Private Security Structure Policy 2025
Infrascructure Protection Policy
National Security Framework of Antarctica (NSF-A)
Article 1 — Purpose
1.1 This policy establishes the private security structure of the National Security Framework. It defines officer categories, training requirements, certification standards, records governance, and compliance obligations to ensure private security functions are performed in line with NSF-A legal, operational, and educational standards.
1.2 Foreign or international certifications may inform practice but are not substitutes for NSF-A authorisations under the Domestic Compliance Framework (DCF).
Article 2 — Officer Categories
2.1 Recognised classifications
a) Venue Officer (VO): Entry control, venue protection, crowd management.
b) Manned Guarding Officer (MGO): Guarding of sites, assets, and property.
c) CCTV & Cybersecurity Officer (CCO): Surveillance monitoring, cyber defence, and digital protection.
d) Close Protection Officer (CPO): Personal safety of designated individuals.
e) High Valuable Asset Transfer Officer (HVATO): Secure transport of financial, technological, or strategic assets.
2.2 Key holding and First Aid Response. All officers are automatically trained in key-holding and First Aid Response duties as baseline preparation. No additional certificate/licence is required for key holding and First Aid Response.
Article 3 — Elimination of the Contractor Role
3.1 The Framework does not recognise the concept of private security contractors.
3.2 Under the Commercial Science Policy, all individuals performing private security functions must be certified under Certified Private Security Tradesmanship (CPST), focusing on negotiation, compliance, and commercial security integration.
3.3 Labour-only or subcontractor arrangements that evade CPST classification are prohibited.
Article 4 — Certification Standards
4.1 Specialist certifications (mandatory by role)
a) Security tools & equipment (screening devices, radios, restraints, detectors).
b) Firearms & other weapons (where authorised): platform-specific proficiency, legal/use-of-force, safe storage & carriage.
c) Physical security systems (locks, barriers, safes, vaults, access control, alarms).
d) Cybersecurity technologies (SIEM, endpoint, network sensors, video analytics) for CCOs and supervisors.
e) Other knowledge areas relevant to role (first aid/trauma, defensive driving, crowd psychology, hazardous goods, cash/valuables-in-transit).
4.2 Baseline requirements
- Vetting: Identity, background, sanctions, fitness, and psychological suitability screening.
- Training hours: Role-based curricula with practical assessments; minimum 28 hours/month CPD/CPE to maintain active status.
- Assessment integrity: Proctored exams; scenario-based evaluations; annual requalification for force options.
- Device trust: Field devices used by officers must pass MPSL pre-boot attestation and operate on the Civilian DMZ.
Article 5 — Records & Authority
5.1 Mandatory registries
a) Sharable Authority Account (SAA): Officer-held digital record of licences, certifications, force options, and current deployment scope.
b) NSF Antarctic Office of Education & Professions (A-OEP) Registry: Authoritative record of qualifications, compliance, and active status.
5.2 Legal effect
- Only officers with current, matching records in both systems may perform private security functions.
- Site access systems must verify SAA status in real time; expired scopes auto-block.
Article 6 — Enforcement
6.1 Prohibition. No private security activity may be conducted within Antarctic territory outside this policy’s structure.
6.2 Measures. Violations may result in disqualification, removal of authority, licence suspension, seizure of contraband equipment, civil penalties, and criminal referral under NSF-A laws.
6.3 Appeals. Decisions are appealable within 15 working days to the Independent Security Review Panel; emergency suspensions are not stayed.
Article 7 — Command, Conduct & Use of Force
7.1 Command & supervision. Each deployment designates a Responsible Security Manager (RSM) accountable for planning, briefings, and incident closure.
7.2 Code of conduct. Lawful, necessary, and proportionate actions; non-discrimination; duty of candour; conflict-of-interest disclosures.
7.3 Use of force. Strict continuum; weapon carriage only where authorised by licence & site order; body-worn video for force-enabled roles; mandatory post-incident reporting within 4 hours.
7.4 Close protection. Advance work, route & venue sweeps, medical contingency, comms discipline, and liaison with policing authorities.
Article 8 — Operational Integration & Technology
8.1 Interlocks. Operations must align with:
- MIM (Market Information Monopoly) for public comms and evidence disclosures.
- CDD (Certified Digital Democracy) for warrants, incident IDs, and chain-of-custody logs.
- DMZ & MPSL for telemetry and device trust.
- 8.2 CCTV & cyber. CCOs run approved VMS/SIEM with immutable logs; privacy zones enforced; retention per DCF schedule; export only under lawful basis.
- 8.3 HVAT operations. Dual-crew, geo-fenced routes, silent alarms, smart seals, time-locks; variances require RSM approval and ledger entry.
Article 9 — Site Standards & Physical Security
9.1 Surveys. Risk assessment, threat model, and Security Risk Register before deployment.
9.2 Controls. Access control (MFA), visitor management, CCTV coverage, lighting, emergency egress, and safe rooms where justified.
9.3 Key holding. Dual-control for master keys; audit trail on issue/return; lost-key protocol with immediate rekey plans.
Article 10 — Commercial & Licensing Controls
10.1 CPST. Mandatory for all officer roles; lapse = immediate suspension of duties.
10.2 CSL (Commercial Science Licence). Required for security service negotiations: L3 baseline; Bachelor-level for contracts > USD 75,000; Advanced + independent risk review for > USD 3,000,000.
10.3 Used-asset intake. Any security asset > USD 9,950 (arms, safes, scanners, servers) requires registered appraisal for provenance, condition, and fair value.
Article 11 — Health, Safety & Welfare
11.1 Duty of care. PPE, cold-weather protocols, rotation to prevent fatigue; first aid kits and trauma supplies available on posts.
11.2 Critical incidents. Major events trigger Gold–Silver–Bronze command with shared talkgroups and unified logs.
11.3 Mental health. Post-incident debrief, confidential counselling, and fitness-to-return assessments.
Article 12 — Inspections, Audits & KPIs
12.1 Audits. Risk-tiered inspections; at least annual on-site audits for each employing organisation; unannounced drills permitted.
12.2 KPIs (illustrative). Response time, incident closure within SLA, false alarm rate, force incidents per 1,000 hours, training compliance ≥ 98%, body-cam activation compliance ≥ 99%.
12.3 Transparency. Redacted quarterly scorecards published by the Authority.
Article 13 — Transitional & Final Provisions
13.1 Transition. Existing private security personnel must obtain CPST and registry alignment within 180 days; force-enabled roles within 90 days.
13.2 Supremacy. Conflicting guidance is superseded by this Policy.
13.3 Entry into force. On the effective date above.
Annex A — Role-to-Certification Matrix (Indicative)
- VO: Crowd management, access control, first aid, radio discipline, key holding.
- MGO: Patrol & post orders, search, incident command basics, physical security systems, key holding.
- CCO: VMS/SIEM ops, cyber hygiene, data protection, incident response, evidence handling.
- CPO: Advance & route planning, defensive tactics, protective driving (if authorised), trauma care, threat assessment.
- HVATO: CIT protocols, smart seals/time-locks, evasive driving (if authorised), route intelligence, covert/overt posture.
Contacts
- Certification (CPST) & Registry: cpst@nsf-antarctica.org
- Licensing & CSL: licensing@nsf-antarctica.org
- Audits & Inspections: security-audits@nsf-antarctica.org
- Ombuds & Appeals: ombuds-security@nsf-antarctica.org
This article-style policy creates a single, auditable, and professionalised private security regime for Antarctica—removing informal contracting, elevating training and ethics, and integrating security with national digital trust and lawful oversight.
Version 1.0 • Effective 26 September 2025