This page contains a Flash digital edition of a book.
Singapore Police Force disseminates information to registered volunteers on any safety and security development around the country. Volunteers assist police in measures such as crowd and traffic control, evacuation of buildings and locations, and cordon control.


In South Africa, the national police force launched a pilot project in 2007 to train private security personnel in crowd control, securing crime scenes and reporting suspect vehicles. Project participants have since been trained to take part in policing non- emergency situations, notably general crowd control during the 2010 FIFA World Cup.


GRIFFIN WORLDWIDE Continued


counter-terrorism measures, gang crime and evidence preservation. In January 2014 the Royal Canadian Mounted Police (RCMP) launched Operation Securus, an adaptation of the Project Griffin model.


In Singapore, the scheme has been renamed Project Guardian but operates on broadly the same principles. Private security guards are trained and volunteer their service in the event of a major emergency. The


07


In the United States, the New York City Police Department has modelled its NYPD SHIELD program in part on Project Griffin. NYPD SHIELD is best described as an umbrella program for police initiatives relating to counter-terrorism and, like its UK progenitor, it is based on sharing information with private sector security organisations. Business is effectively encouraged to serve as NYPD’s ‘eyes and ears’ in combating terrorism. On a broader level, Operation Nexus is a US-wide network of businesses


dedicated to preventing terrorist attacks against US citizens and property. Members are encouraged to report suspicious business encounters that they suspect may have links to terrorism.


In India, Operation Sahyog began in 2008 in response to the terrorist attacks on Mumbai and draws together financial institutions, security providers and the Anti- Terrorist task force. The project has helped transform the attitude of Indian businesses to security through the adoption of surveillance techniques and risk analysis based on information provided by law enforcement agencies.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16