SlideShare uma empresa Scribd logo
1 de 11
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal




 HOW TO ENHANCE BETTER SECURITY
FOR YOURSELF AND YOUR VALUABLES?




A BASIC GUIDELINE FOR YOUR PERSONAL SECURITY
                        SECURITY MANUAL PREPARED BY:

       RAJ K PANDEY, MBS, MA (RURAL DEVELOPMENT)
                              JAWALAKHEL, LALITPUR
                                 GPO BOX: 19862
                                KAHTMANDU, NEPAL
                               Mobile: 977-01-98510 86884
rajkpandey2000@hotmail.com, rajkpandey2000@yahoo.com, rajkpandey2000@gmail.com



Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com      1
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal


SECURITY: BASIC GUIDELINES

      The purpose of the security and safety guidelines is to deter or stop intrusion, and to
       delay attack. The focus of this is on residential protection.

      Site protection starts with site selection. Site selection should be based on the agency’s
       security strategy.

      While looking for residence it is useful to observe what security measures the local
       community take: barred windows, security fences, exterior lighting, guards and dogs.

      Note what security measures are commonly accepted and, therefore, will not look out of
       place if implemented by the agency.

      The residence should be closer to the office to avoid travel risks and save time.

      Once selected, it is important to continually assess and re-evaluate the suitability of a
       particular site in the context of changing circumstances. The most common criteria are
       location (access/logistics), floor space, and price. From a security point of view, however,
       you will need to take into account other criteria, such as:

           1.   What are the known or potential natural and man-made threats?
           2.   What are physical strengths/weak points of the site from a security point of view?
           3.   Which deficiencies can you live with/improve?
           4.   Will physical improvements be allowed by owner; which improvements will cost
                most, and are they affordable?

SECURITY: APARTMENT SELECTION

      It can be more difficult for an intruder to gain access to an apartment than a single
       dwelling, especially one on a higher floor.

      Avoid apartments on the first or second floor which can be accessed from the street,
       trees, tall vehicles, or porch roofs. Objects can also be accurately thrown up to second
       floor.

      Avoid apartments above the reach of the local rescue services.

      Access to an apartment must be well controlled by a door-keeper, locks, electronic
       devices, or similar objects.

SECURITY: RESIDENCE SELECTION

      Do not take house which is located near government office, security forces installation,
       Campus/university and near the busy market area/bus stop.
      Do not take house which is located near factory/industry.
      As far as possible avoid adjoining houses.
      Do not take house which is located in an isolated area (very few houses).
      Be careful about the road situation between your work site, organization and residence.



Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com         2
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal


   Are there enough lights for night or not? Volume of traffic movement/Are there bushes or
    thick vegetation or not.
SECURITY: LOCALITY AND NEIGHBORHOODS

      What sort of neighborhood are you in? Are most people local residents or does the area
       has workers coming in daily from elsewhere or other places?

      The more local the population in the vicinity, the more difficult it will be for outsiders to
       watch you and/or carry out an attack on you or your property.

           1. What local authority and rescue services are there in the area?
           2. Where is the nearest fire station and the police posts?
           3. Where are the hospitals
           4. Where are the bus stations
           5. Find out if there is a police patrol and which are the regularly patrolled areas.
           6. Consider the potential vulnerabilities of the neighborhood:

      Military Activity: Are there military installations and any government buildings and/or
       important socioeconomic targets?

      Political Unrest: Demonstrations are likely to turn against the government buildings. A
       university area may be susceptible to student unrest; a market place can be a target for a
       terrorist attack.

      Social Crimes: Is the area and neighborhood susceptible to criminal activities?

      Residence Owner: Try to find out more about landlord, his/her occupation, social
       background, possible role in the local community, political affiliation, etc.

      You do not want to rent a house/apartment from a person involved in suspicious dealings,
       someone who is politically prominent or who is a leader (family member) of a group that
       is involved in the conflict.

      Perimeter Security: The outer perimeter is usually the property line marking the extent
       of the site. The inner perimeter is usually the exterior of buildings within site of
       residence. The actual building or flat constitutes the ‘inner perimeter’ the compound
       walls or larger grounds in which it is set the ‘outer perimeter’.

      Do some scenario thinking and even role-play: put yourself in the shoes of a potential
       attacker and study the site for its weak points.

SECURITY: OUTER PERIMETER

      If the approach to the site is full of vegetation have it trimmed or removed where it offers
       hiding places for an assailant.

      A wall at least 2.5 meters high increases the protection of the compound. You can top this
       with barbed wire or iron pickets. A more ‘modest’ version could be broken glass on top.




Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com          3
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal


      If there are trees on the outside, by which the wall can be scaled, you will need to do
       something about the trees or the wall at these points.

      Consider Gates: high walls are little use, if the gate is a weak point because it is easy to
       scale or is only closed with a padlock and chain, either of which can be broken quickly.

      Improved lighting is likely to reduce certain risks. In the absence of electricity or if there
       are regular power cuts, you could consider the strategic placement of some hurricane
       lanterns, if there is a guard to monitor them.

      Dogs can be an excellent early warning help and often a deterrent. Get a proper guard
       dog, not a pet that sleeps all the time.

      Guards are commonly used at residences, warehouses and for agency offices. Security
       guards should be hired from a reliable and professional security company.

      They supply trained and professional guards and to some extend take the responsibility of
       the incident if the incident has taken place due to the negligence of deployed guard.

      Parking Vehicles: Where there is the threat of vandalism and car theft vehicles must be
       parked in the compound at all the times. Make sure there are enough parking spaces when
       you select your site.

      Inner Perimeter: Walk around building with an eye of an intruder and find weak spots.

      All entrance doors need to be strong. The strength of a door, however, also depends on its
       frame and hinges.

      Avoid or replace doors which have any glass, but do install an optical viewer (peephole)
       and a primary and auxiliary lock on outer doors. On the inside install a safety chain and a
       sliding dead bolt or strong bar across the door.

      Heavy duty padlocks on the inside, at the top and bottom of the door, are an additional
       means of creating a ‘safe house’.

      Windows can be protected with bars, grills, or shutters, at all floors.

      Check whether it is possible to enter the house using other outer parts of a building or
       not.

      Don’t place a panic button and the telephone close to the entrance door where an intruder
       could block your access to them.

      You also need fire extinguishers: at least one in the kitchen and one on every floor.

      At night, routinely close curtains to make it difficult to observe who and how many are
       inside. When going out, leave a light on to give the impression that someone is in.

      Regularly check that all locks and bolts, etc, are in good working order and routinely lock
       everything as night falls or before going to bed. Limit the number of keys available and
       closely control who has access to them.


Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com           4
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal




      Master Bedroom: should be strongly built to deny access to intruders and to gain time
       for reinforcement during Break-In. It should have a reinforced door and protected
       windows. It should have a telephone and a list of numbers, torchlight or candles/matches.
      Master Keys: Locks and keys are only useful when tightly managed. The number of
       keys and access to them, must be tightly controlled. If in doubt, locks should be changed!
       Keys should be identified, generally in code.

      All personnel with keys, including household staff, should be clearly instructed that:

           1. keys should be carried on the person and not left on desks, car or in unattended
              coats or bags
           2. Keys should never be allowed to be duplicated.
           3. Locks should be immediately replaced if the keys get lost.

SECURITY: HOTEL ACCOMMODATION

      When you have to check into a hotel in an area where you don’t know the threats, do not
       simply accept the rooms. Check its location and the access points (doors/windows) from
       a security point of view.

      Factors that are likely to increase vulnerability to burglary, robbery, or sexual assault are:

           1. A room at ground floor, especially with a covered (e.g. from vegetation);
           2. A room at upper floor level close to a fire escape or service stairs that are
           3. A room at the end of a long corridor away from the main movements of hotel
              personnel, where suspicious noises from inside are less likely to attract attention;
           4. A room with a door that can easily be forced and no security lock/security chain;
           5. a room with a window that is easily forced, especially when at ground floor level;
           6. A room without good curtains that can conceal who is inside, and without a
              functioning telephone to hotel security;
           7. A hotel without guards or poorly guarded and a hotel without night-service at the
              reception desk to respond to an emergency call;
           8. Admitting into your room someone you don’t know well, for example, somebody
              you met during day and who drove you to the hotel.

SECURITY: DOMESTIC STAFF

      If you hire domestic staff then their security and your security are closely linked. It is
       important to have confidence in each other, especially if working together in an insecure
       environment. Hired/recruit staff who have been employed and recommended by a friend,
       a reputable agency or neighbor.

      Take time to check references with referees concerned. Keep a Xerox copy of citizenship
       card of Household staff with yourself.

      They should not let unknown people in, give information to unknown phone callers, give
       details about the residence layout, or allow their keys to be duplicated etc.




Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com            5
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal


      They need careful instructions about how to respond in different scenarios, and how to
       report anything unusual immediately.

      All domestic staff should be briefed on security procedures and updated as circumstances
       change which covers:
           1. Security related responsibilities.
           2. Maintaining security awareness.
           3. Incident response and reporting procedures.
           4. Emergency telephone numbers or use of a radio in an emergency.

      Avoid discussing security sensitive issues that could be overheard by the domestic staff
       unless of direct relevance to the staff.

SECURITY: GENERAL SITUATION

      Do not answer any questions regarding yourself with the strangers.

      Apologize that you are not allowed to give away any information about your residence,
       profession and work place.

      Be vigilant to the suspected strangers. (You don’t know who is police, political party,
       journalist, Maoist, Nepal Government and others).

      If it seems like there is s a ‘bandh’ or there is no alternative transport, return home
       immediately and inform your immediate supervisor as soon as possible.

      If your car/taxi/vehicle gets caught in a chukka jam or demonstration you should close all
       the windows, make sure the door is locked and sit away from the windows.

      If necessary sit on the floor and keep your head down and do not attempt to leave the car.

      Stay calm until the trouble clears. Do not leave the car unless you are forced to by
       someone. If you do have to leave the car/taxi, try to find a safe place and don’t leave.

      Always have enough cash for using a taxi in an emergency.

      You should know which evacuation group they are in and with which staff.

      If evacuating -walk quickly but together and keep calm and do not shout loudly.

      Ensure that you have the emergency information including telephone list at home.

SECURITY: LOCAL FESTIVALS

      Firecrackers may be a cause of fire in the houses that may physically hurt the person
       particularly injuries in the eyes and ears.

      Hence, keep yourself in a far distance from it. Moreover, the unsocial criminal elements
       may use real explosive devices for their vested interest and to deceive the security forces.
       A number of fire-crackers may be set into fire and minor explosions can be observed


Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com         6
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal


       during Deepawali festival, mainly in night, throughout the urban areas of Nepal and India
       to celebrate the festival.

      Gambling takes place in every nook and corner of the city. Do not play gambling in the
       public places with the unknown persons.
      They may economically deceive you and later on, blackmail you. And, they may come up
       aggressively to fight in case of loosing. Moreover, Security Personnel may raid gambling
       places, which is operated illegally. Hence, avoid such gambling in the public places.

      Drinking culture can be observed common in houses and public places during festival
       period. It may be a cause of quarrel and gang fight which may turn into serious incidents
       that may even lead to the difficult circumstances. You, therefore, are advised to avoid
       drinking culture at public places such as local bars.

      Traffic accident cases increase in the city areas due to alcohol consumptions. Always be
       conscious while crossing the road or if you are on the wheel, maintain proper speed as
       other drunkard drivers may collide with your car and create problem with you.

      Musical and dancing groups visit your houses for fund raising purpose and playing
       Deunshi-Bhailo (traditional singing/dancing) particularly at night. Do not let them enter
       into your apartments since some of these groups may be an unsocial criminal element,
       entered into your house in a disguised form with wrong motives.

      The same unknown group may spy your house thoroughly for the future theft. If your
       local friends come to your house to enjoy with you, you can play with them in a gentle
       manner for only short period. And, for unknown group, ask you domestic helpers to
       directly deal them by donating some money.

      Cases of theft, robbery, pick pocketing, snatching, looting, gang fighting, night
       movements, etc. increases during festival period. Deepawali/Tihar, which is a joy
       making, entertainment and socio-cultural festival when people need huge amount of
       money. Hence, to celebrate it, people attempt to make money by any means – hooks or
       crooks. We, therefore, advice you to be more alert to protect yourself and valuable
       properties.

      Ladies may be sexually harassed by an alcoholic young group. Alcoholic driven persons
       loose their consciousness and forget basic social norms who may commit any unsocial
       criminal activities due to alcohol. You, therefore, are recommended to adopt the local
       culture and customs i.e. do not physically expose yourself in front of youth.

SECURITY: OVERALL SITUATION

      Ensure that you have all emergency telephone numbers in your wallet.

      Ensure that your have most important documents - Passport, ID Card, Visas, TCs,
       Cheques are valid/safe.

      Ensure that you have proper records of rental contract, payment/deposit.




Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com      7
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal


      Always understand that personal security is a matter of an individual
       responsibility. The security risk can be reduced by using common sense.

      The best way to be safe is to avoid trouble in the prior rather than try to guilty
       after incidents took place.

      If your intuitions realize and feel uncomfortable and unsafe about a location and a
       situation, leave that place immediately.

      Learn to notice details about the people in the event of an incident.

      Always know where you are going otherwise you may reach to the different
       place. Always demonstrate a confidence you may not feel.

      Become knowledgeable about your neighborhoods. Where is the nearest police
       station? Where is the telephone available?

      Establish several routes to work and vary your selection and time you depart for
       work and return home.

      Be alert to evidence of surveillance of your house and travel route.

      When you encounter with a risky situation, you may subconsciously either fight
       or flight. But know your own physical strengths and ability. Be honest with
       yourself and be aware of your capabilities to face.

      Call attention to yourself if you are in danger. Shout or blow the horn.

      At a new duty station find out about customs, how to behave, potential threats and
       areas to be avoided.

      Learn basic phrases in local dialects to signal your need for help.

      Remember that your life is not worth losing for material possession.

      Always ignore unusual and strange circumstances and persons.

      Be sure that doors and locks are strong and lock them even if you are at home.

      Make sure that your entrance and compound areas are well lit.

      Make sure that you have a possible fire extinguisher at your residence.

      Check the background information of your home-service providers.

      Place telephones away from windows/doors through which you can be observed.



Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com      8
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal




      Be aware of an unexpected visitor, especially after dark.

      Trimming of bushes and trees close to the house, where might hide an intruder.

      Always check security situations of the areas in which you are traveling.
      Be careful during your movements that the travelers are exposed to the particular
       risk, as they are known to be carrying money and valuables.

      Before you leave your home, let someone know your plans. Leave contact
       numbers. If you change plans, let someone know.

      Stay in a larger hotels, which have more elaborate security.

      If you are attending a conference, remove your nametag as soon as possible to
       avoid being identified.

      Put your wallet in a front pocket or under clothing and carry only the cash you
       need and divide it.

      Keep only those keys on your key chain that you use.

      Mark you keys so that they can be identified in the dark quickly.

      Before getting into car, look inside to make sure that no one is hiding in back seat.

      Act neutral and be a good listener to your captors if you are kidnapped.

      Build rapport with captors. Find areas of mutual interests such as entertainment
       and personal issues rather than political interests.

      Encourage captors to let authorities know your whereabouts/conditions.

      Do not physically fight with the criminal.

      Do not give confidential personal information via phone.

      Do not leave your children in public and crowded areas along.

      Do not accept package, parcel or letters from people you do not know.

      Do not beg, cry, plead and threaten in front of the captors in case of kidnap.

      If hostage takers are attempting to conceal their identity, give no indication that
       you recognize them.




Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com      9
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal


      Do not make threats against hostage takers that you would testify against theme.

      Do not speak unless spoken to and then only when necessary with captors.

      Do not say anything to arouse the hostility of your captors, if you are in
       abduction.

      Do not offer assistance to someone that may appear to be trouble later.

      Do not have you name and address on your key chain.

      Do not talk to stranger mainly on sensitive issues – politics, sex, religions, casts
       and creeds, and burning matter of the nation.

      Do not take shortcuts through isolated risky areas particularly at night.

      Do not juggle your keys in your which announces that you are on you way.

      Do not make any logical arguments with the criminals. Remember that they may
       be totally illiterate, wrongly motivated with weapon on hands.

      If someone knocks on your door, assume the person is who s/he claims to be, call
       someone to double check.

      Do not sleep with your windows open unless they have secured bars.

      Do not enter your room if you find door open and ask someone to accompany.

      Do not leave tools for criminals to use against you where they can find them.

      Do not establish routines as they may predict for any moment as observer.

      Do not display cash, keys and valuables as this may attract potential robbers.

      Do not put your name on a mailbox or on a gatepost.

      Do not place yourself in situations that may be expected to attract threats such as
       political rallies and do not unnecessarily venture in night.


Security Manual Prepared By:

Raj K PANDEY, MBA, MA (Rural Development)
Jawalakhle, Lalitpur
GPO BOX: 19862, Kathmandu, Nepal
Mobile: 977-01-98510-86884
rajkpandey2000@hotmail.com


Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com      10
Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal


rajkpandey2000@yahoo.com
rajkpandey2000@gmail.com




Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com      11

Mais conteúdo relacionado

Mais de rajkpandey2000

Basic security in the field certificate raj kumar pandey
Basic security in the field certificate   raj kumar pandeyBasic security in the field certificate   raj kumar pandey
Basic security in the field certificate raj kumar pandeyrajkpandey2000
 
The Power Of Positive Words
The  Power Of  Positive WordsThe  Power Of  Positive Words
The Power Of Positive Wordsrajkpandey2000
 
4 Humor Of Poverty With Music
4 Humor Of  Poverty With Music4 Humor Of  Poverty With Music
4 Humor Of Poverty With Musicrajkpandey2000
 
5 First World And Poverty
5 First  World And  Poverty5 First  World And  Poverty
5 First World And Povertyrajkpandey2000
 
5 First World And Poverty
5 First  World And  Poverty5 First  World And  Poverty
5 First World And Povertyrajkpandey2000
 
6 Good Governance After 1990 In Nepal
6 Good  Governance After 1990 In  Nepal6 Good  Governance After 1990 In  Nepal
6 Good Governance After 1990 In Nepalrajkpandey2000
 
6 Good Governance After 1990 In Nepal
6 Good  Governance After 1990 In  Nepal6 Good  Governance After 1990 In  Nepal
6 Good Governance After 1990 In Nepalrajkpandey2000
 
10 Review Of Tenth Plan In Nepal
10 Review Of  Tenth  Plan In  Nepal10 Review Of  Tenth  Plan In  Nepal
10 Review Of Tenth Plan In Nepalrajkpandey2000
 
13 Project Monitoring And Evaluation
13 Project  Monitoring And  Evaluation13 Project  Monitoring And  Evaluation
13 Project Monitoring And Evaluationrajkpandey2000
 
14 Sonny Cammera Take Your Photos
14 Sonny  Cammera Take  Your  Photos14 Sonny  Cammera Take  Your  Photos
14 Sonny Cammera Take Your Photosrajkpandey2000
 
14 Sonny Cammera Take Your Photos
14 Sonny  Cammera Take  Your  Photos14 Sonny  Cammera Take  Your  Photos
14 Sonny Cammera Take Your Photosrajkpandey2000
 
16 Think Positive With Music
16 Think  Positive With Music16 Think  Positive With Music
16 Think Positive With Musicrajkpandey2000
 
My Proposal As Of 2011
My  Proposal As Of 2011My  Proposal As Of 2011
My Proposal As Of 2011rajkpandey2000
 
1 My Detaile Marriage Proposal
1 My  Detaile  Marriage  Proposal1 My  Detaile  Marriage  Proposal
1 My Detaile Marriage Proposalrajkpandey2000
 
03 C Extra Profile Raj
03 C Extra  Profile Raj03 C Extra  Profile Raj
03 C Extra Profile Rajrajkpandey2000
 

Mais de rajkpandey2000 (20)

Basic security in the field certificate raj kumar pandey
Basic security in the field certificate   raj kumar pandeyBasic security in the field certificate   raj kumar pandey
Basic security in the field certificate raj kumar pandey
 
The Power Of Positive Words
The  Power Of  Positive WordsThe  Power Of  Positive Words
The Power Of Positive Words
 
4 Humor Of Poverty With Music
4 Humor Of  Poverty With Music4 Humor Of  Poverty With Music
4 Humor Of Poverty With Music
 
5 First World And Poverty
5 First  World And  Poverty5 First  World And  Poverty
5 First World And Poverty
 
5 First World And Poverty
5 First  World And  Poverty5 First  World And  Poverty
5 First World And Poverty
 
6 Good Governance After 1990 In Nepal
6 Good  Governance After 1990 In  Nepal6 Good  Governance After 1990 In  Nepal
6 Good Governance After 1990 In Nepal
 
6 Good Governance After 1990 In Nepal
6 Good  Governance After 1990 In  Nepal6 Good  Governance After 1990 In  Nepal
6 Good Governance After 1990 In Nepal
 
10 Review Of Tenth Plan In Nepal
10 Review Of  Tenth  Plan In  Nepal10 Review Of  Tenth  Plan In  Nepal
10 Review Of Tenth Plan In Nepal
 
13 Project Monitoring And Evaluation
13 Project  Monitoring And  Evaluation13 Project  Monitoring And  Evaluation
13 Project Monitoring And Evaluation
 
14 Sonny Cammera Take Your Photos
14 Sonny  Cammera Take  Your  Photos14 Sonny  Cammera Take  Your  Photos
14 Sonny Cammera Take Your Photos
 
14 Sonny Cammera Take Your Photos
14 Sonny  Cammera Take  Your  Photos14 Sonny  Cammera Take  Your  Photos
14 Sonny Cammera Take Your Photos
 
15 Poverty Discourse
15 Poverty  Discourse15 Poverty  Discourse
15 Poverty Discourse
 
16 Think Positive With Music
16 Think  Positive With Music16 Think  Positive With Music
16 Think Positive With Music
 
17 We Can Do
17  We  Can  Do17  We  Can  Do
17 We Can Do
 
For Facebook
For  FacebookFor  Facebook
For Facebook
 
My Proposal As Of 2011
My  Proposal As Of 2011My  Proposal As Of 2011
My Proposal As Of 2011
 
1 My Detaile Marriage Proposal
1 My  Detaile  Marriage  Proposal1 My  Detaile  Marriage  Proposal
1 My Detaile Marriage Proposal
 
1 Bio Data Raj
1 Bio Data Raj1 Bio Data Raj
1 Bio Data Raj
 
03 C Extra Profile Raj
03 C Extra  Profile Raj03 C Extra  Profile Raj
03 C Extra Profile Raj
 
18 Identity Cards
18 Identity  Cards18 Identity  Cards
18 Identity Cards
 

Último

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 

Último (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 

34 concise basic security guidlines and manual

  • 1. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal HOW TO ENHANCE BETTER SECURITY FOR YOURSELF AND YOUR VALUABLES? A BASIC GUIDELINE FOR YOUR PERSONAL SECURITY SECURITY MANUAL PREPARED BY: RAJ K PANDEY, MBS, MA (RURAL DEVELOPMENT) JAWALAKHEL, LALITPUR GPO BOX: 19862 KAHTMANDU, NEPAL Mobile: 977-01-98510 86884 rajkpandey2000@hotmail.com, rajkpandey2000@yahoo.com, rajkpandey2000@gmail.com Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 1
  • 2. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal SECURITY: BASIC GUIDELINES  The purpose of the security and safety guidelines is to deter or stop intrusion, and to delay attack. The focus of this is on residential protection.  Site protection starts with site selection. Site selection should be based on the agency’s security strategy.  While looking for residence it is useful to observe what security measures the local community take: barred windows, security fences, exterior lighting, guards and dogs.  Note what security measures are commonly accepted and, therefore, will not look out of place if implemented by the agency.  The residence should be closer to the office to avoid travel risks and save time.  Once selected, it is important to continually assess and re-evaluate the suitability of a particular site in the context of changing circumstances. The most common criteria are location (access/logistics), floor space, and price. From a security point of view, however, you will need to take into account other criteria, such as: 1. What are the known or potential natural and man-made threats? 2. What are physical strengths/weak points of the site from a security point of view? 3. Which deficiencies can you live with/improve? 4. Will physical improvements be allowed by owner; which improvements will cost most, and are they affordable? SECURITY: APARTMENT SELECTION  It can be more difficult for an intruder to gain access to an apartment than a single dwelling, especially one on a higher floor.  Avoid apartments on the first or second floor which can be accessed from the street, trees, tall vehicles, or porch roofs. Objects can also be accurately thrown up to second floor.  Avoid apartments above the reach of the local rescue services.  Access to an apartment must be well controlled by a door-keeper, locks, electronic devices, or similar objects. SECURITY: RESIDENCE SELECTION  Do not take house which is located near government office, security forces installation, Campus/university and near the busy market area/bus stop.  Do not take house which is located near factory/industry.  As far as possible avoid adjoining houses.  Do not take house which is located in an isolated area (very few houses).  Be careful about the road situation between your work site, organization and residence. Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 2
  • 3. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal Are there enough lights for night or not? Volume of traffic movement/Are there bushes or thick vegetation or not. SECURITY: LOCALITY AND NEIGHBORHOODS  What sort of neighborhood are you in? Are most people local residents or does the area has workers coming in daily from elsewhere or other places?  The more local the population in the vicinity, the more difficult it will be for outsiders to watch you and/or carry out an attack on you or your property. 1. What local authority and rescue services are there in the area? 2. Where is the nearest fire station and the police posts? 3. Where are the hospitals 4. Where are the bus stations 5. Find out if there is a police patrol and which are the regularly patrolled areas. 6. Consider the potential vulnerabilities of the neighborhood:  Military Activity: Are there military installations and any government buildings and/or important socioeconomic targets?  Political Unrest: Demonstrations are likely to turn against the government buildings. A university area may be susceptible to student unrest; a market place can be a target for a terrorist attack.  Social Crimes: Is the area and neighborhood susceptible to criminal activities?  Residence Owner: Try to find out more about landlord, his/her occupation, social background, possible role in the local community, political affiliation, etc.  You do not want to rent a house/apartment from a person involved in suspicious dealings, someone who is politically prominent or who is a leader (family member) of a group that is involved in the conflict.  Perimeter Security: The outer perimeter is usually the property line marking the extent of the site. The inner perimeter is usually the exterior of buildings within site of residence. The actual building or flat constitutes the ‘inner perimeter’ the compound walls or larger grounds in which it is set the ‘outer perimeter’.  Do some scenario thinking and even role-play: put yourself in the shoes of a potential attacker and study the site for its weak points. SECURITY: OUTER PERIMETER  If the approach to the site is full of vegetation have it trimmed or removed where it offers hiding places for an assailant.  A wall at least 2.5 meters high increases the protection of the compound. You can top this with barbed wire or iron pickets. A more ‘modest’ version could be broken glass on top. Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 3
  • 4. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal  If there are trees on the outside, by which the wall can be scaled, you will need to do something about the trees or the wall at these points.  Consider Gates: high walls are little use, if the gate is a weak point because it is easy to scale or is only closed with a padlock and chain, either of which can be broken quickly.  Improved lighting is likely to reduce certain risks. In the absence of electricity or if there are regular power cuts, you could consider the strategic placement of some hurricane lanterns, if there is a guard to monitor them.  Dogs can be an excellent early warning help and often a deterrent. Get a proper guard dog, not a pet that sleeps all the time.  Guards are commonly used at residences, warehouses and for agency offices. Security guards should be hired from a reliable and professional security company.  They supply trained and professional guards and to some extend take the responsibility of the incident if the incident has taken place due to the negligence of deployed guard.  Parking Vehicles: Where there is the threat of vandalism and car theft vehicles must be parked in the compound at all the times. Make sure there are enough parking spaces when you select your site.  Inner Perimeter: Walk around building with an eye of an intruder and find weak spots.  All entrance doors need to be strong. The strength of a door, however, also depends on its frame and hinges.  Avoid or replace doors which have any glass, but do install an optical viewer (peephole) and a primary and auxiliary lock on outer doors. On the inside install a safety chain and a sliding dead bolt or strong bar across the door.  Heavy duty padlocks on the inside, at the top and bottom of the door, are an additional means of creating a ‘safe house’.  Windows can be protected with bars, grills, or shutters, at all floors.  Check whether it is possible to enter the house using other outer parts of a building or not.  Don’t place a panic button and the telephone close to the entrance door where an intruder could block your access to them.  You also need fire extinguishers: at least one in the kitchen and one on every floor.  At night, routinely close curtains to make it difficult to observe who and how many are inside. When going out, leave a light on to give the impression that someone is in.  Regularly check that all locks and bolts, etc, are in good working order and routinely lock everything as night falls or before going to bed. Limit the number of keys available and closely control who has access to them. Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 4
  • 5. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal  Master Bedroom: should be strongly built to deny access to intruders and to gain time for reinforcement during Break-In. It should have a reinforced door and protected windows. It should have a telephone and a list of numbers, torchlight or candles/matches.  Master Keys: Locks and keys are only useful when tightly managed. The number of keys and access to them, must be tightly controlled. If in doubt, locks should be changed! Keys should be identified, generally in code.  All personnel with keys, including household staff, should be clearly instructed that: 1. keys should be carried on the person and not left on desks, car or in unattended coats or bags 2. Keys should never be allowed to be duplicated. 3. Locks should be immediately replaced if the keys get lost. SECURITY: HOTEL ACCOMMODATION  When you have to check into a hotel in an area where you don’t know the threats, do not simply accept the rooms. Check its location and the access points (doors/windows) from a security point of view.  Factors that are likely to increase vulnerability to burglary, robbery, or sexual assault are: 1. A room at ground floor, especially with a covered (e.g. from vegetation); 2. A room at upper floor level close to a fire escape or service stairs that are 3. A room at the end of a long corridor away from the main movements of hotel personnel, where suspicious noises from inside are less likely to attract attention; 4. A room with a door that can easily be forced and no security lock/security chain; 5. a room with a window that is easily forced, especially when at ground floor level; 6. A room without good curtains that can conceal who is inside, and without a functioning telephone to hotel security; 7. A hotel without guards or poorly guarded and a hotel without night-service at the reception desk to respond to an emergency call; 8. Admitting into your room someone you don’t know well, for example, somebody you met during day and who drove you to the hotel. SECURITY: DOMESTIC STAFF  If you hire domestic staff then their security and your security are closely linked. It is important to have confidence in each other, especially if working together in an insecure environment. Hired/recruit staff who have been employed and recommended by a friend, a reputable agency or neighbor.  Take time to check references with referees concerned. Keep a Xerox copy of citizenship card of Household staff with yourself.  They should not let unknown people in, give information to unknown phone callers, give details about the residence layout, or allow their keys to be duplicated etc. Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 5
  • 6. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal  They need careful instructions about how to respond in different scenarios, and how to report anything unusual immediately.  All domestic staff should be briefed on security procedures and updated as circumstances change which covers: 1. Security related responsibilities. 2. Maintaining security awareness. 3. Incident response and reporting procedures. 4. Emergency telephone numbers or use of a radio in an emergency.  Avoid discussing security sensitive issues that could be overheard by the domestic staff unless of direct relevance to the staff. SECURITY: GENERAL SITUATION  Do not answer any questions regarding yourself with the strangers.  Apologize that you are not allowed to give away any information about your residence, profession and work place.  Be vigilant to the suspected strangers. (You don’t know who is police, political party, journalist, Maoist, Nepal Government and others).  If it seems like there is s a ‘bandh’ or there is no alternative transport, return home immediately and inform your immediate supervisor as soon as possible.  If your car/taxi/vehicle gets caught in a chukka jam or demonstration you should close all the windows, make sure the door is locked and sit away from the windows.  If necessary sit on the floor and keep your head down and do not attempt to leave the car.  Stay calm until the trouble clears. Do not leave the car unless you are forced to by someone. If you do have to leave the car/taxi, try to find a safe place and don’t leave.  Always have enough cash for using a taxi in an emergency.  You should know which evacuation group they are in and with which staff.  If evacuating -walk quickly but together and keep calm and do not shout loudly.  Ensure that you have the emergency information including telephone list at home. SECURITY: LOCAL FESTIVALS  Firecrackers may be a cause of fire in the houses that may physically hurt the person particularly injuries in the eyes and ears.  Hence, keep yourself in a far distance from it. Moreover, the unsocial criminal elements may use real explosive devices for their vested interest and to deceive the security forces. A number of fire-crackers may be set into fire and minor explosions can be observed Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 6
  • 7. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal during Deepawali festival, mainly in night, throughout the urban areas of Nepal and India to celebrate the festival.  Gambling takes place in every nook and corner of the city. Do not play gambling in the public places with the unknown persons.  They may economically deceive you and later on, blackmail you. And, they may come up aggressively to fight in case of loosing. Moreover, Security Personnel may raid gambling places, which is operated illegally. Hence, avoid such gambling in the public places.  Drinking culture can be observed common in houses and public places during festival period. It may be a cause of quarrel and gang fight which may turn into serious incidents that may even lead to the difficult circumstances. You, therefore, are advised to avoid drinking culture at public places such as local bars.  Traffic accident cases increase in the city areas due to alcohol consumptions. Always be conscious while crossing the road or if you are on the wheel, maintain proper speed as other drunkard drivers may collide with your car and create problem with you.  Musical and dancing groups visit your houses for fund raising purpose and playing Deunshi-Bhailo (traditional singing/dancing) particularly at night. Do not let them enter into your apartments since some of these groups may be an unsocial criminal element, entered into your house in a disguised form with wrong motives.  The same unknown group may spy your house thoroughly for the future theft. If your local friends come to your house to enjoy with you, you can play with them in a gentle manner for only short period. And, for unknown group, ask you domestic helpers to directly deal them by donating some money.  Cases of theft, robbery, pick pocketing, snatching, looting, gang fighting, night movements, etc. increases during festival period. Deepawali/Tihar, which is a joy making, entertainment and socio-cultural festival when people need huge amount of money. Hence, to celebrate it, people attempt to make money by any means – hooks or crooks. We, therefore, advice you to be more alert to protect yourself and valuable properties.  Ladies may be sexually harassed by an alcoholic young group. Alcoholic driven persons loose their consciousness and forget basic social norms who may commit any unsocial criminal activities due to alcohol. You, therefore, are recommended to adopt the local culture and customs i.e. do not physically expose yourself in front of youth. SECURITY: OVERALL SITUATION  Ensure that you have all emergency telephone numbers in your wallet.  Ensure that your have most important documents - Passport, ID Card, Visas, TCs, Cheques are valid/safe.  Ensure that you have proper records of rental contract, payment/deposit. Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 7
  • 8. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal  Always understand that personal security is a matter of an individual responsibility. The security risk can be reduced by using common sense.  The best way to be safe is to avoid trouble in the prior rather than try to guilty after incidents took place.  If your intuitions realize and feel uncomfortable and unsafe about a location and a situation, leave that place immediately.  Learn to notice details about the people in the event of an incident.  Always know where you are going otherwise you may reach to the different place. Always demonstrate a confidence you may not feel.  Become knowledgeable about your neighborhoods. Where is the nearest police station? Where is the telephone available?  Establish several routes to work and vary your selection and time you depart for work and return home.  Be alert to evidence of surveillance of your house and travel route.  When you encounter with a risky situation, you may subconsciously either fight or flight. But know your own physical strengths and ability. Be honest with yourself and be aware of your capabilities to face.  Call attention to yourself if you are in danger. Shout or blow the horn.  At a new duty station find out about customs, how to behave, potential threats and areas to be avoided.  Learn basic phrases in local dialects to signal your need for help.  Remember that your life is not worth losing for material possession.  Always ignore unusual and strange circumstances and persons.  Be sure that doors and locks are strong and lock them even if you are at home.  Make sure that your entrance and compound areas are well lit.  Make sure that you have a possible fire extinguisher at your residence.  Check the background information of your home-service providers.  Place telephones away from windows/doors through which you can be observed. Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 8
  • 9. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal  Be aware of an unexpected visitor, especially after dark.  Trimming of bushes and trees close to the house, where might hide an intruder.  Always check security situations of the areas in which you are traveling.  Be careful during your movements that the travelers are exposed to the particular risk, as they are known to be carrying money and valuables.  Before you leave your home, let someone know your plans. Leave contact numbers. If you change plans, let someone know.  Stay in a larger hotels, which have more elaborate security.  If you are attending a conference, remove your nametag as soon as possible to avoid being identified.  Put your wallet in a front pocket or under clothing and carry only the cash you need and divide it.  Keep only those keys on your key chain that you use.  Mark you keys so that they can be identified in the dark quickly.  Before getting into car, look inside to make sure that no one is hiding in back seat.  Act neutral and be a good listener to your captors if you are kidnapped.  Build rapport with captors. Find areas of mutual interests such as entertainment and personal issues rather than political interests.  Encourage captors to let authorities know your whereabouts/conditions.  Do not physically fight with the criminal.  Do not give confidential personal information via phone.  Do not leave your children in public and crowded areas along.  Do not accept package, parcel or letters from people you do not know.  Do not beg, cry, plead and threaten in front of the captors in case of kidnap.  If hostage takers are attempting to conceal their identity, give no indication that you recognize them. Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 9
  • 10. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal  Do not make threats against hostage takers that you would testify against theme.  Do not speak unless spoken to and then only when necessary with captors.  Do not say anything to arouse the hostility of your captors, if you are in abduction.  Do not offer assistance to someone that may appear to be trouble later.  Do not have you name and address on your key chain.  Do not talk to stranger mainly on sensitive issues – politics, sex, religions, casts and creeds, and burning matter of the nation.  Do not take shortcuts through isolated risky areas particularly at night.  Do not juggle your keys in your which announces that you are on you way.  Do not make any logical arguments with the criminals. Remember that they may be totally illiterate, wrongly motivated with weapon on hands.  If someone knocks on your door, assume the person is who s/he claims to be, call someone to double check.  Do not sleep with your windows open unless they have secured bars.  Do not enter your room if you find door open and ask someone to accompany.  Do not leave tools for criminals to use against you where they can find them.  Do not establish routines as they may predict for any moment as observer.  Do not display cash, keys and valuables as this may attract potential robbers.  Do not put your name on a mailbox or on a gatepost.  Do not place yourself in situations that may be expected to attract threats such as political rallies and do not unnecessarily venture in night. Security Manual Prepared By: Raj K PANDEY, MBA, MA (Rural Development) Jawalakhle, Lalitpur GPO BOX: 19862, Kathmandu, Nepal Mobile: 977-01-98510-86884 rajkpandey2000@hotmail.com Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 10
  • 11. Raj K Pandey, MBS, MA (Rural Dev), GPO Box: 19862, Jawalakhel, Lalitpur, Kathmandu, Nepal rajkpandey2000@yahoo.com rajkpandey2000@gmail.com Mobile: 977-01-98510 86884, E-mail: rajkpandey2000@yahoo.com, rajkpandey2000@hotmail.com 11