Understanding the reasons for security and protection measures will be included in this module. Further, topics on risk management and strategies, security hazards, and identification and avoidance of pilferage will be the bulk of discussions. RISKS MANAGEMENT ALTERNATIVES AND STRATEGIRS A.DEFINITION OF TERMINOLOGIES Security is all about reducing or eliminating the impact or effect of potential risks or hazards. Security managers normally conduct security surveys and security inspections to determine the needed security measures. The following terms are defined to guide security managers in determining the appropriate security measures in response to potential risks or hazards. 1. Hazards - exposure to the chance of loss or injury; synonymous to risk and or peril. 2. Security Hazards - Any act or condition which may result in the compromise of information, loss of life, loss or destruction of property or disruption of the objective of the installation. It can also be defined as an act or condition affecting the safe operation of the facility caused by human action accidental or intentional. 3. Risk - It is the potential damage or loss of an asset. The level of risk is a combination of two factors: The value placed on that asset by its owner and the consequence, impact adverse effect of the loss or damage to that asset and; the likelihood that a specific vulnerability will be exploited by a particular threat. 4. Risk Management- It is a process of selecting and implementing security countermeasures to achieve an acceptable level of risk at an acceptable cost. 5. Risk Analysis - It is the analysis of risk which includes examinations of the vulnerability, probability and criticality of potential threats and include natural and man-made risk. 6. Adversary - An individual, group, organization, or government that conducts activities or has the intention and capability to conduct activities detrimental to the individual, private or government entity. 7. Asset - Any information, facility, material, information, or activity which has a positive value to its owner whether it is an individual, private or government entity. 8. Countermeasures - An action taken or a physical security used to reduce or eliminate one or more vulnerabilities. The cost of possible countermeasures may be monetary, but may also include non-monetary cost such as reduced operational efficiency, adverse publicity unfavorable Working conditions, and political consequences. 9. Probability - It is the chance or likelihood that a loss will take place. Indicated by a mathematical statement concerning the possibility of an event occurring. 10. Criticality - It is the impact of a loss as measured in financial terms. How important it is in terms of the survival or existence of the organization.
B. RELATIVITY OF RISK AND SECURITY
The extent and degree of risks to security is dependent on the following: 1. Relative criticality of operation - This pertains to the importance of the firm with reference to the natural economy and security. Example is gasoline depots, communication transmission lines, and power plants. 2. Relative vulnerability - This is the susceptibility of the plant or establishment to damage, loss or disruption of operation due to various hazards. A good example is the location of the building; the machines; or presence of possible poisons. Security managers and planners normally consider the above relativity in determining the degree of security measures needed to reduce or eliminate the potential risks or hazards. C. RISK MANAGEMENT ALTERNATTVES AND STRATEGIES To lessen or eliminate the effect of risks or hazards, the following are the alternatives and strategies that are commonly applied by industrial security managers: 1. Risk Avoidance - This is the eliminating or removing the risk totally from the business, government, or industrial environment for which the risk manager has responsibility. A good example of this is the proper disposal of inflammable substances. 2. Risk Reduction- This is the decreasing the risk by minimizing the probability of the potential loss. The reduction of criminal opportunity is often accomplished by situational crime prevention strategies to discourage, deter, or deny criminal incidents. A good example is the construction of fences and similar physical barriers. 3. Risk Spreading - This is the spreading the risk through Compartmentation or decentralization to limit the impact (criticality) of the potential loss. This could be done by using numerous vaults or safes for the safekeeping of valuables such as documents and paper bills. 4. Risk Transfer - This is the moving the financial impact of the potential loss-over to an insurance company. This is done by availing of property and life insurances. Hiring security agencies is also a good example of this. 5. Risk Self-assumption - This is a planned assumption and acceptance of the potential risk by Making a deliberate managerial decision of doing nothing about the threat, or setting aside resources for use in case of a specific loss incident. SECURITY HAZARDS A. HAZARDS IN GENERAL As earlier defined, hazard could mean exposure to the chance of loss or injury: or the Term is synonymous to risk and or peril. In the field of industrial security, any hazardous situations or conditions are called security hazards. Normally, loss of life and damage to properties are caused by human negligence in their failure to recognize the adverse effect of a particular condition or event. Security interferes by removing or deterring the identified hazards. B. TYPES OF HAZARDS There are various forms and causes of hazards. Generally however, they can be classified into: 1. Natural Hazard- these are hazards which arise from natural phenomena. The following are types of natural hazards or disasters: a. Floods caused by typhoons b. Earthquakes C. Fire (not caused by human action)- such as those cause by lightning. d. Storms (typhoons, cyclones, tornado and hurricane) e. Lightning storms f. Extreme temperature and humidity 2. Human-Man made Hazards - These are hazards which are the result of a state of mind, attitude, weaknesses or character traits of one or more persons. They can be acts of commission or omission, both overt and overt, which can disrupt operation of a plant or installation. It includes but not limited to the following: a. Sabotage - It can be described as the deliberate destruction the deliberate damaging or destroying of property or equipment, for example by resistance fighters, enemy agents, disgruntled workers; or action to hinder or an action taken to undermine or destroy somebody's efforts or achievements. b. Espionage - It is describes as the activity of spying or the use of spying or spies to gather secret information. This is a hazard because people may come to know the confidential processes or procedures of a certain organization or business establishment (Microsoft, Encarta, 2001-2005). c.Pilferage - the act of stealing small things or items of little value, especially habitually. d. Theft and Robbery - Both acts involve the taking of another's property with intent to gain without the owner’s consent. Theft is committed without violence against or intimidation of persons nor force upon things while robbery involves intimidation of persons or force upon things. e.Disloyalty This is the act of unfaithfulness to one's organization. This is hazardous because it may lead to unauthorized disclosure of information f. Disaffections - This is manifested by losing satisfaction thereby causing the dissatisficed person to commit acts that may cause peril to his own organization. g. Subversive activities - These are activities designed to overthrow government or intended or likely to undermine or overthrow a government or other institution. These are hazards because they may cause disruption of the normal operations of an institution or organization. C. PERSON'S INTERNAL HAZARDS Every employee of the company or business establishment including but not limited to the assigned security personnel are all possible causes of security hazards. This is because of the following that are innate to every human being: 1. Faith - In the sphere of security operations, faith can be a questionable virtue. Those persons in which trust of their fellowmen is an abiding instinct, and who Consider themselves a definite threat to effective Security, for the entire training an enemy is aimed at deceiving this type of person.. He may do this through an infinite number of ways, but it is often the most Common place and unexpected that prove most dangerous to the company's and most often productive to him. 2. Conceit - It is the desire to satisfy the ego or impress someone, provides the enemy agent with his best Source of information. An individual may unconsciously disclose sensitive information to unauthorized persons because of conceit. 3. Enthusiasm and Pride - These are common causes of indiscretion. Anyone who is truly interested in his job finds it difficult not to talk and write about it. The Foreign agent and/or criminal elements by touching upon the individual's pride in his unit or mission can learn much about the equipment, training operation, personnel and its strength 4. Ignorance - Many people compromise vital information simply because they do not realize its value and do not know the methods by which intelligence agencies Operate through security education and indoctrination, one can combat this. PILFERAGES AND OTHER SRCURITY HAZARDS A. PILFERAGE AS A SECURITY HAZARD As earlier described, pilferage is the act of stealing small items or items of little value. However, these little items when accumulated become a great loss to a business establishment. In the field of business, pilferage is one of the most annoying and common human hazards which security has to deal with. This activity if uncontrolled can become financial drain if not a menace to smooth and orderly operation. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may be labeled as pilferage. 1. Types of Pilferers a. Casual Pilferer is one who steals due to his inability to resist the unexpected opportunity and has little fear of detection is no plan or premeditation and he is usually a "loner" on the job. The temptation to pick up the article is basically due to poor security measure. The implication of causal pilfering is the big cumulative cost if it remains unchecked. b. Systematic Pilferer is one who preconceived plans and takes away any or all types of items or supplies for economic gain. Pilferers of this kind can be employees or outsiders of the establishment. 2. Factors considered in Pilferage a. Location of items to be pilfered - the systematic pilferer surveys shopping and store areas, or through contacts from the firms. b. Access to the items - techniques can be from fake documents, bribing of guards, outsmarting security, creating disturbance and other methods to divert attention while pilferage goes on. c. Removal of item - this can be done as wearing the stolen shoes or shorts, concealment in body or vehicles, use of false documents, etc. Driver may conceal pilfered items in his vehicle. d. Disposal of items - there is a need for "fences" brokers" or "clearing houses" for these "hot items. 3. Countermneasures for Casual Pilferage a. "Spot": check on outgoing vehicles and persons. b. An aggressive security education and indoctrination program with emphasis that "crime does not pay. c. Superiors should set example of integrity and desirable moral climate for employees in the establishment. d. All employees must be enjoined to report or any loss to security. e. Inventory and control methods should be done especially to pilferable items. f. Control of tools equipment and sets. 4. Countermeasures for Systematic Pilferage a. Guards and electronic surveillance on all exits. b. Package and material control system. C. Parking area Outside Perimeter Fence Of establishment d. Careful screening and background checks on applicants to weed out potential thieves. e. Investigation of all losses quickly and efficiently to determine “modus operandi or obtain clues. f. Alert all patrols to check areas and buildings for possible concealment of stolen properties. g. Install mechanical, electrical, electronic detection and alarm devices where needed and applicable. h. Establish an effective lock and key control system. i. Use of appropriate perimeter fencing and lighting for parking facilities and areas for vehicles and persons. j. Store bulk quantities of pilferable items in enclosed security areas and distribute them to using section in limited quantities. k. Establish accurate inventory and accounting methods for procurement, use and disposal. 1. Establish close liaison with governmental law enforcement and intelligence agencies. B. SABOTAGE AS A SECURITY HAZARD - As earlier defined sabotage is the deliberate destruction or the deliberate damaging or destroying of property or equipment. 1. Description of a Saboteur: a. He is the most dangerous foe that security will have to deal with while planning and implementing security measures and techniques. b. He is an ordinary looking as the guy next door but in his mind, he has the training in deception, knowledgeable in incendiaries, explosives, chemistry, bacteriology, mechanics and psychology. c. He can work alone, in-groups, or simultaneously in several places. 2. As initial security measure, saboteurs target are any of the following: a. Armed Forces Installations b. Natural resources- mines, forests, farms and farm products c. Industries like the buildings, power sources, machinery, fuel, etc. d. Warehouses utilities, etc. depots, communications, 3. Countermeasures against Sabotage a. Use of an efficient, alert and trained guard force. b. Use of Physical security aids like barriers, personnel and vehicular control, intrusion devices, communication systems, and electric aids. C. Proper screening of personnel public d. Identification and movement control system. e. Searches on incoming vehicles. f. Safeguarding of classified information. g. Designation of restricted areas. h. Investigation of breaches of security. i.Security education and indoctrination. j.Good housekeeping methods. k. Effective and compatible emergency planning. l.Regular audit. m. Continuing background checks. C. ESPIONAGE AS A SRCURITY HAZARD - As earlier stated, espionage is a hazard because it may cause unauthorized as closures of company information, processes and procedures. 1. Description of an Espionage Agent a. He is very dangerous adversary and his skills in deception and his cunning should never be under estimated. b. He is usually a person of extensive training and will be highly effective in gaining the confidence of people and of extracting information of value to be relayed to his employer or handler. c. Even how well-trained an espionage agent he might be, he is human like the saboteur and he can be defeated in his own game if proper methods and techniques are undertaken. 2. Some Methods Employed by Espionage Agent a. Stealing or information from employees b. Stealing information from records or other sources. C. Using various methods of reproducing documents Products, equipment or working models. d. Using “front as Commercial concerns, travel agencies, associations, business groups and other organizations to obtain confidential information or data.’ e. Using various form or threats to obtain information. f. Using blackmail techniques by exposing intimate and personal details concerning an individual or organization. g. Picking or securing information in social and other gatherings h. Penetration and operational tactics. 3. Countermeasures against Industrial Espionage a. Careful and complete pre-employment measures designed to control threats of industrial espionage. b. Continuing personnel check on employees and particularly personnel on sensitive positions even already employed. C. Prevention of unauthorized entry to the plant or Industrial installation. d. Restricting of movement of personnel in the premises of the plant. e. Controlled disposal of waste papers including carbons in classified work. f. Only properly cleared personnel should handle classified document. D. SUBVERSIVE ACTIVITY AS A SECURITTY HAZARD -This is clearly a security hazard because it disrupts normal operation within a certain organization or institution. 1. Threats of Subversive Activity a. It can be local or national in nature and their mission is to undermine the authority weaken the organization, 'and eventually take over. This can be in business or any activity. b. This can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist attitudes and other emotional approaches. c. It is an activity not easy to detect.
2. Countermeasures to Subversive Activity
a. The spreading of rumors, written materials, slogans or any other devices to confuse the work population should be and discredit the government b. Labor and other company unions can be infiltrated so that strikes and "slow downs" can be called to disrupt the normal operation of a plant or installation immediately reported. C. Security force should be alerted for person trying to recruit others in organizing movements for peace, anti-colonials, anti-trade and anti-imperialism. d. Employees or outside personnel seeking memberships in "paper organizations" should report this activity to security. e. Other methods of subversion like united fronts, mob action, terrorism and sabotage will be done to gain the subversive ends.