In a climate where the use, and threat to use, Improvised Explosive Devices (IED’s) has become prevalent, searching is the primary weapon in locating the device before it can be activated.
Searching in this context has to be seen as a proactive response to the threat.
The two key areas, in which, searching is conducted are;
• Proactive searching of people, vehicles and facilities during periods of heightened threat
• In response to a threat via telephone, email or written claim that a device has been planted/placed, within a facility.
This document details the policies and procedures for carrying out searching, commensurate to the different levels of threat. They can be broken down into the following headings.
• Location specific searching i.e. Access points, Buildings.
• Open area searching
• Perimeter searching
2. Code of Conduct
It is fundamental that all parties involved in maintaining the integrity of the facilities buy into the adoption of and the practical measures used in the security operations. To establish confidence in the staff performing their tasks and to raise the morale of the same staff, everyone must know the part they have to play.
The manning of security falls under that of the Supernumerary Police (SPY Police) and as such they have a clearly defined role and chain of command laid down in Nigerian Law. Section !8 Police Act 1943 (as revised 1990) see appendix 1
The use of searching by the SPY is authorised by the powers laid down in Nigerian Law, this states, clearly that they hold the powers, privileges and immunities of a Police Officer. Section 18(3) (c) Police Act 1943 (as revised 1990) and as such gives them the powers to detain and search under Section 29 Police Act 1943 (as revised 1990) see appendix 1
To prevent any interference in the SPY, carrying out of their duties to the fullest extent....