Professional Documents
Culture Documents
Industirial Security Management
Industirial Security Management
CONCEPT OF SECURITY
Security is a state or condition of being secured; there is freedom from fear, harm, danger, loss, destruction or
damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions.
Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man
needs adequate protection.
Since security in general is very hard to comprehend, it can be divided into three major areas:
1. Physical Security - this concern with the physical measures adopted to prevent unauthorized access
to equipment, facilities, material and document and to safeguard them against espionage, sabotage,
damage, loss and theft.
2. Personnel Security- this is as important as physical security. Personnel security starts even before
the hiring of an employee and remains to be maintained for as long as the person is employed. Its
purpose is to insure that a firm hires those best suited to assist the firm in achieving its goals and
objectives and once hired assist in providing necessary security to the work force while carrying out
their functions.
3. Document and Information Security- this involves the protection of documents and classified papers
from loss, access by unauthorized persons, damage, theft and compromise through disclosure.
Classified documents need special handling. Lack of indoctrination and orientation among the
personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the
documents.
Physical security, personnel security, and document security cannot exist independently- they are mutually
supporting. They are in many respects overlapping. Physical security is correlated to the other two parts,
interwoven and one is essential to the other.
PROTECTIVE SECURITY SYSTEMS
Protective Security can be defined as those measures taken by an installation or unit to protect itself against
sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the
installation of the unit with the necessary flexibility to accomplish its mission.
The aspects of protective security can be seen with the application of the following:
1. Industrial Security – a type of security applied to business groups engaged in industries like
manufacturing, assembling, research and development, processing, warehousing and even
agriculture. It may also mean the business of providing security.
2. Hotel Security - a type of security applied to hotels where its properties are protected from pilferage,
loss, damage and the function in the hotel restaurants are not disturbed and troubled by outsiders or
the guest themselves. This type of security employs house detectives, uniforms guard and supervisor
and insures that hotel guests and their personal effects are safeguarded.
3. Bank security - this type of security is concern with bank operations. Its main objective is the
protection of bank cash and assets, its personnel and clientele. Security personnel are trained to
safeguard bank and assets while in storage, in transit and during transactions.
4. VIP Security - a type of security applied for the protection of top-ranking officials of the government or
private entity, visiting persons of illustrious standing and foreign dignitaries.
5. School Security - a type of security that is concern with the protection of students, faculty members,
and school properties. Security personnel are trained to protect the school property from theft,
vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students.
6. Supermarket or Mall Security - a type of security which is concern with the protection of the stores,
warehouses, storage, its immediate premises and properties as well as the supermarket personnel
and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and
customer relation.
7. Other types – this include all other security matters not covered in the above enumeration.
PHYSICAL SECURITY
Definition: Physical security measures are being used to define, protect, and monitor property rights and
assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized
access to equipment, facilities, material and document and to safeguard them against espionage, sabotage,
damage and theft.
Physical security may be also defined as the safeguarding by physical means, such as guard, fire protection
measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation
against compromise, trespass, sabotage, pilferage, embezzlement, fraud, or other dishonest criminal act.
What is a Barrier?
A barrier can be defined as any structure or physical device capable of restricting, deterring, delaying, illegal
access to an installation.
Generally, a barrier is use for the following purposes:
1. Define the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic.
Types of Barriers
1. Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain
that are difficult to traverse.
2. Structural barriers - these are features constructed by man regardless of their original intent that
tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or
containers etc.
3. Human barriers - persons being used in providing a guarding system or by the nature of their
employment and location, fulfill security functions. Examples are guards, office personnel, shop
workers, etc.
4. Animal barriers - animals are used in partially providing a guarding system. Dogs are usually trained
and utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose
and turkeys could also be included.
5. Energy barriers - it is the employment of mechanical, electrical, electronic energy imposes a deterrent
to entry by the potential intruder or to provide warning to guard personnel. These are protective
lighting, alarm system and any electronic devices used as barriers.
Three Line of Physical Defense
1. First line of Defense- perimeter fences/ barriers
2. Second line of defense- doors, floors, windows, walls, roofs and grills and other entries to the buildings
3. Third line of defense- storage system like steel cabinets, safes, vaults and interior files.
Principles of Physical Security
1. The type of access necessary will depend upon a number of variable factors and therefore may be
achieved in a number of ways.
2. There is no impenetrable barrier
3. Defense-in depth is barriers after barriers
4. Delay is provided against surreptitious and non-surreptitious entry.
5. Each installation is different.
Types of keys
1. Change key - a specific key, which operates the lock and has a particular combination of cuts which
match the arrangement of the tumblers in the lock.
2. Sub-master key - a key that will open all the lock within a particular area or grouping in a given facility.
3. Master key - a special key capable of opening a series of lock.
4. Grand Master key - a key that will open everything in a system involving two or more master key
groups.
Key Control
Once an effective key control has been installed, positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of new locking devices. The
following methods can be used to maintain effective key control;
1. Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have to be of
sufficient size to hold the original key to every lock in the system. It should be secured at all times.
2. Key record- some administrative means must be set up to record code numbers and indicates to
whom keys to specific locks have been issued.
3. Inventories- periodic inventories will have to be made of all duplicate and original keys in the hands of
the employees whom they have been issued.
4. Audits- in addition to periodic inventory, an unannounced audit should be made of all key control
records and procedures by a member of management.
5. Daily report- a daily report should be made to the person responsible for key control from the
personnel department indicating all persons who have left or will be leaving the company. In the event
that a key has been issued, steps should be initiated to insure that the key is recovered.
What is a Security Cabinet?
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, precious metals or other especially valuable assets are protected. These security containers will be
of a size and quantity, which the nature of the business dictates.
In protecting [property, it is essential to recognize that protective containers are designed to secure against
burglary or fire. Each type of equipment has a specialized function and it will depend on the owner of the facility
which type ha is going to use.
Three (3) Types of Security Cabinet
1. Safe - a metallic container used for the safekeeping of documents or small items in an office or
installation. Safe can be classified as either robbery or burglary resistance depending upon the use
and need.
a. Its weight must be at least 750 lbs. And should be anchored to a building structure.
b. Its body should at least one inch thick steel.
2. Vault - heavily constructed fire and burglar resistance container usually a part of the building structure
used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but
smaller than a file room.
a. The vault door should be made of steel at least 6 inches in thickness.
b. The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
c. The vault must be resistive up to 6 hours.
3. File room - a cubicle in a building constructed a little lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.
a. The file room should at most be 12 feet high.
b. It must have a watertight door and at least fire proof for one hour.
Control of Personnel in the Physical Facility
In every installation, the use of protective barriers, security lighting, communication and electronic hardware
provides physical safeguards but these are insufficient to maximize the effort of the guard force. A control point
must be established for positive personnel identification and check system. This is to insure that only those
persons who have the right and authority will be given the necessary access to the area.
The most practical and generally accepted system of personnel identification is the use of identification cards
badges or passes. Generally speaking, this system designates when and where and how identification cards
should be displayed, and to whom. This helps security personnel eliminate the risk of allowing the access of
unauthorized personnel within the establishments.
Types of Personnel Identification
1. Personal recognition
2. Artificial recognition- identification cards, passes, passwords, etc.
Use of Pass System
1. Single pass system - the badge or pass coded for authorization to enter specific areas is issued to an
employee who keeps it in his possession until his authorization is terminates.
2. Pass exchange system - an exchange takes place at the entrance of each controlled area. Upon
leaving the personnel surrenders his badge or passes and retrieve back his basic identification.
3. Multiple pass system - this provides an extra measure of security by requiring that an exchange take
place at the entrance of each restricted area.
Visitors Movement Control
Security should establish proper methods of establishing the authority for admission of visitors as well as the
limitation thereat. This security measure would depend on the sensibility of the installation, but could include
the following:
1. Visitor’s logbook – All visitors to any facility should be required to identify them selves and should be
given a visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors,
nature and duration of visit.
2. Photograph - taking of photographs should also be considered. Extreme caution must be exercised in
areas where classified information is displayed to preclude unauthorized taking of pictures of the
installation. If a visitor has camera and it is prohibited to take picture, said camera should be left in the
care of security with corresponding receipt.
3. Escort - If possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
4. Visitor entrances - separate access for visitors and employees of the establishment should be
provided.
5. Time- traveled - If there is a long delay or time lapse between the departure and arrival, the visitors
maybe required to show cause for the delay.
Package Movement Control
Every facility must establish a system for the control of package entering or leaving the premises. However,
desirable it might seem it is simply unrealistic to suppose that a blanket rule forbidding packages either in or out
would be workable. Such a rule would be damaging to the employee morale and, in many cases, would
actually work against the efficient operation in the facility. Therefore, since the transporting of packages through
the portals is a fact of life, they must be dealt with in order to prevent theft and misappropriation of company
properties. Thus;
a. No packages shall be authorized to be brought inside the industrial installation, offices and
work area without proper authority. This basic precept help reduce if not eliminate pilferage,
industrial espionage or sabotage.
b. Outgoing packages carried by personnel should be closely inspected and those in vehicles
should also be checked as many pilfered items are hidden in the surface of the vehicles
leaving the compound.
c. Any personnel/visitor entering the installation with a package should deposit the same to the
security and in return receives a numbered tag, which he/she will use in claiming his/her
package upon departing.
Classification Categories - Official matter which requires protection in the interest of national security shall be
limited to four categories of classification which in descending order of importance shall carry one of the
following designations:
TOP SECRET - SECRET
CONFIDENTIAL - RESTRICTED
In Document and Information Security, a matter includes everything, regardless of its physical character, or in
which information is recorded or embodied. Documents, equipment, projects, books, reports, articles, notes,
letters, drawings, drawings, sketches, plans, photographs, recordings, machinery, models, apparatus, devices,
and all other products or substances fall within the general term “matter”. Information, which is transmitted
orally, is considered “matter” for purposes of security.
Security Clearance is the certification by a responsible authority that the person described is cleared for
access to classified matter the appropriate level. Need-to-know is the principle whereby access to classified
matter may only be only given to those persons to whom it is necessary for the fulfillment of their duties.
Persons are not entitled to have access to classified matter solely by virtue of their status or office. It is a
requirement that the dissemination of classified matters be limited strictly to persons whose official duty
requires knowledge or possession thereof.
Certificated of Destruction is the certification by a witnessing officer that the classified matters describe
therein has been disposed of in his presence, approved destruction methods.
Classified refers to assign information by one of the four classification categories. Security Clearance refers to
the administrative determination that an individual is eligible for access to classified matter. Compromise
means lose of security, which results from an authorized persons obtaining knowledge of classified matter.
Compartmentation is the grant of access to classified matter only to properly cleaved persons in the
performance of their official duties.
Declassify is the removal of security classification from classified matter. Reclassify / Re grading is the act of
changing the assigned classification of matter. Up- grading is the act of assigning to a matter of higher
classification to a classified document.
What are Top Secret Matters?
These are information and material (matter), the unauthorized disclosure of which would cause exceptionally
grave damage to the nation, politically, economically or from a security aspect. This category is reserve for the
nation’s closest secrets and is to be used with great reserve.
Classification Authority
The original classification authority for assignment of TOP SECRET classification rests exclusively with the
head of the department. This power may however, be delegated to authorized offices in instances when the
necessity for such arises. Derivative classification authority for TOP SECRET classification (authority for) may
be granted those officers who are required to give comments or responses to a communication that
necessitates TOP-SECRETS response.
Examples of Top Secret Documents
Very important political documents regarding negotiation for major alliances.
Major governmental projects such as proposal to adjust the nation’s economy.
Military – Police defense class/plans
Capabilities of major successes of Intel services.
Compilations of data individually classified as secret or lower but which collectively should be in a higher
grade.
Strategies plan documenting overall conduct of war.
Intel documents revealing major Intel production effort permitting an evaluation by recipients of the success
and capabilities of Intel agencies.
Major government project like drastic proposals.
What are Secret Matters?
These Information and material (matter), the unauthorized disclosure of which would endanger national
security, cause serious injury to the interest or prestige of the nation or of any governmental activity or would be
of great advantage to a foreign nation.
A secret grading is justified if:
1. It materially influences a major aspect of military tactics;
2. It involves a novel principle applicable to existing important projects;
3. It is sufficiently revolutionary to result in a major advance in existing techniques or in the performance of
existing secret weapons;
4. It is liable to compromise some other projects so already graded.
Custody and accounting of classified matter – Heads of departments handling classified matter shall issue
orders designating their respective custodians of classified matter. Custodian shall:
a. Store all classified matter.
b. Maintain a registry of classified matter showing all classified matter received and to whom
transmitted.
c. Maintain current roster of persons authorized access to classified matter for each classification in
the office.
d. Insure physical security for classified matter.
e. Conduct an inventory of all TOP SECRET matter as specified in paragraph 7 (Memo Cir Nr
78/196).
f. Upon his relief, account for all TOP SECRET and SECRET matter by inventory and transmit the
same to his successor.
Unauthorized keeping of private records – All government personnel are prohibited from keeping private
records, diaries, or papers containing statement of facts or opinions, either official or personal, concerning
matters which are related to or which affects national interest or security. Also prohibited are the collecting of
souvenirs or obtaining for personal use whatsoever any matter classified in the interest of national security.
Dissemination – Dissemination of classified matter shall be restricted to properly cleared persons whose
official duties required knowledge or possession thereof. Responsibility for the determination of “need-to-know”
rests upon both each individual, who has possession, knowledge or command control of the information
involve, and the recipient.
Disclosures to other departments of classified information originating from another department
Classified matter originating from another department shall not be disseminated to other departments without
the consent of the originating department.
Release of classified matter outside a department
General Policy. – No person in the government shall convey orally, visually or by written communication any
classified matter outside his own department unless such disclosures has been processed and cleared by the
department head or his authorized representative.
Release of classified matter to Congress
Government personnel, when giving oral testimony before Congressional Committee involving classified
matter, shall advice the committee of the classification thereof. Government personnel called upon to testify
shall obtain necessary and prior instruction from his department head concerning disclosure.
When Congressional members visit government offices, department heads are authorized to release classified
matter which is deemed and adequate response to an inquiry provided that it is required in the performance of
official functions.
Disclosure to Foreign Government or Nationals
1. Its use shall be solely for the purpose for which the classified matter is requested.
2. It shall be treated or handled in accordance with the classified categories of the originating office.
3. Handling shall be made by security-cleared personnel.
4. Reproduction and dissemination shall not be made without the consent of the department head.
Disclosure of classified matter for publication
Classified matter shall be released for public consumption only upon the consent of the department head or his
authorized representative. However, in instances where there is a demand or need for releasing classified
information, extreme caution must be exercised to analyze in detail contents of the classified matter before
release. Normally all information are released through Public Information Officers. Public Information Officers
should be assisted in the analysis of classified information by the Security Officer.
Purpose of Protecting Classified Materials
1. Deter and impede potential spy
2. Assist in security investigations by keeping accurate records of the moments of classified materials.
3. Enforce the use of “Need to Know” principle
Categories of Document for Security Purposes
1. Category A
a. Information which contains reportable time sensitive, order of battle and significant
information.
b. It should be given priority because it is critical information.
c. It must be forwarded without delay.
d. It is critical to friendly operations.
e. It requires immediate action.
2. Category B
a. Anything that contains communications, cryptographic documents, or systems that should be
classified as secret and requires special handling.
b. Higher authorities should declassify it.
3. Category C
a. Other information, which contains something that, could be an intelligence value.
b. Contains exploitable information regardless of its contents.
c. Unscreened materials/documents should be categorized as Category C.
4. Category D
a. No value, yet lower level will classify documents as category D.
b. No decision must be made at the lower echelon that document has no value. It is the
responsibility of the higher Headquarters.
Three (3) Security Concepts
1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of document.
3. Training is necessary for the practice of “Need to Know” principle.
Rules for Classification of Documents
1. Documents shall be classified according to their content.
2. The overall classification of a file or of a group of physically connected therein. Pages, paragraphs,
sections or components thereof may bear different classifications. Documents separated from file or
group shall be handled in accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain classified information or which
contain information classified lower than that of the preceding element or enclosure shall include a
notation for automatic downgrading.
4. Correspondence, Indexes, receipts, reports of possession transfer or destruction, catalogs, or
accession list shall not be classify if any reference to classified matter does not disclosed classified
information.
5. Classified matter obtained from other department shall retain the same original classification.
Protection of Sensitive Information
Proprietary information is information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership. In the business community, proprietary
information relates to the structure, products or business methods of the organization. It is usually protected in
some way against causal or general disclosure.
All proprietary information is confidential, but not all confidential information is proprietary. For example,
confidential personnel data in employee files is not considered as proprietary although the company treats it as
confidential.
Types of Proprietary Information
1. Trade Secrets- this consist of any formula, pattern, device or compilation of information which is used
in one’s business and which gives him an opportunity to gain an advantage over competitors who do
not know or us e it. It may be a formula for a chemical compound a process of manufacturing, treating
or preserving materials, a pattern for machine or device, or a list of customers. It differs from other
secret information as to single or ephemeral events. A trade secret is a process or device for
continuous use in the protection of the business.
2. Patents- this is a grant made by the government to an inventor, conveying or securing to him the
exclusive right to make, use, or sell his invention for term of years.
Primary Distinctions Between Patents and Trade Secrets
1. Requirements for obtaining a patent are specific. To qualify for a patent the invention must be more
than novel and useful. It must represent a positive contribution beyond the skill of the average person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive
right to patent protection expires after 17 years.
Proprietary Information Protection Program
Realizing that the most serious threat to trade secrets is the employee, a measure of protection is often
realized through the use of employee agreements which restrict the employee’s ability to disclose information
without specific authorization to the company. The following countermeasures may be adopted:
1. Policy and procedure statements regarding All sensitive information.
2. Pre and post employment screening and review.
3. Non-disclosure agreements from employees, vendors, contractors and visitors.
4. Non-competitive agreements with selected employees.
5. Awareness programs
6. Physical security measures
7. Informed monitoring of routine activities.
COMMUNICATION SECURITY
Communication Security is the protection resulting from the application of various measures which prevent or
delay the enemy or unauthorized persons in gaining information through our communications. It includes
Transmission, Cryptographic and Physical security.
Rules- governing communications security do not in guarantee security, and they do not attempt to meet every
conceivable situation. Communication security rules are a means, not an ends.
Department heads- are responsible for the maintenance of communication security and for the promulgation
of additional directives as may be necessary to insure proper communication security control within their
jurisdiction.
All communication personnel should have an appreciation of the basic principles of communication security
may result in compromise.
Communication Security Officer - A properly trained and cleared Communication Security Officer shall be
appointed in every Department of the Government handling cryptographic communication.
TRANSMISSION SECURITY:
Transmission Security is that component of communication security which results from all measures
designed to protect transmission from interception, traffic analysis and imitative deception.
Communication personnel shall select the means most appropriate to accomplish the delivery of message in
accordance with the specified precedence and security requirements.
Radio Operators shall adhere to the use of correct procedures, circuit discipline and authentication system as
a security measures against traffic analysis, imitative deception and radio direction finding.
CRYPTOGRAPHIC SECURITY
Cryptographic Security is that component of communication security which results from the provisions of
technically sound crypto-system and their proper use.
CODES AND CIPHERS
Code - a system which uses words as the smallest element like the one below.
Cipher Plaintext
B 1
C 2
J 3
D 4
Abbreviation
C: code or cipher
P: Plaintext
K: keyword/ key number
Note: Code and cipher may be used interchangeably to mean the same.
Categories of Cipher
ADDE DAQD NPCR OOLL TMAT RLOC RATS TKCL MNRA KETI SSTU ARTF
THEE OSET ULCO JEOU TAKE BLFZ IAHF SQUI TIFC ANLL TMZX AEXE
DLGY ZZTI FLOO VWKA TTIM IFTT HATH EEFC ANND FLHA
(Read this by copying out a progressive cipher. Progress 1, 2, 3….)
Decipher: DO NOT TRUST SMITH
Note: The plaintext are concealed by “nulls” - are meaningless symbol to fill in and separate plaintext.
Transposition System – is another category of cipher. Below is an example.
Example
RTRTBS
encipher by droppings every other letter
E U N O A E
C: RTRTBS EUNOAE
Decipher:
P: Return to base
Decipher:
P: Charlie will attack 2001
P: CHARLIE WILL ATTACK TWO ONE ZERO ONE
C: charliewillattacktwoonezero
C: char liew illa tack twoo nez roome
Substitution Method - original message elements, letters, numbers or other symbols are replaced with
alternate symbols.
Example 2 - c: x y z a b c d e
p: ABCD EFGH
p: stop icebox
c: VWRS LFHERA
Example 3 - Using a keyword/phrase
c: FOURSCOREANDSEVENYEARSAGO
p: abcde………………………xyz
SECURITY HAZARDS
Any act or condition which may result in the compromise of information, loss of life, loss or destruction of
property or disruption of the objective of the installation.
Types of Hazards
1. Natural Hazard- these are hazards which arise from natural phenomena. The following are types of
natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not caused by human action)
d. Storms (typhoons, cyclones, tornado and hurricane)
e. Lighting storms
f. Extreme temperature and humidity
2. Human-Man made Hazards- These are hazards which are the result of a state of mind, attitude,
weaknesses or character traits of one or more persons. They can be acts of commission or omission,
both overt and covert, which can disrupt operation of a plant or installation. The following are types of
human or man made hazards:
a. Carelessness- accidents and dissatisfaction
b. Disloyalty-subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism, etc
Sabotage as a Security Hazard
Description of a Saboteur
1. He is the most dangerous foe whom security will have to deal with while planning and implementing
security measures and techniques.
2. He is an ordinary looking as the next guy but in his mind, he has the training in deception,
knowledgeable in incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.
Possible Targets of Saboteur
1. Armed Forces Installation
2. Natural resources- mines, forests, farms and farm products
3. Industries- buildings, power sources, machinery, fuel, etc.
4. Warehouses depots, communications, public utilities, etc.
Countermeasures Against Sabotage
1. Use of an efficient, alert and trained guard force.
2. Use of Physical security aids like barriers, personnel and vehicular control, intrusion devices,
communication systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination.
10. Good housekeeping methods.
11. Effective and compatible emergency planning.
12. Regular audit.
13. Continuing background checks.
Espionage as a Security Hazard
Description of an Espionage Agent
1. He is very dangerous adversary and his skills in deception and his cunning should never be under
estimated.
2. He is usually a person of extensive training and will be highly effective in gaining the confidence of
people and of extracting information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like the saboteur and he can be
defeated in his own game if proper methods and techniques are undertaken.
Countermeasures against Industrial Espionage
1. Careful and complete pre-employment measures designed to control threats of industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive positions even
already employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.
Subversive Activity as a Security Hazard
Threats of Subversive Activity
1. It can be local or national in nature and their mission is to undermine the authority weaken the
organization, and eventually take over. This can be in business or any activity.
2. This can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist
attitudes, and other emotional approaches.
3. It is an activity not easy to detect.
Countermeasures to Subversive Activity
1. The spreading of rumors, written materials, slogans or any other devices to confuse the work
population and discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and “slow downs” can be called to
disrupt the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing movements for peace,
anti-colonials, anti-trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations” should report this
activity to security.
5. Other methods of subversion like united fronts, mob action, terrorism and sabotage will be done to
gain the subversive ends.
Pilferage as a Business Hazard
1. Pilferage is one of the most annoying and common human hazards which security has to deal with.
This activity if uncontrolled can become financial drain if not a menace to smooth and orderly
operation.
2. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may be
labeled as pilferage.
Types of Pilferers
1. Casual Pilferer- one who steals due to his inability to resist the unexpected opportunity and has little
fear of detection is no plan or premeditation and he is usually a “loner” on the job. The temptation to
pick up the article is basically due to poor security measure. The implication of causal pilfering is the
big cumulative cost if it remains unchecked.
2. Systematic Pilferer- one who steals with preconceived plans and takes away any or all types of items
or supplies for economic gain. Pilferers of this kind can be employees or outsiders of the
establishment.
Factors considered in Pilferage
1. Location of items to be pilfered- the systematic pilferer surveys shopping and store areas, or through
contacts from the firms.
2. Access to the items- techniques can be from fake documents, bribing of guards, outsmarting security,
creating disturbance and other methods to divert attention while pilferage goes on.
3. Removal of item- this can be done as wearing the stolen shoes or shorts, concealment in body or
vehicles, use of false documents, etc. Driver may conceal pilfered items in his vehicle.
4. Disposal of items- there is a need for “fences” brokers” or “clearing houses” for these “hot” items.
Countermeasures for Casual Pilferage
1. “Spot”: check on outgoing vehicles and persons.
2. An aggressive security education and indoctrination program with emphasis that “crime does not pay”.
3. Superiors should set example of integrity and desirable moral climate for employees in the
establishment.
4. All employees must be enjoined to report or any loss to security.
5. Inventory and control methods should be done especially to pilferable items.
6. Control of tools equipment and sets.
Countermeasures for Systematic Pilferage
1. Guards and electronic surveillance on all exits.
2. Package and material control system.
3. Parking area outside perimeter fence of establishment.
4. Careful screening and background checks on applicants to weed out potential thieves.
5. Investigation of all losses quickly and efficiently to determine “modus operandi” or obtain clues.
6. Alert all patrols to check areas and buildings for possible concealment of stolen properties.
7. Install mechanical, electrical, electronic detection and alarm devices where needed and applicable.
8. Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking facilities and areas for vehicles and
persons.
10. Store bulk quantities of pilferable items in enclosed security areas and distribute them to using section
in limited quantities.
11. Establish accurate inventory and accounting methods for procurement, use and disposal.
12. Establish close liaison with governmental law enforcement and intelligence agencies.
The information pertaining to one of the most important security services offered to a head of office is the
conduct of security surveys and security inspections. Every unit chief desires a security system that will reduce
to an absolute minimum the possibility of espionage, sabotage and compromise of classified information on his
office or unit. Since there are many security countermeasures to be considered, heads of offices should utilized
specially trained personnel, if the efforts of espionage and sabotage agents and other criminal elements are to
be negated. Security is an extremely complex program an objective analysis of an office head’s security
program by security survey and inspection personnel can be of great assistance in determining the efficiency of
any established security program.
What is a Security Survey?
It is an estimate of the security standards of a unit, and is conducted to enable the responsible officer to
recognize and evaluate security hazards and determine protective measures necessary to the prevention of
sabotage, espionage, subversive activities and other criminal acts inimical towards the interest and/or mission
of the unit and/or command.
Every phase of security must be carefully in advance, to include the importance of the individual to be
protected, political attitude of the population, obstacles involved, means of transportation, and duration of the
security mission.
Physical protection should consist of a series of protection cordons. These protective cordons may be
composed of a combination of personnel or physical security barriers.
Central direction and unity of effort
The officer in charge should be given full responsibility for all phases of the security mission.
Close coordination must be established with all local military and civilian authorities. Civilian authorities will
include police and other interested city, municipal or other local officials.
The agencies responsible for each of the security plan must be clearly defined. Arrangements should be made
for local police to control local inhabitants. All available intelligence channels should be used to obtain
information of potential danger areas, persons, or groups.
Coordination must be accomplished by an advance party after the official itinerary is received.
Protective measures must be through but inconspicuous and afford security without impending the
protectee/VIP’s performance of his functions.
The degree of protection is dependent upon the degree of contact with the general public desired by the
protectee.
A basic element of VIP/Executive protection is the identification and the elimination of possible sources of
danger against a VIP/Executive before the danger becomes real.
Plans for a perimeter of protection must be surprise proof and flexible enough to allow a quick response to any
emergency.
Defense-in-Depth Theory
There is no impenetrable barrier. If an unfriendly individual, organization or government can devote time,
money, personnel, material or imagination to passing a barrier, he can succeed.
To achieve the ultimate results from a physical security system, it is necessary to add barrier to barrier, delay
time, until sufficient delay time has been accumulated to allow control of any foreseeable penetration.
Therefore, rather than attempting to achieve exclusion through the use of a single barrier, security must be built
upon accumulated time or a system of “Defense-in-Depth.
Contingency Planning
Security planning should be flexible. Weather conditions, mechanical failures and failure of lighting systems are
three-ever-present potential hazards. The unexpected arrival of large numbers visitors, audience is another
situation frequently encountered. Last-minute changes in the security plan or schedule of events occur
routinely. The security plan therefore must be sufficiently fluid to cover these and other eventualities, all of
which present hazards.
Mission Orientation
An orientation/briefing must be conducted by the officer in charge or the protection plan, during which he
explains fully the contents of the plan. Some topics to be emphasized are:
Advance Preparations
Advance preparation refers to the activities of arranging timetable/ itinerary and coordinating with those
concerned with visit local or foreign law enforcement security men. Conduct security survey and inspection of
routes, quarters, conference, luncheon and or inaugural site. Arrange for security measures for motorcade
routes, quarters, conference site, etc. Confer with local or foreign security men about potential danger to the
Executive, such as persons, organizations or obtain copies of photographs and place these persons under
surveillance.
Motorcades
Select and consider the best motorcade route, preferably the most direct route to destination. Select a route
which affords a chance to have alternate routes if something happened on the motorcade route.
Review or dry run the route and take notes on the requirements for controlling the crowd and traffic and
deployment of foot patrolmen and motorcycle police at various positions along the route. Arrange for police or
buildings custodian to inspect buildings along the motorcade routes.
Security in Inaugural/Conference/Luncheon sites
Threat evaluation is to ascertain at varying times and function which will give the best formation sequence or
set. Other considerations are threat levels and type and advance planning for staff levels.
The Need for Close - in /Escort security officers, such as first aid requirements (which differs from location
to location) and special weapons (a real headache-the less you need to rely on them, the better), and other
logistical needs must be considered. One must have the ability to use a lot of common sense and attention to
detail, to give the possible protection, without overbearing or on top of the protectee/principal. Fully aware with
this information, the Close-in/Security Escort team will be well equipped, with an understanding of their
respective position, alternatives and functions.
These could be varied hourly, in response to current threat level, and areas of coverage or occasion in any of
the following:
Crowds, restaurants, home, office
Public transport, bus, taxi
Friends of protectee/principal, business
Movie theatre
Functions: private, public, business
Huge crowds: a tight-packed area of swirling bodies
Elevators: opening a door to the unknown, stopping at unknown floors.
Escalators: progressing into the unknown, Turn side on, so that you can see the front at one side and the
area behind you. As you rise with the escalator, you will become level with the floor behind before you,
giving you something to watch.
Stairs: give way, standing, doors on way
Doors: can’t see through them, an unknown reality.
Street lights: workmen, doorways, shops you are walking past, hotels or clubs and doorways should
always be covered the protectee/Principal walks past
Threat Analysis and Reaction
1. Concentrate - concentration do not get loss or be left behind, it takes only a second or two {to get
killed}
2. Anticipation - anticipate your fellow officer/Escort’s moves, you can keep the protective formation
together nice and well coordinated. Because of obstacles, obstructions, and areas of threats, the
movement of Close-in security/Escorts will be spasmodic and spontaneous.
3. Relaxation/Observation- observation should be done in a relaxed manner. Be very attentive but
looking relaxed.
4. Common sense- common sense comes from using your brain, foresight, experience, and good
training.
5. Participation within the Team- the team must train together and understand completely what their job is
and their responsibilities. There will be big gaps in the defenses if we do not have participation within
the team.