You are on page 1of 16

INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS

Development and Evolution of Security and Safety

Lesson I Security and Safety Concepts in Early Civilization

Introduction Security concerns everyone. All ages must be aware of what and how to make
herself secured because we don’t know when, where and how we could possibly meet danger.
In this course, we will be able to identify possible hazards or danger and learn on how we are
going to combat them and we will be enlightened with the laws governing security.

A. Early Civilization
 Security has a long history dating back to the origin of human being.
 Cave dwellers devised various forms of security to protect themselves and their
property from other tribe and wild animals.
 The Law of Hammurabi- (King of Babylon 1900 B.C.). The Law of Hammurabi is the
earliest record of laws to protect people and property.
 The ancient Greek City-States (about 600B.C.) This was consisted of the municipality
and the surrounding territory with a centrally located fortress built on a hill. -These city-
states created what is considered the first Police Force.
B. Middle Ages
 1066 England- King William assumed ownership of the land when he conquered
England.
 King William- Duke of Norwandy (France)
 He divided England into fifty-five military district and given the title REEVES.
REEVE- during this time, another position created to assist the reeves, which were
Constabuli.
CONSTABULI- means that keeper of the stable.
Constable- it denotes to someone with special power
 King John- he was forced to sign the Magna Charta (1215)- this document guaranteed
basic civil and political liberties to both people and nobles.
 King Edward I- issued the stature of Westminster in 1285- established a systematic
police and justice system.
 The Watch and Ward- organized town watchmen to patrol at night and to assist the
constables who worked during the day.
 Curfew- this act also established the position of bailiff who was required to check on all
strangers every fifteen days. Today bailiffs are officers of the court.
 The hue and Cry- this was an integral part of the watch and cry.
 Assize of Arms- this requires all males between fifteen to sixty years to maintain a
weapon in their home. The Statute of Westminster established this and they played a
significant role in promoting law and order.
C. The Eighteen Century
 In 1749, Henry Fielding published the first great social novel entitled Tom Jones.
 The bow Street Runners- this referred to as the first detective unit, since they quickly
moved to the scene of crimes for immediate investigation.
D. Nineteen Century
 Sir Robert Peel was introduced into parliament the Metropolitan Police Act in 1829. He
argued for a single police system in London composed of professionals that would be
carefully selected and thoroughly trained. At the same time, he realized that the police
could never be effective if the law were wide in scope and harsh in penalty.
 Today police officers in England are called Bobbies and named after Sir Robert Peel.

E. Evolution of Security in America

 1600s- several cities established a “Watch”.


 1800s- several cities like Detroit, Chicago, Philadelphia, San Francisco, and Los
Angeles established Paid Police Force.
 New York City adopted the Peelian principles and Federal Law Enforcement agencies
were also organized.
 The United States Post Office established an investigative arm in 1828 and the U.S
treasury department did the same in 1864.
 In 1908, the Department of Justice formed the Bureau of Investigation that became the
Federal Bureau of Investigation in 1924 headed by J. Edgar Hoover.

F. Private Security Grows in America

 Allan Pinkerton was a maker of barrels to trade, he settled in Chicago from Scotland
and became interested in law enforcement and made a career change by becoming a
deputy sheriff.
 In 1984, Pinkerton was appointed Chicago’s first detective. After seven years, he
formed his own private security agency company, the Pinkerton National Detective
Agency that provides security to various business clients.
 During the Civil War, US president Abraham Lincoln summoned Allan Pinkerton to
Washington t established an intelligence network for union forces.
 William J. Burns (USA)- he was a former secret service investigator who headed the
bureau of investigation.
 In 1850s, Henry Wells joined William Fargo and they established American Express
which operates east of the Missouri River.
 In 1859, Washington Perry Brink established da freight and package delivery service in
Chicago and he concentrated on the protection of valuables in transit.
 In 1910, William J Burns, the foremost American Investigator of his day and the first
director of the government agency that later became the FBI.
 In 1917, the armored truck was born.

G. Other Nation who contributed to the development of Security

 Greek and Roman civilizations devised various forms of protection


 The French, under King Louise XIV, during the 1600s, he promoted crime prevention
through preventive patrol and street lightning.
 Asian investigative methods used psychology to elicit confession.

H. Rail Road Police

 This was the era of the Robber Barons. It is when the massive corporate organizations
formed secret agreements to eliminate competition. Although Congress passed the
Sherman Anti-Trust Act in 1890 to curb monopolies, railroads became one of the most
hated industries because violence was involved.
 Several States enacted legislation permitting rail roads to organized security force with
full police power.
 In 1914, there were about fourteen thousand railroad police in America. They were
deputized by the federal government to help prevent sabotage.
I. The growth of security after world war II
 In 1950, the department of defense formulized security requirements for defense
contractors to protect classified information and materials and to prevent espionage.

J. A new century with challenges

 Terrorist attack with hijacked airline killed about 5,000 people by leveling the World
Trade Center and destroying part of the Pentagon these bolts surprise attracts, subsequent
bio-terrorism, and the war in Afghanistan show difficult and guard are yielding to
professional security officer who is more educated, better trained, knowledgeable of
humorous security and loss prevention strategies.

K. Development of Security device

 Personnel- are the backbone of protection efforts, various security devices and systems
that provides additional safeguards like;
a. Dogs- with their keen sense and smell; they are a very old form of alarm notification.
b. The ancient civilization in China and Egypt equipped doors with primitive keyed
locks.
c. Early Egyptians constructed locked vaults deep inside huge pyramids that illustrated
the concept of “protection in depth”, a modern strategy used in banks.
d. The ancients of Israel used bright light and loud noise to scare intruders.
e. Gideon- he is a Jewish warrior king who instilled fear in a large invading force by
blowing three hundred trumpets and waving three hundred torches.
f. The Romans used the sensitive hearing and squawking of geese to warn of an
approaching army.
g. During the 1700s, British investors assembled the first mechanical burglar alarm
system to protect doors. It was set of chimes linked to a door lock. Therefore, burglars
defeated the system by cutting the cord between the lock and the chimes.
h. In 1852, Augustus R Pope- filed a patent for an electromagnetic alarm consisting of an
electric bell activated by falling weight or uncoiling of a spring when a door or window
opened.
i. Edwin Holmes- after six years he bought Pope patent and formed the first private
company that provides alarm protection. Holmes protection Group Inc. was acquired by
AT Security Century Service Inc. at the end of the twentieth.
Theories, Concepts, Philosophy of Security

Historical Background of Security in the Philippines

In the 1950s, the private security agencies/guards were under the supervision and
control of the municipal and city mayors. Any civilian could be employed as a security
guard without undergoing any training at all, especially in handling firearms. The only
requirement then was a permit secured from the office of the city mayor where he was
posted. In fact, even foreigners or any person, regardless of age or educational
background were allowed owning and operate a security agency.
The Philippine Association of Detective and Protective Agency Operators
(PADPAO) was established way back 1958 with the aim of making itself as freely self-
governing, self-regulating and self-policing.
On June 13, 1969, RA 5487, otherwise known as “Private Security Agency Law
was enacted.
They provided that the Philippine Constabulary would be the sole authority to
supervise all private security agencies, co-guard forces, government guard forces and
their security guards.
Later, the control of government forces as transferred to the National Intelligence
and Security Agency. Likewise, during the succeeding years, various presidential decrees
were issued amending certain provisions of RA 5487.
On August 4, 1969, the Philippine Constabulary issued Staff Memorandum
organizing the PC Security and Investigations Supervisor Office(PCSIASO) with the
authorized strength of eight (8) officers and eight (8) enlisted personnel under the
functional grouping of C3 Division and it was later named as Constabulary Supervisory
Office for Security and Investigations Agencies (CSOSIA). Pursuant to General Order
No. 404 date June 29, 1970, the office was designated as the PC Supervisory Unit
Security and Investigation Agencies (PC SUSIA) and later as PC/INPSUSIA.
With the creation of the Philippine National Police on January 01, 1991,
PCSUSIA was again renamed as PNP Supervisory Office for Security and Investigation
Agency (PNPSOSIA), charged with the mission to provide administrative services and
general supervision over the organization, operation, business and activities of all
operating private detective, watchmen, security guards/agencies and company guards’
forces and all government guards throughout the country.
At present, SOSIA operates under a new PNP Security Agency Guard Supervisory
Division (PPSAGSD)
Security

It is the state or condition of being safe or free from fear, harm, danger, loss, destruction or
damages.

There is a need for adequate protection because of the prevailing action of man against man
that leads to unsecure or unsafe conditions due to economic reasons, revenge or just plain greed.

Legal Basis of Industrial Security Management

The security is bound to respond on calls of violence against women and children in their
AOR that is the reason why it is important for the security to be acquainted with this law.

A. National Authority 1. The highest law is the law of self-preservation. Man naturally
reacts to protect himself, his family, his honor, freedom, liberty and property from danger,
threat or hazard. It became an unwritten law of the early Filipinos to protect themselves and
their property against the natural and man-made hazard.

B. Constitutional Authority

1. The prime duty of the Government is to serve and protect the people (Art. II Sec 4)

 The government may call upon the people to defend the State and in the
fulfillment thereof, all citizens may be required, under conditions provided by law,
or to render personal military service.
 Although the defense of the State is the one contemplated here, people being one
of the elements of the State is directly affected in whatever protection the state
will receive from the government and the people. All citizen who are qualified,
including the security guards, may be required by law to render personal, military
or civil services.

2. No person shall be depriving of life, liberty or property without due process of law, nor shall
any person be denied the equal protection of the laws. (Art. III, Sec. 1)

 This means the life, liberty, freedom and property can only be taken from a
person after the observance of due process of law. Due process of law is of two
aspects; substantive and procedural. Webster, in brief, defines procedural due
process as “one which hears before it condemns, which proceed upon inquiry, and
render judgment only after trial”. But if the taking of life, liberty, freedom or
property does not fall within the framework of due process of law, available
remedies under the law should be resorted to.
3. Private Property shall not be taken for public use without just compensation. (Art. III, Sec. 9)

 The Constitution protects not only ownership but also possession, enjoyment,
use and disposition of private property by their rightful owner’s subject to such
limitations imposed by the law. In this regards, private property to be taken by the
government in its exercise of power of the eminent domain must satisfy two
important conditions namely; public use and just compensation.

4. The right of the people to be secure in their persons, houses, papers and effects against
unreasonable searches and seizures of whatever nature and for any purposes shall be inviolable,
and no search warrant or warrant of arrest shall be issued except upon examination under oath
or affirmation of the complainant and the witnesses he may produce, and particularly describing
the place to be searched and the persons or things to be seized. (Art. III, Sec. 2.

C. Statutory Authority

1. DILG Act of 1990 and later recognized as the PNP Law of 1991

The law that created the public safety agencies. Thus, the creation of Civil Security Group
under the PNP Operational Support Units which has general supervision over the organization,
business operation and activities of all organized private detectives, watchmen, security guard
agencies, and company guard forces.

2. Anti-Violence against Women and Children

This is an act defining violence against women and their Children, providing for protective
measures for victims, prescribing penalties therefore, and for other purposes. "Violence against
women and their children" refers to any act or a series of acts committed by any person against
a woman who is his wife, former wife, or against a woman with whom the person has or had a
sexual or dating relationship, or with whom he has a common child, or against her child
whether legitimate or illegitimate, within or without the family abode, which result in or is
likely to result in physical, sexual, psychological harm or suffering, or economic abuse
including threats of such acts, battery, assault, coercion, harassment or arbitrary deprivation of
liberty.

Sec. 30. Duties of Barangay Officials and Law Enforcers.

a. Respond immediately to a call for help or request for assistance or protection of the victim
by entering the necessary whether or not a protection order has been issued and ensure the
safety of the victim/s;

b. Confiscate any deadly weapon in the possession of the perpetrator or within plain view;

c. Transport or escort the victim/s to a safe place of their choice or to a clinic or hospital;
d. Assist the victim in removing personal belongs from the house;

e. Assist the barangay officials and other government officers and employees who respond to a
call for help;

f. Ensure the enforcement of the Protection Orders issued by the Punong Barangay or the
courts;

g. Arrest the suspected perpetrator without a warrant when any of the acts of violence defined
by this Act is occurring, or when he/she has personal knowledge that any act of abuse has just
been committed, and there is imminent danger to the life or limb of the victim as defined in this
Act; and

h. Immediately report the call for assessment or assistance of the DSWD, social Welfare
Department of LGUs or accredited non-government organizations (NGOs).

3. Comprehensive Firearms and Ammunition Regulation Act

This is an Act providing for a comprehensive law on firearms and ammunition and providing
penalties thereof.

4. Comprehensive dangerous Drug Act of 2002

This is an Act Instituting the Comprehensive Dangerous Drugs Act Of 2002, Repealing
Republic Act No. 6425, otherwise known as the Dangerous Drugs Act of 1972, as Amended.

The security should be familiar with the prohibited drugs for them to positively identify it
while in the performance of their duty.

5. Private Security Agency Law of the Philippines

This law governs the operation, administration of security agency, and activities,
qualification, duties and licensing of security guards, watchmen and private detectives. In short,
it is the intention of this law to professionalize the security services in order to upgrade the level
of security protection.

6. Revised Penal Code (Republic Act No. 3815, as amended)

-The applicable provisions for the Code on Crime Against Persons, personal liberty,
security and property have bearing on the security and protection of one’s life, liberty and
property.
DEFINITION OF TERMS

Industry

-the term denotes” earnest or constant application to work or business”, or A special branch of
productive work, or the capital or workers employed in it. - It is likewise defined as a large
scale production or organized economic activity connected with the production, manufacture or
construction of a particular product or range of products (Microsoft Encarta, 2001-2005)

Industrial

- This defined as “pertaining to or engaged in industry.

Management

- This term means the skillful use of means to accomplish a purpose. - This is the process of
property utilizing available resources to achieve organizational and objectives.

Industrial Security

- The term may mean: a) security measures applied to business industries (Manwong and Delizo
2006) or b) the business of providing security and protection to private individuals, business
and enterprise or government and non-government industries.

Industrial Security Management

- It is the skillful handling of the security and safety measures of business enterprises and
industrial establishments.

Major Divisions of Security

Types of Security

1. Industrial Security- a type of security applied to business groups engaged in


industries like manufacturing, assembling, research and development, processing, warehousing
and even agriculture.

2. Hotel Security-it is a type of security applied to hotels where its properties are protected
from pilferage, loss, damage and function in hotels, restaurants are not disturbed and troubled
by outsiders or the guest themselves. This type of security employs house detectives, uniform
guards and supervisors and to ensure that hotel guests and their personal effects are
safeguarded.

3. Bank Security- this type of security is concerned with bank operations. Its main
objectives are the protection of bank cash and assets, its personnel and clientele. Security
personnel are trained to safeguard bank assets while in storage, in transit and during
transactions.

4. VIP Security- a type of security applied for the protection of top-ranking officials of the
government or private entity, visiting person of illustrious and foreign dignitaries.

5. School Security- a type of security that is concern with the protection of students,
school personnel and other school properties. Security personnel are trained to protect the
school property from theft, vandals, handling campus riots and detecting the use of intoxicated
drugs and alcohol by the students.

6. Supermarket or Mall Security- a type of security which concerns with the protection of
the stores, warehouses, storage, its immediate premises and the properties as well as the
supermarket or mall personnel and customers. Security personnel are trained to detect
“shoplifter”, robbery and bomb detection and customer relation.

7. Physical Security- part of security concerned with the physical measures designed to
safeguard personnel and to prevent un authorized access to equipment, facilities, materials and
the documents and to protect them from espionage, sabotage, damages or theft. This is
considered as the broadest type of security.

8. Document Security- it is the protection of documents, classified papers and vital record
from loss, access, to unauthorized persons, damages, theft and compromise through proper
storage and procedures.

9. Operational Security-this involves the protection of process, formula and patents,


industrial and manufacturing activities from espionage, infiltration, loss, compromise or
photocopying.

10. Communication Security- the protection resulting from the application of various
measures which prevents or delay the enemy or un authorized person in gaining information
through communication. This includes transmission, cryptographic and physical security.

Three Major Divisions of Security

1. Physical Security - this concern with the physical measures adopted to prevent un
authorized access to equipment, facilities, material and document and to safeguard them against
espionage, sabotage, damage, loss and theft.

2. Personnel Security - this is as important as physical security. Personnel security starts


even before the hiring of an employee and remains to be maintained for as long as the person is
employed. - Its purpose is to ensure that a firm hires those best suited to assist the company or
firm in achieving its goals and objectives and once hired assist in providing necessary security
to the work force while carrying out their functions.

3. Document and Information Security - this involves the protection of documents and
classified papers from loss, access by unauthorized persons, damages, theft and compromise
through disclosure. -Classified documents need special handling. Lack of indoctrination and
orientation among the personal handling them can result in the leakage, loss, theft, and un
authorized disclosure of the documents.

Security, Hazards and Barriers

Physical Security

Physical measures are used to define, protect and monitor property rights and objects; they
consist of barriers and devices that are able to detect, impede, and deter potential security
threats. Physical security measures help to combat the crime related threats that both employees
and outsiders pose to the organization. (example; robbery, burglary, arson, assault, rape, theft
and vandalism). If measures are properly planned, most potential intruders, whether employees
or outsiders, should see that the risks of detection and punishment for attempting to penetrate a
protected area are significantly greater that whatever they may gain.

Security Hazard

-it is an act or condition affecting the safe operation of the facility caused by human action
accidental or intentional. It includes sabotage, espionage, pilferage and theft, disloyalty,
disaffection, and subversive activity.

1. Human Hazards- caused by person whether intentional or accidental.

2. Natural Hazards- those that are caused by natural phenomena that may cause damage,
disturbance, fear or problems to the humanity. This includes floods, typhoons, earthquakes,
storms, volcanic eruption, tidal waves, tsunami, lightning, etc.
Protective Barrier

Barrier

- any structure or physical device capable of restricting, deterring and delaying illegal access to
any installation.

Purpose of Barriers

1. Define the physical limits of an area

2. Create a physical and psychological deterrent to unauthorized entry

3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders

4. Assist in more efficient and economical employment of guards

5. Facilitate and improve the control of vehicular traffic.

Types of Physical Barriers

1. Natural Barrier-Geographical features like rivers, cliffs, canyons or any other terrain
that is difficult to traverse.
2. Structural Barrier- these are features constructed by man regardless of their original
intent that tends to delay the intruders.
 Examples: fence, walls, grills, doors, roadblocks, screens or any other construction
that will serve as a deterrent to unauthorized entry.
3. Human Barrier- persons being used in providing a guarding system or by the nature of
their employment and location, fulfill security functions.
 Examples: Security guard and employees of the establishment.
4. Animal Barrier- animals that are used in partially providing a guarding system.
 Examples: dogs, geese. turkey, parrots.
5. Energy- it is the employment of mechanical, electrical, electronic energy imposes a
deterrent to entry by the potential intruder or to provide warning to guard personnel.
 Examples: protective lighting, alarm system and any electronic devices used as barriers

Three Line of Physical Defense

1. First line of defense- perimeter fence or barriers

2. Second line of defense- doors, floors, windows, walls, roofs and grills and other entries to
the buildings.
3. Third line of defense- storage system like steel cabinets, safes, vaults and interior files.

Levels of Physical Security

1. Minimum Security- the system designed to impede unauthorized external activity such as
simple intrusion to armed attack.

2. Low level Security- system designed to impede and detect some unauthorized external
activity such as on small retail store, storage warehouse.

3. Medium Security- designed to impede, detect and assess most external activity and some
unauthorized internal activity that range from simple shoplifting to conspiracy to commit
sabotage.

 Use of advance intrusion alarm system


 Establishment of perimeter and perimeter barriers
 Establishment of perimeter and perimeter barriers

4. High Level Security- designed to impede, detect and assess most unauthorized external and
internal activities.

Principles of Physical Security

1. The type of access necessary will depend upon the number of variable factors and therefore
may be achieved in a number of ways.

2. There is no impenetrable barrier.

3. Defense in depth is barrier after barriers.

4. Delay is provided against surreptitiously entry.

5. Each installation is different.

Perimeter Barrier

-A medium or structure, which defines the physical limits of an installation or area to restrict or
impede access thereto. It refers to any physical barrier used to supplement the protection of an
inside perimeter.
a. Inside perimeter- a line protection adjacent to protected area and passing through points of
possible entry into the area such as doors, windows, skylights or other points of access.

b. Outside perimeter-a line of protection surrounding but somewhat removed from a protected
area such as fence.

Type of Perimeter Barrier

1. Fences- wire fencing can be barbed wire, chain link or concertina. Chain link are for
permanent structure, barbed wire is for semi –permanent, and concertina for the least permanent
and can also be used as temporary roadblock or impediment during strikes and crowd control.
Wire fences are attractive and low in maintenance cost; they offer fewer hazards to people
because of the absence of barbs, and the openings are small to prevent passage of pilfered.

2. Building Walls- walls, floors, roofs or their combination serve also as barriers and they
should be of such construction to provide uniform protection just like the wire fencing.

 Masonry walls as perimeter barrier should have the same height as the chain link and
surmounted by the barbed wire as top guard; if the height of the masonry is less than the
prescribed, additional chain link should be placed as “topping”.
 Walls can be made of stone slabs like adobe or hollow blocks bound by concrete with
post at regular intervals to prevent the walls from toppling due to wind or scouring
facilities, security must sit down with design engineers so that the area where sensitive
activity will be done should be given special emphasis in protective walls.

3. Bodies of water like river lakes, marsh cataract, sea pond or any other bodies of water
forming a part of the wall, building or fencing should never be considered adequate natural
perimeter barrier. Additional security measures like wire fence, concrete walling, security
patrolling and floodlighting at night may be necessary for the portions of the perimeter.

Types of Fences

1. Solid Fences

a. Visual access to the fencing is denied


b. It denies the opportunity for the intruder to become familiar with the personnel,
activities and the time scheduled of the movements of the guards in the installation.

c. It prevents the guards from observing the area around the installation and it creates
shadow that may be used by the intruder for cover and concealment.

2. Full-view Fence

a. Visual access is permitted through the fence.

b. It allows the roving patrols and stationary guard to keep the surrounding area of the
installation under observation.

c. It allows intruder to become familiar with the movements and time schedule of the
guard patrols thereby allowing him to pick the time that is advantageous on his part.

Type of Full View Fence

1. Chain Link Fence


 It should be constructed with 7 feet material excluding the top guard
 It must be 9 gauge or heavier.
 The mesh opening is not to be larger than 2 inches per side
 It should be twisted and barbed at the top and bottom
 It must be securely fastened to rigid metal or reinforced concrete.
 It must reach within 2 inches of hard group or paving
 On soft ground, it, must reach below surface deep enough to compensate for
shifting soil or sand.
2. Barbed Wire Fence
 Standard barbed wire is twisted, double strand, 12-gauge wire with 4 point barbs
spaces in an equal distance apart.
 It should not be less than 7 feet high excluding the top guard.
 It must be firmly affixed to posts not more than 6 feet apart.
 The distance between strands must not exceed 6 inches at least one wire will be
interlaced vertically and midway between posts.
3. Concertina Wire Fence
 Standard concertina barbed wire is commercially manufactured wire coil of high
strength steel barbed wire clipped together at intervals to from a cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter.
Types of Perimeter Barrier Openings

1. Gate and doors- when not in active use and controlled by guard, gates and doors in the
perimeter should be locked and frequent inspected by guards. Locks should be changed from
time to time.

2. Sidewalk Elevator- these provide access to areas within the perimeter barrier and should be
locked or guarded.

3. Utilities Openings-like sewers, air tanks, and exhaust channels

4. Clear Zone- unobstructed area or a clear zone should be maintained on both side of the
perimeter barrier.

Additional Protective Barrier

1.Top Guard- it is an additional overhand or barbed wire place on vertical perimeter


fences facing upward and outward with a 45 degree with three to four strands of barbed
wires, 6 inches apart and must be stalled on the supporting arms.

2. Guard Control Stations- this is normally provided at main perimeter entrance to


secure areas located outdoors, and manned by a guard on a fulltime basis.

3. Tower- “Guard Tower”- are house-like structure above the perimeter barriers.

4. Signs and Notice- “Control Signs” should be erected where necessary in the
management of un authorized ingress and preclude accidental entry. Signs should plainly be
visible and legible from approach and in under standard language. Signs on entry should also
be posted at all principal entrance.

You might also like