User talk:Virgil

From Baystation 12
Jump to: navigation, search

Use of force protocol for Security and Command personnel

As a member of Security, your primary job is to keep the peace and enforce the law on the ship whilst protecting crew from internal and external threats. To assist with this, Security has many different tools at their disposal to use in various situations, and members of Security should take care to only use as much force as is appropriate for any given situation.

As a member of Command, your job is to lead and manage the ship. However, there will be times when you are called upon to defend yourself. The same care should be taken to ensure that only appropriate force is used. For this reason, it is also important to ensure that you are aware of Security's use of force protocols as outlined below.

Suspect is visibly unarmed

You should use verbal commands to attempt to remedy the situation. if the suspect is non-compliant then you should call for backup, and then proceed to use your flash or pepper spray to subdue the suspect. Use your stun baton only if they're protected from your flash and pepperspray, or using your pepper spray and flash is otherwise ineffective.

If the suspect is actively assaulting someone then use your stun baton to subdue the suspect.

If the suspect attempts to evade arrest, use ranged stun weaponry to subdue the suspect.

Suspect visibly armed

If the suspect is armed with a melee weapon (for example, an axe) then you should call for backup, draw your ranged stun weaponry and approach the suspect. Attempt to de-escalate the situation with verbal commands multiple times. Only use ranged stun weaponry to subdue the target if the suspect is non-compliant.

If the suspect is armed with a firearm but not actively firing it, request lethal authorization from Command and call for backup. Once backup arrives, attempt to surround the suspect where possible. Attempt to de-escalate the situation verbally. Do not engage unless fired upon.

If the suspect is actively firing a weapon, then use of lethal force should be used to neutralize the threat.

Unusual Circumstances & Situations

From time to time, Security personnel may find themselves required to handle situations where the usual protocol for use of force does not apply, or is not reasonable to carry out.

Some protocols for handling these situations have been outlined below. If the situation that occurs is not covered below, Security should use their best judgement. Remember that above all else, all attempts to de-escalate should be used at every possible opportunity before resorting to any use of force.

Hostage situations
When a suspect has taken another person hostage, contact should be made with the suspect. Demands should be requested and negotations attempted whilst Security mobilizes.

If the suspect and hostage are in an area Security can access, Security personnel should attempt to surround the suspect where possible.

  • If the suspect is unarmed or only armed with a melee weapon, such as a knife, then Security should approach with non-lethal weapons drawn.
  • If the suspect is armed with a gun, or other ranged lethal weapon, Security should approach with lethal weapons drawn.

Security should attempt to de-escalate the situation and convince the suspect to release the hostage.

  • If the hostage taker proceeds to attempt to kill or harm the hostage, the appropriate weaponry outlined above should be used to subdue the suspect, taking care not to cause further harm to the hostage where possible.
  • If the hostage taker proceeds to attempt to kill or cause harm to Security, Command, or any other personnel in the area, Security should use the outlined weaponry above to subdue the suspect, taking care to not cause harm to the hostage where possible.
  • If after several attempts at de-escalation the suspect is unyielding, Security should attempt to use flashbangs to stun the hostage taker before moving in to Secure them.

Suspect using teleportation technology
If, whilst following protocol, a suspect uses teleportation technology to evade arrest multiple times successfully, Security should request lethal authorization and use ranged lethal weaponry whilst only aiming for the suspect's legs, in order to render them immobile. Aiming to kill, or aiming for any area other than the legs is not acceptable.

Escaped prisoners
Escaped prisoners should be treated under the same protocol as if a suspect's visibly armed, regardless if they're actually armed or not.