You are on page 1of 32

INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS

John Lester B. Cadeliña, MSCJ., CSP

IRC Modified Tables of Specification

COURSE CODE: LEA 3  State and apply the theories, concepts, and philosophy of security and
safety;
COURSE TITLE: Introduction to  Organize and assess the related laws in security and detective agency
Industrial Security Concepts operations, management and administration;
 Translate and construct the basic industrial security concepts of
security survey, security plan, security test and evaluation, personnel
check, technical surveillance, and security management

INTRODUCTION
Security
 The state or quality, condition of being secure, freedom from fear, harm, danger, loss, destruction or damages;
 To secure is to make safe or be protected
 Defense against crime
Safety
 Freedom from HAZARDS
 Shall refer to the physical or environmental conditions of work or employment, which substantially comply with
legal requirements.

Basic Principles of Security


1. Command responsibility
- Cannot be delegated but the security tasks can be assigned
2. Compartmentation
- Need to know basis
3. Balance between security and efficiency
- Security prevails over efficiency
4. General principles of security remain constant
- Specific measures to suit operations
5. Security is the concern of all personnel
- Regardless of rank, position, designation

DEVELOPMENT AND EVOLUTION OF SECURITY

Man in the course of history has always shown that he values property next to his life and loved ones. Centuries
before the modern concept of security and crime prevention came into practice, cave dwellers fought among
themselves to protect life and property. Eventually, families and clans banded together as tribes and later on formed
communities for mutual protection, recognizing that there is strength in numbers.

 The private security business began on March 11, 1933, when the first formally licensed private security agency
“Special Watchman Agency” started its operations.
 Later it renamed “Jimenez Security Agency”, founded by brothers Juan and Pedro Jimenez.
 On May 30 1958, the Philippine Association of Detectives and Protective Agency Operations (PADPAO) were
formally organized.
 In the Philippines, it would be wise to trace the steps leading to the final signing by Ferdinand E. Marcos Sr. on June
13, 1969 of Republic Act 5487.
 In this law was assigned the most important role of Security Guard Force in assisting the Police in its mission to
safeguard lives and properties.
 Republic Act 5487 otherwise known as the “Private Security Agency Law”  was enacted making the Philippine
Constabulary as the sole authority to provide administrative services and general supervision over the management

1
Insight Review Center LEA (Introduction to Industrial Security Concepts)
and operations of all organize Private Security Agencies (PSAs), Company Guard Forces (CGFs), Government
Security Forces (GSFs) and their security guards. 
 However, the supervision was later on transferred to the National Intelligence and Security Agency (NISA) now
National Intelligence Coordinating Agency (NICA)
 In August 04, 1969, a staff memo was issued by Headquarters, Philippine Constabulary (HPC), organizing
the Philippine Constabulary Security and Investigation Agency Supervisory Office (PCSIASO) and later renamed
to PC Supervisory Office for Security and Investigation Agencies (PCSOSIA).  
 And pursuant to GO No. 404 dated June 29, 1970, the office was renamed to PC Supervisory Unit for Security and
Investigation Agencies (PCSUSIA). With the intention of continuously professionalizing the security industry,
several presidential Decrees were issued such as P.D. No. 11 issued on October 03, 1972, amending certain sections
of R.A. 5487 particularly Section 3, 4, 5, 8 and 9 which permits the Philippine Constabulary to deputize any private
detectives, watchman or security guard to assist in cases of emergency disaster or calamity.
 With the creation of the Philippine National Police on January 01, 1991 pursuant to R.A. 6975, PCSUSIA became
PNP SAGSD (Security Agencies and Guards Supervision Division)
 Pursuant to Memorandum 07-S96 dated 31 May 1996 the Security Agencies and Guards Supervision Division
(SAGSD)  was created as one division under the Civil Security Group (CSG) to exercise supervisory authority and
implement the Rules and Regulations embodied in RA 5487. 
 On Sep 25, 2009, SAGSD was renamed as the Supervisory Office for Security & Investigation Agencies
(SOSIA) thru General Orders #DPL-09-10. NAPOLCOM RESOLUTION 321 dated 24 Nov 2010 approved GO# DPL-09-
10 entitled “confirming the Restructuring of the PNP CSG”.

SOSIA Seal/Logo

The SOSIA logo illustrates the Office’s foundation and focus. It comprises the symbol and the name depicting the
true nature and origin of the Office. The Sun depicts brightness that serves as beacon of the industry. The Shield shows
the protective nature of the industry with the term “Steadfast” below the symbol of the security guard which means
loyalty and unwavering devotion to his duty. The three (3) stars represent the three (3) main Islands of the
Philippines, namely Luzon, Visayas and Mindanao. The Laurel leaves symbolizes peace which the security guard helps
enforce the rules and regulations in accordance with policies and guidelines.

THEORIES, CONCEPTS, PHILOSOPHY OF SECURITY & SAFETY

Safety and security are top priorities in our society and addressing problems in these areas is crucial. Several
different kinds of safety or security exist today, such as international security, cyber security, physical security, fire
safety, and so on. The scientific community is starting to address the creation of a theory of safety and security. The
theory of safety and security will be followed by a series of default theories.

Theory of safety and security;


A. risk theory;
B. crisis theory;
C. causality

A. RISK THEORY is a widely used scientific discipline, based on the identification of a threat, the specification of risk and
the specification of how to overcome the risk. The essence of risk lies in the objective existence of threats. The risk
comes from consciously controlled acting, or chaotic and uncontrolled acting of each part of a complex. Many
interactions are negative, with devastating impact. This impact is proportional to the magnitude and direction of the
action (measure), where the individual reference objects are involved in negative interactions.

This negative interaction is named “security incident”. The application of the risk theory evaluates which threats (or
negative acts) affect the reference object, and which ones have more or less significant impact.

The method of risk management is used in many fields.


These include;
 project management,
 investment,
 economics, and so on.

Risk management has an important position in the field of safety and security. It is focusing on minimization of
damage or impact. The disadvantage of the risk management is that it does not find out the causes of threats. Threats

2
Insight Review Center LEA (Introduction to Industrial Security Concepts)
are taken as a fact and it only focuses on what they can cause. Unacceptable risk is solved by appropriate measures. The
solution comes as acceptance of risk, risk retention, risk transfer and risk avoidance. Despite this disadvantage, risk
theory creates the basis of the theory of safety and security. The main contribution is its well-developed methods of risk
analysis.

What is RISK?
 Is the potential damage or loss of an asset.

The level of risk is a combination of two factors:


1. The value placed on that asset by its owner and the consequences, impact adverse effect of loss or damage to
that asset;
2. The likelihood that a specific vulnerability will be exploited by a particular threat.

Types of risk:
1. Pure Risk 2. Dynamic Risk

Risk Analysis
 It is the process used by the Security Professionals in determining his priorities in the protection of assets. The
analysis of risk includes examination of the vulnerability, probability and criticality of potential threats and
includes natural and man-made risk.

Major Risk
Among the major categories of risk which are arranged according to Criticality are:
 Nuclear Attack  Other Crimes
 Natural Catastrophe  Conflict of Interest
 Civil Disturbances and Malicious Destruction  Other Risk

Risk Management
 The process of selecting and implementing security countermeasures to achieve an acceptable level of risk at an
acceptable cost.
ASSET
 Any person, facility, material, information or activity which has a positive value to its owner whether it is an
individual, private or government entity.
 The asset may have value to an adversary, as well as to the owner, although the nature and magnitude of those
values may differ.
VULNERABILITY
 Any weakness that can be exploited by an adversary to gain access to an asset.
COUNTERMEASURE
 An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities.
 The cost of a possible countermeasure may be monetary, but may also include nonmonetary costs such as:
reduced operational efficiency, adverse publicity, unfavorable working conditions and political consequences.
DEFINING THE PROBLEM
 Useful definition of a security problem requires that three things be recognized and evaluated in quantitative
terms:
1) The kinds of threats or risks affecting the assets to be safeguarded;
2) The likelihood or probability of those threats becoming actual loss events;
3) The impact or effect upon the assets or upon the enterprise responsible for the assets if the loss occurs.
The first we may call Loss Event Profile, the second Loss Event Probability or Frequency and the third
Loss Event Criticality.
LOSS EVENT PROFILE
 The kinds of threats or risks affecting the assets to be safeguarded.
SECURITY VULNERABILITY
 No security plan or program can be effective unless it is based upon a clear understanding of the actual risks it is
designed to control.
 That statement should be the basis for all security activity. It makes no difference whether the problem being
considered involves quick assets like cash or negotiable instruments, more permanent assets such as equipment,
inventory and fixtures or intangible assets like trade secrets.
 Until the actual act threat to those assets is assessed accurately, precautions and countermeasures, even those of
the highest quality, reliability and repute, cannot be chosen expect by guesswork.

3
Insight Review Center LEA (Introduction to Industrial Security Concepts)
 The value of a security program depends not only upon the excellence of the resources but upon their
appropriateness and relevance. Problem definition comes first; then comes countermeasures design. Reversing
this order would result in needless expense and possibly, a substantially non-responsive security program.
PROBABILITY
 The change or likelihood that a loss will take place.
 Indicated by a mathematical statement concerning the possibility of an event occurring.
CRITICALITY
 The impact of a loss as measured in financial terms. How important it is in terms of the survival or existence of
the organization.
CRITICALLY KNOWN OR UNKNOWN
Percentage of Impact:
100% Fatal 75% Very Serious 50% Average 25% Less Serious 0% Unimportant

PROGRAM IMPLEMENTATION THE SYSTEM APPROACH


 An effective method of designing and implementing an assets protection program is the systems approach.
 The systems approach has been defined as "a comprehensive solution to a total problem".
 It is an orderly and rational method of problem solving and, if properly carried out, should insure and effective
assets protection program.

THREE GENERAL STEPS IN THE IMPLEMENTATION OF THE SYSTEMS APPROACH:


1. Vulnerability analysis
2. Installation of countermeasures:
• Software • Hardware • People
3. A test of the operating program to insure its effectiveness.

Risk Management Alternatives and Strategies

Risk Avoidance
• Eliminating or removing the risk totally from the business, government or industrial environment for which the
risk manager has responsibility.
Risk Reduction
• Decreasing the risk by minimizing the probability of the potential loss. The reduction of criminal opportunity is
often accomplished by situational crime prevention strategies to discourage, deter or deny criminal incidents.
Risk Spreading
• Spreading the risk(s) through compartmentation or decentralization to limit the impact (criticality) of the
potential loss.
Risk Transfer
• Moving the financial impact of the potential loss over to an insurance company.
Risk Self Assumption
• Planned assumption and acceptance of the potential risk(s) by making a deliberate managerial decision of;
a. doing nothing about the threat or
b. setting aside resources for use in case of a specific loss incident.
Combination of the above
• Using a combination of two or more of the above strategies to manage potential risk and threats.

B. A CRISIS THEORY is an important phenomenon, which has negative influence on human society. The negative effect
is a common sign of security breach and crisis. For the safety and security research, it is important to determine
what is the reason and nature of safety and security problems. Crisis theory is a scientific discipline focused on the
theoretic aspects of crisis research, mainly on nature and causes of crisis. The crisis theory is the basis for successful
management of a crisis.

Nowadays, the crisis is understood as:


a. time when contradictions culminate, b. or as a complicated situation.

These terms are similar. They are appropriate for designation of a time period when existential complications arise.
The crisis is considered as a state or period when danger is coming out and simultaneously the aim function of the
reference object is threatened. The crisis arises when there is a significant change in conditions for the reference object.
Changing conditions occurs due to the chaotic or uncoordinated behavior of each part of the system. During this time
period, the configuration of conditions and environment are changing. If the changes are expected, the system can be
4
Insight Review Center LEA (Introduction to Industrial Security Concepts)
prepared for them and after that; it also can have a suitable reaction. The situation is different when a rapid change has
a higher-than-expected value. During this situation, the system can have an inappropriate reaction and, following that
complications or crisis may arise.
Basically, the crisis is created due to:
a. unexpected and large negative b. unmanaged control.
situation,

a. Unexpected and Large Negative Situation


An unexpected situation is a situation which cannot be predicted. The complications are created by a negative
event of large scale (for example, natural disasters, the sharp fall in the price of the shares on the stock exchange, large-
scale attack of an unknown computer virus, and so on). The system is not prepared for these changes, because they are
not frequent and the prevention is economically unbearable. The system should be prepared for these negative
situations. Managing the crisis is based on minimization of the influence of the negative situation and also on system
recovery. Crisis management is a special kind of management created for managing and overcoming the crisis. The
activation of new forces and equipment is a basic crisis measure.

b. Unmanaged Control
The nature of the crisis arising is based on the unmanaged control. The crisis usually includes periods (stages) of
latent symptoms, acute, chronic and resolved/unresolved crisis. In the stage of latent symptoms, the accumulation of
unresolved problems happens. If the managing system is not catching up or is not solving the crisis symptoms, the crisis
comes out. In the acute stage, problems culminate. The unsolved problems accumulate, too. The control system should
start solving these problems slowly. This breakpoint is based on the capacity of the system, especially on the control
system. The crisis is eliminated if the system is capable of activating and ensuring plenty of resources for appropriate
measures.

C. THE CAUSALITY is a scientific discipline which researches relations between cause and effect. The term causality has
evolved from the Latin word ‘’causa “. The cause is relation, where cause and effect are mutually connected. The law
of causality determines that anything that happens has at least one cause, and also any cause has future
consequences. The same causes create the same effects. It is structured by a causal relationship (causal nexus).

Causality is an expression of the relationship between two events, where one of them raises and the second is
called the "cause". Basically, the reason is the term, which causes effect. Causality is key for the theory of safety and
security. It allows establishing a logic chain of causes of security or safety violation. From this point of view of safety or
security, there is inadequate position of causality. A role of causality is neglected. It is important to focus on this
problem.

SAFETY INDUSTRY

Accident theories guide safety investigations. They describe the scope of an investigation. Understanding
accident causation is intrinsic to their successful prevention.
Accident prevention is the most basic of ail safety management paradigms. If safety management is effective,
then there should be an absence of accidents. Conversely, if accidents are occurring then effective safety management
must be absent. Therefore, understanding how accidents occur is fundamental to establishing interventions to prevent
their occurrence. A simple nexus it would seem, yet the reality is accidents are complex events, seldom the result of a
single failure, and that complexity has made understanding how accidents occur problematic since the dawn of the
industrial evolution.

Definition of Terms:

Accident
— a short, sudden and unexpected event or occurrence that results in an unwanted and undesirable outcome and
must directly or indirectly be the result of human activity rather than a natural event.
Incident
— an unexpected and usually unpleasant thing that happens.
Near miss
— is an unplanned event that did not result in injury, illness, or damage - but had the potential to do so.
Fault of Persons

5
Insight Review Center LEA (Introduction to Industrial Security Concepts)
— created by social environment or acquired by ancestry.
Social Environment/Ancestry
— where and how a person was raised and educated.
Theory
— collections of concepts about some real-world area of concern or interest which facilitate explaining, predicting,
or intervening. With theories we explain why and how things occur as they do.
EVOLUTION OF MODEL OF ACCIDENT CAUSATION
The history of accident models to date can be traced from the 1920s through three distinct phases:
1. Simple linear models 2. Complex linear models 3. Complex non-linear models

Each type of model is underpinned by specific assumptions:


• The simple linear models assume that accidents are the culmination of a series of events or circumstances which
interact sequentially with each other in a linear fashion and thus accidents are preventable by eliminating one of
the causes in the linear sequence.
• Complex linear models are based on the presumption that accidents are a result of a combination of unsafe acts
and latent hazard conditions within the system which follow a linear path. The factors furthest away from the
accident are attributed to actions of the organization or environment and factors at the sharp end being where
humans ultimately interact closest to the accident; the resultant assumption being that accidents could be
prevented by focusing on strengthening barriers and defenses.

The new generation of thinking about accident modelling has moved towards recognizing that accident models need to
be non-linear; those accidents can be thought of as resulting from combinations of mutually interacting variables which
occur in real world environments and it is only through understanding the combination and interaction of these multiple
factors that accidents can truly be understood and prevented. (Hollnagei, 2010).

There are several major theories concerning accident causation, each of which has some explanatory and predictive
value.
1. The domino theory developed by H. W. Heinrich, a safety engineer and pioneer in the field of industrial accident
safety.

According to Heinrieh, an “accident” is one factor in a sequence that may lead to an injury. The factors can be visualized
as a series of dominoes standing on edge; when one fails, the linkage required for a chain reaction is completed. Each of
the factors is dependent on the preceding factor.

Heinrich's Dominos - The Process


1. A personal injury (the final domino) occurs only as a result of an accident.
2. An accident occurs only as a result of a personal or mechanical hazard.
3. Personal and mechanical hazards exist only through the fault of careless persons or poorly designed or
improperly maintained equipment.
4. Faults of persons are inherited or acquired as a result of their social environment or acquired by ancestry.
5. The environment is where and how a person was raised and educated.

Heinrich's Domino Theory - Corrective Action Sequence

(The three "E"s)


• Engineering
o Control hazards through product design or process change
• Education
o Train workers regarding all facets of safety
o impose on management that attention to safety pays off
• Enforcement
o Insure those internal and external rules, regulations, and standard operating procedures are followed by
workers as well as management.

Based on the domino model, accidents could be prevented by removing one of the factors and so interrupting the
knockdown effect. Heinrich proposed that unsafe acts and mechanical hazards constituted the central factor in the
accident sequence and that removal of this central factor made the preceding factors ineffective. He focused on the
human factor, which he termed "Man Failure", as the cause of most accidents.

Giving credence to this proposal, actuarial analysis of 75,000 insurance claims attributed some:

6
Insight Review Center LEA (Introduction to Industrial Security Concepts)
a. 88% of preventable accidents to unsafe acts of persons
b. 10% to unsafe mechanical or physical conditions,
c. with the last 2% being acknowledged as being unpreventable giving rise to Heinrich's chart of direct and
proximate causes

2. Human Factors Theory - Heinrich posed his model in terms of a single domino leading to an accident. The
premise here is that human errors cause accidents. These errors are categorized broadly as:
OVERLOAD
- The work task is beyond the capability of the worker
a. Includes physical and psychological factors
b. Influenced by environmental factors, internal factors, and situational factors

INAPPROPRIATE WORKER RESPONSE


 To hazards and safety measures (worker's fault)
 To incompatible work station (management, environment faults)

INAPPROPRIATE ACTIVITIES
- Lack of training and misjudgment of risk
- But the structure of this theories still a cause/effect format

3. Accident/Incident Theory - Extension of human factors theory. Here the following new elements are
introduced:
 Ergonomic traps - These are incompatible work' stations, tools or expectations (management failure)
 Decision to err - Unconscious or conscious (personal failure)
 Systems failure - Management failure (policy, training, etc.)

4. Epidemiological Theory - Epidemiology - This field studies relationship between environmental factors and
disease can be used to study causal factors in a relationship

Two key components;


1) Predisposition characteristics-tendencies may predispose worker to certain actions
2) Situational characteristics-peer pressure, poor attitude, risk taking

Together these characteristics can cause or prevent accidents that a person predisposed to a given situation or
condition may succumb to.

ORGANIZE AND ASSESS THE RELATED LAWS IN SECURITY AND


DETECTIVE AGENCY OPERATIONS, MANAGEMENT AND ADMINISTRATION

Legal Bases of Industrial Security in the Philippines:

A.  Natural Authority
 The highest law is the law of preservation
 By instinct, man naturally reacts to protect himself, his family, his home, freedom, liberty and property from
danger, threat or hazard. He does it personally or through the help of others.

B. Constitutional Authority
1. The prime duty of the government is to serve and protect people. The government may call upon the people to
defend the state and, in the fulfillment thereof, all citizens may be required under conditions provided by law or to
render personal military or civil service. (Art II, Sec 4 of the 1987 Philippine Constitution)

 Take note also that all citizens who are qualified, including the security guards, may be required by law to render
personal military or civil service. The service required of the citizen is personal.

2. No person shall be deprived of life, liberty or property without due process of law, nor shall any person be denied
the equal protection of the laws. (Art III, Sec.1 of the 1987 Philippine Constitution)
 This means that life, liberty, freedom and property can only be taken from a person after the observance of due
process of law.

7
Insight Review Center LEA (Introduction to Industrial Security Concepts)
3. Private Property shall not be taken for public use without just compensation. (Art III Sec. 9 of the 1987 Philippine
Constitution)
 The Constitution protects not only ownership but also possession, enjoyment, use and disposition of private
property by their rightful owners subject to such limitations imposed by law.
 In this regard, private property to be taken by the government in its exercise of the power of the eminent
domain must satisfy two important conditions, namely: public use and just compensation.

4. The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and
seizures of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of arrest shall
be issue except upon probable cause to be determined personally by the judge after examination under oath or
affirmation of the complainant and the witnesses he may produce, and particularly describing the place to be search
and the persons or things to seize. (Art III, Sec 2 of the 1987 Philippine Constitution).

C. Statutory Authority

1. The Revised Penal Code (Act No. 3815, as amended)


 The applicable provisions of the Revised Penal Code on Crime Against Persons. Personal liberty, security and
property have bearing on the security and protection of one’s life, liberty and property.
2. Private Security Agency Law (Republic Act No. 5487, as amended by Presidential Decree No. 11.)
 “Act to Regulate the Organization and Operation of Private Detective, Watchman or Security Guards Agencies”
 approved and took effect on JUNE 13, 1969.
 This law governs the operation, administration of security agencies, activities and qualifications, duties and
licensing of security guards, watchmen and private detectives.
 In short, it is the intention of this law to professionalize the security services in order to upgrade the level of
security protection.

DEFINITION OF TERMS
(RA 5487 as amended)
PERSON
 shall include not only natural but also juridical persons such as single proprietorships, partnerships,
corporations, companies or associations, duly organized and registered with the Securities and Exchange
Commission and/or the Department of Trade and Industry.
PRIVATE SECURITY SERVICES
 shall include the act of providing or rendering services to watch an establishment whether public or private,
building, compound/area or property, to conduct access control/denial in any form whether physically, manually
or scientifically by electronic monitoring systems, for the purpose of securing such area/property and at the
same time ensuring safety and protection of persons within such areas, to maintain peace and order within such
areas, to conduct private security training, and/or to conduct investigation. It shall also include the act of
contracting, recruiting, training, furnishing or posting any security guard, to do its functions or solicit individuals,
businesses, firms, or private, public or government-owned or controlled corporations to engage his/its service or
those of his/its security guards, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation.
PRIVATE DETECTIVE SERVICES
 shall include among others the act of providing personal security protection, inquiry and information gathering,
pre-employment verification and individual background profiling, providing assistance in civil liability and
personal injury cases, insurance claims and fraud, child custody and protection cases, for the purpose of
assisting in gathering information leading to determination and/or prevention of criminal acts and/or resolution
of legal, financial and personal problems.
PRIVATE SECURITY INDUSTRY
 shall cover those in the legitimate business of providing private security and detective services.
PRIVATE DETECTIVE AGENCY
 Any person, association, partnership, firm or private corporation, who contracts, recruits, trains, furnishes, or
post any private detective, to perform its functions or solicit individuals, business, firms, or private, public or
government-owned or controlled corporations to engage his/its service or those of his/its detectives, for hire,
commission or compensation.
Notes:
1. All person used in a private detective work must be licensed
2. All person employed solely for clerical or manual work need no private detective license.

8
Insight Review Center LEA (Introduction to Industrial Security Concepts)
3. License (LTO) shall be displayed at all times in a conspicuous and suitable place in the agency office or
headquarters of the agency and shall be exhibited at the request of any person whose jurisdiction is in
relation with the business of the agency or the employees thereof, or of the Chief of the PNP or his duly
authorized representative or any peace officer.
4. The PNP shall exercise general supervision over the operation of all private detective and private detective
agency.

The rules above apply to a Private Security Agency.


PRIVATE DETECTIVE
 any person who does detective work for hire, reward, or commission other than members of the AFP, Guard of
the BJMP, Municipal or City jail guards, and members of the PNP or of any other Law Enforcement Agency of
the government

Qualifications of a Private Detective


1. Must be a Filipino citizen
2. Must be a high school graduate
3. Must be physically and mentally fit
4. Must not be less than 21 nor more than 50 years of age
5. Must be at least 5 feet and 4 inches in height
6. Must not be suffering from any of the ff: disqualifications
a. Dishonorably discharged or separated from the AFP
b. Mental incompetent
c. Addicted to the use of narcotic drug or drugs
d. Habitual drunkard
7. Must not be convicted of any crime involving moral turpitude

Moral Turpitude
— A phrase used in Criminal Law to describe conduct that is considered contrary to community standards of
justice, honesty, or good morals. Crimes involving moral turpitude have an inherent quality of baseness,
vileness, or depravity with respect to person's duty to another or to society in general.

Examples of Crime Involving Moral Turpitude


1. Rape 3. Robbery
2. Forgery 4. Prostitution

PRIVATE SECURITY GUARD


 (watchman) shall include any person who offers or renders personal service to watch or secure either a
residence, business establishment, or buildings, compounds, areas, or property, inspects/monitors bodily
checks/searches individuals and/or baggage and other forms of security inspection, physically/ manually or
scientifically electronic, including but not limited to, logging concessions and agricultural, mining or pasture
lands, transportation, for hire or compensation , or as an employee thereof, including any employee of the
national or local governments or agencies or instrumentality’s thereof and or government owned or controlled
firm or corporations who is employed to watch or secure government buildings, compounds, premises and
other properties, other than members of the Armed Forces of the Philippines, guards of the Bureau of Jail
management and Penology, Municipal or City jail guards, and members of the Philippine National Police or of
any other law enforcement agency of the Government.

Qualifications of a Security Guard


1. Must be a Filipino citizen
2. Must be a high school graduate
3. Must be physically and mentally fit
4. Must not be less than 21 nor more than 50 years of age
5. Must be at least 5 feet and 4 inches in height (RA 5487)
6. Must not be suffering from any of the ff: disqualifications
a. Dishonorably discharged or separated from the AFP
b. Mental incompetent
c. Addicted to the use of narcotic drug or drugs
d. Habitual drunkard
7. Must have undergone a pre-licensing training course
8. Must not be convicted of any crime involving moral turpitude

9
Insight Review Center LEA (Introduction to Industrial Security Concepts)
PRIVATE SECURITY GUARD AGENCY
 any person, association partnership, or corporation, who recruits, trains, muster, furnishes, solicits individuals
or business firms, private or government-owned or controlled corporations to engage his service or those of its
watchmen.
Notes:
1. All person used in a private detective work must be licensed
2. All person employed solely for clerical or manual work need no private detective license.
3. License (LTO) shall be displayed at all times in a conspicuous and suitable place in the agency office or
headquarters of the agency and shall be exhibited at the request of any person whose jurisdiction is in
relation with the business of the agency or the employees thereof, or of the Chief of the PNP or his duly
authorized representative or any peace officer.
4. The PNP shall exercise general supervision over the operation of all private detective and private detective
agency.

Who May Organize and Maintain PSA and PDA?


 Any Filipino citizen or corporation, partnership, or association, one hundred per cent (100%) of which is owned
and controlled by Filipino citizens
 Provided, that no person shall organize or have an interest in, more than one such agency except those which
are already existing at the promulgation of this Decree:
 Provided, further, That the operator or manager of said agency must be:

Qualifications of the Operator/Manager of a Security Agency


1. Must be at least 25 years of age
2. Must be a College Graduate and/or No.3 below.
3. Must be a commissioned officer in the inactive service of the Armed Forces of the Philippines
4. Must be of good moral character
5. Must have no previous record of any conviction of any crime or offense involving moral turpitude
6. Must not be suffering from any of the following disqualifications:
a. Dishonorably discharged or separated from the AFP
b. Mental incompetent
c. Addicted to the use of narcotic drug or drugs
d. Habitual drunkard
7. Must have taken a course/seminar on industrial Security Management and/or must have adequate training
or experience in security business (IRR)

Note: One can’t be a Commissioned officer in the inactive service of the AFP unless college graduate. The law used the
word and/or.

— New applicant for license to operate shall be required to obtained minimum capitalization of one million (Php
1,000,000.00) pesos with minimum bank deposit of five hundred thousand (Php 500,000.00) pesos in order to start
its business operation

LICENSE TO EXERCISE PROFESSION


 shall mean any document issued by the Chief, Philippine National Police or his duly authorized representative
recognizing a person to be qualified to perform his duties as private security or training personnel.
LICENSE TO OPERATE (LTO)
 is a License Certificate document, issued by the Chief, Philippine National Police or his duly authorized
representative, authorizing a person to engage in employing security guard or detective, or a juridical person to
establish, engage, direct, manage or operate an individual or a private detective agency or private security
agency/company security force after payment of the prescribed dues or fees as provided in these Rules and
Regulations.
COMPANY GUARD FORCE (CGF)
 a security force maintained and operated by any private company/corporation utilizing any of its employees to
watch, secure or guard its business establishment premises, compound or properties.
GOVERNMENT GUARD UNIT (GGU)
 a security unit maintained and operated by any government entity other than military or police, which is
established and maintained for the purpose of securing the office or compound and/or extension of such
government entity.

10
Insight Review Center LEA (Introduction to Industrial Security Concepts)
PNP
 as used herein shall mean the Philippine National Police, which was organized pursuant to the provision of RA
6975 otherwise known as the National Police Act of 1991.
SAGSD
 has used herein shall refer to the current PNP Civil Security Group Security Agency and Guard Supervision
Division or any other PNP Office that may be designated later as the primary office for supervision of the
implementation of these rules and regulations.

PADPAO
 refers to the Philippines Association of Detective and Protective Agency Operators, Inc., which is an association
of all licensed security agencies and company security forces.
DUTY DETAIL ORDER
 is a written order/schedule issued by a superior officer usually the private security agency/branch manager or
operations officer assigning the performance of private security/detective services duties.

LIMITATIONS AND PROHIBITIONS

1. On Membership:
— No regular license shall be granted to any PRIVATE SECURITY AGENCY unless it has a minimum of two hundred
(200) licensed private security personnel under its employ;
— nor to any COMPANY GUARD FORCE or PRIVATE DETECTIVE AGENCY unless it has a minimum of thirty (30)
licensed private security personnel under its employ;
— Provided, that the maximum number of private security personnel that a PSA/CGF/PDA may employ shall be one
thousand (1,000):
2. On Organization:
— No person, corporation, partnership or association may organize more than one agency in any one city or
municipality.
3. On Service:
— No agency shall offer, render or accept its services to gambling dens or other illegal enterprises.
— The extent of the security service being provided by any security agency shall not go beyond the whole
compound or property of the person or establishment requesting the security service except when they escort
big amount of cash.

License to Exercise Profession:


 shall mean any document issued by the Chief, PNP or his duly authorized representative recognizing a person to
be qualified to perform his duties as private security or training personnel

Licenses in the Security Profession:


A. License to Operate B. Security Guard License C. Firearms License

A. License to Operate
 Is license certificate document, issued by the Chief, PNP or his duly authorized representative, authorizing a
person to engage in employing security guard or detective, or a juridical person to establish, engage, direct,
manage, or operate an individual or a private detective agency or private security agency/company security
force after payment of the prescribed dues or fees as provided.

Application of LTO:
 To the Chief, PNP through the PNP Security and Guard Supervision Division, Civil Security Group (SAGSD-CSG).
Using license application form PNPSF1, the application shall contain the full name of the applicant, his age, civil
status, his residence and location of business

For new applicant:


⮚ Applicants from NCR may file their application for license to exercise profession with the personnel
licensing section, SAGSD, Civil Security Group, Camp Crame, Quezon City.
⮚ Applicants from the Province may file their application with the Firearms, Explosives, Security Agencies
and Guards Section (FESAGS), Regional Operation and Plan Division (ROPD) of the Police Regional Office
concerned.

Renewal of License to Operate:

11
Insight Review Center LEA (Introduction to Industrial Security Concepts)
 All applications for renewal of license to operate shall be filed at least sixty (60) days before expiry date of LTO
subject of the renewal application filed/accepted thereafter shall be penalized for late filing.
 In addition to other renewal requirements under provision of these rules and regulation, no application shall be
approved unless a certification is issued by FED-CSG to the effect that all licensed firearms of the agency
concerned are updated/renewed for at least one (1) year forthcoming during the validity of the renewed LTO

Two Categories of LTO:


a. Temporary License
b. Regular License
Temporary License
— Is issued by the PNP thru CSG Directorate after the applicant/licensee should have complied with all the
requirements while it has less than two hundred guards.
Regular License
— Is issued to the PSA once it is qualified of having two hundred (200) or more licensed security guard in its employ
duly posted.
— It is renewable every two years

B. Security Guard License


 Before a security guard can practice his profession, he shall possess a valid security license.
 It is renewable every three years as per PNP-SOSIA Memorandum dated May 23, 2011.

C. Firearms License
 All firearms of the security agency should be covered with firearms license issued by the PNP through Firearms
Explosives Division under the Civil Security Group
 Renewable every two years.

Possession of Firearms:
— one firearm for every two security guards (1:2) in its employ;
— No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500 units

Restriction to possess high powered firearms:


— The firearm first be registered with the FED before issuance and shall not be used or transferred in places other
than those specially authorized by the Director, CSG.
— The total number of high – powered firearms that an agency or security force/unit is authorized to possess shall
not exceed ten percent (10%) of the total number of security guards or watchmen in its employ.

Stocking of ammunition:
— PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
— Individual issue to each a security guard shall be limited to one half of such basic load or twenty-five (25) rounds
for every security guard

TYPES OF SECURITY

In the field of industrial security, various types of security are applied depending on the installation and the
security needs of the installation. The types of security are the following:

1. Physical Security
 The broadest branch of security which is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials and documents and to safeguard them from espionage,
sabotage, damage, loss and theft.
 defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies,
programs, personnel, property, utilities, information, facilities and installation against compromise, trespass,
sabotage, pilferage, embezzlement, fraud, or another dishonest criminal act.
 It is the sum total of all physical protection employed or installed to secure assets.
 Ex. Human Guards, perimeter fence/barrier and security devices

2. Communication Security
 It is the protection resulting from the application of various measures that prevent or delay the enemy or
unauthorized persons in gaining information through the communication system. This includes:

12
Insight Review Center LEA (Introduction to Industrial Security Concepts)
a. Transmission Security- a component of communication security that results from all measures designed
to protect transmission from the interception, traffic analysis, and imitative deception.
b. Cryptographic Security- result from the provisions of technically sound crypto-systems and their proper
use.

3. Hotel Security
 a type of security applied to hotels where its properties are protected from pilferage, loss, damage and the
function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type
of security employs house detectives, uniformed guard and supervisor and ensures that hotel guests and their
personal effects are safeguarded.

4. Bank Security
 This type of security is concerned with bank operations.
 Its main objective is the protection of bank cash and assets, its personnel and clientele.

5. Document Security
 is that aspect of security which involves the application of security measures for the proper protection and
safeguarding of classified information.

6. VIP Security
 a type of security applied for the protection of top-ranking officials of the government or private entity, visiting
persons of illustrious standing and foreign dignitaries.

7. Industrial Security
 a type of security applied to business groups engaged in industries like manufacturing, assembling, research and
development, processing, warehousing and even agriculture.
 It may also mean the business of providing security.

8. Operational Security
 This is a type of security that deals primarily with the protection of processes, formula, patents and other
industrial and manufacturing activities from espionage, infiltration, loss, compromise, or photocopying.

9. Other Special Types of Security


a. Air cargo Security – This is applied to minimize, if not prevent, losses of cargo during in transit, storage or
transfer.
b. School Security - a type of security that is concerned with the protection of students, faculty members, and
school properties.
c. Supermarket or Mall Security - a type of security which is concerned with the protection of the stores,
warehouses, storage, its immediate premises and properties as well as the supermarket personnel and
customers.
d. Personnel Security – This involved in the background checks of individuals commensurate with the security
requirements of their work. This also includes measures designed to protect employees of an organization or
business establishment.

MAJOR AREAS OF INDUSTRIAL SECURITY MANAGEMENT

1. Physical Security
2. Personnel Security
3. Document & Information Security

PHYSICAL SECURITY
 The broadest branch of security which is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials and documents and to safeguard them from espionage,
sabotage, damage, loss and theft.
 defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies,
programs, personnel, property, utilities, information, facilities and installation against compromise, trespass,
sabotage, pilferage, embezzlement, fraud, or another dishonest criminal act.
 It is the sum total of all physical protection employed or installed to secure assets.
 Ex. Human Guards, perimeter fence/barrier and security devices

13
Insight Review Center LEA (Introduction to Industrial Security Concepts)
BARRIER
— defined as any physical structure whether natural or man-made, capable of restricting, deterring, delaying or
preventing illegal and unauthorized access to an installation.

Two General Types of Physical Barriers:


1. Natural Barrier
2. Man-Made Barrier
Natural Barrier
 It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse
which delay or make more difficult the entry of the intruder.
Man-Made Barrier
 Structural constructions like fences, walls, floors, roofs, grills, bars, road blocks, or other physical means to deter
or impede penetration.

Kinds of Barriers:

Natural barriers
 it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
Structural barriers
 These are features constructed by man regardless of their original intent that tends to delay the intruder.
 Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
Human barriers
 persons being used in providing a guarding system or by the nature of their employment and location, fulfill
security functions.
 Examples are guards, office personnel, shop workers, etc.
Animal barriers
 animals are used in partially providing a guarding system.
 Dogs are usually trained and utilized to serve as guard dogs. German shepherds are best suited for security
functions.
Energy barriers
 It is the employment of mechanical, electrical, electronic energy that imposes a deterrent to entry by the
potential intruder or to provide warning to guard personnel.
 These are protective lighting, alarm systems and any electronic devices used as barriers.

Three Lines of Physical Defense:

1. First line of Defense


 perimeter fences/ barriers
2. Second line of defense
 doors, floors, windows, walls, roofs and grills and other entries to the buildings
3. Third line of defense
 storage system like steel cabinets, safes, vaults and interior files.

1) PERIMETER BARRIER
 (1st Line of Defense)

MAIN PURPOSE
 To deny, to delay or impede access or exit unauthorized person/s. 

OTHER PURPOSE OF PERIMETER BARRIER


 Defines the boundary of the property to be secured
 Creates a physical and psychological deterrent to unauthorized entry
 Delays intrusion, thus facilitating apprehension of intruders
 Assists in a more efficient and economical employment of guards
 Facilitates and improves the control of pedestrian and vehicular traffic

TYPES OF FENCING
1. SOLID 2. FULL-VIEW

Solid fence

14
Insight Review Center LEA (Introduction to Industrial Security Concepts)
 constructed in such a way that visual access through the fence is denied.
 Its advantage is that it denies the opportunity for the intruder to become familiar with the personnel, activities
and the time scheduled of the movements of the guards in the installation.
 On the other hand, it prevents the guards from observing the area around the installation and it creates
shadows that may be used by the intruder for cover and concealment.
Full-view fence
 it is constructed in such a way that visual access is permitted through the fence.
 Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the
installation under observation.
 On the other hand, it allows the intruder to become familiar with the movements and time schedule of the
guard patrols thereby allowing him to pick the time that is advantageous on his part.

Types of Full-View Fence:


A. Chain link fence B. Barbed wire fence C. Concertina wire fence

Chain Link Fence


 Must be constructed of 7 - foot material excluding top guard
 Must be of 9-gauge or heavier
 Mesh opening are not larger than 2" per side
 Should be twisted and barbed salvage of top and bottom
 Must be securely fastened to rigid metal or reinforced concrete
 Must reach within 2" of hard ground or paving
 On soft ground, must reach below surface deep enough to compensate for shifting soil or sand
Barbed Wire Fence
 Standard barbed wire is twisted, double strand, 12-gauge wire within 4-point barbs spaced an equal distance
apart.
 Barbed wire fencing should not be less than 7 feet high, excluding top guard
 Barbed wire fencing must be firmly affixed to posts not more than 6 feet apart.
 The distance between strands must exceed 6" and at least one wire will be interlaced vertically and midway
between posts.
Concertina Wire Fence
 Standard concertina barbed wire is a commercially manufactured wire coil of high strength steel barbed wire
clipped together at intervals to form a cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter.

THE TOP GUARD


⮚ A top guard is an overhead barbed wire along the top of the fence, facing outward and upward at approximately
45-degree angle.
⮚ Top guard supporting arms will be permanently affixed to the top of fence posts to increase the overall height of
the fence by at least one foot.
⮚ Three strands of barbed wire, spaced 6" apart, must be installed supporting arms.
CLEAR ZONES
A. A clear zone of 20 feet or more should exist between the perimeter barrier and exterior structures, parking
areas and natural or man-made features.
B. A clear zone of 50 feet or more should exist between the perimeter and structures within the protected areas
except when a building constitutes part of the perimeter barrier.

2) BUILDING EXTERIORS (2nd Line of Defense)


1) Walls 3) Windows 5) Fire Escapes
2) Doors 4) Roof Openings

3) INTERIOR CONTROLS (3rd Line of Defense)


1) ID System 3) Exit 5) Alarm Sensors
2) Entrance 4) Restricted Area

6) Communication Systems
a. Local Tel Exchange d. Call Boxes
b. Two-Way Radio e. Intercommunications
c. Commercial Tel Service f. Paging & Recall System
15
Insight Review Center LEA (Introduction to Industrial Security Concepts)
7) Guards 

DOGS AND ASSET PROTECTION (K9)


1) Basic Instincts
a. Hunting, attack without fear
b. Pack, sees human as a member of his pack and will protect him

2) Primary Value
a. Sensor mechanism, 100X better than man
b. Hearing 2X that of man
3) Secondary Value
a. Attack/Pursue, attack/hold
4) Dog's Sense
a. Smell c. Sight
b. Hearing d. Touching
5) Deployment
a. With Handlers b. Without Handlers

PROTECTIVE LIGHTING
— is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders.

Types of Protective Lighting

A. Continuous lighting
 The most familiar type of outdoor security lighting
 This is designed to provide two specific results: glare projection or controlled lighting.
 It consists of a series of fixed luminaries at range to flood a given area continuously during the hours of
darkness.

1. Glare Protection Type


 The intensity is focused to the intruder while the observer or guard remains in the comparative
darkness. The lighting is toward the approach of an entrance to an installation. Lights with reflectors
increase glare. It is being used in prisons and correctional institutions to illuminate walls and outside
barriers.
2. Controlled Lighting
 The lighting is focused on a pile of items rather than on the background. The width of the lighted strip
can be controlled and adjusted to suit the security needs.

B. Stand-by Lighting
 It is designed for reserve or standby use or to supplement continuous systems. A standby system can be most
useful to selectively light a particular area on an occasional basis.
C. Movable or Portable Lighting
 This system is manually operated and is usually made up of movable search or floodlights that can be located in
selected or special locations which will require lighting only for a short period of time.
D. Emergency Lighting
 A stand-by lighting which can be utilized in the event of electrical failure or other emergencies when another
system is inoperative, either due to local equipment or commercial power failure.

Types of Lighting Equipment:

Four types of lighting equipment are generally used or associated with security lighting.
These are:

A. Flood lights
 These can be used to accommodate most outdoor security lighting needs, including the illumination of
boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
B. Street lights
 This lighting equipment received the most widespread notoriety for its value in reducing crime.
C. Search lights
 These are highly focused incandescent lamps and are designed to pinpoint potential trouble spots.

16
Insight Review Center LEA (Introduction to Industrial Security Concepts)
D. Fresnel lights
 These are wide beam units, primarily used to extend the illumination in long, horizontal strips to protect the
approaches to the perimeter barrier.
 Fresnel projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from 15 to
30 degrees in the vertical plane.

ALARM
 is an aural or visual signal given by the annunciator to security when intruder actuates the device in a protected
area.
 designed to alert security personnel to consummated or attempted intrusions into an area, building or
compound

PROTECTIVE ALARM
 It assists the security in detecting, impeding or deterring potential security threat in the installation.
 Basically, its function is to alert the security personnel for any attempt of intrusion into a protected area,
building or compound. Once an intruder tampers the circuitry, the beam or radiated waves of the alarm system,
it will activate an alarm signal.

Three Basic Parts of Alarm System:


1. Sensor or trigger device
 it emits the aural or visual signals or both.
2. Transmission line
 a circuit which transmits the message to the signaling apparatus.
3. Enunciator/ annunciator
 it is the signaling system that activates the alarm.

Types of Protective Alarm System:

A. Central Station System


 a type of alarm where the control station is located outside the plant or installation. When the alarm is sounded
or actuated by a subscriber, the central station notifies the police and other public safety agencies.
B. Proprietary system
 centralized monitor of the proprietary alarm system is located in the industrial firm itself with a duty operator.
In case of alarm, the duty operator calls whatever is the primary need; firefighters, police, an ambulance or a
bomb disposal unit.
C. Local Alarm
 This system consists of ringing up a visual or audible alarm near the object to be protected. When an intruder
tries to pry a window, the alarm there goes off.
D. Auxiliary alarm
 company-owned alarm systems with a unit in the nearest police station so that in case of need, direct call is
possible. The company maintains the equipment and lines both for the company and those in the police, fire and
other emergency agencies by special arrangement. The auxiliary system can be availed of by radio, landlines, or
cell phones.
E. Local alarm by chance system
 This is a local alarm system in which a bell or siren is sounded with no predictable response.
 This system is used in residences or small retail establishments which affords a response system.
 The hope is that a neighbor or passing patrol car will reach an alarm and call for police assistance, but such a call
is purely a matter of chance.
F. Dial alarm system
 This system is set to dial a predetermined number or numbers when the alarm activates. The numbers selected
might be the police or the subscriber’s home number, or both.
 When the phone is answered, a recording states that an intrusion in progress at the location is so alarmed.

Kinds of Alarms Devices:

A. Audio Detection Device


 it will detect any sound caused by attempted force entry. A supersonic microphone speaker sensor is installed in
walls, ceilings and floors of the protected area.
B. Vibration Detection Device

17
Insight Review Center LEA (Introduction to Industrial Security Concepts)
 it will detect any vibration caused by attempted force entry. A vibration sensitive sensor is attached to walls,
ceilings or floors of the protected area.
C. Metallic foil or wire
 it will detect any action that moves the foil or wire. An electrically charged strip of tin foil or wire is used in the
doors, windows or glass surfaces of the protected area.

D. Laser Beam Alarm


 a laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a physical object, an
alarm is activated.
E. Photoelectric or Electric Eye Device
 an invisible/visible beam is emitted and when this is disturbed or when intruder breaks contact with the beam, it
will activate the alarm.
F. Microwave Motion Detection Device
 a pattern of radio waves is transmitted and partially reflected back to an antenna. If they strike a moving object,
they return at a different frequency which results in initiating an alarm signal.

PROTECTIVE LOCK and KEY CONTROL

LOCK
— defined as a mechanical, electrical, hydraulic, or electronic device designed to prevent entry into a building,
room, container or hiding place.
PETERMAN
— a term in England for lock picker, safecracker, and penetrator of restricted areas or rooms.

Types of Locks:

1. Key-operated mechanical lock


 it uses some sort of arrangement of internal physical barriers (wards tumblers) which prevent the lock from
operating unless they are properly aligned.
 The KEY is the device used to align these internal barriers so that the lock may be operated.
2. Padlock
 a portable and detachable lock having a sliding hasp which passes through a staple ring and is then made fasten
or secured.
3. Combination lock
 instead of using the key to align the tumblers, the combination mechanism uses numbers, letters or other
symbols as reference points which enables an operator to align them manually.
4. Code-operated lock
 a type of lock that can be opened by pressing a series of numbered buttons in the proper sequence.
5. Electronic lock
 a type of lock that can be opened and closed remotely by electrical means.
6. Card-operated lock
 a type of lock operated by a coded card.
7. Biometric System

Types of Keys:

1. Change key - a specific key, which operates the lock and has a particular combination of cuts or biting, which match
the arrangement of the tumblers in the lock.
2. Sub-master key - a key that will open all the locks within a particular area or grouping in a given facility.
3. Master key - a special key capable of opening a series of locks.
4. Grand Master key - a key that will open everything in a system involving two or more master key groups.

KEY CONTROL
 Once an effective key control has been installed, positive control of all keys must be gained and maintained.
 This can be accomplished only if it is established in conjunction with the installation of new locking devices.
 The following methods can be used to maintain effective key control;
a. Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system. It should be secured at all times.

18
Insight Review Center LEA (Introduction to Industrial Security Concepts)
b. Key record- some administrative means must be set up to record code numbers and indicate to whom keys
to specific locks have been issued.
c. Inventories- periodic inventories will have to be made of all duplicate and original keys in the hands of the
employees whom they have been issued.
d. Audits- in addition to periodic inventory, an unannounced audit should be made of all key control records
and procedures by a member of management.
e. Daily report- should be made to the person responsible for key control from the personnel department
indicating all persons who have left or will be leaving the company. In the event that a key has been issued,
steps should be initiated to ensure that the key is recovered.
STATUTORY PROHIBITION OF KEY

Art. 304 (RPC) Possession of picklocks or similar tools.


 Any person, who shall without lawful cause have in his possession picklocks or similar tools especially adapted
to the commission of the crime of robbery, shall be punished by arresto mayor in its maximum period to prision
correccional in its minimum period.
 The same penalty shall be imposed upon any person who shall make such tools. If the offender be a locksmith,
he shall suffer the penalty of prision correccional in its medium and maximum periods.

Art. 305 (RPC) False keys. — The term "false keys" shall be deemed to include:
 The tools mentioned in the preceding articles.
 Genuine keys stolen from the owner.
 Any keys other than those intended by the owner for use in the lock forcibly opened by the offender.

SECURITY CABINET
— The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instruments, precious metals or other especially valuable assets are protected.
— These security containers will be of a size and quantity, which the nature of the business dictates.

Three (3) Types of Security Cabinet:

Safe
 a metallic container used for the safekeeping of documents or small items in an office or installation.
 Its weight must be at least 750 lbs. and should be anchored to a building structure.
 Its body should at least one-inch-thick steel.
Vault
 heavily constructed fire and burglar resistance container usually a part of the building structure used to keep
and protect cash, documents and negotiable instruments.
 Vaults are bigger than safe but smaller than a file room.
 The vault door should be made of steel at least 6 inches in thickness.
 The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
 The vault must be resistive for up to 6 hours.
File room
 a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people
to work on the records inside.
 The file room should at most be 12 feet high.
 It must have a watertight door and at least fireproof for one hour.

PERSONNEL SECURITY
— Of the three key security processes, personnel security is considered the most important simply because
security involves people, both as assets to be protected and as sources of security threats.

Purpose
 To ensure that a firm hires those employees best suited to assist the firm in achieving its goals; and
 Once hired, assist in providing the necessary security to them

Scope of Personnel Security


a. Personnel Security Investigation
b. Security Education

The Security “Chain”:

19
Insight Review Center LEA (Introduction to Industrial Security Concepts)
 Personnel Security is the “weakest link” in the security “chain”.
 This weakness can best be minimized or eliminated by making initial personnel security conscious through a
good training program.
 Security depends upon the action of the individuals.
 The superior must instruct his subordinates so that they will know exactly what security measures to take in
every instance; A safe will not lock itself.

Control of Personnel:
 Access to “Restricted Areas” can be partially controlled by fences, gates and other physical means, but the
individual working in the area is the key to the bringing out of classified matter to unauthorized personnel.
 Written information does not have the power of speech.
 Only the individual has knowledge of this written information can pass it to unauthorized personnel if he
unguardedly talks about information.

Personnel Security Investigation (PSI)


 An inquiry into the character, reputation, discretion, integrity, morals and loyalty of an individual in order to
determine a person's suitability for appointment or access to classified matter.

Types of Personnel Security Investigation (PSI):


A. National Agency Check (NAC) C. Background Investigation (BI)
B. Local Agency Check (LAC)

National Agency Check (NAC).


 This is an investigation of an individual made upon the basis of written information supplied by him in response
to official inquiry, and by reference to appropriate national agencies. It is simply a check of the files and records
of national agencies. The national agencies checked under this type of investigation are the following:
a. National Bureau of Investigation (NBI) clearance
b. PNP Directorate for Intelligence (DI) clearance
c. Intelligence Service, AFP (ISAAFP) clearance

Local Agency Check (LAC)


 This type of investigation consists of the first type plus written inquiries sent to appropriate local government
agencies, former employees, references and schools listed by the person under investigation. The local agencies
normally check besides the past employment, schools and references are the following:
a. Barangay clearance c. Local Police clearance
b. City or Municipal clearance d. Court clearance

General Techniques of PSI:


A. Background Investigation D. Financial and Lifestyle Inquiry
B. Positive Vetting E. Undercover Investigation
C. Profiling F. Exit Interview

A. Background Investigation (BI)


 This is a more comprehensive investigation than the NAC or the NAC and LAC.
 A thorough and complete investigation of all or some of the circumstances or aspects of a person’s life is
conducted.
 This type of Personnel Security Investigation may either be a complete (CBI) or a partial Background
Investigation (PBI).
a. Complete Background Investigation - Consist of the investigation of the background of a person,
particularly all the circumstances of his personal life.
b. Partial Background Investigation – Consist of the investigation of the background of an individual but
limited only to some of the circumstances of his personal life which are deemed pertinent to the
investigation. Normally, the request for the investigation will indicate the specific personal
circumstances to be covered. This type of BI is also used to further develop questionable information
contained in another investigation report.

Background Investigation

20
Insight Review Center LEA (Introduction to Industrial Security Concepts)
— It serves to verify information on the application form and to obtain other information pertinent to the decision
to employ.
— Factors to consider in a Bl:
a. Loyalty - quality of faithfulness to the organization, superiors, subordinates and peers.
b. Integrity - uprightness of character, soundness of moral principles and truthfulness.
c. Discretion - ability to act or decide with prudence; habit of wise judgment.
d. Morals - distinctive identifying qualities that serve as an index to the essential nature of a person.
e. Character-sum of traits impressed by nature, education and habit of a person.
f. Reputation - opinion which one is generally held. Reputation is what a person is reported while
character is what a person is.
— Motives That Cause People to be Disloyal
a. Revenge d. Friendship
b. Material Gain e. Ideological Beliefs
c. Personal Prestige

B. Positive Vetting
 The process of inspecting or examining with careful thoroughness.
 The essence of vetting is a personal interview conducted under stress.
 It is based on the information previously given by the applicant.
C. Profiling
 The process whereby a subject’s reaction in a future critical situation is predicted by observing his behavior, or
by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test.
D. Financial and Lifestyle Inquiry
 This type of investigation seeks to gather information on income and mode of living, sometimes referred to as
the earning to debt ratio.
E. Undercover Investigation
 This is the placement of an agent in a role in which the agent’s true identity and role remains unknown in order
to obtain information for criminal prosecution or for recovery or limitation of asset losses
F. Exit Interview
 It gives departing employees an opportunity to list grievances.
 It offers security managers an opportunity to learn of problems not previously known.
 Debriefing an employee to remind their continuing legal obligation to safeguard confidential company
information

DOCUMENT & INFORMATION SECURITY


— The leakage of documents and information cost the government, business and industry alike, billions of pesos.

PROTECTION OF SENSITIVE INFORMATION


In the business community it is seldom heard about the protection of such information which we believe should
be given enough protection. In the security protection, a security professional should deal with this squarely and fairly as
in other security aspects like physical security and personnel. In our discussion, we will try to understand why this should
be and what kind of information should be given ample protection and distinguish them from one another. Also, why
and in what we are losing them.

Proprietary Information
Information which in some special way relates to the status of activities of the possessor and over which the
possessor asserts ownership. In the business community proprietary information relates to the structure, products or
business methods of the organization.
What kind of information needs protection?

Trade Secret
A trade secret may consist of any formula, pattern, device or compilation of information which is used on one’s
business and which gives one an opportunity to gain advantage over competitors who do not know or use it. It may be a
formula for a chemical compound, a process of manufacturing, treating or preserving materials, a pattern for a machine
or other device, or a list of customers.
The most basic distinction in regard to proprietary information is between trade-secret data and all other types
of confidential data.

All proprietary information is confidential, but not all confidential information is proprietary.

21
Insight Review Center LEA (Introduction to Industrial Security Concepts)
For example, confidential personnel data in employee files is not proprietary information even though the
company treats it as confidential.
The definition of trade secret contains a reasonable departure from the Restatement of Torts definition which
required that a trade secret be “continuously used in one’s business”.

Essential elements of a Trade Secret


a. It is not to be generally known too other and
b. Some advantages are gained by the user from its use or possession

What is Secret?
This question is taken up first because it is relevant even in cases where data involved are not trade secrets but
merely simple facts. If information is not novel or secret, it is not entitled to any protection; it is the property of
everyone and it is in the public domain.

To be secret, information must generally meet the following tests:


a. It must be identifiable
b. It must not be already available in public sources
c. It must be disclosed by the owner only to persons who under some duty to protect its secrecy
d. Persons to whom it is disclosed must know it is a secret
e. There must be some objective indication that the owner is attempting to prevent its unauthorized disclosure

A Patent is a grant made by the government to an inventor, conveying and securing to him exclusive rights to make, use
and sell his invention for a term of 20 years.
The main differences between a Trade Secret and a Patent are:
a. A trade secret can remain a secret for as long as it continues to meet the trade secret test, whereas an exclusive
right patent expires after a period of 20 years.
b. Since anyone can purchase a patent, they are not industrial espionage targets, whereas trade secrets are.

Basis of Document, Information, and Communication Security:


 Security of documents and information is based on the premise that the government has the right and duty to
protect official papers from unwarranted and indiscriminate disclosure.
 In answer to this problem, Malacañang, Manila dated August 14, 1964 entitled “Promulgating rules governing
security of classified matters in Government Offices” was promulgated in order to safeguard our secrets as
secrets.

Standard Rules
 The authority and responsibility for the preparation and classification of classified matter rest exclusively with
the originating office. Classified matter shall be classified according to their content and not to the classification
of files in which they are held or another document to which they referred;
 Classification shall be made as soon as possible by placing the appropriate marks on the matter to be classified.
 Each individual whose duties allow access to classified matter, or each individual who possesses knowledge of
classified matter while it is in his possession shall insure that dissemination of such classified matter is on the
“need-to-know” basis and to properly cleared persons only.

Matter
 In Document and Information Security, it includes everything, regardless of its physical character, or in which
information is recorded or embodied.
 A general term referring to documents, equipment, projects, books, reports, articles, notes, letters, drawings,
drawings, sketches, plans, photographs, recordings, machinery, models, apparatus, devices, and all other
products or substances.
 For purposes of security, it is also information which is transmitted orally.
Classified
 refers to assigning information by one of the four classification categories.
Security Clearance
 is the certification by a responsible authority that the person described is cleared for access to classified matter
in the appropriate level.
Need-to-know

22
Insight Review Center LEA (Introduction to Industrial Security Concepts)
 is the principle whereby access to classified matter may only be only given to those persons to whom it is
necessary for the fulfillment of their duties? Persons are not entitled to have access to classified matter solely by
virtue of their status or office. It is a requirement that the dissemination of classified matters be limited strictly
to persons whose official duty requires knowledge or possession thereof.
Certificate of Destruction
 the certification by a witnessing officer that the classified matters describe therein has been disposed of in his
presence, approved destruction methods.
 Compromise
 means loss of security, which results from unauthorized persons obtaining knowledge of classified matter.
Compartmentation
 the grant of access to classified matter only to properly cleared persons in the performance of their official
duties.
Declassify
 the removal of security classification from classified matter.
Reclassify/Regrading
 the act of changing the assigned classification of matter.
Up-grading
 is the act of assigning a matter of higher classification to a classified document.

DOCUMENT SECURITY SYSTEMS

Documents Security
 is that aspect of security which involves the application of security measures for the proper protection and
safeguarding of classified information.

Classification Categories
 Official matter which requires protection in the interest of national security shall be limited to four categories of
classification which in descending order of importance shall carry one of the following designations:
1. TOP SECRET 3. CONFIDENTIAL
2. SECRET 4. RESTRICTED

4 Types of Classified Matter:

Top Secret
 Green Color Code
 If any information and materials (matter), the unauthorized disclosure of it would cause exceptionally grave
damage to the nation, politically, economically and military operation.
Secret
 Red Color Code
 If any information and material (matter), the unauthorized disclosure of it would endanger national security,
cause serious injury to the interest or prestige of the nation or any governmental activity or advantage to a
foreign nation.
Confidential
 Blue Color Code 
 Is any information and material (matter) the unauthorized disclosure of it, would be prejudicial to the interest
and prestige of the national or governmental activity, or would cause administrative embarrassment or
unwarranted injury to and be of advantage to a foreign country.
Restricted
 White or No Color
 Is any information and material (matter), which requires special protection other than that determined to be
TOP SECRET, SECRET, or CONFIDENTIAL.

Categories of Document for Security Purposes

1. Category A
 Information which contains reportable time sensitive, order of battle and significant information.
 It should be given priority because it is critical information.
 It must be forwarded without delay.
 It is critical to friendly operations. It requires immediate action.
2. Category B

23
Insight Review Center LEA (Introduction to Industrial Security Concepts)
 Anything that contains communications, cryptographic documents should be classified as secret and requires
special handling.
 Higher authorities should declassify it
3. Category C
 Other information, which contains something that, could be an intelligence value.
 Contains exploitable information regardless of its contents.
 Unscreened materials should be categorized as Category C.
4. Category D
 No value, yet lower level will classify documents as category D.
 No decision must be made at the lower echelon that document has no value. It is the responsibility of the higher
Headquarters.

TRANSLATE AND CONSTRUCT THE BASIC INDUSTRIAL SECURITY CONCEPTS OF SECURITY SURVEY, SECURITY PLAN,
SECURITY TEST AND EVALUATION, PERSONNEL CHECK, TECHNICAL SURVEILLANCE, AND SECURITY MANAGEMENT

SECURITY MANAGEMENT

MANAGEMENT IN GENERAL AND THE PLANNING FUNCTION

The Security executive is no longer a private practitioner who impresses people with his courage deeds, skill in
apprehending criminals or expertise in handling weapons. Rather he is a modern manager entwisted with the twin tasks
of Protecting corporate assets and ensuring that business interruption if at all, is kept to the minimum. In fact, his most
challenging role is to predict the opportunities for the loss of corporate assets and/or business disruptions and reduce
those opportunities to manageable - proportions in this role, he is backed by his years and years of technical expertise as
well as the seasoning and sensitivity that come with long year of exposure in the field. It is this seasoned and sensitive
application of expertise that we will try to delve with in this discussion. Particularly, as it relates to the results that the
security executive has targeted for himself and his organization.

Management Defined
 It is the art of achieving results through people.
 It involves two types of work:
a. Technical Work- Does work by himself
b. Management Work - Oversees or supervises the job.

Elements of the Management Cycle


• in the security as in any other - field, the manager's major concern is in getting things done. It is truism that
there is no substitute for results. Thus, the primary purpose for using management technique is to aid the user
in getting things done. To be able to do that a grasp of the following elements of the management cycle is
imperative:
 Planning  Staffing
 Financing  Training and Professional Development
 Organizing  Communication

Security Management and Cost - Effectiveness


Cost - Effectiveness means spending the least possible amount consistent with required and at the same time, assuring
that each item of expense is fully justified as the best possible way to commit the funds.

SECURITY PLANNING
 It is PRE-DETERMINING a course of action.
 It is deciding IN ADVANCE what to do, how to do it and who is to do it.

The initial requirement in a planning process is to identify the overall objectives and purpose of the enterprise. This is
also referred to as the "MISSION STATEMENT".

Development of Security Policies


• It is a broad guide to management decision-making;
• It should be flexible enough to be applicable to changing ambitions;
• It should be in document form.

FINANCING

24
Insight Review Center LEA (Introduction to Industrial Security Concepts)
Financial Forecast
• Requires knowledge of forecasting and • Budgeting
budgeting. • It is a plan stated in financial terms
• Determining future activities & costs involved.

The Budgeting Process


 Set up goals and objectives for the year.
 Evaluate current activities, identify new activities, develop alternatives and identify costs
(aka BUDGET DEVELOPMENT).
 Evaluate and review recommendations.
 Allocate funds.

Budget Costs - 3 Categories


 Salary Expenses - total personnel costs
 Sundry Expenses (non-salary) - supplies, uniform, representations, transportations, fees, etc.
 Capital expenditures (one-time expenses) - physical improvements, acquisitions of equipment, purchase of
furniture & fixtures.

Justification
 What must be done?  When must it be done?
 How are we going to do it?  How much will it cost?

ORGANIZATION
 It is the orderly arrangement of manpower and material resources to effectively carry out their intended
purposes.
 A security organization should be designed to meet company needs.
 The structure should ENHANCE rather than impede the work of the department/agency.

Organizational Relationships
3 Basic Forms
1. Line Authority - Right & power to issue commands, exact accountability and discipline for violators.
2. Staff Authority - Authority over the staff but limited to support activities (like planning, recommending, advising,
assisting, etc.)
3. Functional Authority - Right to command but does not carry the right to discipline. (E.g., Fire safety procedure,
guidelines when receiving a bomb threat call.)

Organizational Principles
1. Work should be divided according to some logical plan.
2. Lines of authority & responsibility should be made as clear as possible.
3. There should be UNITY OF COMMAND.
4. Under the direct control of one supervisor (only) at any given time.
5. Limit SPAN OF CONTROL
o Highest Level-3
o Lowest Level -12
6. Delegate with commensurate authority and accountability.
7. All efforts of subordinate units and personnel must be coordinated into the HARMONIOUS achievement of the
organization's objectives.

Reporting Levels
1. As a General Rule, a Security Executive should 4. Customers they serve
NOT be less than two levels removed from the 5. Nature of business activities
Chief Executive Officer. 6. Identification of vulnerabilities
2. Factors Affecting Security Organization. 7. Location of company facilities
3. Corporate philosophy & purpose

Roles of the Security Executive


1. Leader – Possess leadership qualities
2. Company Executive – Accepted by senior management and peers
3. Executive with high visibility -Participates in company activities – Makes himself always available to the security
force
25
Insight Review Center LEA (Introduction to Industrial Security Concepts)
4. Executive with Broad Profile – Has interest in other fields beyond his expertise, meets people & exchanges ideas
with them.
5. Innovator – Always on the lookout for a better and less expensive way to accomplish the tasks.
6. Counselor & Adviser – For the management, peers & subordinates
7. Trainer – Can develop his men, even his successor -Participates in meetings, seminars, conferences, etc.
8. Goal-setter – Establishes objectives & defines the goals

STAFFING AND ADMINISTRATION


Position Standards or Job Descriptions
1. Job function/Principal responsibilities 7. Personal Circumstances
2. Reporting relationships 8. Hiring - sourcing and choosing candidates.
3. Professional/technical skills required Compensation - "You get what you pay for".
4. Management abilities required 9. Training - the mark of a professional security
5. Education and training force.
6. Minimum years’ experience

Basic Rules of Discipline


1. Put rules in writing and ensure that employees 4. Educate, do not humiliate. Help, not hurt.
understand them 5. Discipline promptly.
2. Discipline in private. 6. Appraisal of Results - basis for promotion or
3. Be objective and consistent. Condemn the act, discipline; should be done regularly. Enhance
not the person. accountability.

Promotions
- key to motivation.
- "Promote from within or recruit from outside?"
Morale and Welfare
- taking care of your men
- motivate subordinates; make them function as a team
- instill pride in them as a member of the organization/company
Communication
- fast and complete
- upward, downward, horizontal & grapevine

Ten Management Rules


1. Definite and clear responsibilities should be assigned to each executive.
2. Responsibility should always be coupled with the corresponding authority.
3. No change should be made in the scope or responsibilities of a position without a define understanding to that
effect on the part of all persons concerned.
4. No executive or employee, occupying a single position in the organization, should be subject to definite orders
from more than one source.
5. Orders should never be given to subordinates over the head of responsible executive. Rather than do this,
management should supplant the officer in question.
6. Criticisms of subordinates should, whenever possible, be made privately and in no case should subordinates be
criticized in the presence of executives or employees of equal or lower rank.
7. No dispute or difference between executives or employees as to authority or responsibilities should be
considered too trivial for prompt and careful adjudication.
8. Promotions, wage changes and disciplinary action should always be approved by the executive immediately
superior to the one directly responsible.
9. No executive or employee should be required or expected to be at the same time as assistant to, or critic of,
another.
10. Any executive whose work is subject to regular inspection should, whenever practicable, be given the assistance
and facilities necessary to enable him to maintain an independent check of the quality of his work.

PROGRAM IMPLEMENTATION
 Top management responsibility - where it  Drills and rehearsals.
should start.  Validation and updating of plans.
 Involvement of others.  Program evaluation.
 Setting priorities and meeting schedules.

26
Insight Review Center LEA (Introduction to Industrial Security Concepts)
PROBLEM SOLVING AND DECISION MAKING - Seven Steps
 Clearly define the problem.  Select the best practical solution.
 Gather information.  Implement the solution.
 Interpret/analyze the information.  Evaluate
 Develop solutions.

Some Pitfalls in Decision - Making


 Jumping into conclusions  Failing to get the facts
 Accepting the first choice  Failing to weigh alternatives
 Accepting the easiest way out  Failing to consider consequences
 Procrastinating or postponing  Fearing to take risks and assume responsibility
 Letting prejudices or emotions influence
Factors Affecting a Decision
 Prior experience  Authority or expert opinion
 Self-interest  Logical thinking
 Tradition  Emotion and prejudice
 Creativity  Ease of execution

SECURITY AUDIT/INSPECTION
Rationale
 To check on the degree of compliance with the recommended countermeasures.
 To determine the effectiveness and adequacy of the countermeasures.

Conduct of Audit - based on security survey and vulnerability assessment report. Questions to Ask:
 Why are we doing it?  Is there a better way?
 Must we do it at all?  Is there a cheaper way?

The Difference between a Boss & being a Leader


 The boss drives his worker; the leader coaches them.
 The boss depends upon the authority, the leader on goodwill.
 The boss inspires fear; the leader inspires enthusiasm.
 The boss says "I”, the leader says "We".
 The boss fixes the blames for the breakdown; the leader fixes the breakdown.
 The boss knows how it is done; the leaders show how.
 The boss says, "Go", the leader says, "Let's go".

SECURITY SURVEY

1. Security Surveys are often called 'RISK ANALYSIS SURVEYS / or 'RISK ASSESSMENT SURVEYS'
2. A Security Survey is defined as the process of conducting an exhaustive physical examination of all operational
systems and procedures of a facility for the following purposes:
a. To determine existing state of security
b. Identifying weaknesses in defenses;
c. To determine the degree of protection required;
d. To produce recommendations for a total security system.
3. The survey should be undertaken by either suitably trained staff security personnel or a fully qualified independent
security specialist.
4. No universal checklist can be applied to all sites for survey purposes, as no two facilities are alike.
5. Before commencing a security survey:
a. Written authority should be obtained from the site director;
b. Previous surveys should be reviewed;
c. An orientation tour should be made;
d. Photographs should be taken of things will be difficult to describe in a report.
(Only with authority)
6. After completing the survey an immediate review of the findings should be undertaken with the plant supervisor so
that urgent deficiencies can be addressed.
7. A follow-up survey should always be conducted to ensure improvements and recommendations have been made.
8. Any survey report including lists of recommendations is incomplete without including a cost-benefit analysis, which
is; "A direct comparison of the cost of operation of the security unit and all the existing security measures with the

27
Insight Review Center LEA (Introduction to Industrial Security Concepts)
amount of the corporate assets saved or recovered as well as reduction of losses caused by injuries and lost
production."
9. No security measure should be recommended which is not cost effective.
10. Key stages in the risk assessment process are:
a. To determine the value, impact and cost of any asset should it be lost due to natural or man-made forces;
b. To determine the degree of vulnerability of the facility to damage or attach by natural or man-made forces;
and
c. To determine the degree of probability that natural or man-made forces will strike any given facility.
11. The vulnerability of a facility to damage or attack may be determined in a number of ways: (Only with authority)
a. By an inspection of the facility by an experienced inspector;
b. An examination of the facility's record of losses; and
c. Determining whether the high-value property or items are properly protected from theft by insiders.

12. Security surveys have a number of objectives:


a. To determine existing vulnerabilities to injury, death, damage or destruction by natural causes;
b. To determine existing vulnerabilities of corporate assets due to outside criminal activities;
c. To determine existing vulnerabilities to corporate assets due to criminal activities within the company;
d. To determine existing conditions of physical security regulations;
e. To measure effectiveness of current manning;
f. f. To measure compliance by employees to company security regulations;
g. To conduct an internal audit to determine fraud;
h. To inspect the overall condition within the facility which causes security problems;
i. To investigate environmental conditions in the community from a standpoint of interaction with the facility.
13. There is a similarity between a physical security surveys and crime prevention surveys, but the primary differences
are;
b. Physical security measures are oriented more towards security of property and facilities whereas;
c. Crime prevention measures focus on the deterrence of criminal activity regardless of the physical safeguards
in place.

SURVEILLANCE

Surveillance which can be conducted either covertly or overtly is the secretive and continuous process of
observing people, places or activities during the course of an investigation and the results of such surveillance can be
admitted into evidence in accordance with "rules of evidence"
It should be realized that surveillance operations are very costly. In fact, the two most expensive items in an
investigators budget are personnel and communications.

The methods employed are either: Carried out by people, or;


1. Physical Surveillance - By use of electronic equipment such as CCTV and other technical equipment, often
referred to as
2. Technical Surveillance
3. "Bugging" or Wiretapping
Surveillance' is covert (secret) observation of places, person and vehicles for the purpose of obtaining information
concerning the identities or activities of subjects.

Surveillant - The person carrying out surveillance.


Subject -The person being watched.

Three kinds of surveillance:


1. Surveillance of plan
2. Surveillance of persons (tailing or shadowing)
3. Undercover investigations (roping)

Three categories of surveillance:


1. Physical Surveillance - what a person is doing or saying; includes tailing, eavesdropping and picture taking.
2. Psychological Surveillance - what a person is thinking. Lie detection, employment form, paper honesty testing
and personality test.
3. Data Surveillance - what a person has done or has thought. Use of records, education and life history
documents.

28
Insight Review Center LEA (Introduction to Industrial Security Concepts)
*Use of video surveillance without public knowledge is a difficult area and some States do not permit its use.

The most difficult type of surveillance is when the subject is on the move and there are three kinds of 'moving
surveillance':
1. Keeping the subject under observation regardless of whether you have been spotted or 'made'
2. Carrying out discreet surveillance and discontinuing as necessary to prevent being 'made' and;
3. In such a manner as to keep subject under observation at all times without being made.

• Surveillance logs should be maintained and may be submitted as evidence.


• Where the number of the company's own staff are insufficient, or are untrained, the company should consider
the use of a professional outside agency.
• Those selected to carry out physical surveillance should be able to blend into the environment with a normal
appearance.
• One of the most important rules when conducting physical surveillance is 'not to look the subject in the eye'.

Results and Reports of Investigation:

Report Writing
• Use short paragraphs and sentences, simple words, be accurate, clear, ensure that confidential informants are
not identified and do not include suspicions or conclusions in the main body of the report.
• Reports are more usually in a narrative style and when reporting interviews include the name, address and any
other identifying information of the interviewee.
• There is no specific format for the taking of notes during an investigation, although, concise accurate and
chronologically ordered notes assist in both report writing and as an aide memoir giving evidence.

Statements and Confessions:


• There is no prescribed format for confessions or statements but both must be voluntarily.
• The person giving the statement must be advised of their rights and any waiver of these rights should be
recovered in writing.
• If the person taking the statement has only citizen's powers of arrest, then they are not required by law to
advise the suspect of his rights prior to taking the statement.
• It is good practice to have statements typed to aid legibility and signed. However, unsigned statements may be
of some value, in fact, it is said that an oral confession as well as an unsigned written confession still have legal
value.

Written statements used in recording investigative facts are primarily of the following types:
• Affidavit
• Question/Answer Statement
• Un-sworn statement; and
• Memorandum of Interview

The Investigative File:


Preparing and maintaining an investigative case file is an investigator's most important administrative duty. Not
only it is critical in the recording of investigative efforts, but it is also aids in the investigative process by indicating where
the investigator has been, what has been accomplished and what the next phase of the investigation should be. An
investigation cannot truly be considered closed until the file is completed.

The need for records: There is many reasons to create and maintain accurate and timely records of the investigative
work, some are:
1. The subject of the investigation may end up in court; the private sector investigator should be prepared to
present their finding in the event of civil or criminal litigation.
2. The file can protect the investigator from charges brought by disgruntled employees or others wishing to
discredit the investigation, by being able to demonstrate, with documented evidence, that the investigative
process is, pr was properly carried out.
3. To enable the investigator to quantify their work product, aid in budget planning and rationalization.
Identification and labeling: Instituting a case file management system that aids location and maintains complete
records of the case. It is not recommended that the suspects' name appears as part of the file/label, (e.g., 01-01-
91 Theft of Product, ABC Division) Case files should be maintained in a convenient yet secure location.

It is important to protect and keep confidential the information in the file for several reasons:

29
Insight Review Center LEA (Introduction to Industrial Security Concepts)
1. Risk of losing vital and sometimes irreplaceable information. Possibility of the file being stolen, tampered with,
destroyed or otherwise compromised.
2. Ineffective security of the file could lead to improper disclosure or leakage as sensitive information; this could
lead to claims of defamation by individuals named in the file.
3. To establish a credible 'chain of custody'. A 'chain of custody 7 refers simply to a traceable record of how
evidence was stored.

Record Retention and Disposal:


• A final consideration in investigative file maintenance is how long the files should be maintained; most law
enforcement agencies establish a record retention schedule that sets specific destruction date for each class of
records; investigator in the private sector should establish a similar process.
• A primary concern in setting the time limit should be any statutes of limitation, either civil or criminal, that
applies to the file. A destruction date should always be set after the statute of limitation expires.

Recent Developments:

DNA Profiling
1. The ability to identify a person through the DNA Profile or DNA fingerprint.
2. Samples of Hair, Blood and Semen are tested in laboratories.

Laser Latent Print Developments


• The most positive means of identifying people is the fingerprint. Laser latent print developments allow
fingerprints to be extracted from objects (including skin) some considerable time after they were left.

Artificial Intelligence (Al)


Computer driven logical processing also used in conjunction with Expert Systems.

Offender Profiling:
• Looking at the profile of the offender from the evidence of the act. Can for example indicate whether the
offender is organized or disorganized. It can also provide a personality assessment.

Types of Strikes:
• The "Economic Strike', is the most frequent type, it takes place when there is a vote to stop work because a
satisfactory employment agreement has not been negotiated. The strike action must be preceded by at least 60
days’ notice that the union desires to modify the existing collective bargaining agreement. A strike without the
60-day notice would be unlawful.
• The "Unfair Labor Practices Strike", takes place when workers strike to force discontinuance of an alleged
violation by an employer of the labor laws. It is a no strike and therefore does not permit effective planning by
security.
• Also, during this type of strike all striking employees who request to return to work, must be allowed to do so by
the employer.
• Any improper actions by security could result in unfair-practices charges and if proved, the striking employees
are guaranteed their jobs even if through permanent replacement have been hired.
• Because of the possibility of allegations of unfair labor practice being brought by the unions against the
company, it is important that security only engage in recording and documenting illegal activities by the union
and workers.
• Certain routine duties or the documentation and recording of legal activities could be seen as attempting to
interfere with an employee's rights during the strike period; for example, handling access control duties;
handling matters relating to the distribution of union literature on company property and background
investigations or investigation of activities of employees.
• It is recommended that background checks should not seek to obtain information concerning union activities
and undercover operations or surveillance type investigations should be avoided during intense union activity.
• Investigative reports should not include information concerning union affiliations of applicants or employee. An
employer may not reject applicants who have union history and may not discriminate against employees
because of union affiliations.

30
Insight Review Center LEA (Introduction to Industrial Security Concepts)
• Documentation of illegal activities would be useful in the following instances: to support criminal charges,
support of injunctive relief and support to defend against unfair labor practice complaints. It should be noted
that when taking statements from employees, Miranda warnings are not required among private parties.
• Before conducting any investigation, which involves clandestine searches of lockers or desks, it is good policy to
have a published rule covering the fact that lockers, desks and the like are subject to no notice search by
management.
-------END-------

DISCLAIMER:
This document does not claim any originality and cannot be used as a substitute for prescribed textbooks. The information presented here is merely a
collection by the committee members for their respective teaching assignments. Various sources as mentioned at the end of the document as well as freely available
material from internet were consulted for preparing this document. The ownership of the information lies with the respective authors or institutions.

31
Insight Review Center LEA (Introduction to Industrial Security Concepts)
32
Insight Review Center LEA (Introduction to Industrial
Security Concepts)

You might also like