You are on page 1of 47

Introduction to

Industrial
Security
Concept
LEA3 MODULE

Prepared By:
BONOTAN, PERCILA FLORDELIZ M.
RCRIM

Department CRIMINOLOGY
Course No. LEA3
Course Title Introduction to Industrial
Security Concept
No. of units 3
Instructor’s name Percila Flordeliz M.
Bonotan
C

Course Description:

The study covers the organizational set-up, administration


and operation of security agencies, special police and
investigation agencies.

Course Objectives
At the end of the course, you will be able to
1. Explain the legal basis of industrial security in the
Philippines;
2. Explain the different types as well as the three major
divisions of security;
3. Memorize the professional code of ethics and code of
conduct for security personnel and security agencies, as
well as the general orders for security guards;
4. Discuss the qualifications, attributes, functions and the
different types of security agencies authorized by law;
5. Identify the authorized ranks, positions and staffing
patterns of security agencies; and
6. Discuss the different methods and techniques employed
in the management of security agencies.

Course Outline
Week 1 Industrial security and
management operation
Week 2 Different Types of Barriers
Week 3 Perimeter Security
Week 4 Types of Protective Lighting
Week 5 Protective Alarms; Protective
Lock and Key Control
Week 6 Types of Keys; Types of Security
Cabinet;
Week 7 PERSONNEL SECURITY
Week 8 Types of Security Guard Forces;
Week 9 DOCUMENT AND
INFORMATION SECURTY
Week 10 Confidential Matters;
Communication security;
Transmission security; Risk
analysis and Security Hazard
INDUSTRIAL SECURITY MANAGEMENT & ADMINISTRATION

WHAT IS SECURITY?

Security is a state or condition of being secured; there is freedom


from fear, harm, danger, loss, destruction or damages.

It was the action of man against man that led to many unsecured
and unsafe conditions.
What are the 3 Major Areas in Security?

• Physical Security - this concern with the physical measures


adopted to prevent unauthorized access to equipment,
facilities, material and document and to safeguard them
against espionage, sabotage, damage, loss and theft.

• Personnel Security- this is as important as physical


security. Personnel security starts even before the hiring of
an employee and remains to be maintained for as long as
the person is employed. Its purpose is to insure that a firm
hires those best suited to assist the firm in achieving its
goals and objectives and once hired assist in providing
necessary security to the work force while carrying out their
functions.
• Document and Information Security- this involves the
protection of documents and classified papers from loss,
access by unauthorized persons, damage, theft and
compromise through disclosure. Classified documents need
special handling. Lack of indoctrination and orientation
among the personal handling them can result in the leakage,
loss, theft and unauthorized disclosure of the documents.

What is PROTECTIVE SECURITY?


Protective Security can be defined as those measures taken by
an installation or unit to protect itself against sabotage, espionage
or subversion and at the same time provide freedom of action in
order to provide the installation of the unit with the necessary
flexibility to accomplish its mission.

Where can be Protective Security be applied?


Industrial Security – a type of security applied to business groups
engaged in industries like manufacturing, assembling, research and
development, processing, warehousing and even agriculture. It
may also mean the business of providing security.
Hotel Security - a type of security applied to hotels where its
properties are protected from pilferage, loss, damage and the
function in the hotel restaurants are not disturbed and troubled by
outsiders or the guest themselves. This type of security employs
house detectives, uniforms guard and supervisor and insures that
hotel guests and their personal effects are safeguarded.

Bank security - this type of security is concern with bank


operations. Its main objective is the protection of bank cash and
assets, its personnel and clientele. Security personnel are trained
to safeguard bank and assets while in storage, in transit and during
transactions.
VIP Security - a type of security applied for the protection of top-
ranking officials of the government or private entity, visiting persons
of illustrious standing and foreign dignitaries.

School Security - a type of security that is concern with the


protection of students, faculty members, and school properties.
Security personnel are trained to protect the school property from
theft, vandals, handling campus riots and detecting the use of
intoxicated drugs and alcohol by the students.
Supermarket or Mall Security - a type of security which is concern
with the protection of the stores, warehouses, storage, its
immediate premises and properties as well as the supermarket
personnel and customers. Security personnel are trained to detect
“shoplifter”, robbery, and bomb detection and customer relation.
Other types – this include all other security matters not covered in
the above enumeration.

What is PHYSICAL SECURITY?


Physical Security measures are being used to define, protect, and
monitor property rights and assets. These measures consist of
barriers and devices that would detect, impede, and prevent
unauthorized access to equipment, facilities, material and
document and to safeguard them against espionage, sabotage,
damage and theft.

Physical Security may be also defined as the safeguarding by


physical means, such as guard, fire protection measures, of plans,
policies, programs, personnel, property, utilities, information,
facilities and installation against compromise, trespass, sabotage,
pilferage, embezzlement, fraud, or other dishonest criminal act.

What is a Barrier?
Barrier is any structure or physical device capable of restricting,
deterring, delaying, illegal access to an installation.

What are the Purposes of a Barrier?


Define the physical limits of an area.
Create a physical and psychological deterrent to unauthorized
entry.
Prevent penetration therein or delay intrusion, thus, facilitating
apprehension of intruders.
Assist in more efficient and economical employment of guards
Facilitate and improve the control and vehicular traffic.
General Instruction.

Read and comprehend the following questions and explain each


with minimum of 50 words. Use the corresponding answer sheet
attached at the back of your module.

ASSESSMENT NO.1

1. As a criminology student, discuss the importance of security in


all means.
2. Why is it essential to study industrial security management?
3. On your own opinion, give at least 3 major goals of security.
4. Discuss the advantages and disadvantages of physical security,
personnel security and document security.
5. Schools are one of the installations where security must be
maintained. As a student what means of security best suited for
the school and discuss its importance.
What are the different Types of Barriers?

Natural barriers - it includes bodies of waters, mountains,


marshes, ravines, deserts or other terrain that are difficult to
traverse.

Structural barriers - these are features constructed by man


regardless of their original intent that tends to delay the intruder.
Examples are walls, doors, windows, locks, fences, safe, cabinets
or containers etc.

Human barriers - persons being used in providing a guarding


system or by the nature of their employment and location, fulfill
security functions. Examples are guards, office personnel, shop
workers, etc.

Animal barriers - animals are used in partially providing a guarding


system. Dogs are usually trained and utilized to serve as guard
dogs. German shepherds are best suited for security functions.
Goose and turkeys could also be included.

Energy barriers - it is the employment of mechanical, electrical,


electronic energy imposes a deterrent to entry by the potential
intruder or to provide warning to guard personnel. These are
protective lighting, alarm system and any electronic devices used
as barriers.

What are the 3 Three Line of Physical Defense?

• First line of Defense- perimeter fences/ barriers


• Second line of defense- doors, floors, windows, walls, roofs and
grills and other entries to the buildings
• Third line of defense- storage system like steel cabinets, safes,
vaults and interior files.

What are the Principles of Physical Security?


 The type of access necessary will depend upon a number of
variable factors and therefore may be achieved in a number of
ways.
 There is no impenetrable barrier
 Defense-in depth is barriers after barriers
 Delay is provided against surreptitious and non-surreptitious
entry. Each installation is different.
What is a Restricted Area?
A Restricted Area is any area in which personnel or vehicles are
controlled for reasons of security. Restricted area is established to
provide security for installation or facilities and to promote efficiency
of security operations and economy in the use of security
personnel.

What are the Types of Restricted Areas?


• Exclusion Area- an exclusion area is a restricted area which
contains a security interest to TOP SECRET importance, and
which requires the highest degree of protection.
• Limited Area Control- a limited area is a restricted area in
which a lesser degree of control is required than in an
exclusion area but which the security interest would be
compromised by uncontrolled movement.

Limited Area Control includes the following:


Interior Area Control - Interior area control is generally affected in
two ways. The first method is the system which is initiated and
terminated at the outer limits of the area to determine the
movements of a visitor within the area. A second somewhat less
means of accomplishing the same thing is time travel. This system
provides for checking the actual time used by the visitor against
known time requirements for what the visitor is to accomplish.

Visitor Identification and Movements Control - Processing and


control of movements of visitor shall be included in the PASS
SYSTEM. The control of movements of visitor will depend on the
installation. A visitor register shall be maintained to include the
name of the visitor, date of visit, purpose of visit, which may be filed
for the future reference.

General Instruction.
Read and comprehend the following questions and explain
each with minimum of 50 words. Use the corresponding
answer sheet attached at the back of your module.

ASSESSMENT NO.2

1. Does barriers only referring to physical installations such as walls


or fences? Defend your answer.
2. Give a concept of installation using natural barriers. E.g. “The
Alcatraz Prison” located in the island of San Francisco Bay in
California.
3. Explain the importance of animal barriers and give an example
scenario using animal barriers as a means of security.
4. In our modern world how electronic barriers plays a vital role in our
society?
5. The physical security has 3 stages line of defense. Discuss its
importance and why it is categorized from top to least security?
6. There are two types of restricted areas, relate those means of
security in a certain establishment such as the Mati Polytechnic
College.
7. Presuming you are security personnel why is it important to identify
visitors and vigilant to establishment’s movement?

Key Control- A system of controlling keys shall be advised and


regulations covering the disposal, storage or withdrawals, shall be
issued and imposed.
Fire Prevention- fire is so potentially destructive without human
assistance, with assistance it can be caused to devastate those
things you are attempting to secure and, professionally
accomplished, often in a way that does not leave recognizable
evidence of sabotage.

What is Perimeter Security?


It is the protection of the installation’s inner and the immediate
vicinity.

The main purpose of perimeter barrier is to deny or impede access


or exit of unauthorized person. Basically, it is the first line of
defense of an installation. This is maybe in the form of fences,
building walls or even bodies of water.

What are the Types of Perimeter Barrier?

 Fences
 Walls
 Bodies of Water

What are the different Types of Fences?


Solid fence -constructed in such a way that visual access through
the fence is denied. Its advantage is that it denies the opportunity
for the intruder to become familiar with the personnel, activities and
the time scheduled of the movements of the guards in the
installation. On the other hand, it prevents the guards from
observing the area around the installation and it creates shadow
that may be used by the intruder for cover and concealment.

Full-view fence - it is constructed in such a way that visual access


is permitted through the fence. Its advantages are that it allows the
roving patrols and stationary guard to keep the surrounding area of
the installation under observation. On the other hand, it allows the
intruder to become familiar with the movements and time schedule
of the guard patrols thereby allowing him to pick the time that is
advantageous on his part.
Types of Full-View Fence
• Chain link fence
• It must be constructed of 7 feet material excluding top guard.
• It must be of 9 gauges or heavier.
• The mesh openings are not to be larger than 2 inches per side.
• It should be twisted and barbed selvage at top and bottom
• It must be securely fastened to rigid metal or reinforced concrete.
• It must reach within 2 inches of hard ground or paving.
• On soft ground, it must reach below surface deep enough to
compensate for shifting soil or sand.

• Barbed wire fence


• Standard barbed wire is twisted, double-strand, 12-gauge wire with
4 point barbs spaces in an equal distance apart.
• Barbed wire fencing should not be less than 7 feet high excluding
top guard.
• Barbed wire fencing must be firmly affixed to posts not more than 6
feet apart.

Note: As a standard, the distance between strands must not


exceed 6 inches at least one wire will be interlaced vertically and
midway between posts.

• Concertina wire fence


• Standard concertina barbed wire is commercially manufactured
wire coil of high strength steel barbed wire clipped together at
intervals to form a cylinder.
• Opened concertina wire is 50 feet long and 3 feet in diameter.

Perimeter Barrier Opening


• Gates and Doors - when not in use and controlled by guards,
gates and doors in the perimeter should be locked and frequently
inspected by guards. Locks should be changed from time to time
and should be covered under protective locks and key control.
• Side-walk-elevators - these provide access to areas within the
perimeter barrier and should be locked and guarded.
• Utilities Opening - sewers, air intakes, exhaust tunnels and other
utility openings which penetrate the barrier and which have cross
sectional areas of 96 square inches or more should be protected by
bars, grills, water filled traps or other structural means providing
equivalent protection to that portion of the perimeter barriers.
• Clear Zones - an unobstructed area or a “clear zone” should be
maintained on both sides of the perimeter barrier. A clear zone of
20 feet or more is desirable between the barriers and exterior
structures and natural covers that may provide concealment for
assistance to a person seeking unauthorized entry.
Additional Protective Measures
• Top Guard - additional overhang of barbed wire placed on vertical
perimeter fences upward and outward with a 45 degree angle with
3 to 4 strands of barbed wires spaced 6 inches apart. This
increases the protective height and prevents easy access.
• Guard Control stations - this is normally provided at main
perimeter entrances to secure areas located out-of-doors, and
manned by guards on full-time basis. Sentry station should be near
a perimeter for surveillance at the entrance.

• Tower Guard - this is a house-like structure above the perimeter


barriers. The higher the tower, the more visibility it provides. It gives
a psychological unswerving effect to violators. By and large guard
towers, whether permanent or temporary, must have a
corresponding support force in the event of need. Towers as well as
guard control stations should have telephones, intercoms, and if
possible two-way radios connected to security headquarters or
office to call for reserves in the event of need.

• Barrier Maintenance - fencing barriers and protective walls should


always be regularly inspected by security. Any sign or attempts to
break in should be reported for investigation. Destruction of fence
or sections thereof should be repaired immediately and guard
vigilance should be increased.

• Protection in Depth - in large open areas or ground where fencing


or walling is impractical and expensive, warning signs should be
conspicuously placed. The depth itself is protection reduction of
access roads, and sufficient notices to warn intruders should be
done. Use of animals, as guards and intrusion device, can also be
good as barriers.
• Signs and notices - “Control signs” should be erected where
necessary in the management of unauthorized ingress to preclude
accidental entry. Signs should be plainly visible and legible from
any approach and in an understood language or dialect.

ASSESMENT NO.3

General Instruction.

Read and comprehend the following questions and explain each with
minimum of 50 words. Use the corresponding answer sheet attached at
the back of your module.
1. Explain the importance of key control in terms of storage and
usage.
2. Is there any difference of perimeter security to physical security?
Defend your answer.
3. Fire prevention is crucial for an establishment. Give at least 3
recommendations as a security measures for the former.
4. Discuss the advantages and disadvantages of full-view fence and
solid fence.
5. Explain the importance of guard control stations in terms of tumults
and any kind of disorders.
6. On your opinion, what is the importance of signs and controls in
terms of maintaining the security of the establishment?

What is Protective Lighting?


Protective Lighting is the single most cost-effective deterrent to
crime because it creates a psychological deterrent to the intruders.

Types of Protective Lighting


• Continuous lighting - the most familiar type of outdoor security
lighting, this is designed to provide two specific results: glare
projection or controlled lighting. It consists of a series of fixed
luminaries at range to flood a given area continuously during the
hours of darkness.
• Glare projection type- it is being used in prisons and correctional
institutions to illuminate walls and outside barriers.
• Controlled lighting- it is generally employed where, due to
surrounding property owners, nearby highways or other limitations,
it is necessary for the light to be more precisely focused.

• Standby lighting - it is designed for reserve or standby use or to


supplement continuous systems. A standby system can be most
useful to selectively light a particular area in an occasional basis.
• Movable or Portable lighting - this system is manually operated
and is usually made up of movable search or floodlights that can be
located in selected or special locations which will require lighting
only for short period of time.
• Emergency lighting - this system is used in times of power failure
or other emergencies when other systems are inoperative.

General Types of Lighting Sources


• Incandescent lamp - it is the least expensive in terms of energy
consumed and has the advantage of providing instant illumination
when the switch is on.
• Mercury vapor lamp - it is considered more efficient that the
incandescent and used widespread in exterior lighting. This emits a
purplish-white color, caused by an electric current passing through
a tube of conducting and luminous gas.
• Metal halide - it has similar physical appearance to mercury vapor
but provides a light source of higher luminous efficiency and better
color rendition.

• Fluorescent - this provides good color rendition, high lamp


efficiency as well as long life. However, it cannot project light over
long distance and thus are not desirable as flood type lights.
• High-pressure sodium vapor - this has gained acceptance for
exterior lighting of parking areas, roadways, buildings and
commercial interior installations. Constructed on the same principle
as mercury vapor lamps, they emit a golden white to light pink color
and this provide high lumen efficiency and relatively good color
rendition.
Types of Lighting Equipment
Floodlights - These can be used to accommodate most outdoor
security lighting needs, including the illumination of boundaries,
fences and buildings and for the emphasis of vital areas or
particular buildings.
Street lights - This lighting equipment received the most
widespread notoriety for its value in reducing crime.

Search lights - These are highly focused incandescent lamp and


are designed to pinpoint potential trouble spots.
Fresnel lights - These are wide beam units, primary used to
extend the illumination in long, horizontal strips to protect the
approaches to the perimeter barrier. Fresnel projects a narrow,
horizontal beam that is approximately 180 degrees in the horizontal
and from 15 to 30 degrees in the vertical plane.

ASSESSMENT NO.4
General Instruction.

Read and comprehend the following questions and explain each with
minimum of 50 words. Use the corresponding answer sheet attached at
the back of your module.

1. Presuming you is a security officer on-duty. How does lighting


become crucial in terms of providing security?
2. There are various types of protective lighting. On your own opinion,
why there is a need of specification of using a certain lighting for an
establishment?
3. Why there is a need to choose lighting sources and equipment to
be used?
What are Protective Alarms?

Protective Alarm is one of the important barriers in security. It


assists the security in detecting, impeding or deterring potential
security threat in the installation. Basically, its function is to alert the
security personnel for any attempt of intrusion into a protected area,
building or compound. Once an intruder tampers the circuitry, the
beam or radiated waves of the alarm system, it will activate an
alarm signal.

Three Basic Parts of Alarm System


• Sensor or trigger device - it emits the aural or visual signals or
both.
• Transmission line - a circuit which transmit the message to the
signaling apparatus.
• Enunciator/annunciator - it is the signaling system that activates
the alarm.

Types of Protective Alarm System

• Central Station System - a type of alarm where the control station


is located outside the plant or installation. When the alarm is
sounded or actuated by subscriber, the central station notifies the
police and other public safety agencies.

• Proprietary system - centralized monitor of the proprietary alarm


system is located in the industrial firm itself with a duty operator. In
case of alarm, the duty operator calls whatever is the primary need;
firefighters, police, an ambulance or a bomb disposal unit.
• Local Alarm – This system consist of ringing up a visual or audible
alarm near the object to be protected. When an intruder tries to pry
a window, the alarm thereat goes off.
• Auxiliary alarm - company-owned alarm systems with a unit in the
nearest police station so that in case of need, direct call is possible.
The company maintains the equipment and lines both for the
company and those in the police, fire and other emergency
agencies by special arrangement. Radio, landlines, or cell phones
can avail of the auxiliary system.
Kinds of Alarms
• Audio Detection Device - it will detect any sound caused by
attempted force entry. A supersonic microphone speaker sensor is
installed in walls, ceilings and floors of the protected area.
• Vibration Detection Device - it will detect any vibration caused by
attempted force entry. A vibration sensitive sensor is attached to
walls, ceilings or floors of the protected area.

• Metallic foil or wire - it will detect any action that moves the foil or
wire. An electrically charge strips of tinfoil or wire is used in the
doors, windows or glass surfaces of the protected area.
• Laser Beam Alarm - a laser emitter floods a wall or fencing with a
beam so that when this beam is disturbed by a physical object, an
alarm is activated.
• Photoelectric or Electric Eye Device - an invisible/visible beam is
emitted and when this is disturbed or when an intruder breaks
contact with the beam, it will activate the alarm.

What is a Protective Lock and a Key Control?


It complements other physical safeguards of the installation against
any possible surreptitious entry.
Locks are considered as delaying devices which cannot really stop
a determine intruder from destroying the lock just to launch an
attack. Hence, knowledge of the basic principles of locking systems
will enable the installation owner or the security officer to evaluate
any lock and determine its quality and effectiveness in a particular
application.

What is a Lock?
A Lock is defined as a mechanical, electrical, hydraulic or
electronic device designed to prevent entry into a building, room,
container or hiding place.

Types of Locks
• Key-operated mechanical lock - it uses some sort of arrangement
of internal physical barriers (wards tumblers) which prevent the lock
from operating unless they are properly aligned. The key is the
device used to align these internal barriers so that the lock may be
operated.

Three (3) Types of Key-operated Lock

Disc or wafer tumbler mechanism


Pin tumbler mechanism
Lever tumbler mechanism

• Padlock - a portable and detachable lock having a sliding hasp


which passes through a staple ring and is then made fasten or
secured.
• Combination lock - instead of using the key to align the tumblers,
the combination mechanism uses numbers, letters or other symbols
as reference point which enables an operator to align them
manually.
• Code-operated lock - a type of lock that can be opened by
pressing a series of numbered button in the proper sequence.
• Electrical lock - a type of lock that can be opened and closed
remotely by electrical means.
• Card-operated lock - a type of lock operated by a coded card.

ASSESSMENT NO.5
General Instruction.

Read and comprehend the following questions and explain each with
minimum of 50 words. Use the corresponding answer sheet attached at
the back of your module.

1. How do protective alarms become barriers in security?


2. Among the types of protective alarm system. Which is most efficient
in terms of its operations?
3. In our modern world, various inventions make our lives easier and
more convenient. Based on your observation give an example of a
certain establishment using an alarm as security measure.
4. There are various types of lock. Give 3 examples of locks being
used for a specific establishment. (E.g, Card-operated lock are
mostly used by hotels.)
Types of Keys
Change key - a specific key, which operates the lock and has a
particular combination of cuts which match the arrangement of the
tumblers in the lock.
Sub-master key - a key that will open all the lock within a particular
area or grouping in a given facility.
Master key - a special key capable of opening a series of lock.
Grand Master key - a key that will open everything in a system
involving two or more master key groups.

What is a Security Cabinet?


The final line of defense at any facility is in the high security storage
where papers, records, plans or cashable instrument, precious
metals or other especially valuable assets are protected. These
security containers will be of a size and quantity, which the nature
of the business dictates.

Three (3) Types of Security Cabinet


• Safe - a metallic container used for the safekeeping of documents
or small items in an office or installation. Safe can be classified as
either robbery or burglary resistance depending upon the use and
need.
• Its weight must be at least 750 lbs. And should be anchored to a
building structure.
• Its body should at least one inch thick steel.

• Vault - heavily constructed fire and burglar resistance container


usually a part of the building structure used to keep and protect
cash, documents and negotiable instruments. Vaults are bigger
than safe but smaller than a file room.
• The vault door should be made of steel at least 6 inches in
thickness.
• The vault walls, ceiling, floor reinforce concrete at least 12 inches in
thickness.
• The vault must be resistive up to 6 hours.
• File room - a cubicle in a building constructed a little lighter than a
vault but of bigger size to accommodate limited people to work on
the records inside.
• The file room should at most be 12 feet high.
• It must have a watertight door and at least fire proof for one hour.

ASSESSMENT NO.6
General Instruction.

Read and comprehend the following questions and explain each with
minimum of 50 words. Use the corresponding answer sheet attached at
the back of your module.

1. Just like protective locks, there are also types of protective keys.
Explain the importance of proper handling of keys in terms of
protection of assets from damages.
2. Explain the advantages and disadvantages of safe in terms of
security potential.
3. Differentiate the vault and the file room.

What is PERSONNEL SECURITY?


Personnel Security includes all the security measures designed to
prevent unsuitable individuals or persons of doubtful loyalty to the
government, from gaining access to classified matter or to any
security facility, and to prevent appointment, or retention as
employees of such individuals.
Control of Personnel
Access to “restricted Areas” can be partially controlled by
fences, gates and other physical means, but the individual working
in the area is the key to the bringing out of classified matter to
unauthorized personnel. Written information does not have the
power of speech. Only the individual has knowledge of this written
information can pass it to an unauthorized personnel if he
unguardedly talks about information.

What is Personnel Security Investigation?

It is an inquiry into the character, reputation, discretion and loyalty


of individual in order to determine a person’s suitability to be given
security clearance.
Types of Personnel Security Investigation (PSI)
• National Agency Check (NAC). – This is an investigation of an
individual made upon the basis of written information supplied by
him in response to official inquiry, and by reference to appropriate
national agencies. It is simply a check of the files and record of
national agencies. The national agencies checked under this type
of investigation are the following:
• National Intelligence Coordinating Agency (NICA)
• National Bureau of Investigation (NBI)
• ISAAFP or J2 Division, GHQ AFP
• CIDG PNP Camp Crame., etc.

• Local Agency Check (LAC) – This type of investigation consist of


the first type plus written inquiries sent to appropriate local
government agencies, former employees, references and schools
listed by the person under investigation. The local agencies
normally check besides the past employment, schools and
references are the following:
Place of the locality where the individual is a resident.
Mayor, Police, Fiscal, Judge of the locality where the individual is a
resident.
• Background Investigation (BI) This is more comprehensive
investigation than the NAC or the NAC and LAC. A through and
complete investigation of all or some of the circumstances or
aspects of a person’s life is conducted.

Types of BI
Complete Background Investigation – Consist of the
investigation of the background of a person, particularly all the
circumstances of his personal life.

Partial Background Investigation – Consist of the investigation of


the background of an individual but limited only to some of the
circumstances of his personal life which are deemed pertinent to
the investigation. Normally, the request for the investigation will
indicate the specific personal circumstances to be covered. This
type of BI is also used to further develop questionable information
contained in another investigation report.

ASSESSMENT NO.7
General Instruction.

Read and comprehend the following questions and explain each with
minimum of 50 words. Use the corresponding answer sheet attached at
the back of your module.

1. Why there is a need to maintain personnel security?


2. What is the main purpose of personnel security?
3. How does personnel security differs from physical security?
4. Among the 3 types of security such as physical security, document
security and personnel security. Which must be maintained the
most? Defend your answer.
5. Why there is a need to control personnel to access restricted
areas?
6. During personnel security investigation what must be obtained?
7. Differentiate the 2 types of personnel security investigation and its
importance.

What is a Security Guard?


Sometimes called private security guard or watchman shall include
any person who offers or renders personal service to watch or
secure either a residence or business establishment or both for hire
or compensation, and with a license to exercise profession.

What is Security Guard Force?


It is a group of force selected men, trained or grouped into
functional unit for the purpose of protecting operational processes
from those disruption which would impede efficiency or halt
operation at a particular plant, facility, installation or special activity.

Types of Security Guard Forces


• Private Security Agency - any person, association, partnership,
firm or private corporation, who contracts, recruits, trains, furnishes
or post any security guard, to do its functions or solicit individual s,
business firms, or private, public or government-owned or
controlled corporations to engage his/its service or those of his/its
security guards, for hire commission or compensation.

• Company Security Force - A security force maintained and


operated any private company/ corporation for its own security
requirements only.
• Government Security Unit - a security unit maintained and
operated by any government entity other than military and/a police,
which is established and maintained for the purpose of securing the
office or compound and/or extension such government entity.

Selection of Guards
Republic Act Number 5487 and its implementing rules and
regulations prescribed the minimum requirements for guards to be
able to secure a license to exercise profession as a security guard,
private detective, security officer and security consultant.

General Requisites in the Security Profession

• Filipino Citizen
• Physically and mentally fit
• Good moral character
• Must not possess any disqualification
General Disqualification

• Dishonorably discharge from the service in the PNP/AFP or any


private government entities.
• Physically or mentally unfit
• Conviction of a crime
• Addicted to drugs or alcohol dummy of a foreigner
• Elective or appointive government official

Basic Qualifications of an Agency Operator/Manager


In addition to the general qualifications, an operator should be:

• At least 25 years of age


• Commissioned officer, inactive or retired from AFP or PNP or a
graduate of Industrial Security Management with adequate training
and experience in the security business.

Basic Qualification of a Security Consultant


In addition to the general qualifications, a consultant should be:
• Holder of Master Degree in Criminology, MPA, MNSA, Industrial
Management or LL.B.
• Must have at least ten (10) years’ experience in the operation and
management of security business.
Basic Qualifications of a Security Officer
In addition to the general qualifications, a security officer, should
be:
• At least graduated from Security Officers Training Course
• A retired personnel in the PNP/AFP
• Must not possess any of the disqualification.

Basic Qualifications of a Private Detective


In addition to the general qualification, a detective should possess
any of the following:
• BS Criminology Graduate
• LL.B. holder
• Graduate of a Criminal Investigation Course
• Advance ROTC graduate

Basic Qualification of a Security Guard


In addition to the general qualifications , a security guard should-
• Be at least high school graduate
• Be at least 18 years of age but not more than 50 years old
• Undergone pre-licensing training course
• Passed a neuropsychiatry examination.
• Be locally cleared with PNP or NBI

Licenses in the Security Profession


License to Operate- before a Private Security Agency (PSA) can
operate; it has to secure a License to Operate (LTO) categorized as
either temporary or regular. A temporary license is issued by the
PNP thru Civil Security Croup Directorate after the applicant
/licensee should have complied with all the requirements while it
has less than two hundred guards. A Regular license to operate is
issued to the PSA once it is qualified of having two hundred (200)
or more license security guard in its employ duly posted. Regular
license is renewable every two (2) years.

Security Guard License- before a security guard can practice his


profession; he shall possess valid security license. The use of
expired license is not allowed. In case of doubt, licenses may be
verified at the PNP SAGSD whether valid or fake.
Firearm’s license- all firearms of the security agency should be
covered with firearms license issued by the PNP through its
Firearms Explosive Division under the Civil Security Group,
renewable every two years. No duplication of two or more firearms
with the same make and serial number shall be covered by one
license.

ASSESSMENT NO.8
General Instruction.

Read and comprehend the following questions and explain each with
minimum of 50 words. Use the corresponding answer sheet attached at
the back of your module.

1. An operator or manager of a security agency must have no


previous record of any conviction of any crime or offense involving
moral turpitude. Why it must be thoroughly investigated?
2. If you owned a security agency operating in the City of Manila, how
many numbers of security employees you may employ and why?
3. If you owned a security agency operating in places other than
Metropolitan Manila, other cities and first class  municipalities  may
employ not more than? Why?

(See: The Implementing Rules and Regulations of R.A. No 5487)


Firearms and Weapons Authorized for Used of the Security
Guard While on Duty
• Handguns/Low-powered (cal. 22 and cal.38) not exceeding one FA
for every two guards employed.
• Shotguns (not bigger than 12 gauge)
• High-powered- when the agency is operating in areas where there
is upsurge of lawlessness and criminality as determined by the
Chief PNP.
DOCUMENT AND INFORMATION SECURTY
Security of documents and information is based on the premise that
the government has the right and duty to protect official papers
from unwarranted and indiscriminate disclosure. In answer to this
problem, Malacanang, Manila dated August 14, 1964 entitled
“Promulgating rules governing security of classified matters in
Government Officers” was promulgated in order to safeguard our
secrets as secrets.

Standard Rules
The authority and responsibility for the preparation and
classification of classified matter rest exclusively with the originating
office.
 
Classified matter should be classified according to their content and
not to the file in which they are held or of another document to
which they refer, except radiograms or telegrams referring to
previously classified radiograms or telegram.

Classification should be made as soon as possible by placing the


appropriate marks of the matter to be classified.

Each individual whose duties allow access to classified matter, or


each individual who possesses knowledge of classified matter while
it is in his possession and shall insure that dissemination of such
classified matter is on the “need-to-know” basis and to property
cleared persons only.

Document Security Systems


Documents Security is that aspect of security which involves the
application of security measures for the proper protection and
safeguarding of classified information.

Classification Categories - Official matter which requires


protection in the interest of national security shall be limited to four
categories of classification which in descending order of importance
shall carry one of the following designations:
• TOP SECRET
• SECRET
• CONFIDENTIAL
• RESTRICTED

In Document and Information Security, a matter includes


everything, regardless of its physical character, or in which
information is recorded or embodied. Documents, equipment,
projects, books, reports, articles, notes, letters, drawings, drawings,
sketches, plans, photographs, recordings, machinery, models,
apparatus, devices, and all other products or substances fall within
the general term “matter”. Information, which is transmitted orally, is
considered “matter” for purposes of security.

Security Clearance is the certification by a responsible authority


that the person described is cleared for access to classified matter
the appropriate level. Need-to-know is the principle whereby access
to classified matter may only be only given to those persons to
whom it is necessary for the fulfillment of their duties. Persons are
not entitled to have access to classified matter solely by virtue of
their status or office. It is a requirement that the dissemination of
classified matters be limited strictly to persons whose official duty
requires knowledge or possession thereof.
Certificated of Destruction is the certification by a witnessing
officer that the classified matters describe therein has been
disposed of in his presence, approved destruction methods.

Classified refers to assign information by one of the four


classification categories. Security Clearance refers to the
administrative determination that an individual is eligible for access
to classified matter. Compromise means lose of security, which
results from an authorized persons obtaining knowledge of
classified matter. Compartmentation is the grant of access to
classified matter only to properly cleaved persons in the
performance of their official duties.

Declassify is the removal of security classification from classified


matter. Reclassify / Re grading is the act of changing the
assigned classification of matter. Up- grading is the act of
assigning to a matter of higher classification to a classified
document.

What are Top Secret Matters?


These are information and material (matter), the unauthorized
disclosure of which would cause exceptionally grave damage to the
nation, politically, economically or from a security aspect. This
category is reserve for the nation’s closest secrets and is to be
used with great reserve.

Classification Authority
The original classification authority for assignment of TOP SECRET
classification rests exclusively with the head of the department.
This power may however, be delegated to authorized offices in
instances when the necessity for such arises. Derivative
classification authority for TOP SECRET classification (authority for)
may be granted those officers who are required to give comments
or responses to a communication that necessitates TOP-SECRETS
response.
Examples of Top Secret Documents
Very important political documents regarding negotiation for major
alliances.
Major governmental projects such as proposal to adjust the nation’s
economy.
Military – Police defense class/plans
Capabilities of major successes of Intel services.
Compilations of data individually classified as secret or lower but
which collectively should be in a higher grade.
Strategies plan documenting overall conduct of war.
Intel documents revealing major Intel production effort permitting an
evaluation by recipients of the success and capabilities of Intel
agencies.
Major government project like drastic proposals.

What are Secret Matters?


These Information and material (matter), the unauthorized
disclosure of which would endanger national security, cause
serious injury to the interest or prestige of the nation or of any
governmental activity or would be of great advantage to a foreign
nation.

A secret grading is justified if:


It materially influences a major aspect of military tactics;
It involves a novel principle applicable to existing important
projects;
It is sufficiently revolutionary to result in a major advance in existing
techniques or in the performance of existing secret weapons;
It is liable to compromise some other projects so already graded.

Classification Authority

Same as TOP SECRET matter.

Examples of Secret Documents


Those that jeopardize or endanger Intel relations of a nation.
Those that compromise defense plans, scientific or technological
development.
Those that reveal important intelligence operations.
War plans or complete plans for future war operations not included
in top secret.
Documents showing disposition of forces.
New designs of aircraft projections, tanks, radar and other devices.
Troop movement to operational areas.
Hotel plans and estimates
Order of battle info.

ASSESSMENT NO.9
General Instruction.

Read and comprehend the following questions and explain each with
minimum of 50 words. Use the corresponding answer sheet attached at
the back of your module.

1. Under the Implementing Rules and Regulations of R.A. No 5487.


What is required to be displayed at all times in a conspicuous and
suitable place in a security agencies office
or headquarters?
2. Under the Implementing Rules and Regulations of R.A. No 5487.
Services of any security personnel may be terminated on what
certain ground?
3. The Application for renewal of license to operate a private security
agency shall be filed at least how many days before expiry date?
4. Explain the importance of document security.
5. Explain the importance of document classification categories and
its descending order of importance.
6. Explain the essential differences of secret matters to confidential
matters.
7. Why there is a need for security clearance and maintaining the
“need-to-know” principle?

What are Confidential Matters?


These are information and material (matter) the unauthorized
disclosure of which, while not endangering the national security,
would be prejudicial to the interest or prestige of the nation or any
governmental activity, or would cause administrative
embarrassment or unwarranted injury to an individual or would be
of advantage to a foreign nation.

Confidential grading is justified if:


It is a more than a routine modification or logical improvement of
existing materials and is sufficiently advanced to result in
substantial improvement in the performance of existing
CONFIDENTIAL weapons.
It is sufficiently important potentially to make it desirable to
postpone knowledge of its value reaching a foreign nation.
It is liable to compromise some other project already so graded.

Classification Authority

Any officer is authorized to assign confidential classification to any


matter in the performance of his duties.

Examples of Confidential Documents


Plans of government projects such as roads, bridges, building, etc.
Routine service reports like operations and exercise of foreign
power.
Routine intelligence reports.
Certain Personnel records, Staff matters.

What are Restricted Matters?

These are information and material (matter), which requires special


protection other than that determined to be TOP SECRET,
SECRET, or CONFIDENTIAL.

Authority to classify shall be the same as for CONFIDENTIAL


matter. Reproduction is authorized. Transmission shall be through
the normal dissemination system.

What is COMMUNICATION SECURITY?


Communication Security is the protection resulting from the
application of various measures which prevent or delay the enemy
or unauthorized persons in gaining information through our
communications. It includes Transmission, Cryptographic and
Physical security.

Rules- governing communications security do not in guarantee


security, and they do not attempt to meet every conceivable
situation. Communication security rules are a means, not an ends.
 
Department heads- are responsible for the maintenance of
communication security and for the promulgation of additional
directives as may be necessary to insure proper communication
security control within their jurisdiction.

All communication personnel should have an appreciation of the


basic principles of communication security may result in
compromise.

Communication Security Officer - A properly trained and cleared


Communication Security Officer shall be appointed in every
Department of the Government handling cryptographic
communication.

What is TRANSMISSION SECURITY?


Transmission Security is that component of communication
security which results from all measures designed to protect
transmission from interception, traffic analysis and imitative
deception.

Communication personnel shall select the means most


appropriate to accomplish the delivery of message in accordance
with the specified precedence and security requirements.

Radio Operators shall adhere to the use of correct procedures,


circuit discipline and authentication system as a security measures
against traffic analysis, imitative deception and radio direction
finding.

RISK ANALYSIS AND SECURITY HAZARD


What is a Risk?
It is the potential damage or loss of an asset. The level of risk is a
combination of two factors: The value placed on that asset by its
owner and the consequence, impact adverse effect of the loss or
damage to that asset and; the likelihood that a specific vulnerability
will be exploited by a particular threat.

What is Risk Management?


It is a process of selecting and implementing security
countermeasures to achieve an acceptable level of risk at an
acceptable cost.

What is Risk Analysis?


It is the analysis of risk include examinations of the vulnerability,
probability and criticality of potential threats and include natural and
manmade risk

What is an Adversary?
An individual, group, organization, or government that conducts
activities or has the intention and capability to conduct activities
detrimental to the individual, private or government entity.

What is Asset?
Any information, facility, material, information, or activity which has
a positive value to its owner whether it is an individual, private or
government entity.

What are Countermeasures?


An action taken or a physical entity used to reduce or eliminate one
or more vulnerabilities. The cost of possible countermeasures may
be monetary, but may also include non-monetary cost such as
reduced operational efficiency, adverse publicity unfavorable
working conditions, and political consequences.

What is Probability?
It is the chance or likelihood that a loss will take place. Indicated by
a mathematical statement concerning the possibility of an event
occurring
What is Criticality?
It is the impact of a loss as measured in financial terms. How
important it is in terms of the survival or existence of the
organization.

Risk Management Alternatives and Strategies


Risk Avoidance- eliminating or removing the risk totally from the
business, government, or industrial environment for which the risk
manager has responsibility
Risk Reduction- decreasing the risk by minimizing the probability
of the potential loss. The reduction of criminal opportunity is often
accomplished by situational crime [prevention strategies to
discourage, deter, or deny criminal incidents.

Risk Spreading- spreading the risk through compartmentation or


decentralization to limit the impact (criticality) of the potential loss
Risk Transfer- moving the financial impact of the potential loss-
over to an insurance company.
Risk Self-assumption- planned assumption and acceptance of the
potential risk by making a deliberate managerial decision of doing
nothing about the threat, or setting aside resources for use in case
of a specific loss incident.

What is SECURITY HAZARD?

Any act or condition which may result in the compromise of


information, loss of life, loss or destruction of property or disruption
of the objective of the installation.

Types of Hazards
• Natural Hazard- these are hazards which arise from natural
phenomena. The following are types of natural hazards or
disasters:
Floods caused by typhoons
Earthquakes
Fire (not caused by human action)
Storms (typhoons, cyclones, tornado and hurricane)
Lighting storms
Extreme temperature and humidity
• Human-Man made Hazards- These are hazards which are the
result of a state of mind, attitude, weaknesses or character traits of
one or more persons. They can be acts of commission or omission,
both overt and covert, which can disrupt operation of a plant or
installation. The following are types of human or manmade
hazards:
Carelessness- accidents and dissatisfaction
Disloyalty-subversion and sabotage
Espionage, pilferage and theft
Vandalism, etc.

ASSESSMENT NO.10
General Instruction.

Read and comprehend the following questions and explain each with
minimum of 50 words. Use the corresponding answer sheet attached at
the back of your module.

1. What is the difference between information security and


communication security?
2. What is the difference between communication and transmission
security?
3. Differentiate risk and hazard.
4. In security risk situations, which usually occurs first between
probability and criticality? Defend your answer.
5. As a criminology student give an example of security management
being implemented by our government during this COVID-19
pandemic.
ANSWER SHEET FOR ASSESSMENT NO.1
ANSWER SHEET FOR ASSESSMENT NO. 2
ANSWER SHEET FOR ASSESSMENT NO. 3
ANSWER SHEET FOR ASSESSMENT NO.4
ANSWER SHEET FOR ASSESSMENT NO.5
ANSWER SHEET FOR ASSESSMENT NO.6
ANSWER SHEET FOR ASSESSMENT NO.7
ANSWER SHEET FOR ASSESSMENT NO.8
ANSWER SHEET FOR ASSESSMENT NO.9
ANSWER SHEET FOR ASSESSMENT NO.10

You might also like