You are on page 1of 9

LESSON 2

RISKS ANALYSIS AND SECURITY HAZARDS


Understanding the reasons for security and protection measures will be included in this
module. Further, topics on risk management and strategies, security hazards, and
identification and avoidance of pilferage will be the bulk of discussions.
RISKS MANAGEMENT ALTERNATIVES AND STRATEGIRS
A.DEFINITION OF TERMINOLOGIES
Security is all about reducing or eliminating the impact or effect of potential risks or
hazards. Security managers normally conduct security surveys and security inspections
to determine the needed security measures. The following terms are defined to guide
security managers in determining the appropriate security measures in response to
potential risks or hazards.
1. Hazards - exposure to the chance of loss or injury; synonymous to risk and or peril.
2. Security Hazards - Any act or condition which may result in the compromise of
information, loss of life, loss or destruction of property or disruption of the objective of the
installation. It can also be defined as an act or condition affecting the safe operation of
the facility caused by human action accidental or intentional.
3. Risk - It is the potential damage or loss of an asset. The level of risk is a combination
of two factors: The value placed on that asset by its owner and the consequence, impact
adverse effect of the loss or damage to that asset and; the likelihood that a specific
vulnerability will be exploited by a particular threat.
4. Risk Management- It is a process of selecting and implementing security
countermeasures to achieve an acceptable level of risk at an acceptable cost.
5. Risk Analysis - It is the analysis of risk which includes examinations of the vulnerability,
probability and criticality of potential threats and include natural and man-made risk.
6. Adversary - An individual, group, organization, or government that conducts activities
or has the intention and capability to conduct activities detrimental to the individual,
private or government entity.
7. Asset - Any information, facility, material, information, or activity which has a positive
value to its owner whether it is an individual, private or government entity.
8. Countermeasures - An action taken or a physical security used to reduce or eliminate
one or more vulnerabilities. The cost of possible countermeasures may be monetary, but
may also include non-monetary cost such as reduced operational efficiency, adverse
publicity unfavorable Working conditions, and political consequences.
9. Probability - It is the chance or likelihood that a loss will take place. Indicated by a
mathematical statement concerning the possibility of an event occurring.
10. Criticality - It is the impact of a loss as measured in financial terms. How important it
is in terms of the survival or existence of the organization.

B. RELATIVITY OF RISK AND SECURITY


The extent and degree of risks to security is dependent on the following:
1. Relative criticality of operation - This pertains to the importance of the firm with
reference to the natural economy and security. Example is gasoline depots,
communication transmission lines, and power plants.
2. Relative vulnerability - This is the susceptibility of the plant or establishment to damage,
loss or disruption of operation due to various hazards. A good example is the location of
the building; the machines; or presence of possible poisons. Security managers and
planners normally consider the above relativity in determining the degree of security
measures needed to reduce or eliminate the potential risks or hazards.
C. RISK MANAGEMENT ALTERNATTVES AND STRATEGIES
To lessen or eliminate the effect of risks or hazards, the following are the alternatives and
strategies that are commonly applied by industrial security managers:
1. Risk Avoidance - This is the eliminating or removing the risk totally from the business,
government, or industrial environment for which the risk manager has responsibility. A
good example of this is the proper disposal of inflammable substances.
2. Risk Reduction- This is the decreasing the risk by minimizing the probability of the
potential loss. The reduction of criminal opportunity is often accomplished by situational
crime prevention strategies to discourage, deter, or deny criminal incidents. A good
example is the construction of fences and similar physical barriers.
3. Risk Spreading - This is the spreading the risk through Compartmentation or
decentralization to limit the impact (criticality) of the potential loss. This could be done by
using numerous vaults or safes for the safekeeping of valuables such as documents and
paper bills.
4. Risk Transfer - This is the moving the financial impact of the potential loss-over to an
insurance company. This is done by availing of property and life insurances. Hiring
security agencies is also a good example of this.
5. Risk Self-assumption - This is a planned assumption and acceptance of the potential
risk by Making a deliberate managerial decision of doing nothing about the threat, or
setting aside resources for use in case of a specific loss incident.
SECURITY HAZARDS
A. HAZARDS IN GENERAL
As earlier defined, hazard could mean exposure to the chance of loss or injury: or the
Term is synonymous to risk and or peril. In the field of industrial security, any hazardous
situations or conditions are called security hazards. Normally, loss of life and damage to
properties are caused by human negligence in their failure to recognize the adverse effect
of a particular condition or event. Security interferes by removing or deterring the
identified hazards.
B. TYPES OF HAZARDS
There are various forms and causes of hazards. Generally however, they can be
classified into:
1. Natural Hazard- these are hazards which arise from natural phenomena. The following
are types of natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
C. Fire (not caused by human action)- such as those cause by lightning.
d. Storms (typhoons, cyclones, tornado and hurricane)
e. Lightning storms
f. Extreme temperature and humidity
2. Human-Man made Hazards - These are hazards which are the result of a state of mind,
attitude, weaknesses or character traits of one or more persons. They can be acts of
commission or omission, both overt and overt, which can disrupt operation of a plant or
installation. It includes but not limited to the following:
a. Sabotage - It can be described as the deliberate destruction the deliberate damaging
or destroying of property or equipment, for example by resistance fighters, enemy agents,
disgruntled workers; or action to hinder or an action taken to undermine or destroy
somebody's efforts or achievements.
b. Espionage - It is describes as the activity of spying or the use of spying or spies to
gather secret information. This is a hazard because people may come to know the
confidential processes or procedures of a certain organization or business establishment
(Microsoft, Encarta, 2001-2005).
c.Pilferage - the act of stealing small things or items of little value, especially habitually.
d. Theft and Robbery - Both acts involve the taking of another's property with intent to
gain without the owner’s consent. Theft is committed without violence against or
intimidation of persons nor force upon things while robbery involves intimidation of
persons or force upon things.
e.Disloyalty This is the act of unfaithfulness to one's organization. This is hazardous
because it may lead to unauthorized disclosure of information
f. Disaffections - This is manifested by losing satisfaction thereby causing the dissatisficed
person to commit acts that may cause peril to his own organization.
g. Subversive activities - These are activities designed to overthrow government or
intended or likely to undermine or overthrow a government or other institution. These are
hazards because they may cause disruption of the normal operations of an institution or
organization.
C. PERSON'S INTERNAL HAZARDS
Every employee of the company or business establishment including but not limited to
the assigned security personnel are all possible causes of security hazards. This is
because of the following that are innate to every human being:
1. Faith - In the sphere of security operations, faith can be a questionable virtue. Those
persons in which trust of their fellowmen is an abiding instinct, and who Consider
themselves a definite threat to effective Security, for the entire training an enemy is aimed
at deceiving this type of person.. He may do this through an infinite number of ways, but
it is often the most Common place and unexpected that prove most dangerous to the
company's and most often productive to him.
2. Conceit - It is the desire to satisfy the ego or impress someone, provides the enemy
agent with his best Source of information. An individual may unconsciously disclose
sensitive information to unauthorized persons because of conceit.
3. Enthusiasm and Pride - These are common causes of indiscretion. Anyone who is truly
interested in his job finds it difficult not to talk and write about it. The Foreign agent and/or
criminal elements by touching upon the individual's pride in his unit or mission can learn
much about the equipment, training operation, personnel and its strength
4. Ignorance - Many people compromise vital information simply because they do not
realize its value and do not know the methods by which intelligence agencies Operate
through security education and indoctrination, one can combat this.
PILFERAGES AND OTHER SRCURITY HAZARDS
A. PILFERAGE AS A SECURITY HAZARD
As earlier described, pilferage is the act of stealing small items or items of little value.
However, these little items when accumulated become a great loss to a business
establishment. In the field of business, pilferage is one of the most annoying and common
human hazards which security has to deal with. This activity if uncontrolled can become
financial drain if not a menace to smooth and orderly operation. Failure to detect shortage
and inaccurate inventories will cause inventory losses, which may be labeled as pilferage.
1. Types of Pilferers
a. Casual Pilferer is one who steals due to his inability to resist the unexpected opportunity
and has little fear of detection is no plan or premeditation and he is usually a "loner" on
the job. The temptation to pick up the article is basically due to poor security measure.
The implication of causal pilfering is the big cumulative cost if it remains unchecked.
b. Systematic Pilferer is one who preconceived plans and takes away any or all types of
items or supplies for economic gain. Pilferers of this kind can be employees or outsiders
of the establishment.
2. Factors considered in Pilferage
a. Location of items to be pilfered - the systematic pilferer surveys shopping and store
areas, or through contacts from the firms.
b. Access to the items - techniques can be from fake documents, bribing of guards,
outsmarting security, creating disturbance and other methods to divert attention while
pilferage goes on.
c. Removal of item - this can be done as wearing the stolen shoes or shorts, concealment
in body or vehicles, use of false documents, etc. Driver may conceal pilfered items in his
vehicle.
d. Disposal of items - there is a need for "fences" brokers" or "clearing houses" for these
"hot items.
3. Countermneasures for Casual Pilferage
a. "Spot": check on outgoing vehicles and persons.
b. An aggressive security education and indoctrination program with emphasis that "crime
does not pay.
c. Superiors should set example of integrity and desirable moral climate for employees in
the establishment.
d. All employees must be enjoined to report or any loss to security.
e. Inventory and control methods should be done especially to pilferable items.
f. Control of tools equipment and sets.
4. Countermeasures for Systematic Pilferage
a. Guards and electronic surveillance on all exits.
b. Package and material control system.
C. Parking area Outside Perimeter Fence Of establishment
d. Careful screening and background checks on applicants to weed out potential thieves.
e. Investigation of all losses quickly and efficiently to determine “modus operandi or obtain
clues.
f. Alert all patrols to check areas and buildings for possible concealment of stolen
properties.
g. Install mechanical, electrical, electronic detection and alarm devices where needed and
applicable.
h. Establish an effective lock and key control system.
i. Use of appropriate perimeter fencing and lighting for parking facilities and areas for
vehicles and persons.
j. Store bulk quantities of pilferable items in enclosed security areas and distribute them
to using section in limited quantities.
k. Establish accurate inventory and accounting methods for procurement, use and
disposal.
1. Establish close liaison with governmental law enforcement and intelligence agencies.
B. SABOTAGE AS A SECURITY HAZARD - As earlier defined sabotage is the deliberate
destruction or the deliberate damaging or destroying of property or equipment.
1. Description of a Saboteur:
a. He is the most dangerous foe that security will have to deal with while planning and
implementing security measures and techniques.
b. He is an ordinary looking as the guy next door but in his mind, he has the training in
deception, knowledgeable in incendiaries, explosives, chemistry, bacteriology,
mechanics and psychology.
c. He can work alone, in-groups, or simultaneously in several places.
2. As initial security measure, saboteurs target are any of the following:
a. Armed Forces Installations
b. Natural resources- mines, forests, farms and farm products
c. Industries like the buildings, power sources, machinery, fuel, etc.
d. Warehouses utilities, etc. depots, communications,
3. Countermeasures against Sabotage
a. Use of an efficient, alert and trained guard force.
b. Use of Physical security aids like barriers, personnel and vehicular control, intrusion
devices, communication systems, and electric aids.
C. Proper screening of personnel public
d. Identification and movement control system.
e. Searches on incoming vehicles.
f. Safeguarding of classified information.
g. Designation of restricted areas.
h. Investigation of breaches of security.
i.Security education and indoctrination.
j.Good housekeeping methods.
k. Effective and compatible emergency planning.
l.Regular audit.
m. Continuing background checks.
C. ESPIONAGE AS A SRCURITY HAZARD - As earlier stated, espionage is a hazard
because it may cause unauthorized as closures of company information, processes and
procedures.
1. Description of an Espionage Agent
a. He is very dangerous adversary and his skills in deception and his cunning should
never be under estimated.
b. He is usually a person of extensive training and will be highly effective in gaining the
confidence of people and of extracting information of value to be relayed to his employer
or handler.
c. Even how well-trained an espionage agent he might be, he is human like the saboteur
and he can be defeated in his own game if proper methods and techniques are
undertaken.
2. Some Methods Employed by Espionage Agent
a. Stealing or information from employees
b. Stealing information from records or other sources.
C. Using various methods of reproducing documents
Products, equipment or working models.
d. Using “front as Commercial concerns, travel agencies, associations, business groups
and other organizations to obtain confidential information or data.’
e. Using various form or threats to obtain information.
f. Using blackmail techniques by exposing intimate and personal details concerning an
individual or organization.
g. Picking or securing information in social and other gatherings
h. Penetration and operational tactics.
3. Countermeasures against Industrial Espionage
a. Careful and complete pre-employment measures designed to control threats of
industrial espionage.
b. Continuing personnel check on employees and particularly personnel on sensitive
positions even already employed.
C. Prevention of unauthorized entry to the plant or Industrial installation.
d. Restricting of movement of personnel in the premises of the plant.
e. Controlled disposal of waste papers including carbons in classified work.
f. Only properly cleared personnel should handle classified document.
D. SUBVERSIVE ACTIVITY AS A SECURITTY HAZARD -This is clearly a security
hazard because it disrupts normal operation within a certain organization or institution.
1. Threats of Subversive Activity
a. It can be local or national in nature and their mission is to undermine the authority
weaken the organization, 'and eventually take over. This can be in business or any
activity.
b. This can be in the form of rumor mongering, propaganda, undermining morale, and
injecting defeatist attitudes and other emotional approaches.
c. It is an activity not easy to detect.

2. Countermeasures to Subversive Activity


a. The spreading of rumors, written materials, slogans or any other devices to confuse
the work population should be and discredit the government
b. Labor and other company unions can be infiltrated so that strikes and "slow downs"
can be called to disrupt the normal operation of a plant or installation immediately
reported.
C. Security force should be alerted for person trying to recruit others in organizing
movements for peace, anti-colonials, anti-trade and anti-imperialism.
d. Employees or outside personnel seeking memberships in "paper organizations" should
report this activity to security.
e. Other methods of subversion like united fronts, mob action, terrorism and sabotage will
be done to gain the subversive ends.

You might also like