You are on page 1of 8

MODULE IN INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Prepared By: Ms. Kenneth S. Diodos, MSCRIM. (CAR)


∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞∞

MODULE 15
(Final – 3rd Week)

Learning Objectives:

1. Discuss security surveys and security inspections as an effective security system.


2. Understand the main objectives of security system.
3. Evaluate the effectiveness of security inspections and survey in every establishment.

LESSON 6.1 - SECURITY SURVEY

A. RATONALE -The information pertaining to one of the most important security services
offered to a head of office is the conduct of security surveys and security inspections. Security
Surveys and security inspections are conducted for the establishment of an effective Security
System.

Since there are many security countermeasures to be considered, heads of offices should utilized
specially trained personnel, if the efforts of espionage and sabotage agents and other criminal
elements are to be negated. Security is an extremely complex program and the objective analysis
of an office head's security program by security survey and inspection personnel can be of great
assistance in determining the efficiency of any established security program.

B. SECURITY SYSTEM - This is the set of policies, procedures and rules and regulations
designed to reduce to an absolute minimum the possibility of espionage, sabotage and
compromise of classified information of an office or a whole establishment.

C. BECURITY SURVEY- This is also known as security audit which is actually a fact-finding
probe to determine a plant's adequacy and deficiency in all aspects of security, with the
corresponding recommendations.

It is also referring to an estimate of the security standards a unit, and is conducted to


enable the responsible officer to recognize and evaluate security hazards and determine
protective measures necessary to the prevention of sabotage, espionage, subversive activities and
other criminal acts inimical towards the interest and/or mission of the unit and/or command.

In the field of police and military intelligence, Security survey is defined as a


counterintelligence service to assist heads of office in determining the security measures required
to protect key installations from possible sabotage, espionage, subversion, and unauthorized
disclosures o, or access to, classified information or material contained therein.

D. RELATED TERMINOLOGIES - For better comprehension, the following terminologies


are hereby defined:
1. Survey - the term applied to the first detailed "look see conducted by a team.

2. Security Inspections or Follow-up Surveys - This is the term referring to the


succeeding surveys after the initial surveys.

3. Supplements Surveys - It is conducted when there is business reorganization with


corresponding changes in object and physical by-outs of the complex.

4. Special Surveys -This is directed by management, if the initial survey appears to have
left certain portions or aspects involving security due to change in policy or operation that
will greatly affect the total security picture.

5. Entrance Conference – A conference or dialogue between the survey team and


management officials of a plant before security survey is conducted.

6. Exit Conference - A conference similar to entrance conference done after the


completion of the security survey.

E. WHO PERFORMS SECURITY AUDIT AND SURVEY? This should be conducted by


qualified security experts who can be from the organ1zation or outsiders contracted to do the job.
Generally, recommendations from security survey will fall into three categories:

1. Human guard- refers to the number of guards needed and their respective qualifications
like female guards for searching female employees.

2. Equipment firearms needed, communications gadgets, metal detectors and other


devices necessary in the implementation of the proposed security system.

3. Procedures these are the detailed rules and regulations and steps necessary in the
implementation of the proposed or existing security system. This includes the type and
number of

F. THE ROLE OF SECURITY OFFICERS - With the exception of the office head, the
security officer is more interested in the survey that any other individual of the office. It is the
security officer who is directly responsible to the head of office for proper maintenance of
security of the security program of the office.

A survey Specialist must be cognizant of established Security procedures relative of the


office since much of the survey including the resulting recommendations will be affected by
these measures

This knowledge will enable him to recognize the present or potential hazards in the area,
answer most of the security questions put forth by the head of office personnel, suggest minor
recommendations during the survey which can be implemented on the spot and to discuss
completely his tentative recommendations with office personnel.

G. AUTHORITY IN CODUCTING SECURITY SURVEY - The Unit head may request a


survey of his entire office or of specific function of a unit within the office. When higher
authorities directs a security survey to be conducted for one of its Subordinate office, an
information copy of the correspondence may also be forwarded to the unit to be surveyed. It
must be remembered that a security survey is not conducted solely for the purpose of
establishing a security program of an office. The head of office is directly responsible for
establishing a security System for his office after which a survey may be conducted to determine
if the program is adequate in comparison with the importance of the office to the overall national
objective.

The following are some of the situations under which a Security survey may be requested or
directed:

1. Activation of an organization or office.

2. Reactivation of an organization or office.

3. A substantial change on the mission, number of personnel, structures, or real estate of


the office.

4. Indications of laxity in the security program which would indicate the need for a
complete revaluation of the security system.

5. When no record exists of a prior survey having been conducted.

H.SECURITY SURVEY PROCEDURES- Security surveys are conducted by considering the


following steps:

1. Preliminary Planning - To assure as much as possible the successful completion of a


security survey, a Chronological plan of action is developed. The first action taken by the
security survey agent is to prepare 0 and conduct those preliminary courses of action that precede
the actual conduct of the survey.

A very 1mportant consideration during the preliminary lelnnin8 stage is the use of a
checklist. This is a list of general considerations or specific points that must be covered during
the survey. Checklists may be either the general type or the specific or detailed type.

2. Initial Briefing (Entrance Conference) - After completion of the preliminary stage, the
specialist is prepared to visit the office. It is to be recalled as mentioned previously that contact
1S made with the security officer of the office for the purpose of establishing a time and date for
the initial briefing of the office head. It would be ideal to have at this conference not only the
office head but his entire staff and other key personnel of the office.

3. Escort Personnel - It is often desirable for both the specialist and the office that an
escort accompany the specialist during the survey. Preferably, this escort should be the security
office of the office or his representative. In any event he should be a person conversant with the
security practice and procedures employed as the office.

It is often in the areas adjacent to the office that you find many of the office personnel
congregating for relaxation or entertainment, often under circumstances conductive to loose talk
the agent also checks geographical features: terrain, road and railroad networks, bridges and
natural or man-made hazards near the office

4. Preliminary Exterior and Interior Check - As soon as possible after the initial briefing,
the specialist conducts a tour of the area surrounding the office. The purpose of such an
inspection is to gain a general knowledge of those elements outside the office which do or could
conceivably have either a direct or indirect influence upon the security of the office.

History of the unit to be surveyed When the survey specialist completes his check of the
surrounding area of the installation and preliminary survey of the interior of the installation, he
1s ready to commence the analysis of the office's security program.

The specialist first determines the history of the organization to be surveyed and or the
office on which it is located. There may be some information contained in the history of the
organization or office which may directly affect the security situation as it exists during the
current survey.

5. Analyzing Existing Security - Having completed the preliminaries and determined the
level of required security, the specialist must now ascertain the existing level of security of the
installation. This portion of the survey is a minute examination of all factors regarding the
physical security, security of personnel and the security of information. It includes the collection
of all factual data that affects the security of the office. This data will include all preventive
measures as well as hazards and deficiencies any of the security measures the specialist examine
are not based upon existing requirements. The specialist makes his own conclusions which are
reflected in his recommendations.

6. Final briefing (Exit conference) - The final conference is an oral to the chief wherein
the specialist determines whether or not his tentative recommendations can be realistically
implemented. The specialist discusses the recommendations with the command since
information may exist which may negate or change the recommendations. In many instance the
chief may have unsuccessfully attempted to implement corrective measures or the
recommendations are not feasible 1or some reason unknown to the agent. If the chief has
unsuccessfully attempted to correct its certain security weakness, a report of these attempts is
included in the specialist's final report.

I .REPORT OF SECURITY SURVEY - A Security Inspection is a service performed to


determine compliance with established security police’s and procedures and is conducted on a
recurring Schedule or a follow-up to a security survey.
LESSON 6.2 - SECURITY INSPECTION

A. RATIONALE- Established security measures soon become dated and ineffective Because of
the new demands of the organization or business establishment. Or after prolonged application of
the security measures, the establishment becomes a11SCeptible to security risks. Therefore,
follow-up surveys and inspections are conducted to make the security system applicable to the
present and future demands of the establishment.

B. SECURITY INSPECTION- This is a check of how well existing security measures and
regulations are being carried out within a detachment or establishment. A security inspection
may also include an investigation of alleged or suspected security violations. Physical security is
concerned with forces, entrances and exits guards, traffic control, lighting, fire control, and with
such other physical measures, which, if properly established and maintained, will deny access to
unauthorized persons.

In the field of police and military intelligence, security inspection is defined as a


counterintelligence service performed to determine compliance with established security policies
and procedures.

C. CHARACTERISTICS OF SECURITY INSPECTION- The security inspection, although


akin to the security survey, is much more restricted in scope. As observed, the security survey
considers everything pertaining to an office's security, but the security inspection is limited to
determination of the degree of Compliance by unit personnel with established police’s and
procedures.

D.BECURITY IN SPECTION PROCEDUREES- investigative procedures involved in the


conduct of a security inspection are essentially the same as those required for a security survey;
this is the selection of inspection personnel, the necessary file checks and other preparation, the
duties of the in- C8e, the use of checklists and the coordination with the preliminary officer. The
actual inspection will closely parallel the same procedures fallowed during the conduct of a
security survey.

Prior to the actual conduct of the inspection, the agent conducts a preliminary check of
the office or offices to be at inspected to determine what security regulations are enforced at the
unit.

E. TYPES OF SECURITY INSPECTIONS - There are three specific types of security


inspections are:

1. Continuous Inspection

To keep pace with the constant changes in the organization, Changes in our security
terms of attitudes, life-style and moral values, and the rapid advancement of technological
modifications are all around us, the inspection must be an on-going and never ending activity.
2. Formal or Informal

For the company which has just upgraded the Security function, hired a new security
administrator, or initiated a security department and program. The formal approach to inspection
is most desirable, primary because it tells the Company how senior management feels about
protection, and thus establishes the desirable climate.

Formal Inspection is one which some fanfare is attached. It is usually preceded by an


announcement, and the unit under inspection "prepares" for events, including some extra
housekeeping activities that would not otherwise happen at that point in time.

Informal Inspection is usually the result of a long and firmly entrenched inspection
program, understood by all and accepted as part of the organizational life. The inspection has
been stripped of all external trappings of importance, but their functions importance has not been
lessen in any manner. They are seriously and quietly executed in a spirit of understanding and
cooperation.

3. Structured or Unstructured Inspection

Is systematically from one area to the next and so on. There is a format or logical
sequence to the process. For instance, the audit may start with the first line of defense, then the
second line, then the third line, etc.

Unstructured inspection is conducted in a random manner. There is no format or logical


sequencing. For example, the countermeasures for proprietary information, then emergency plan,
followed by investigation and so forth with inspection may start.

LESSON 6.3 - SECURITY INVESTIGATION

A. RATIONALE- The functions of Investigation are many and multifaceted. From its Latin
derivative, vestige investigation implies a tracking, a search, an assimilation, or collection of
information and facts. Today, many business firms and other organizations employ investigators
directly as part of their in- house security programs.

B. SECURITY INVESTIGATION - This is a planned and organized determination of facts


concerning specific loss or damage of assets due to threats, hazards or unsecured conditions.

C. TOOLS OF INVESTIGATION -There are four specific types of investigation which may
be applicable to security, these are:

1. Information- knowledge which the investigator gathers from other persons.

a. Acquired from regular sources- conscientious and public-spirited citizens, company


files, school files or records file of other agencies.

b. Acquired from cultivated sources-paid informants, bartenders, cab drivers,


acquaintances, etc.

2. Interrogation- the skilful questioning of a person who is reluctant to divulge information


concerning the offense under investigation.

3. Interview- the simple questioning of a witness who has no personal reason to withhold
information.

4. Instrumentation- the application of instruments and methods of physical sciences to the


detection of crimes. In other words, the sum total of the application of all sciences in crime
detection otherwise known as criminalistics.
D. SYSTEMATIC APPROACH TO AN INVESTIGATION

1. Define the Investigative Problem

a. know the reason for the investigation


b. Know the particular Phases or elements investigation assigned to the investigator.
c. Know whether the investigation 1s to be handled overt or discreetly.
d. Know the priority and suspense date ass1gned to the investigation
e. Know the origin of the information.

2. Collection of Relevant data

a. Prepare written investigative plan- represents a guide for work. This covers:
1) Information needed.
2) Methods used in gathering information.
3) Location of sources to furnish this information.

b. Methods and sources to be used. Methods available to an investigator are as follows:

1) Personal observation

- Undercover/use of agent
-Surveillance
-Raids and seizure
-Direct visits to the scene

2) Study of Documents or records


-Operational files
-Identity of documents
-Newspapers, books, periodicals, etc.
-Correspondence, letters, telegrams etc.

3) Use of Interrogation and Interview

4) Used of recruited Informants


5) Liaison with Agencies who possess information.

3. Analysis and Verification of the Information Gathered

a. Analysis involves a study of the information in terms of


1) Data collected should be appropriate and complete
2) Information supplied must be factual to

b. Verification Method Involves:


1) Personal observation of the agent
2) Secure reliable statements from individuals making personal observation through
experience.
3) Documents or physical evidence- consulting official records8.

4. Drawing the Conclusion

It is the function and responsibility of the person requesting the investigation.

You might also like