from one moment to the next.
(4) Makes a sudden U-turn.
(5) Turn around a block.
(6) It disappears after a climb and then waits for the one following it.
3. SUBJECT TACTICS TO EVADE SURVEILLANCE
to. In fixed surveillance
(1) The subject enters or leaves the area under surveillance in disguise.
(2) He enters or leaves confused among conveniently instructed people.
(3) Enters or exits hidden inside a box or something similar.
(4) Using third parties, he causes an incident, such as a traffic accident, a street
fight, etc., to distract attention and enter or leave the surveillance area.
b. On foot surveillance
(1) Enter a building or commercial premises with several exits.
Banking specialization 82
(2)
Get on a public vehicle and get off at the moment it leaves or get on at the
last moment of the departure.
(3) Enter a building immediately after turning a corner.
(4) He immediately enters and exits a movie theater or hides in the bathroom.
(5) Take the only taxi available in the area.
(6) It moves around in various means of transport.
(7) Look for busy streets to disappear into the crowd.
(8) Use the convoy or bell to intercept and distract the guard under any pretext.
c. In car surveillance
(1) It disappears at high speed.
(2) Look for places with a lot of traffic congestion and place several vehicles in
front of the guard at a time.
(3) He tries to momentarily get out of the guard's sight to change vehicles.
(4) Violates traffic rules such as going against traffic, running red lights, making
U-turns or turning left or right on two-way streets when it is prohibited.
(5) Use the convoy or bell to intercept or distract the guard under any pretext.
4. SOME TECHNIQUES TO RESTORE LOST SURVEILLANCE
a. Simultaneously monitor the places frequented by the subject.
b. Locate the subject based on an intelligent assumption.
c. Make a phone call to the subject's home and also ask about him, in the places
where you think he may be.
d. Allow some time to pass if the investigation is not urgent, so that the subject
becomes confident and returns to his or her usual activity.
TERRORISM
http://es.wikipedia.org/wiki/Terrorismo - cite_note-1
Terrorism is the systematic use of terror1 to coerce societies
or governments, used by a wide range of political organizations in the promotion of their
objectives, both by nationalist and non-nationalist political parties, right and left, as well as
by corporations, religious groups, racists, colonialists, independentists, revolutionaries,
conservatives and governments in power.2
Terrorism, as a tactic, is a form of violence that is distinguished from state terrorism by the
fact that in the latter case its perpetrators belong to government entities. It is also
distinguished from acts of war and war crimes in that it occurs in the absence of
war.http://es.wikipedia.org/wiki/Terrorismo - cite_note-3
3 The presence of non-state actors in armed conflicts
has created controversy regarding the application of the
http://es.wikipedia.org/wiki/Leyeslaws ofhttp://es.wikipedia.org/wiki/Guerra war.
The word "terrorism" has strong political connotations and is highly charged with emotions,
which makes it difficult to agree on a precise definition.
common for organizations and individuals who practice it to reject the term as unfair or
imprecise.http://es.wikipedia.org/wiki/Terrorismo - cite_note-6
6 Both tend to confuse the concept with the
legitimacy or illegitimacy of their own motives or those of their antagonist. At the academic
level, the decision is made to focus exclusively on the nature of the incidents without
speculating on the motives or judging the perpetrators.
State terrorism consists of the use of illegitimate methods by governments aimed at
inducing fear or terror in the http://es.wikipedia.org/wiki/Poblaci%C3%B3n_civilcivilian
population in order to achieve their objectives or encourage behaviour that would not occur
on its own. Such actions are justified on grounds of State.
State terrorism has been considered to take one or more of the following forms:
EMERGENCY MANAGEMENT
Environmental and social conditions in the workplace make it necessary and convenient to
be well prepared to successfully deal with possible emergency situations that may arise in
companies.
Emergency prevention and response plans are designed to minimize the consequences
and severity of potential catastrophic events that may occur for various reasons.
The effectiveness of an emergency plan does not depend exclusively on the level of
technical and professional training of those who execute it, but on teamwork and the
Banking specialization 84
willingness of each employee to put the established standards into practice. You, as a
security leader, have a very important role to play before, during and after each
emergency, therefore, it is very important that you know the basic concepts and
procedures outlined below:
• If you find a hot door in your evacuation route, do not open it, look for another exit5
• Stay calm
• Observe the robber's most prominent features such as height, age, approximate weight,
hair color, eyes, scars and types of weapons
• Do not touch anything in the robbery area to avoid hindering the collection of evidence
• Obey the robber's instructions slowly and calmly
• Do not confront the robber, especially if he is armed
7. HOW TO ACT IN CASE OF SEISMIC MOVEMENT?
• If you are on public roads, go to green areas or parks where there is no danger from
electrical cables or collapsing
structures• If you are in a car, stop immediately and remain inside or underneath it if there
are no other moving
cars• In churches, stadiums, theatres and cinemas, do not rush to look for the exit, many
other people will want to do the same, hindering evacuation
• If you are near rivers or ravines, move away from the banks, seek refuge in a high place
with a slight slope
• Turn off equipment, machinery and systems before leaving
• Stay calm and avoid running
• Stay away from windows, lamps, air ducts, shelves and bookcases
• Take cover under desks or door frames8
• When you hear the alarm, disconnect all electrical and mechanical
devices. • Stop all activity
. • Leave immediately, avoid crowds
. • Follow the main route marked on the evacuation plan, do so without running but as
quickly as possible
. • Always use the stairs
. • Go to the meeting
place. • Do not shout, make unnecessary
noise or comments. • Pay attention to and strictly follow the orders of the evacuation
coordinators. • If a colleague is missing, notify the evacuation
coordinator. • Do not return under any circumstances once the evacuation has begun.
Banking specialization 86
INFORMATION SECURITY
SUMMARY
A brief description of information security is provided, exploring problems in systems, both
at the software level and at the network level. An introduction to systems auditing is also
provided, indicating its typical processes and presenting some information security
standards at the end.
1. INFORMATION SECURITY
Many of today's companies, as well as many of the people involved in the digital world,
have sought ways to develop information systems, focusing on software and hardware that
enable communications from various parts of the world.
The emergence and evolution of information systems is such that on average 97 out of
100 families have communications via the Internet, and it is not only the World Wide Web
that allows us to see these great changes, but also the technology that is involved such as
televisions, wireless communication systems, CPUs, laptops, among others.
It is therefore important to highlight the importance that these information systems give to
society and therefore the importance that is given to them within governmental, political,
business or educational environments; this is how to ensure that information flows from
one place to another without problems, there is security and data custody, and to explain
this we will talk about information security and systems auditing.
According to [1], security can be understood as a state of any system (computer or not)
that indicates that the system is free of danger, damage or risk. Danger or damage is
understood as anything that may affect its direct operation or the results obtained from it.
For most experts, the concept of computer security is utopian because there is no 100%
secure system. For a system to be defined as secure it must have these four
characteristics:
Integrity: The information can only be modified by someone who is authorized, that is,
no modifications are made by unauthorized persons to the data, information or
processes, no unauthorized modifications are made by authorized personnel to the
data, information or processes and the data or information is consistent both
internally and externally.
Confidentiality: The information must only be readable by authorized persons, this
implies seeking to prevent unauthorized access to the information, whether
intentional or unintentional.
Availability: Data, information, or resources must be available to the appropriate
personnel when needed.
Irrefutability: (Non-Rejection or Non-Repudiation) That authorship cannot be
denied.
Depending on the threat sources, security can be divided into logical security and physical
security.
It is also important to take into account certain terms that clarify what can be taken into
account when talking about computer security, such as:
Asset: resource of the information system or related to it, necessary for the
organization to function correctly and achieve the proposed objectives.
Threat: is an event that can trigger an incident in the organization, causing material
damage or immaterial losses to its assets.
Impact: measuring the consequences when a threat materializes.
Risk: The possibility that a specific impact will occur on an asset, domain, or entire
organization.
Vulnerability: possibility of a threat materializing on an asset.
Banking specialization 87
Attack: event, successful or not, that threatens the proper functioning of the
system.
Disaster or Contingency: interruption of the ability to access and process
information through computers necessary for the normal operation of a business.
Don't forget that risk and vulnerability are different concepts, because vulnerability is linked
to a threat and risk to an impact.
Taking into account the above, it can be noted that among the most important assets for
an organization is information and therefore its custody, this is how information security is
the set of methodologies, practices and procedures that seek to protect information as a
valuable asset, in order to minimize the continuous threats and risks to which it is exposed,
in order to ensure business continuity, minimize damage to the organization and maximize
the return on investments and business opportunities. And in the case of each individual to
protect identity and privacy [2].
The difference that information security can make for both organizations and individuals is
clear. This means that organizations seek to protect the organization's resources such as
information, communications, hardware and software that belong to it. To achieve this,
appropriate controls are selected and established. Information Security helps the
organization's mission by protecting its physical and financial resources, reputation, legal
position, employees and other tangible and intangible assets, the other point of view exists
for individuals whose purpose is to protect their privacy and identity by preventing their
information from falling into the wrong hands and being used inappropriately.
Please note that many companies use powerful antivirus software to prevent access to
your information and any damage that may be caused to it. This allows the user to detect
and eradicate viruses. The user should only consider which one is the most appropriate to
use and which one meets their needs.
So in conclusion, security describes the policies, procedures and technical measures that
are employed to prevent unauthorized access, alteration, theft and physical damage to
information systems.
1.1. Problems in the systems
Please note that many problems in information systems are caused by errors within the
systems themselves, which allow access in violation of established rules. This means, for
example, programming errors, because as the system is very large, errors are sometimes
not fully corrected and may create instability in the system in the future. According to [3]
studies show that approximately 60% of errors are detected during testing and are the
result of omitted, ambiguous, erroneous or non-perceptible specifications in the design
documentation.
Another reason why information systems can be unstable is maintenance, since it is the
most expensive phase of any project, and because almost half of the time is spent making
adjustments and maintaining the systems.
Therefore, the quality certification process is essential for the development process of an
information system, since it can prevent errors during data capture.
And this is where we start talking about controls for the custody of information; it is
important to detail that a control according to Laudon in his book [3] are all the methods,
policies and procedures that ensure the protection of the organization's assets, the
accuracy and reliability of its records and the adherence of its operations to the standards
defined by the administration. Thus, the control of an information system must be an
integral part of its design. Users and system builders must pay close attention to controls
throughout the life of the system.
But not only control is important, it should also be noted that there are two types of
controls, general and application controls. The former govern the design, security and use
of computer programs and the security of data files throughout the information technology
Banking specialization 88
infrastructure; application controls are more specific to each computer application. Please
note that general controls include software controls, physical hardware controls, computing
operations controls, data security controls, controls over the system implementation
process, and administrative controls.
With this in mind, there are currently managed service providers (MSPs) that provide
networks, systems, storage and security administration for their subscriber clients.
This is why, in addition to the security that must be taken into account for software
applications, the security of hardware components must also be taken into account. For
this purpose, intrusion detection systems were created, which are tools to monitor the
most vulnerable points in a network, to detect and stop unauthorized intruders.
Continuing with the concepts, it can also be taken into account that when information is
handled by several people it is important to keep it intact, so in search of this concept,
encryption was created, which has been working since the Arab era and has been applied
to current computing systems, this consists of coding for messages to prevent
unauthorized reading or access.
In this sense, we must also talk about another type of security implemented for
organizations and in terms of their senior management or specific areas of the company,
that is, the application of digital certificates that can be used to establish the identity of
people or electronic assets, and they also protect online transactions by providing secure
and encrypted communication. Currently, these information security methods are used by
financial institutions that transmit important information to other controlling entities, as well
as by companies where the information is valuable and can only be known by certain
people.
1.2. System assurance techniques
As previously mentioned, there are currently several methods used to ensure security
within a system, such as:
Encrypt information: Using cryptography, passwords are difficult to guess from
the individual's personal data.
Network monitoring.
Repellent or protective technologies: Manage firewalls, antispyware or intrusion
detection systems, antivirus. Keys for software protection, etc. Maintain information
systems with the updates that have the greatest impact on security.
1.3. Software Considerations
A person or company should have only the necessary software installed on the machine
as this helps reduce risks. Likewise, having the software under control ensures the quality
of its origin (pirated software or software without guarantees increases the risks).
In any case, a software inventory provides a sound method of ensuring reinstallation in the
event of a disaster. Software with quick installation methods also facilitates reinstallation in
case of contingency.
Please note that there are currently a large number of pages on the Internet that warn
about security and show risky viruses, existing antivirus programs and procedures for
safeguarding important information.
1.4. Network Considerations
Entry points into the network are generally email, web pages and file entries from disks or
from other computers, such as laptops.
Keeping the number of network resources in read-only mode as high as possible prevents
infected computers from spreading viruses. In the same way, user permissions can be
reduced to a minimum.
Data can be centralized so that batch mode virus scanners can work during machine
downtime.
Banking specialization 89
Controlling and monitoring Internet access can detect, in recovery phases, how the virus
was introduced.
At this point it is important to emphasize that every person and/or company is vulnerable in
their security because, as was mentioned from the beginning, there is still no 100% secure
and reliable system.
HANDLING OF FIREARMS
The first examples of this type of weapon date back to the 16th century. Its operation is based
on a system of repeating rotating chambers, in this way multi-barrel weapons were
manufactured whose system was a set of barrels around an axis. Their main objective was to
manufacture firearms that could fire several shots without having to be loaded each time they
were fired.
After their success as short defensive weapons, they went from a set of barrels around an axis,
known as the "Pepperbox" or also "wasp's nest" system, to being a single piece with several
holes. But the true success of the revolver began in 1835 when Samuel Colt in North America
and Adams in England patented their revolver models.
Both revolvers are based on a similar operation, the chambers are loaded from the front and
use the piston system to initiate the shot. Samuel Colt, the undisputed leader for several years,
had a competitor, the Dean Adams revolver, patented in 1851. In 1855, Beaumont's selective
double action system was patented in Great Britain and applied to the Adams system.
Almost in the middle of the century, with the emergence of rimfire metal cartridges, the revolver
would adopt them and become a breech-loading weapon with an essential change in the
feeding system. It was in 1857 when the Smith & Wesson company introduced the first
revolver designed to fire . 22 short. Smith & Wesson bought the patent from Rollin White,
which prevented any other American company from selling a large-caliber pistol that used a
metal cartridge until 1873, when the patent expired.
Banking specialization 90
The revolver is a repeating, multi-chamber weapon, and can be double action or single action.
There are different mechanisms used in oscillating revolvers, whose differences with the others
we will see later.
- Grip - Trigger
guard
- Flat mechanism
box - Rectangular cylinder window.
are housed. 3.- The barrel It is the part of the weapon through which the projectile runs at the
moment of firing. It faces the upper chamber of the drum or cylinder. The barrel's bore has a
series of grooves, which give the projectile a direction of rotation as it moves through it, and
which begin a few millimetres from the rear end of the barrel. These millimetres of barrel are
slightly widened with respect to the rest of the barrel, so that the projectile, when it comes off
the case and hits the grooves in the barrel, does not do so abruptly, as this kind of funnel
facilitates the entry of the bullet.
3. Opening and closing mechanism It allows the shooter to access the different chambers of
the cylinder to insert the cartridges in them and close it firmly to prevent it from opening
accidentally when fired.
It is composed of:
Banking specialization 92
- The bolt -
The bolt
According to their opening and closing system related to the feeding system, we can classify
revolvers as follows:
- Side-action.
- Tilting.
- Oscillating.
4. Feeding
- Cylinder
- Cylinder stop
- Cylinder
cam or connecting rod - Cylinder toothed crown
Banking specialization 93
spring For the firing and percussion actions to occur, the firing hammer and the trigger must
come into contact, varying depending on whether the shot is fired in single action or double
action.
- Single-action operation: When the hammer spur is pulled, the hammer moves back,
overcoming the force of the mainspring and dragging the trigger and, consequently, the tail
along its path. Once its travel has finished, the firing hammer is held in its rearmost position
(cocking) by a trigger edge, called the firing tooth, located in the contact area between the
hammer and the firing pin. When the trigger is pressed, the trigger moves, breaking the contact
between the two pieces, releasing the hammer, which is driven forward with force by the
compressed mainspring.
projection on the hammer, pushing it the rest of the way, until, at a certain point, the hammer
and trigger separate abruptly, with the hammer falling, driven by the force of the mainspring.
The lifting piece is therefore only useful to put the hammer and the trigger in direct contact,
since when the hammer is in its most forward position both pieces (hammer and trigger) are
separated. Regarding the needle, it can be inside a hole in the closing plane as in the pistol, or
be attached to the hammer by a pin.
6. Extraction
The star returns to its original position once we stop pressing on the stem to extract the pods. It
is located inside the cylinder.
7. Safety Systems Today's conventional revolvers lack manual safeties, that is, all the safeties
they have are automatic. A manual safety is understood to be one that acts according to the
shooter's will, and an automatic safety is understood to be the opposite. The risk with a
revolver is that when it is fully loaded it always has a cartridge facing the firing pin, so a knock
or fall could cause percussion. To avoid this risk, revolvers use various safety devices, the best
known of which are:
b. Slide safety The upper part of the slide has a small projection or plateau that coincides with
and is superimposed by the lower projection of the hammer. When the weapon is at rest, they
are in contact, preventing the hammer from advancing and striking the firing pin anvil.
c. Eccentric safety Safety device used in some revolvers, which due to the eccentricity of the
Banking specialization 95
hammer's axis of rotation prevents the hammer from facing the firing pin while the hammer is
at rest, making accidental firing impossible.
a. Front sight The front sight is usually fixed and located near the end of the muzzle.
b. Rear sight The rear sight is located on the bridge of the frame at the rear and is frequently
adjustable in laterality and height.
Often, and it could not be otherwise, terms such as slide, frame, percussion system,
breechblock and a long etc. appear in this blog. But do we really know anything about these
terms? To a greater or lesser extent, we all know what a pistol is, but do we know its origin?
How is it different from other firearms? What is a striker lock? I hope that with this post I will
answer these and other questions, which will undoubtedly help us to increase our knowledge
about the weapon.
We'll start at the beginning. A pistol is any short weapon with one or more repeating shots or
semi-automatic, except those with a rotating chamber system, which we classify in the revolver
group. The history of the pistol is closely related to the evolution of mechanics, cartridges,
military and civilian use and sport. The most important factors for the adoption of handguns
were, in addition to mobility and ease of use, concealment and ease of transport. The
achievement of the repeating weapon was not enough for the gun manufacturers who sought
to transform the repeating system, which was merely manual, into a semi-automatic one.
The origin of the pistol dates back to the 19th century. In 1892, Joseph Laumann, an Austrian
engineer, created the first semi-automatic pistol that used smokeless powder ammunition. It
was called Schonberger. In 1893, Andreas Wilhelm Schwarzlose designed a pistol that was
operated by the movement of the barrel, and in 1898 he manufactured a semi-automatic pistol
that, like the previous one, also bore his name. The first weapon of this type to achieve
commercial success was the one invented by the American Hugo Borchardt, also known by the
name of its inventor. This made its appearance in 1893 and was the first to use a magazine
that could be separated from its housing in the grip. This pistol can be considered the
precursor to the Luger, and was designed so that a stock could be attached to it and it could be
used as if it were a carbine. Borchardt used a mechanism similar to the joint of a human knee,
so that when it was extended and locked it was practically impossible to move, but once it was
moved slightly upwards, it opened easily and simply.
From 1906, names such as John M. Browning and the Colt company in the USA, the Fabrique
Nationale d'Armes de Guerre in Herstal (Belgium), and Mauser and Walther in Germany,
combined the various locking systems with differentiating qualities between the types of pistols,
beginning a race towards perfection of operation that has been achieved today.
Banking specialization 97
OPERATING
SYSTEMS Among the best known operating systems are the following:
1. Fixed
cannon a/. Fixed barrel system with recoil breech (Mauser System) In this system, once the
shot has been fired, the barrel remains motionless attached to the frame while the breech is
moved backwards by the force of the gases. This system is used, with exceptions, with low-
power cartridges. Examples of this system are the Hacker & Koch P9S pistol, in which the
locking is produced by a system of rollers that do not allow the opening until the chamber
pressure drops. Another pistol worthy of mention is the P7, also from H&K, in which the delay
in the opening of the bolt is produced by a gas intake in the barrel, that is, a portion of the
Banking specialization 98
gases produced in the combustion of gunpowder pass through a hole into a cylinder whose
piston is integral with the slide, preventing the opening of the slide until the projectile leaves the
barrel and the pressure drops.
2. Mobile
cannon a/. Long recoil movable barrel system The barrel recoils a distance greater than the
length of the cartridge. The barrel-lock assembly moves forward together, undergoing a turning
movement thanks to helical grooves in the frame, into which lugs provided for the lock are
inserted. When the barrel-lock assembly reaches the end of its travel, the barrel is unlocked to
return to its initial position, and then the lock is returned, which in its movement drags a new
cartridge inside the chamber.
-Barrel:
This is a special steel tube with strong walls, designed to allow the projectile to flow through it,
Banking specialization 99
2 Sliding: Mobile
piece located above the frame or armature, to which it is attached by means of channels or
rails that allow longitudinal movement-displacement. The barrel is housed in the front recess,
and there are two holes at the front: one for the barrel to exit when the weapon is assembled,
and another for the recoil spring guide.
Parts. - Closing block. - Clutches. - Ejection window. - Extractor claw - Aiming elements. -
Recesses.
3. Frame.
The frame of a pistol is usually made of aluminum, steel, alloys and even high-impact plastic
such as Bloc, which helps the entire assembly to maintain a lighter weight. It is used to house
the different parts that form part of the firing, ejection, automation, feeding, disassembly and
gripping mechanisms, with their corresponding grips, which are usually made of a hard rubber
similar to neoprene, mother-of-pearl or wood. Among the parts it houses are: - Percussion
mechanism frame - Trigger - Magazine compartment - Closing latch.
Double action: When pressure is applied to the trigger, the force is transmitted to the
connecting rod, which with its central rear part presses on the firing pin latch, which, due to its
eccentric shape, begins to move backwards until it reaches a stop where the connecting rod
takes an inclined plane, separating abruptly from the firing pin latch, which, due to the action of
the mainspring and its guide, falls violently, hitting the anvil or rear part of the firing pin. .
- Single action: When the hammer is in its most rearward position, it is engaged by the sear.
The connecting rod, in turn, is set back and held by the firing pin latch. When pressure is
applied to the trigger, the connecting rod presses on the sear, which releases the firing pin,
causing it to strike the firing pin.
Firing pin
b) Percussion mechanism:
In this mechanism the element or piece that plays the most important role is the so-called firing
pin. We call the percussion system launched percussion because its operation is based on the
inertial launch of the firing pin. The firing pin is smaller than the housing where it is located,
being held in place by a return spring. When struck by the firing pin, it is propelled through the
bore until its tip emerges through the firing grain and strikes the cartridge piston. Then, by
means of its antagonist spring, it is hidden again inside the locking block. This system allows
the hammer to rest directly on the needle, without danger, since the needle does not protrude
through the hearth grain.
is the mechanism responsible for extracting the cartridge case once fired and expelling it
through the window to the outside of the weapon. It is made up of two fundamental parts:
- The extractor claw and the ejector. Once the shot has been fired, and in a matter of
milliseconds, the action of the projectile exiting the barrel, pushed by the gases, produces a
reaction in the weapon's mechanisms in such a way that the slide begins to recoil, guided by
the rails that hold it to the frame. The case, engaged by the extractor and attached to the
breech block, moves with the slide in its backward movement until it hits the ejector, which
pivots the case, preparing it to be disengaged from the extractor while making it take the
precise angle that directs it towards the ejection window, through which it exits to the outside.
This ejector has the particularity of being foldable, in order to aid in the assembly and
disassembly of the weapon, and is placed in its optimal operating position by the action of the
loader when feeding the weapon.
5.- Safety mechanisms They generally consist of a manually operated safety device and two
automatic ones.
Banking specialization 101
- Manual safety
: This is formed by the levers located on both sides of the slide and their purpose is to hide the
firing pin inside the breech block, so that it is not exposed to the action of the firing pin, while
blocking it inside, preventing the needle from accidentally falling and its own inertia causing it
to come out through the grain. Stove and strike the piston, always of course with a cartridge in
the chamber.
- Locking safety: This safety activates when the weapon is incompletely locked due to multiple
causes. This consists of the switch, located on the right side of the trigger cassette, not fitting
perfectly into the crescent-shaped recess in the slide, causing the connecting rod to move
downwards and not to contact the sear pin, thus preventing the firing pin from being released,
resulting in a lack of firing.
-Automatic magazine safety: This consists of disabling the firing mechanism while the
magazine is not in its housing, or is incorrectly placed.
-Drop safety: This is a safety device that works automatically in the event of the firing pin
accidentally falling, as long as the trigger is not pressed, preventing the firing pin from hitting
the firing pin, leaving it at a point further back and closer to it.
Summary
Slide (Solid): It is the carriage or mobile assembly that moves on the guides or rails of the
frame, allowing firing. In the vast majority it serves as a location for the sighting devices
(rear sight and front sight), in others, it only carries the rear sight. It also houses the
extractor (of the vassels), the firing pin and in some cases the devices for the automatic
needle safety, cocking mechanism indicator, chambered cartridge indicator and the flipper
safety, when this is located on the slide.
Frame: It is the chassis, armor or container of the firing mechanism, which can be made of
steel or very hard plastic or alloy, which supports the structure of the weapon. It houses
the trigger, transfer rod, sear, disconnector and magazine catch with their respective
springs and pins. Also to the ejector or ejector and mainspring with its guide, especially in
designs that have a hammer, regardless of whether it acts hidden or visible. The frame
may also include the flipper safety, the grip safety and the magazine safety, as well as the
slide catch, as applicable.
Magazine: This is the device that houses the cartridges that will be fed into the pistol
during operation. It can be located on the grip (most) or in front of the trigger guard, and be
removable or fixed. There are double-row and single-row chargers.
Barrel: A steel tube, movable or fixed, which may have conventional (striped) or
polygonal rifling on its interior (bore).
Recoil spring: This is the spring that returns the slide, which when moving forward will
drag a new cartridge, presented by the magazine lift plate, feeding the chamber. They are
generally helical type, but there are also flat strap models. It can be located under, around
or on the barrel. The guide on which it moves in some cases protrudes from in front of the
slide and serves as a housing for the recoil buffer and the “unloading” ramp.
Sear: This is the piece that holds the hammer when it is mounted or in the intermediate
position, in models that have this type of safety. In the case of shuttle percussion, the firing
pin is retained by hooking it by its lower lug. When the trigger is pulled, the intermediate
rod will push or pull the sear, releasing the hammer or firing pin, retained as the case may
be.
Disconnector (Disconnector): Its function is to disconnect or interrupt the contact
Banking specialization 102
between the sear and the trigger transfer rod, during the recoil of the slide, keeping them
isolated until the former completes its return forward. Its performance is crucial, preventing
burst discharge and acting as a closing lock.
Ejector or ejector (Ejector): Releases the sleeve from the extractor claw, ejecting it
through the open window in the slide during recoil.
Slide stop: Not all pistols have it. They hold the slide back after the last shot, leaving the
action open and serving as an indicator of depleted charge.
Thumb safety: A thumb-friendly control mobilizes the mechanical safety device, which
when placed on the frame, can block the trigger or hammer and/or sear, preventing
accidental firing. When it appears on the slide, it locks and/or protects the firing pin. There
are slide locks, grip locks, trigger locks, magazine locks, etc., according to the
particularities of each brand or model.
Firing pin safety: Does not release the firing pin until the trigger is fully depressed. Very in
vogue today.
Magazine safety: Does not enable the firing system until the magazine is seated in its
place. This is a very useful security scheme for laymen and the absent-minded.
Hand safety: Puts the trigger into battery when its button or lever is pressed when
gripping. It can be on the front or back of the grip.