You are on page 1of 62

Republic of the Philippines

CAGAYAN STATE UNIVERSITY


CARIG CAMPUS
Carig Sur, Tuguegarao City, Cagayan
Telephone Nos. 078-396-0569 Local No. 019
College of Public Administration
_________________________________________________________________________________
LECTURE NOTES IN INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS

Course Description:
This course covers the study of the concepts and principles of industrial security. It includes
the role security profession in law enforcement administration and public safety, importance of
security personnel investigation, the concept of criminalistics in the field of industrial security
investigation and crime detection, and the principles applicable to jurisprudence of criminal law,
evidence and criminal procedure in relation to the legal context of industrial security and related laws.

Course objectives

At the end of the course, you should be able to:

1. Develop skills in conducting comprehensive risk assessments for industrial facilities and
implement effective risk management strategies to safeguards assets.
2. Formulate and implement robust security policies and procedures tailored to industrial
environments, ensuring compliance with industry standardsi and regulations.
3. Explore and implement physical security measures to protect the industrial sites, including
access control, surveillance systems, and perimeter security.
4. Create detailed incident response plans to address and mitigate security incidents promptly,
minimizing the impact to industrial operations.
5. Apply professional, social and ethical standards in practice of profession.
==============================================================================

Introduction

Security from a layman’s point of view refers to the security guards whose main function is to
protect an office, building, installation or equipment against trespass, theft, arson, and other inimical
acts. As a security officer, the job includes the implementation of a viable security education program
which will sell security measures to the customer-clientele of the private policing activities. It is also a
must to improve the knowledge and adopt an open mind regarding the many faceted problems involved
in industrial security management.

1|Page
CHAPTER I

HISTORICAL BACKGROUND OF SECURITY

Many thousand years ago, some form of law and consequently some form of enforcement can
be traced back to the dawn of civilization. Four thousand years before the birth of Christ in the Nile,
Valley, man knew law enforcement which is security. The Chinese, the Greeks, the Hebrews, the
Persians and the Roman empires are replete with historical background of security.

 VIGILES
- origin of the watchmen although their principal duty was as a fire brigade.
 FRANK WILLS
- He was an American Security guard best known for his role in foiling the June 17, 1972,
break-in at the Democratic National Committee inside the Watergate complex in Washington
D. C. He detected the Watergate burglars ultimately leading to the resignation of US
President Richard Nixon.
 In the Christian era or after the birth of Christ, the watchman, forerunner of the security
guard was known in the old Testaments.

In the Old Testament of the Bible, security guards, as we understand them in modern context,
may not be explicitly mentioned. However, there are references to individuals who served in roles that
involved guarding, protecting, or overseeing specific locations. These roles were often associated with
religious or royal contexts.

- Temple guards- in the Old Testament, especially in books 1 Chronicles and 2 Chronicles,
there are references to guards or gatekeepers appointed to watch over the entrance of the
tabernacle or temple. They were responsible for ensuring the sanctity and security of these
sacred spaces.
- Palace Guards- Kings and rulers in the Old Testament often had guards or officials who
were responsible for the security of the royal palace. In the book of Esther, there are
references to the king’s gatekeepers and officials who guarded the king’s entrance’
- City Watchmen- The concept of city gates and watchmen is recurrent in the Old Testament.
Watchmen were individuals appointed to stand guard at the city gates, providing security
against external threats and serving as a means of controlling access.
- Military Guards- in times of war or conflict, military personnel served as guards for the
nation or specific locations. They were tasked with protecting the people and territories from
external adversaries.

While the terminology and specifics may differ from contemporary security roles, these historical
references highlight the importance of having individuals appointed for guarding and protecting various
2|Page
places of significance. The Old Testament often uses terms like “watchmen,” “gatekeepers,” or “guards”
to describe those responsible for security- related duties.

 Security or law enforcement more often than not appeared to be military troops. During the time
that the countries were governed by royal families, military bodyguards or guardsmen picked
from the elite troops comprised of the household troops assigned to Royal Families. Famous
among them the Praetorian Guards of Ancient Rome and the Mameluke of Egypt. Today, the
only remaining are the Swiss Guards at the Vatican in Rome.
 “Frank-pledge”

During the Age of Feudalism, the Anglo-Saxons brought with them the England organizations
made up of individuals to protect civil and military groups. The formal system of security during the
Middle Ages follows largely the refinements of existing practices.

Anglo-Saxons from Germany for six hundred years consolidated England under a fairly legal
system. The basic ties of society were kinship and the voluntary association between lord and man.

Kinship was the bond (lord and man) on which the individual depended for security and mutual
aid in all his affairs.

The system of social structure was known as the “frank-pledge”; groups of ten householders
were considered a unit called “tithing”, ten “tithing” constituted the police organization in criminal
matters. During these times the Anglo-Saxons in the exercise of law used the oath or the ordeal for a
system or justice. Failure to appear before the court to answer a charge made one on outlaw.

 “Shire reeves”
- The Norman period administered by William of Normandy brought about such personality as
“shire reeves” whose duties are directed toward preservation of peace and order within their
jurisdiction.
- Forerunner of the term Sheriff

 “Law Giver”

Under the rule of Henry II, he established a truth between those crimes. Henry II has initiated the
rule of law as distinct from the more arbitrary judgments of the Normans. The Assize of Clarendon in
1166 provided the origin of trial by jury.

 After the Norman period, in “1215” the “Magna Carta” was signed. It established the “principle of
due process” by stating that no freeman could be arrested, imprisoned, deprived of his property,
outlawed ort exiled or “in any way destroyed except by legal judgment of his peers or by the law
3|Page
of the Land”. It established the important principle that everyone including the king is subject to
law.

It was at that time that a central court system was established where in such institutions and courts like
the coroners, Justice of the Peace, Chancery courts, the Privy Councils were established.

 In 1784, author and magistrate Henry Fielding proposed a permanent, profession and
adequately paid security force. His most valuable contribution was the “Foot Patrol” to make the
streets safe and mounted patrol for the highways.
 “Laisses Faire”

The Industrial Revolution during the latter half of the 18th Century began to gather momentum.
The time people flocked to the cities lured by promises of work and wages. The crowding of the citie
with the influx of wealth seeker brought theory, crimes of violence and juvenile delinquencies. Then
came the “Laisses Faire” which contended that labor was the source of wealth; and it was by freedom
of labor, that public wealth would best be promoted. Crime rates spiraled the response to high crimes
brought citizens to resort to carrying of firearms for protection and they continued to band together to
hire special police to protect homes and properties. This was the beginning of private security.

 In America, security practices in the early days of the colonization followed those of England.
Mutual protection and accountability characterized the various groups. The American Revolution
sprang and the “Declaration of Independence was born”. Police power is bestowed upon the
state to permit interference with the normal personal and property rights in the interest of
conducting government in the general public interest.” In 1783, a police Department was
established in New York City, followed by Detroit in 1801, Cincinnati in 1803, Chicago in 1846,
Los Angeles in 1850, Philadelphia in 1855 and Dallas in 1856.
 The advent of the World War II causes an even more dramatic development of private security
agencies. Security personnel constituted a large work force, looking for jobs involving security
services and thus usher in the era of Modern Security.
 In 1859, Allan Pinkerton, a cooper from Scotland and the Chicago Police Department’s first
detective established one of the oldest private security forces in the United States. This
company aside from providing investigation of crimes and security for industrial concerns also
serves as the intelligence gathering arm of the Union Army during the Civil War. In 1889, Brinks
Incorporated started the business as a private service to protect property payrolls. In 1909, the
William J, Burns Inc. was formed to become the sole investigating agency for the American
Banking Association. Pinkerton and Burns were the only National Investigative bodies
concerned with non-specialized crime until the advent of the Federal Bureau of Investigation.

4|Page
Philippine Historical Background of Security Agency

i. 1946
The Philippines was under Spanish and then American colonial rule. Industrial security during
this period was primarily focused on protecting key economic interests, including agricultural and
mining activities, from internal and external threats.
ii. Post- Independence and Martial Law Period
It would be wise to trace the steps leading to the final signing by President Ferdinand E.
Marcos on June 13, 1969 of Republic Act 5487, the Private Security Agency Law. In this law
was assigned the most important role of Security Guard Force in assisting the Police in its
mission to safeguard lives and properties.
The then Philippine Constabulary (PC) played a great role in supervising all Private
Constabulary issued Staff Memo dated August 4, 1969 creating the Philippine Constabulary
Security and Investigation Agency Supervisory Office (PCSIASO). After barely two (2) months
another General Staff Memo was issued renaming PCISASO to PCSOSIA. On June 29, 1970, it
was again renamed as PC Supervisory Unit for Security and Investigation Agency (SUSIA).
However, the supervision was later on transferred to the National Intelligence Coordinating
Agency (NICA).
With the intention of continuously professionalizing the security industry, several
Presidential Decrees were issued such as PD No. 11 issued on October 1972, amending
certain sections of RA 5487 particularly Sections 4 as to who may organize a security and
watchman agency; PD 100 on January 17, 1973 further amended Sections 3, 4, 5, 8 and 9
which permits the watchman or security guard to assist in cases of emergency disaster or
calamity.
iii. 1980s and 1990s
The 1980s saw a transition towards a more democratic form of governance. This period
witnessed increased attention to economic development, and industries played a crucial role.
Security concerns were addressed to promote stability and attract foreign investments.
With the creation of the Philippine National Police on January 1, 1991 pursuant to RA
6975, PCSUSIA became Supervisory Office for Security and Investigation Agencies (SOSIA)
and on January 01, 1995 it was renamed as PNP SAGSD (Security Agencies and Guards
Supervision Division).

PNP-SAGSD

This Unit of the PNP was given the same functions to that of the PCSOSIA but a more challenging and
expanding tasks

5|Page
iv. Late 20th century to early 21st century
With the rise of technology, there was a growing recognition of the importance of cybersecurity
in protecting industrial systems. The Philippines, like many other countries, began adapting to
the digital era, addressing vulnerabilities in industrial control systems.
v. 21st century
Philippines continued to experience economic growth and increased industrialization. Industrial
security measures expanded to encompass a broader range of threats, terrorism, and
environmental protection and cybersecurity. Compliance with these regulations is crucial for
industries operating in the country.

Legal Bases of Industrial Security in the Philippines

1. Natural Authority- the highest law is the law of preservation. It is by instinct that a man protects
himself, his family, his honor, freedom, liberty and property from danger, threat or hazard.

2. Constitutional Authority- it is the prime duty of the government to serve and protect People.
The government may call upon the people to defend the states depending on the condition or render
personal military or civil services.

Section 1, Article III of the 1987 Philippine Constitution

Section 9, Article III of the 1987 Philippine Constitution

Section 2, Article III of the 1987 Philippine Constitution

3. Statutory Authority

RPC (Act No. 3815 as amended)

RA 5487

PD 11 (act amending certain provision of RA 5487)

6|Page
CHAPTER II

BASIC CONCEPTS OF SECURITY AND SAFETY

A. WHAT IS A SECURITY

Is the state of quality of being secure; freedom from fear or danger; assurance of certainty. To
secure is to make safe or be protected. Basically, it was the action of man against man that led to many
unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain greed and
avarice. Whatever the motives, the civilized man needs adequate protection.

In relation to this subject, security can also be defined as:

A. state or feeling of safe


B. freedom from worry about possible loss
C. something giving assurance
D. safety
E. precautions to maintaining safety
F. guards
B. DEFINITION OF TERMS

1. Industry – the term denotes “earnest or constant application to work or business”, or “a special
branch of productive work, or the capital or workers employed in it”.
2. Industrial – this is defined as “pertaining to or engaged in industry. The word industrial may
also mean: of industry or relating to, used in, or created by industry; and or of industry’s
workforce or relating to or involving workers in industry.
3. Management – this term means the “skillful use of means to accomplish a purpose.
Management can also be defined as “the planning, deciding, or exercising of control and
supervision on some functions of the organization.
4. Industrial Security - It is the state or condition of safety and protection, ease and comfort, free
from danger or harms, stability and prosperity, sufficiency and satisfaction, and enjoying
peaceful and orderly atmosphere in all situation and operation of any industrial installations as
provided by authorized security agency and personnel. It includes safety and protection of all its
resources and investment.
5. Industrial Security Management - It is the effective, efficient, economical, realistic and
practical application, utilization, implementation, adoption and supervision and administration of
the security resources and management operations to protect and preserve the interest and

7|Page
capital including the personnel and investment of any industrial establishment in order to obtain
its goal or objectives smoothly and productively.
6. Industrial Establishment - It refers to any business, construction, firms, factories, school,
buildings, structures, stores, malls, supermarket, industries, facilities, installations, motels or
hotels, restaurants, inns, agencies or office, banks and credit firms, insurance’s, etc., including
its respective personnel, logistics and resources.

C. RISK MANAGEMENT ALTERNATIVES AND STRATEGIES

It is methodical process of determining the risk and providing solutions to such risk. Measure the
extent of the risk, degree of potentialities, variability to determine the availability of resources and
necessary considerations to come up with the best outcome.

 Risk Analysis
- Once the potential threat is identified; determine the vulnerability of the probable target,
criticality of the threat and identification of resources and financial needs.
a. RISK ASSUMPTION- the acceptance of the probable risk and making plan to
provide a solution to the matter when it occurs. When in terms of money, a certain
amount will be set aside.
b. RISK AVOIDANCE- to stay away
from hazards and risk through
removal or elimination of potential
threats.
c. RISK REDUCTION- to level down
the rate of risk through reduction of
criminal opportunity. In cases of
uncontrollable phenomena like
typhoons and earthquakes,
planning and disaster risk
reduction shall apply.
d. RISK SPREADING- the
distribution of potential target of risk or threats. In terms of money, safes shall be
distributed to different areas with different number combination.
e. RISK TRANSFER- moving the potential target of loss to an insurance company or
other means to avoid direct liability.

D. FIELDS OF SECURITY

1) I T FIELDS

8|Page
Computing Security – is a branch of information security applied to both theoretical and actual
computer systems.

Computer Security - is a branch of computer science that addresses enforcement of


“secure” behavior on the operation of computers. The definition of “secure” varies by application, and is
typically defined implicitly or explicitly by a security policy that addresses confidentiality, integrity and
availability of electronic information that is processed by or stored on computer systems.

a) Data Security - is the means of ensuring that data is kept safe from corruption and that access
to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting
personal data.
b) Application Security – encompasses measures taken to prevent exceptions in the security
policy of an application or the underlying system through flaws in the design, development, or
deployment of the application.
c) Information Security – means protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification or destruction.
The terms information security, computer security and information assurance are
frequently used interchangeably. These fields are interrelated and share the common goals of
protecting the confidentiality, integrity and availability of information; however, there are some
subtle differences between them.
These differences lie primarily in the following:
i. approach to the subject
ii. the methodologies used, and
iii. the areas of concentration.
Information Security- It is concerned with the confidentiality, integrity and availability of data
regardless of the form the data may take: electronic, print, or other forms.

d) Network Security – consists of the provisions made in an underlying computer network


infrastructure, policies adopted by the network administrator to protect the network and the network-
accessible resources from unauthorized access and the effectiveness (or lack) of these measures
combined together.

2) Physical Security
Physical Security – describes measures that prevent or deter attackers from accessing a
facility, resource, or information stored on physical media. It can be as simple as a locked door or
as elaborated as multiple layers of armed guard posts.

9|Page
Physical Security – a system or systems of barriers (human, natural, animal structural and
energy) place between the potential intruders or enemies and the establishment, unit persons to
be protected.

a) Shopping Center Security (Mall or Supermarket) – a type of security which is concern with
the protection of the stores, warehouses, storage, its immediate premises and properties as well
as the supermarket personnel and customers. Security personnel are trained to detect
“shoplifter”, robbery, and bomb detection and customer relation.
b) Airport Security – refers to the techniques and methods used in protecting airports and by
extension aircraft from crime and terrorism.
- security measures to secure protect and safeguard entire airport perimeter including complex,
control tower house, runway, aircraft, crews, passengers, cargoes, tarmacs, civil aviation
operations and offices, airline agencies and others.
c) Home Security – are those methods use of protecting residential homes or town sites which
include the interior protection of houses against property losses or damages.

3) Political Field

a) International Security – consists of the measures taken by nations and international


organizations, such as United Nations, to ensure mutual survival and safety. These measures
include military action and diplomatic agreements such as treaties and conventions.
International and national security is invariably linked.
b) National Security – refers to the requirement to maintain the survival of the nation-state
through the use of economic, military and political power and the exercise of diplomacy.
c) Human Security – refers to an emerging paradigm for understanding global vulnerabilities
whose proponents challenge the traditional notion of national notion of national security by
arguing that the proper referent for security should be the individual rather than the state.
Human security holds that a people-centered view of security is necessary for national, regional
and global stability.

4) Monetary Field

vi. Financial Security – refers to the methods applied for the protection of fungible, negotiable
instrument representing financial value. It broadly categorized into debt securities, such as
banknotes, bonds and debentures, and equity securities, etc.

E. TYPES OF SECURITY

1. Communications Security

10 | P a g e
Is the protection resulting from the application of various measures which prevent or delay the enemy
or unauthorized persons in gaining information through the communication system. This includes:

i. Transmission Security
- A component of communications security which results from all measures designed to
protect transmission from interception, traffic analysis and imitative deception.
ii. Cryptographic Security
- Is the result from the provisions of a technically sound crypto-system and their proper use.
iii. Physical Security
- Providing a safeguard to equipment and material from access by unauthorized persons.

2. Hotel Security

The protection of assets, guests, personal effect and other properties in a hotel.

3. Bank Security

A specialized type of physical security in protecting the assets, personnel and operation of a
bank, with special emphasis on the precaution and measures to safeguard the cash and assets while in
storage; in transit, and during transactions.

4. Document Security

Is a physical security involving the protection of documents and classified matters from loss or
access by unauthorized persons, damages, theft and compromise through disclosure.

5. Personal Security

It is the protection of personnel, especially the ranking officials of the company from any harm,
kidnapping and other criminal acts. VIP security is also a type of personal security.

6. Crises Security

A part of VIP security involving hostage taking and kidnapping of VIPs.

7. Industrial Security

It is a physical security applied to business groups engaged in industries like manufacturing,


assembling, research and development, processing, warehousing and even agriculture. It is a form of
physical security involving industrial plant and business enterprises where the personnel, processes,
properties and operations are safeguarded. Use of protective barriers, and security lighting, personnel
movement control, locks and key management, guard forces, communications and electronic hardware
are essential, aside from fire prevention and control programs, emergency plans, industrial safety and
security education programs.
11 | P a g e
8. Operational Security

It is part of physical security that deals primarily with the protection of processes, formulas,
patents, and other industrial and manufacturing activities from espionage, infiltration, loss, compromise,
or photocopying.

9. Other Special Types

i. Air Cargo Security- is a critical aspect of aviation safety aiming to protect the shipments
and aircraft from potential threats.
ii. School Security- a type of security that is concern with the protection of students, faculty
members, and school properties. Security personnel are trained to protect the school
property from theft, vandals, handling campus riots and detecting the use of intoxicated
drugs and alcohol by the students.
iii. Camp Defense Plan/ Security- a comprehensive security plan dealing on preparedness,
alertness, effectiveness and cohesiveness of the security measures and other related
activities to maintain and uphold security of certain industry, establishment, building etc.
iv. Strategic Security – referring to that security measures involving external and internal
threat to national security and broad concern and issues related to governmental
leadership, management, operational, resources and challenges or crisis.
v. Bomb and Explosive Security – system of barrier or devices introduced or applied to
detect, discover, find, locate and diffuse, detonate neutralized bomb and/or explosives.
vi. Maritime Security – securing and protecting maritime and aquatic industries facilities and
resources and all its waterways and transport avenues, including harbors, ports, and
coastline area protection.

F. MAJOR DIVISION OF INDUSTRIAL SECURITY

1. Personnel Security – this is as importance as physical security. Personnel security starts even
before the hiring of an employee and remains to be maintained for as long as the person is employed.
Its purpose is to ensure that a firm hires those best suited to assist the firm in achieving its goal and
objectives and once hired assist in providing necessary security to the work force while carrying out
their functions.

Examples of Personnel Security

i. Procedure – complete or partial background investigation is conducted to


determine whether the applicant shall hire or not.

12 | P a g e
ii. Inquiry – It is a process of determining the loyalty, honesty, integrity, reputation of
a particular applicant or employee.
iii. Criteria – enumerated standard like education, experience, age, citizenship,
family background, potential are being verified if true or not.

2. Physical Security – this concern with the physical measures adopted to prevent unauthorized
access to equipment, facilities, material and document and to safeguard them against espionage,
sabotage, damage, loss and theft.

3. Document and Information Security – this involves the protection of documents and classified
papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure.
Classified documents need special handling, Lack of indoctrination and orientation among the personal
handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.

Examples of Document and Information Security

i. Policy – Security of document and information is the responsibility of all


concerned.
ii. Regulation – Anybody found guilty of violating document and information security
shall be dealt with accordingly.
iii. Doctrine - Access to information is based on the “need to know” and not by
position.
iv. Practice – Authority to have access to classified information is not permanent but
can be withdrawn by the originating authority.

G. WHAT IS A SECURITY HAZARD

Is an act or conditions which results in a situation conducive to a breach of the protection


system and the subsequent loss or compromise of defense information, company secrets, or damage
to personnel, property or facilities.

Kinds of Security Hazards

1. Human Hazard

Are the acts or conditions affecting the safe operation of the facility caused by human action,
accidental or intentional. It includes sabotage, espionage, pilferage and theft, disloyalty, disaffection
and subversive activity.

2. Natural Hazards

Are those caused by natural phenomena which cause damage, disturbance and problems of the
normal functioning of human activities, including security. It includes floods, typhoons, earthquakes,
13 | P a g e
lightning storms, volcanic eruptions, high-velocity winds, tidal waves, etc. It should be noted that the
real problems actually in industrial plants are the human or man-made hazards, the most common of
which are pilferage, theft, arson, accidents through carelessness, and sabotage.

Extent and Degree of Risks to Security will be Dependent on the Following

1. Relative Criticality

It is the importance of the firm with reference to the national economy and security.

2. Relative Vulnerability

It is the susceptibility of the plant or establishment to damage, loss or disruption of operation


due to various hazards.

Pilferage as a Security Hazard

PILFERAGE – this is one of the most annoying and common human hazards
which security has to deal with. This activity if uncontrolled can become a
financial drain if not a menace to smooth and orderly operation. Due to this,
security force has to concentrate large number men to check this nefarious
and disconnecting activity. Petty pilferage is frequent, hard to detect, difficult
to prove and win conviction but definitely dangerous to ignore.

Types of Pilferers

1. Casual Pilferer

One who steals due to his inability to resist the unexpected opportunity and has little fear of
detection.

2. Systematic Pilferer

One who steals with preconceived plans and takes away any of all types of items or supplies for
economic gain.

Factors to consider in Pilferage

a. Location of items to be pilfered – the systematic pilferer survey shopping and store areas, or through
contacts from the firms.

b. Access to the items – techniques can be from fake documents, bribing of guards, outsmarting
security, creating disturbance and other methods to divert attention while pilferage goes on.

c. Removal of item – this can be done as wearing the stolen shoes or shorts, concealment in the body
or vehicle, use of false document, etc. Driver may conceal pilfered items in his vehicle.
14 | P a g e
d. Disposal of items – there is a need for “fences” “brokers” or clearing houses” for these “hot” items.

Some Common Measures Against Pilferage


1. Package Inspection
2. Body Search
3. Garbage and Trash Checks Before Disposal
4. Personnel ID and Management Control
5. Locks and Key Management
6. Property Audits
7. Inspections
8. Asset Inventories
9. Use of Alarm
10. Security Education

Sabotage as a Security Hazard

Description of Saboteur

a. He is the most dangerous for whom security will have to deal with while
planning and implementing security measures and techniques.

b. He is an ordinary looking as the next guy but in mind, he has the training in
deception, knowledgeable in incendiaries, explosives, chemistry bacteriology,
mechanics and psychology.

c. He can work alone, in-groups, or simultaneously in several place.

Possible targets of Saboteur

a. Armed forces Installation


b. Natural resources – mines, forest, farm and farm products
c. Industries – buildings, power sources, machinery, fuel.
d. Warehouses depots, communication, public utilities.

Espionage as a Security Hazard

Espionage is a hazard because it may cause unauthorized disclosure of company information,


processes and procedures.

Description of an Espionage Agent

15 | P a g e
a. He is very dangerous adversary and his skills in deception and his cunning should
never be under estimated.

b. He is usually a person of extensive training and will be highly effective in gaining


the confidence of people and of extracting information of value to be relayed to his
employer or handler.

c. Even how well-trained on espionage agent he might be, he is human like the
saboteur and he can be defeated in his own game if proper methods and techniques are undertaken.

Some methods employed by Espionage Agent

a. Stealing of information from employees.

b. Stealing information from records or others sources.

c. Using various methods of reproducing documents products, equipment or working models.

e. Using various form or threats to obtain information.

f. Using blackmail techniques by exposing inmates and personal details concerning an organization.

g. Picking or securing information in social and other gathering.

h. Penetration and operational tactics.

Espionage – is a state or practice of spying in other countries, place or things in course of systematic,
secret gathering of information in a particular jurisdiction which inimical to national security.

Subversive Activity as a Security Hazard

This is clearly a security hazard because it disrupts normal operation within a certain
organization or institution.

Threats of Subversive Activity

a. It can be local or national in nature and their mission is to undermine the authority weaken the
organization, and eventually take over. This can be in business or any activity.
b. This can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist
attitudes and other emotional approaches.
c. It is an activity not easy to detect.

16 | P a g e
CHAPTER III
CONCEPT OF PHYSICAL SECURITY

Introduction

Physical security is a foundational aspect of safeguarding assets, people, and information by


implementing tangible measures to deter, detect, and respond to potential threats. It involves the use of
physical barriers, access control and surveillance systems to create a secure environment and target
hardening.

Goals of Physical Security

1. Deter potential intruders


vii. How to deter potential intruders install the following:
a. Security warning signs
b. Security Fences
c. Vehicle barriers
d. Vehicle height restriction
e. Restricted access point
f. Sight lighting and trenches
2. Detect Intrusion
viii. How to distinguish authorized from unauthorized people?
Access control at the following:
a. Security Gates
b. Security Doors
c. Locks
3. Delay or prevent intrusion attempt
4. Trigger appropriate incident response

Principles of Physical Security

1. There is no impenetrable barrier – In an unfriendly organization or government is willing to devote


attention, time, money, personnel, materials and imagination to passing a barrier, it can do so. So we
attempt to build defense in depth by using then one barrier.

- suggests the idea that no barrier or defense is completely invulnerable or impervious to penetration or
breach

17 | P a g e
2. Surreptitious VS non-surreptitious entry – The possibility of surreptitious entry is the greatest
hazard from the standpoint of counterintelligence security because it is usually difficult to neutralize the
act of espionage because surreptitious entry is not usually detected

3. Each installation is different – Since each installation is different each will have different problems
to overcome. The security procedures will not be adequate for all installations.

4. Enemy Agent must have access – in most cases espionage, acquisition of information is the
ultimate result, and means and form in which information is obtained is merely an operational detail.
Normally, information on tapes and film is usable as the original documents. Therefore in considering
access, one should think not only of current physical access, but also access to the discussion of the
matter by the use of clandestine listening device.

A. WHAT IS BARRIER?

- refers to any physical structure whether natural or man-made capable or restricting,


deterring, delaying or preventing illegal and unauthorized access to an installation.

Basically, barriers are designed to accomplish the following:

1. Outline of the perimeter of the area to be secured;

2. Create a physical and psychological impact to unauthorized entry;

3. Delay intrusion, thus facilitating apprehension of intruders;

4. Assist in a more efficient, economical employment of guards; and

5. Facilitate and impose the control of pedestrian and vehicular traffic.

Two General Types of Physical Barriers

1. Natural Barrier
Include mountains, cliffs, canyons, rivers, seas, marshes, deserts or terrain difficult to traverse.
2. Man-Made Barrier
Are structural constructions like fences, walls, floors, roofs, grills, bars, road blocks, or other
physical means to deter or impede penetration.
3. Other types of Physical Barrier

i. Structural Barrier – is a permanent or semi-permanent structure that lends itself to hindering


access to an installation. It is primarily constructed for two main purposes, to deny access and

18 | P a g e
to protect from exposure to natural elements. These are features constructed by man regardless
of their original intent that tends to delay the intruder.
ii. Human Barrier – is a systematic employment human as barriers between the potential intruder
and the matter to be protected. Human barrier would give the alarm in the event of threat to
security, apprehend the unauthorized person, and identify the personnel in entering or leaving
the facility or any combination of the three. However, human are subject to being influenced by
a wide variety of factors.
iii. Animal Barrier – An animal barrier is used in partially providing a guarding system or in
augmentation thereto. The cheapest animal used in security is the geese while sentry dog, like
the German Shepard dog are usually utilized in the security business. A sentry dog is valuable
due to its keen sense of smell and hearing. A noise or sound approximately 26 yards audible to
dogs and it can smell scents at least 100 yards away.
iv. Energy Barrier – popularly utilized is the employment of electrical, mechanical, electronic energy
to impose a deterrent to entry of the potential intruder and to adverse his presence. Protective
lighting and alarm are commonly used.

Purpose of Positive Barriers

1. Controlling vehicular and pedestrian traffic flow.

2. Checking identification of personnel entering or departing.

3. Defining the buffer zone for more highly classification areas.

Levels of Physical Security

1. Minimum Security – is a system designed to impede unauthorized external activity such as simple
intrusion to armed attack.

2. Low level Security – is a system designed to impede and detect some unauthorized external
activity such as on small retail store, storage warehouses.

3. Medium Security – is designed to impede, detect and assess most external activity and some
unauthorized internal activity that range from simple shoplifting to conspiracy to commit sabotage. This
includes:

a. Used of advance intrusion alarm system.


b. Establishment of perimeter and perimeter barrier
c. Use of an unarmed guard

19 | P a g e
4. High Level Security – is designed to impede, detect and assess most unauthorized external and
internal activities of certain prisons, defense contractors, pharmaceutical companies and sophisticated
electronic manufactures.

5. Maximum Security – includes the application of the following.

a) Sophisticated alarm system


b) On-site response force.

B. WHAT IS A PERIMETER BARRIER?


A medium or structure which defines the physical limits of an installations or area to restrict or
impede access thereto. It is any physical barrier used to supplement the protection of an inside or
outside perimeter.
 Perimeter Security- It is the protection of the installation’s inner and the immediate vicinity. The
main purpose of perimeter barrier is to deny or impede access or exit of unauthorized person.
Basically, it is the first line of defense of an installation. This is maybe in the form of fence,
building walls or even bodies of water
 Inside Perimeter- A line protection adjacent to protected area and passing through points of
possible entry into the area, such as doors, windows, skylights, tunnels or other points of
access.
 Outside Perimeter- A line of protection surrounding but some what removed from a protected
area, such as a fence and wall.

Three Lines of Defense


1. Perimeter Defense – such as barriers, perimeter fences or guards at the gate are considered as the
First Line of Defense.
2. Inside Perimeter Defense – such as doors, floors, windows, walls, roofs, grills and other entries to a
building is referred to as the Second Line of Defense.
3. Storage System – such as safes, vaults, file rooms are considered as the Third Line of Defense.

Types of Perimeter Barriers

1. Wire Fences- can be barbed wire, chain link or concertina. Chain link are for permanent
structure, Barbed wire is for semi-permanent, and Concertina for the least permanent and also can be
used as a temporary road block or impediment during strikes and crowd control.

20 | P a g e
 Specifications regarding the use of Chain-Link Fences
1. It must be constructed
of 7 feet material
excluding top guard.
2. It must be of 9
gauges or heavier.
3. The mesh openings
are not to be larger than
2 inches per side.
4. It should be twisted
and barbed selvage at
top and bottom
5. It must be securely
fastened to rigid metal or reinforced concrete.
6. It must be reach within 2 inches of hard ground or paving.
7. On soft ground, it must reach below surface deep enough to compensate for shifting
soil or sand.

 Specifications regarding the use of Barbed Wire Fences


1. Standard barbed
wire is twisted,
double-standard, 12
gauge wire with 4
point barbs spaces
in an equal distance
apart.
2. Barbed wire
fencing should not
be less than 7 feet
high excluding top guard.
3. Barbed wire fencing must be firmly affixed to post not more than 6 feet apart.
 Specification regarding the use of Concertina Wire Fences
1. Standard concertina barbed is a commercial
manufactured wire coil of high strength-steel barbed
wire clipped together at intervals to from a cylinder.

21 | P a g e
2. Opened concertina wire is 50 feet long and 3 feet in high.

22 | P a g e
2. Building Wall

Masonry wall should have the same height as the chain link and surmounted by the barbed wire
top guards; if the height is less than the prescribed, additional chain-link as “topping” is placed to attain
the minimum height requirement.

 Specification of Windows
1. When constructed less than 18 feet from the ground and 14 feet away from adjacent
structures, it should be reinforced with steel grills.
2. Screens should be installed to prevent petty thievery and pilferage of small items.
 Specification od Doors
1. Hinges should be constructed in such a way it is not exposed but rather concealed
and welded inside to prevent tampering and removal.
2. It should be heavily constructed with a wide frame.
3. If constructed with glass panels, it should be protected by screens of wire grills.
4. The jamb must be as strong as the door itself and the locking bolt must be at least 1
inch to the jamb.
 Specification of Roofs
1. If there is a possibility of gaining access from roofs, it should be protected by barbed
wires or chain link fence, particularly if it is adjacent from other buildings, trees, pipe
lines etc.
2. Skylights should be installed with fencing materials, screens, or grills.

3. Bodies of Water

It is an additional security measures, surrounding the establishment. Bodies of water like river,
lake, marsh, cataract, sea pond or any other bodies of water forming a part of the wall, building or
fencing should never be considered adequate natural perimeter barrier. Additional security measure
like wire fence, concrete walling security patrolling and floodlighting at night may be necessary for the
portions of perimeter

Kinds of Perimeter Barrier Openings

1. Gates and doors, it must be guarded and locked.

2. Sidewalk elevators, it provides access to areas within the perimeter barriers and should
be locked or guarded.

3. Utility openings, it may be composed of sewers, air intakes, exhaust tunnels which
penetrate the barriers and which have cross-sectioned area of 96 sq. in. or more should be protected
by bar grills, etc.
23 | P a g e
What is Clear Zones?

it is an unobstructed area maintained on both sides of the perimeter barrier. A clear zone of 20
ft. or more is desirable between the barrier and extension structures and natural covers which may
provide concealment or assistance to a person seeking unauthorized entry. Where it is impossible to
have clear zones because of property lines or natural features, an increment in the height of the
fencing, increased guard coverage, more security lighting, or the use of intrusion devices in that portion
of the perimeter barrier should be done.

 Specifications on Clear Zones


1. A clear zone of 20 feet or more should exist between the perimeter barriers and
exterior structures, parking areas, natural or man-made features.
2. A clear zone 50 feet or more should exist between the perimeter barrier and
structures within the protected areas except when a building wall constitutes part of the
perimeter barrier.

C. FENCE
- Is an independent structure designed to control physical and/or visual access between outside areas.
Types of Fence

1. Solid Fence – constructed of opaque material to deny visual access.

Advantage of Solid Fence

1. Denies visual access of the installation to the intruders.

2. Denies the intruder the opportunity to become familiar with the personnel, activities, and time
scheduled of the movement of the guards on the installation.

Disadvantage of Solid Fence

1. It prevents the installation guards from observing the area around the installation.

2. A solid fence creates shadow which may be use the intruder for cover and concealment

2. Full View Fence- It is constructed in such a way that visual access is permitted through the fence.

Advantage of Full view fence

1. Roving patrols and stationary guards are able to keep the area surrounding the installation
under observation

2. It does not create shadows which would provide cover and concealment for the intruder.

24 | P a g e
Disadvantage of Full view fence

1. It’s allowing visual access to the installation, its personnel, its gourds and its activities

2. It allows the intruder to become familiar with the movement and the time schedule of the
gourd patrols, there after allowing him to pick the time for attempting penetration which would be most
advantageous to him.

Minimum Acceptable Requirements for fence used as Security Barrier


1. Height – Eight feet at minimum.
2. Slack at the bottom – Not to exceed two inches, if the fence is not taut then it should extend
even closer to the ground.
3. Wooden fence post – Minimum horizontal dimension of four inches.
4. Steel fence post – The round type should be at least two inches in diameter and the H – beam
type must measurable no less than two inches at the smallest diameter.
5. Fence posts – Should be set in concrete or in firm soil using commercial drive anchors, to a
depth of three feet; Maximum distance between posts is ten feet.
6. Fence top – There should be something on the top of the fence to deter persons attempting to
go over the fence good example would be the use of barbed wire overhang, holding the stands
of barbed wire should be two feet long and should be extended at 45 degree angle in the
direction of the expected approach.
7. Fence area – The area surrounding the fence should be clear of trees and vegetation and
debris or other materials which would offer concealment to the intruder or would aid him in
scaling.
8. Fence gate – Gates should be limited to the number necessary for efficient and safe operation
of the installation.
9. Fence opening – All opening in the fence in excess of 96 inches must be lock, barred, or
screened in such away that they may only be unlocked and open from the inside and only by
selected personnel.
10. Multiple fence – If used, multiple fence should be at least ten feet apart and the overhang on
the top of the inner fence should point inward rather than away from the installation maximum
distance any two parallel fences should not exceed 150 feet.
Additional Protective Measures

1. Top Guard- It is an additional overhang or barbed wire placed on vertical perimeter fences facing
upward and outward with a 45 degrees angle with three to four strands of barbed wires spaced 6”
apart. This will increase the protective height and prevent easy access.

25 | P a g e
2. Sentry Stations- Normally provided at the main perimeter entrances to secure areas located out of
doors, and manned by guards on a full time basis. Sentry Stations should be near at the perimeter for
surveillance at the entrance.

3. Guard Towers- Are house-like structure above the perimeter barriers. It gives a psychological effect
to violators.

4. Protection in Depth- In large open areas or ground where fencing or walling is impracticable and
expensive, warning signs should be conspicuously placed. The dept itself is protection. Reduction of
access roads and sufficient notices to warn intruders should be done. Use of animal guards and
intrusion devices can also be done.

5. Signs and Notices- Control signs should be erected where necessary in the management of
unauthorized ingress, and preclude accidental entry, ID, prohibition, and exclusive areas signs.

6. Barrier Maintenance – Fencing barrier and protective walls should always be regularly inspected by
security. Any sign of attempts to break in should be reported for investigation.

D. PERIMETER GUARDS

Perimeter guards are also employed in augmenting the existing perimeter security or perimeter
barriers of a certain establishment. The two types of employing perimeter guards are:

a. Fixed Post- Security guards are assigned in a particular place of compound to guard and watch
the area and surrounding.
b. Patrol- in this system, the security guard is required to walk and go around regularly around the
company premises.

26 | P a g e
CHAPTER IV

CONCEPTS OF PROTECTIVE LIGHTING, ALARM, PASS SYSTEM, AND LOCK

A. PROTECTIVE LIGHTING

The idea that lighting can provide improve protection for people and facilities is as old as
civilization. Protective lighting is the single most cost effective deterrent to crime because it creates a
psychological deterrent to the intruders.

Perimeter Lighting – usually referred to as protective lightings is completely a part of standard system
in security when fence and guard are employed.

Security Lightings

Security Lighting provides sufficient illumination to areas during hours of darkness. Among its
other purpose are:

1. It improves visibility so that intruders can be seen, identified or apprehended.


2. It gives psychological fear which serves as a deterrent to thieves, pilferers, trespassers, and
saboteurs.
3. It makes the routine work of guard easier of identifying employees, vehicles, etc. during nighttime.
4. If placed in certain areas, may even reduce the number of stationary guards, and instead, may
require roving patrol only at night.

Security Lightings Techniques

1. Security lighting should enable a guard to observe clearly the activities around, and inside the
premises within his jurisdictions.
2. In planning, high contrast between intruder and background should be provided. When contrast
is poor, increase intensity will improve guard’s ability to see.
3. Lighting boundaries and approaches, as well as the area and structure is useful to discourage
unauthorized entries and reveal identity of persons. Good lighting should reveal well
boundaring areas, glaring to intruders and adequate for the guard to observe his positions.
4. Effective lighting should:
a) discourage attempts to enter the premise; and
b) detection were likely if entry is attempted.

27 | P a g e
5. If lighting at night cannot be provided due to impracticability, other means of protection have to
be made like additional guard posts, roving patrols and animal guards.

Types of Security Lightings

1. Stationary Luminary

Most common type, consisting of series of fixed luminous light to a given area
continuously with overlap. These two types are used on the entry gate of employees and vehicles. It
may either be:

a) Glare Projection Type

The intensity is focused to the intruder while the observer or guard remains in the
comparative darkness. The lighting is toward the approach of an entrance to an installation. Lights
with reflectors increase glare.

b) Controlled Lighting

The width of the lighted-atop can be controlled and adjusted to suit the security needs.
The lighting is focused sag on a pile of items rather than on the background.

2. Stand-by Lighting

Similar to continuous lighting, in can be turned on manually or by special devices or other


automatic means, when there is suspicion of entry. It is designed for reserve or standby use or to
supplement continuous system. A standby system can be most useful to selective light a particular area
in an occasional basis.

3. Movable Lighting

Consist of stationary or portable, manually operated search lights which may be lighted
continuously during hours of darkness or only as needed, and usually supplementary to either of the
first two types.

4. Emergency Lighting

A stand-by lighting which can be utilized in the event of electrical failure, either due to local
equipment or commercial power failure.

Types of Light Lamps

1. Incandescent Lamps

28 | P a g e
Common light bulbs in which light is produced by the resistance of a filament to electric current.
For better concentration of light, metal reflectors are used, and directed on areas to be lighted.

2. Gaseous Discharge Lamps

Economical to use but take two or five minutes to light which may be a disadvantage in
industrial security lighting. Examples are as follows:

a) Mercury-Vapor Lamps – blue green color light due to the presence of mercury vapor.

b) Sodium-Vapor Lamps – emits yellow light, placed usually in areas to connote special
concern, like bridges and streets.

i. High Pressure Sodium Vapor – is introduce in 1965, for exterior lighting of parking
areas, roadways, buildings and industrial and commercial installations. It emits
golden white to pink color.
ii. Low pressure Sodium Vapor – produce yellow color.

c) Quarts Lamps – very bright light.


ix. Advantages:
i. Excellent for use along perimeter and in critical areas.
ii. Frequently used at very high wattage.

3. Metal Halide – is similar in physical appearance to mercury vapor, but provides a light source of
higher luminous efficiency and better color rendition.

4. Fluorescent Lamp – provides good color rendition. However, it cannot project light over long
distances; thus, it is not desirable as flood type lights.

Types of Lighting Equipment

1. Street Lights – produce a diffused light rather than directional beam. They are widely used in
parking areas. This lighting equipment received the most widespread notoriety for its value in reducing
crime.

2. Fresnel Lights – these are wide beam units used to extend the illumination in long, horizontal strips.
Fennels project a narrow horizontal beam, approximately 180 degrees in the horizontal and from 15-30
degrees in the vertical plane. An appropriate application is to light perimeters since little light is lost
vertically.

3. Search lights – these are highly focused incandescent lamps used to potential trouble spot.

29 | P a g e
4. Floodlights – these light project light in a concentrated beam. They are appropriate for use in
instances which call for illumination of boundaries, building or fences. Is use to cast a strong light on the
walls building so that intruders are visible either in silhouette {outline] or by the shadows which they
cast.

Areas to be Lighted

1. Vehicular gate
2. Pedestrian Gate Thoroughfare
3. Parking Area
4. Sensitive areas
5. Perimeter Fence

B. PROTECTIVE ALARMS

Alarm, aural or visual signal given by the annunciator to security when intruder actuates device
in a protected area. An annunciator is a visual or audible signaling device which initiates conditions of
associated circuits.

Basically, alarm system was designed to alert security personnel to consummated or attempted
intrusions into an area, building or compound. Each type of alarm is activated in the event that an
intruder tampers with the circuitry, a beam, or radiated waves; intrusion alarm can be electrical,
mechanical, or electronic. Alarms are also used for fire, smoke or other emergencies and presence of
other hazards.

Key definition and terms used in intrusion detection system

1. Actuator – the button, magnetic switch or thermostat that will cause system to alarm
2. Annunciator – this is the monitor. Technically it is the visual or audible signaling device that
indicates conditions of the associated circuits.
3. Conductor – material which transmits electric current; examples are wire and cable.
4. Control Unit – the terminal box for all sensors.
5. Fail Safe – a term applied to a system designed so that if a component fails to function properly
the system will signal or otherwise indicate its incapacity.
6. False Alarm – activation of sensors for which no cause be determined.
 Most common causes of False Alarm
i. User negligence
ii. Poor installation

30 | P a g e
iii. Faulty equipment
7. Intrusion Detection System – the combination of components including sensors, control units,
transmission lines and monitor units integrated to operate in a specified manner.
8. Local Audible Alarm – an electronic bell for outdoor use in the vicinity of the protected area.
9. Monitor – a device that sense and reports in the condition of a system.
10. Motion Sensor – detects movement inside the area to be protected.

Three basic parts of Alarm System

1. Sensor or Trigger Device – it emits the aural visual signals or both.

2. Transmission line – a circuit which transmit the message to the signaling apparatus.

3. Enunciator – it is the signaling system that activates the alarm.

Types of Protective Alarm Systems

1. Central Station System- Several separate compounds tie their alarm system to a central station so
that in case of need, the central station calls for assistance to the police, fire department, hospital or
with other government assisting units.

2. Proprietary System- Similar to the central station type except that the proprietary console is located
inside the subscriber’s installation who owns or base the system.

3. Auxiliary System- An installation owned system which is a direct extension of the local enforcement
agency and/or fire department by special arrangement.

4. Local Alarm System- Consist of ringing up of visual or audible alarm near the object to be
protected. In case of alarm, response will be made by the local guards and other personnel within sight
or hearing.

5. Local Alarm by Chance System – This is local alarm system in which a bell or siren is sounded
with no predictable response. These systems are used in residence or small retail establishment which
affords a respond system. The hope is that a neighbor or passing patrol car will reach to the alarm and
call fore police assistance, but such a call is purely a matter of chance.

6. Dial Alarm System – This system is set to dial predetermined number or numbers when the alarm
activates. The number selected might be the police or the subscriber’s home number or both. When the
phone is answered, a recording states that an intrusion in progress at the location.

31 | P a g e
Kinds of Alarm

1. Audio Detection Device – it will detect any sound caused by attempted force entry.

Application – it can be effectively used to safeguard enclosed areas such as vaults,


warehouses and similar enclosures.

Operation – supersensitive microphone speaker sensor installed in wall, ceilings and floors
of the protected area and any sound cause by attempted forced entry is detected by the
sensor.

2. Metallic Foil or Wire – it will detect any action that moves that foil or wire.

Application – frequently used on glass surfaces.

Operation – any action that breaks the electrical circuit and activates alarm.

3. Photoelectric or electric Eye – an invisible or visible beam is emitted and when this is disturbed or
when intruder breaks contact with a beam, it will activate the alarm.

Application – has a variety of commercial applications.

Operation – a light beam is transmitted at a frequency of several thousand vibrations per


second. It is connected by wires to a control station and when an intruder crosses the beam,
he breaks contact with the photoelectric cell which thus activates the alarm.

4. Vibration Detection Devices – it will detect any vibration caused by attempted force entry.

Application – can be effectively used to safeguard enclosed areas in sound detection


systems.

Operation – the vibration sensitive sensor are attached to walls, ceiling and floors of the
protected area. Any vibration caused by attempted force of entry is detected by the sensors.

5. Microwave Motion Detection Device

Application – very effective for protection of interior areas

Operation – a pattern of radio waves is transmitted and partially reflected back to an


antenna. If they strike a moving object, they return at a different frequency which results in
initiating an alarm signal.

6. Ultrasonic Motion Detection Devices

Application – very effective for the protection of interior areas.


32 | P a g e
Operation – consists of transceivers, amplifier and control unit. Any motion within
protected area causes an activation of alarm signal.

7. Capacitance of Electrostatic Detection Device

Application – it can be installed on a safe, wall or openings therein to establish an


electrostatic field around object to be protected.

Operation – the body capacitance of any intruder who enters the field unbalances the
electrostatic energy of the field which in turn activates the alarm system.

8. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that when this beam is
disturbed by a physical object, an alarm is activated.

Other types of Protective Alarm (Bank Alarm)

1. Foot Rail Activator – are place on the floor in such a position that tellers may activate the alarm in
by placing the front of their foot to engage the activation bar.

Disadvantage

Tellers with platform shoes, itchy feet, or using brooms and other articles will often inadvertently
cause a false alarm.

2. Bill Traps or Currency – devices are usually place in the teller’s top cash drawer and connected to
the alarm system using a wire connector. When currency is removed from the devices, the alarm is
activated.

3. Knee or Thigh Buttons – are installed inside the desk or teller station so they can be activated by
knee or thigh pressure. They are commonly found in location where personnel usually perform their
duties from a seated position.

4. Foot Button – like the foot rail permits alarm activation in relatively safety while both hands remains
clear in view of the robbers.

5. Double Squeeze Buttons – it required pressure on both side of the device and therefore the
probability of accidental alarm is reduced.

Desirable Characteristics of Intrusion Alarm System

33 | P a g e
Intrusion alarm devices are designed to “detect” and not to prevent criminal acts and should be
used normally as an adjunct and not a replacement of the human guard forces.

The primary considerations on the choice of a particular alarm system include stability, durability
and reliability. Desirable characteristics, furthermore, should include:

1. A detection unit should initiate the alarm upon intrusion of a human being in the area or
vicinity of the protected object.

2. Panel board central annunciator or operating console monitoring activities should be


removed at all times. Transmission can be by physical wires or by radio.

3. An annunciator console indicating the audible and/or aural signal and the specific
location of incident so that proper action can be made by security and other units.

4. Fail-safe features give alarms in the annunciator when something is wrong with the
system.

5. System should be difficult to tamper or render ineffective by outsiders, competitors or


saboteurs.

Operation of Intrusion Alarm System

Intrusion devices emit certain signals to the annunciator and operate on the following principles:

1. Breaking an Electric Circuit

In a building or compound, all possible points of entry can be wired by using electrically charged
strips of tinfoil or wire. Any action that will move the foil or wire breaks the circuit and activate an
alarm. The alarm can be local, or near the area where circuit is broken, or can be monitored in a
distant annunciator or both.

2. Interruption of a Light Beam

This system uses a photo-electric cell or the “electric eye” which operates on the principles of
light rays. In this system, an invisible light beam is transmitted to a special receiver. An infrared filter
over the light source makes the beam invisible to intruders. The source of beam is hidden, and the
rays crisscross a room by the use of reflecting mirrors until they contact sensitive cells in the receiver.
This device terminates by wire to a console in the security control room. When an intruder breaks the
beam, an alarm is activated.

34 | P a g e
The disadvantages of photo-cell include: the beam can be bypassed by crawling underneath or
climbing over it; its requirements of a rigid or outdoor installations are not so effective because of fog,
smoke, dust, rain and other obstructions to vision when defuse enough can interrupt the light and
trigger false alarms.

3. Detection of Sound and Vibration

This can be utilized effectively to safeguard enclosed areas vaults, safes, storage bins, file
rooms, warehouses, and similar enclosures. Supersensitive tiny microphones are embedded in the
walls, ceilings and floors of the enclosure to be protected by sound or vibrations. These microphones
distributed evenly can detect sound or vibrations of sound caused by attempts to force entry into the
protected area.

The main advantage of this detector device is its relatively low cost and easy installation. The
amplifier which monitors the sound from the microphone can be adjusted to suit the sensitivity level
requirements. The obvious disadvantage is its limited application to enclosed vaults, and depositories
where minimum external sound exists. It is not satisfactory where minimum external sound exists. It is
not satisfactory where high ambient noise level are encountered because of the proximity to
construction sites, aircraft traffic, and vehicular movements.

4. Space, Motion and Vibration

These systems usually derive their operating principle from a physical phenomenon known as
“Doppler Effect.” Constant sound waves in a cubicle disturbed by an object will cause change of
frequency and wave motion thereby causing an alarm to trigger.

5. Electromagnetic Fence

Is an electronic fence consisting of 3 to 5 strands of wire spaced from 9 to 24 inches above one
another which serves as an antenna, a monitor panel, and an electric circuitry. When power is put on,
an electro-magnetic field is set among the wires from the top to the ground. An intruder about two feet
from this field will trigger an alarm. The fence is zoned to pinpoint areas of intrusion to a monitor
located in the operation room of security. This system is suggested to be located inside the chain-link
fencing to minimize nuisance alarms caused by animals, debris blown by the wind, and harmless
trespassers.

Function of an Alarm System Could Be One Or More of the following:

1. Detection of fire.
2. Detection of intrusion.
3. Emergency notification.
4. Monitoring of equipment or facility conditions.
35 | P a g e
C. SECURITY COMMUNICATION SYSTEM

In any plant or industrial complex, inter and intra communications is indispensable not only in
security work, but also in the plant operation itself. It is a good management policy that security should
have its own communication line officers within the installations and to the outside.

The security force needs a communication landline to call local law enforcement agencies, the
fire department, ambulance, mobile patrol and other governmental agencies. Telephone is also needed
to contact the agency’s main office or security force outposts. The following are some means of
communication that can be a useful part of the protective system:

1. Local telephone exchange

2. Commercial telephone service

3. Inter-communication

4. Two-way radios for security, i.e., base, portable, and mobile.

5. Security supervising system and “beep-beep.”

6. Paging and recall system

7. “Bull-horns” or megaphones

8. Amplifier or loud speaker system

Identification and Control

Identification and control objective include precluding unauthorized entry and facilitating
authorized personnel to enter specific areas, as well as preventing the introduction of material
components of harmful materials, misappropriation, pilferage of installation properties and recorded
classified information.

Identification and control objectives are achieved by:

1. Initially determining who has valid right in the areas;

2. Limiting access to those persons who have a right and need to be there;

36 | P a g e
3. Establishing procedures for positive identification of persons authorized access into
areas;

4. Issuing passes or badges to those authorized to enter restricted areas;

5. By using access list, identification codes, and duress code.

What is a Pass System?

A pass or badge is issued by security for personnel to be admitted in the installation. This
system precludes those visitors with escorts and personnel in the access list. The pass system is for
general use and not for restricted areas like exclusive, limited and controlled areas. The following are
systems recommended:

1. Single Pass or Badge System

Pass is issued for permission to enter different specific areas by letters, numerals, or colors. For
example, green backgrounds of current passes in the general area, or white pass with overprinted blue
symbols for a certain specific areas.

2. Pass of Badge Exchange System

Multiple copies of passes are issued to an individual with the same photograph. The individual
exchange his badge for another color or numeral at the gate. Once inside, if he needs to enter a
restricted area, he exchanges it for one of another color acceptable in that area.

Visitor, Property, Movement and Vehicle Control

A visitor is any person not regularly employed in a plant or firm. Strict precautions are taken with
visitor against pilferage, sabotage and other crimes. Plant visitors can be suppliers, promoters,
collectors, customers, government inspectors, contractors, job-seekers, group visitors, guided tours,
and others.

Passes or badge may be issued to visitors indicating area to be visited and escorts
requirements. Likewise, movement of packages should be controlled, closely inspecting all incoming
and outgoing packages, with inspection to all the vehicles. Trucks entering and leaving the area should
be inspected. Trucks have been found to have special components, items placed inside the spare tire,
tool boxes, and even in fake gasoline tanks.

D. PROTECTIVE LOCKS AND KEY CONTROL

37 | P a g e
Lock is one of the most widely used physical security devices in the asset protection program of
an installation against any possible surreptitious entry. However, the owner of the installation or his
security officer needs to understand the weakness and strength of each type of lock including the door,
window, or walls to be used to achieve maximum benefit from it application.

This is because highly skilled burglars more often concentrate on the lock and its surrounding
mechanism in order to make a forcible entry. It is for this obvious reasons that locks are considered as
delaying devices which can not really top a determine intruder from destroying the lock just to launch an
attack. Hence, knowledge of the basic principles of locking systems will enable the installation owner or
the security officer to evaluate any lock and determine its quality and effectiveness in a particular
application.

Definition of Terms

1. LOCK - A mechanical, electrical, cylindrical or electronic device designed to prevent entry into a
building, room, container or hiding place and to prevent the removal of items without the
consent of the owner.
2. PADLOCK - A portable and detachable lock having or sliding hasp which passes through a
staple ring or the like and is then made fast to secured.
3. PETERMAN - A term used in England for lock picker, safecrackers, and penetrates of restricted
areas or rooms.
4. KEY may be defined as:
a. instrument for locking and unlocking: a metallic bar with notches or grooves that when inserted
into a lock and turned, operates the lock’s mechanism; or
b. door or lock opener: a device such as a plastic cards with an encoded magnetic strip that
operates a door or lock.

What is a Protective Lock?

A protective lock is defined as a mechanical, electrical, hydraulic, or electronic devised designed


to prevent entry to a building, room, container or hiding place.

Types of Lock

1. Key operated mechanical lock – it uses some sort of arrangement of internal physical barriers
{wards tumblers} which prevent the lock from operating unless they are properly aligned. The key is the
device used to align these internal barriers so that the lock may be operated.

Four General Groups of Key Locks

a. The Warded Lock

38 | P a g e
The underlying principle is the incorporation of wards or obstructions inside the lock to
prohibit a key from operating the bolt unless the key has corresponding notches cut in it so
that it will pass the wards.
b. The Lever Tumbler Lock
Each lever hinges on a fixed point and is held down against a stop by the pressure of a flat
spring. Each lever has a cut in tilt, and all the gates can be located at different places. When
the proper key is inserted and turned, notches of various depths raise all the lever whatever
distance is required to line up all the gates exactly opposite the fence on the bolt. When the
key is turned, a portion of the key catches the bolt and slides it back. Because there is no
resistance to the post entering the gate, the lock is opened. If the key is not the correct one
and if even one gate does not line up to let the post slide into it, the lock cannot be opened.
c. The Disc Tumbler Lock
Also known as the woofer tumbler type, has flat metal tumblers with open center fitted into
slots in a plug which is in turn fitted into a lock case. When the plug is turned, it activates a
cam. The key is removable at 90 to 180 degrees and may be rotated either right or left. The
disks are under spring tension forcing them partially out of the plug into recesses in the case
thereby preventing the cylinder from turning. Rectangular openings in the disk tumblers are
out into various longitudinal dimensions requiring corresponding cuts in the key to position
the tumblers. Proper unlocking positioning of the tumblers is accomplished when they are
withdrawn from the recesses in the body of the lock to position flush with the plug, allowing
the plug to turn the cam which causes the withdrawal of the bolt.
d. Pin Tumbler Lock
The pin tumbler mechanism depends for its security, on a number of round pin or tumblers
operating on a cylinder. Each tumbler or pin is divided into two parts: the upper, which is flat
on both, is called the driver; the bottom part called the pin is rounded or slightly pointed on
the lower end to fit the grooves or cuts in the key. A coil spring above each driver constantly
forces it downward. When the right key is inserted, the various depths of the cuts in the key
compensate for the different lengths in the pins. The dividing points between each of the two
pins segment are brought into line with the top of the plug, and allowing it to rotate in the
cylinder. When the plug turns, it carries with its cam which activates the bolt and other lock
mechanism.

2. Cylinder lock – usually installed at home, also called latch and is operated by a key on the outside
and a knob inside.

3. Magnetic locks – similar in design with cylinder locks, except that the pins needs a suitable
magnetized key to bring them into alignment and allow the plug to be turned to released the bolt.

39 | P a g e
4. Electrical Lock – a type of lock that can be opened and closed remotely by electrical means.

5. Card-operated lock – a type of lock operated by a coded card.

6. Combination Lock – for installation in safe and bank vaults, it can be having an intricate system of
at least 1 million possible combination consisting of more than six dials; it affords the maximum delay in
terms of efficiency.

7. Code-operated Locks – they are key less lock. They are opened by pressing a series of buttons in
proper sequence. In several designs, time locks are operated when the series is incorrectly entered. A
type of lock operated by coded card.

What is Key Control?

The management of keys in a plant or business organization to prevent unauthorized individual


access to the keys.

What is a Master Keying System

A system used in big installations whereby keys can open a group or groups of locks. This is
possible by the use of interchangeable cylinder cores in the locks. Using locks with the same key in a
facility is not master keying or the use of a pass key. It is used to operate an inexpensive lock by
moving it in the key hole until it catches a locking belt and unlocks the mechanism.

Master keying is when a lock operates on a master key plus an individual or changes key.
Master keying is made possible due to the development of interchangeable cylinder cores. In matters of
seconds, keys and lock combination can be changed, and this is done by the use of a “control key”.
With this key, all the cores in a locking system can be changed rendering the existing keys not usable.

Types of Key

1. Change Key – a specific key, which operates the lock and has a particular combination of cuts or
biting, which match the arrangement of the tumbler in the lock.

a key to a single lock within a system of locks in an installation.

2. Sub-master Key – a key that will open all the lock within a particular area or grouping in a given
facility.
40 | P a g e
3. Master Key – a special key capable of opening a series of locks.

4. Grand Master Key – a key that will open everything in a system involving two or more master key
groups

Key Control

1. Key Cabinet – a well constructed cabinet will have to be procured. The cabinet will have to be of
sufficient size to hold the original key to every lock in the system. It should be secured at all times.

2. Key Records – some administrative means must be set up to record code numbers and indicates to
whom keys to specific locks have been issued.

3. Inventories – periodic inventories will have to be made of all duplicate and original keys in the hands
of the employees whom they have been issued.

4. Audits – in additions to periodic inventory, an unannounced audit should be made of all key control
records and produces by a member of management.

5. Daily report – a daily reports should be made to the person responsible for key control from the
personnel department all person who have left or will be leaving the company. In the event that a key
has been issued, steps should be initiated to insure that the key is recovered.

Pointers for Effective Locks and Key Control

1. Records of all keys issued and names of holders must be meticulously made regardless
of the size of the establishment.

2. Storage key is important. Duplicate or spare keys should be stored in a securely locked
cabinet in a secure area.

3. Master key should be ensued on an absolute minimum number, and must be kept by an
individual responsible for locks and keys.

4. Regular checks should be made in employees with keys issued.

5. Issuance of keys and locks should be carefully controlled, and issuance should be on a
real-need basis.

6. Periodic re-keying should be considered as essential security safeguard just as


combination of safes are changed from time to time.

41 | P a g e
7. A key depository should be provided in a big plant. Supervisors taking keys should
register in registry book.

What is Maison Keying

The issue of key to open the main entrance and the office.

E. PROTECTIVE CABINET

The final line of defense of any facility is in the high security storage area where papers,
records, plans or capable instrument, precious metal or other special valuable assets are protected;
these security cabinets will be of a size and quantity which the natural of the business dictates.

Every facility will have its own particular need, but certain general observations apply. The
choice of proper security cabinet for specific application is influenced largely by the value and the
vulnerability of the items to be stored in them.

Types of Business Records

1. Class 1 – Vital Records

Includes the records that are irreplaceable; records wherein reproduction of which does not
have the same value as the original; records needed to recover cash to replace buildings, equipment,
raw materials, finished products and records needed to avoid delay in restoration of production, sales
and services.

2. Class II – Useful Records

Includes records which loss might cause inconvenience but could be readily replaced and which
would not in the meantime present an insurmountable obstacle to the prompt restoration of the
business.

3. Class III – Important Records

Include records, the reproduction of which will involve considerable expense and labor, or
considerable delays. Operating and statistical records belong to this class as well as those to maintain
check on efficiencies, operating costs, etc. Also included are contracts, customer credit files, sales
records, design in process development, records of experiments in progress, etc.

4. Class IV – Non-Essential Records

42 | P a g e
Are the daily files, and routine in nature so that even if lost or destroyed, will not affect operation
and administration of the plants or firms.

Categories of Storage Containers

1. Class 1- Commercial record safes designed for fire protection.

2. Class 2- Commercial money safes designed for robbery and burglary protection.

3. Class 3- Security cabinets designed to meet specifications for safeguarding classified materials.

Some Tests for Safes Fire Resistance

1. Fire Endurance Test

A safe should not have any one time a temperature above 350 degrees Fahrenheit.

2. Explosion Hazard Test

Test to determine if the sudden rise in temperature will not cause the safe to rupture. If the safe
can withstand 2000 Degrees Fahrenheit for 30 minutes and will not crack or open, then it has passed
the explosion test.

3. Fire and Impact Test

Aimed at determining the strength of a safe to withstand the collapse of a building during a fire.

What is a Safe?

A metallic container used for the safekeeping of documents or small items in an office or
installation. Safes can be classified as either robbery and/or burglary resistant depending upon the use
and need. Many safes are required to be installed in steel-clad concrete blocks to prevent being carted
away by the thieves and robbers.

Specification in Construction of Safe

 Its weight must be at least 750 lbs. and should be anchored to a building structure.
 Its body should at least one inch thick steel.
 Safe as a general rule required the door to be made of steel and at least 1 ½ thick.

Methods used of Safecracking

43 | P a g e
1. Drilling or Punching – accomplished by knocking off combination dial and drilling hole to expose
locking device.

2. Burning – the process of using high temperature oxyacetylene torches or ‘burning bars” to cut an
opening in the wall or door of the safe.

3. Peeling – is the process of attacking the seams of metal plates with pry bars and other tools to peel
back layers of metal and thus exposing either locking mechanism or interior.

4. Ripping – similar to peeling except ripping can be accomplished against a solid, metal walled
container with a thin wall.

5. X-ray – utilized to reveal position of the combination and mechanism necessary to open safe.

6. Explosives – nitro-glycerin and plastic explosive are still used but not as much as in the past.

7. Power Tools – examples used are rotary devices, hydraulic tools and power drills.

8. Manipulation – very few safe crackers have skill to use this technique.

What is a Vault?

A heavily constructed fire and burglar–resistant container usually a part of the building structure
used to keep and protect cash, documents, and negotiable instruments. Vaults are bigger than safes
but smaller than security file rooms.

Specification in Construction of Vault

 The vault door should be made of steel at least 6 inches in thickness.


 The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
 The vault must be resistive up to 6 hours.
 Standard vaults, to reduce of destroying too much record should not be more than 5,000
cubic feet.
 Vault should not made part of the wall due to moisture and condensation cause by
temperature.
 Electrical conduits into the vault should not exceed 11/2 in diameter.
 Vault floor should be higher by four inches with the floor buttons, storage container
should be raised at least 4 inches above the floor.

What is a File Room

A cubicle in a building constructed a lighter than a vault but of bigger size to accommodate
limited people to work on the records inside.

44 | P a g e
Specification in Construction of File Room

 The file room should at most be 12 feet high.


 It must have a watertight door and at least fire proof for one hour.
 The interior cubage should not more than 10,000 cubic feet.
 The ventilation should be through the door.
 The supporting structure, the wall, floor and roof should be made fire-proof.

45 | P a g e
CHAPTER VI

SECURITY SURVEY, SECURITY INSPECTION, AND SECURITY INVESTIGATION

A. SECURITY SURVEY – This is also known as security audit which is actually a fact-finding probe to
determine a plant’s adequacy and deficiency in all aspect of security, with the corresponding
recommendations.

It is also referring to an estimate of the security standards of a unit, and is conducted to enable
the responsible officer to recognized and evaluate security hazards and determine protective measure
necessary to the prevent of sabotage, espionage, subversive activities and other criminal acts inimical
towards the interest and/or mission of the unit/or command.

In the field of police and military intelligence, Security Survey is defined as a counterintelligence
service to assist the heads of office in determining the security measures required to protect key
installations from possible sabotage, espionage, subversion, and unauthorized disclosure of, or access
to, classified information or materials contained therein.

Definition of Terms

1. Access List- An authenticated list of personnel given to security allowing entry to a compound or
installation or part thereof.

2. Audit- An official verification and examinations of accounts and records.

3. Badge System- A system for personnel movement and control whereby badges or identification
are issued to personnel upon entering an installation. Visitors are also issued temporary badges when
entering the installations.

4. Background Investigation- A check made on an individual usually seeking employment through


subject’s records in the police files, educational institutions, places of residence and former employers.

6. Complete Background Investigation- Same as B.I but more comprehensive to include places of
residence since birth.

7. Controlling- The regulation of many different aspects of business activity. Controls are needed
to standardize quality and performance, protect assets, measure performance, balance plans and
programs, and motivate individuals.

8. Controlled Area- An area near or adjacent to limited or exclusive areas where entry is restricted.

9. Coverage Factor- The minimum number of directions from which each point in the area should
be lighted depending upon the use of the area.

46 | P a g e
10. Doppler Effect- A physical phenomenon that causes frequency shift if an object moves in an
area permeated by radio frequency signals. This change in certain types of alarms activates a signaling
unit.

11. Dry-run- Practical test or exercise of a plan or any activity to test its validity; it is also an
operational readiness exercise.

12. Duress Code- A type of code system so that security personnel when forced by armed men to
enter an installation can give alarm by the use of certain words in casual conversation with other
personnel in the installation.

13. Exclusion Area- A restricted area containing materials or operation of security interest.

14. Program of Instruction- A list of subjects, number of hours, name of instructors, venue of training
for a certain course.

15. Automated Records- Records accumulated by electronic data processing system (EDPS) like
tapes, memory devices, reels, and storage cases.

16. Restricted Area- Any area, access to which is subject to special restriction control.

17. Victimology- A special study concerned with what makes an individual a victim of crime.

What is a Survey

The term applied to the first detailed “look-see” conducted by a team.

Purpose of Security Survey

a. To determine existing state of security

b. To locate weaknesses in defense

c. To determine degree of protection required

d. To produce recommendations establishment a total security program.

Objectives of Security Survey

a. To determine existing vulnerabilities to injury, death, damage, or destruction by natural causes.

b. To determine existing vulnerabilities of corporate assets due to outside criminal activity.

c. To determine existing vulnerabilities of corporate assets due to criminal activity within the
organization.

47 | P a g e
d. To determine existing conditions of physical security corporate property.

e. To measure compliance of employees to security.

Planning a Security Survey

a. Verify the need

b. Obtain organization support

c. Determine how data will be gathered

d. Develop alternatives

e. Prepare a schedule of activities

SECURITY SURVEY PROCEDURES

1. Preliminary Planning –A very important consideration during the preliminary Planning stage is the
use of a checklist.

2. Initial Briefing {Entrance Conference}

3. Escort Personnel – It is often desirable for both the specialist and the office that an escort
accompany the specialist during the survey.

4. Preliminary Exterior and Interior Check – as soon as possible after the initial briefing, the specialist
conducts a tour of the area surrounding the office.

5. Analyzing Existing Security –determine the level of required security, the special list must now
ascertain the exiting level of security of the installation.

6. Final Briefing {Exit Conference}

What is a Supplemental Survey

Conducted when there is business reorganization with corresponding changes in objectives and
physical lay-outs of the complex.

What is a Special Survey

Directed by the management, if the initial survey appears to have left certain portions or aspects
involving security due to change in policy or operations that will greatly affect the total security
picture.

What is Entrance Conference

48 | P a g e
A conference or dialogue between the survey team and the management, and officials of a plant
before security survey is conducted.

What is Exit Conference

A conference similar to entrance conference and it is done after the completion of the security
survey.

Who Performs Security Survey & Inspection

Security survey is performed by qualified security experts who can be from the organization or
outsiders contracted to do the job. Recommendation will fall into three categories:

1. human guard;

2. equipment; and

3. procedures.

Important Factors on Security Survey

1. Surveys must be exhaustive and complete.

2. Hazards must be identified with specific recommendations for elimination, neutralization


or reduction.

3. Deficiencies found should be described in detail, and if possible with photos, sketches,
diagrams, maps and other explanatory notes.

4. Early surveys should be reviewed so that the current survey will determine the
improvement in the former deficiencies.

5. Recommendations should be consistent with the current situations, facilities, resources


available, and most of all concomitant with the organization’s objectives and goals. Time-phasing of
the recommendations should be also recommended especially on execution.

B. SECURITY INSPECTION

SECURITY INSPECTION – this is a check of how well existing security measures and regulations are
being carried out within a detachment or establishment. A security inspection may also include an
investigation of alleged or suspected security violation. Physical security is concerned with forces,

49 | P a g e
entrances and exits, guards, traffic control, lighting, fire control, and with such other physical measures,
which if properly established and maintained, will deny access to unauthorized persons.

In the field of police and military intelligence, security inspection is defined as a


counterintelligence service performed to determine compliance with established security policies and
procedures.

Another important activity, which is necessary to insure the integrity of the overall security
programs, is security inspection. This complement security survey in its attempt to prevent losses of
company properties.

Security inspection is conducted for two reasons: to check on the degree of compliance with the
recommended countermeasures and to determine the effectiveness and adequacy of the
countermeasures which are in effect.

TYPES OF SECURITY INSPECTION


1. Continuous Inspection - To keep pace with the constant changes in the organization, changes in our
security terms of attitudes, life-style and moral values, and the rapid advancement of technological
modifications are all around us, the inspection must be an on-going and never ending activity.
2. Formal or Informal- Formal Inspection is one which some fanfare is attached. It is usually preceded
by an announcement, and the under inspection “prepare” for events, including some extra
housekeeping activities that would not otherwise happen at the point in time.
Informal inspection is usually the result of a long and firmly entrenched inspection program, understood
by all and accepted as part of the organizational life. The inspection has been stripped of all external
trappings of importance has not been lessen in any manner.
3. Structured or Unstructured Inspection
Structured Inspection is one that moves systematically from one area to the next and so on.
There is a format or logical sequence to the process. For instance, the audit may start with the first line
of defense, then the second line, then the third line,
Unstructured Inspection is conducted in a random manner. There is no format or logical
sequencing. For example, the inspection may start with countermeasures for proprietary information,
then emergency plan, followed by investigation and so forth.
C. SECURITY INVESTIGATION
Security investigation is a planned and organized determination of facts concerning specific loss
or damage of assets due to threats, hazards or unsecured conditions.
Elements of Investigation

 Investigator
 Purpose
 Subjects of investigator

Tools of Investigation

50 | P a g e
1. Information – knowledge which the investigator gathers other persons.
a. Acquired from regular sources – conscientious and public spirited citizens, company files, school files
or records files of other agencies.
b. Acquired from cultivated sources – paid informants, bartenders, cab drivers, acquaintances, etc.

51 | P a g e
CHAPTER VII
PERSONNEL SECURITY AND DOCUMENT SECURITY
A. Control of Personnel in the Physical Facility
In every installation, the use of protective barriers, security lighting, communication and
electronic hardware provides physical safeguards but those are insufficient to maximize the effort of the
guard force. A control point must be established for positive personnel identification and check system.
This is to ensure that only those persons who have the right and authority will be given the necessary
access to the area.
The most practical and generally accepted system of personnel identification is the use of identification
cards badges or passes. Generally speaking, this system designates when and where and how
identification card should be displayed, and to whom. This helps security personnel eliminate the risk of
allowing the access of unauthorized personnel within the establishment.
TWO TYPES OF PERSONNEL IDENTIFICATION
1. Personal recognition
2. Artificial recognition - such as identification cards, passes, passwords.

USE OF PASS SYSTEM


1. Single Pass System – the badge or pass coded for authorization to enter specific areas is issued to
an employee who keeps it in his possession until his authorization is terminates.
2. Pass Exchange System – an exchange takes place at the entrance of each controlled area. Upon
leaving the personnel surrenders his badge or passes and retrieve back his basic identification.
3. Multiple Pass system – this provides an extra measure of security by requiring that an exchange take
place at the entrance of each restricted area.
BADGE AND PASS CONTROL
1. The system should have a complete record of all badges and identification cards issued, return,
mutilated or lost by serial number and cross-indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check the list.
3. Passes and Badges reported lost should be validated and security at entrance be informed through
conspicuous posting.
PERSONNEL IDENTIFICATION
1. Badges must be tamper-resistant, which mean that they should be printed or embossed on a
distinctive stock with a series of design difficult to reproduce;
2. They should contain a clear and recent photograph of the bearer, preferably in the color.
3. The photograph should be at least one inch square and should be updated every two or three years
or when there is any significant changes in facial appearance; and
4. Should additionally contain vital statistic such as date of birth, weight, height, color of hair and eyes,
sex and thumbprint.

52 | P a g e
VISITORS MOVEMENT CONTROL
1. Visitors Logbook – all visitors of any facility should be required identification and should be given a
visitors ID by the security. Visitors logbook should be field up with the named of visitors, nature and
duration of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution must be exercised
in areas where classified information is displayed to preclude unauthorized taking of pictures of the
installation. If visitors has camera and it is prohibited to take pictures, said camera should be left in the
care of security with corresponding receipt.
3. Escort – if possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
4. Visitors Entrance – separate access for visitors and employees of the establishment should be
provided.
5. Time Traveled – if there is a long delay or time lapse between the departure and arrival, the visitors
maybe required to show cause for the delay.
PACKAGE MOVEMENT CONTROL
. No package shall be authorized to be brought inside the industrial installation, offices and work area
without proper authority. This basic precept help reduce if not eliminate pilferage, industrial espionage
or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and these in vehicle should
also be checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
3. Any personnel/visitor entering the installation with a packed should deposit the same to the security
and in return receives a numbered tag, which he/she will use in claiming his/her package upon
departing.
CONTROL OF VEHICLE IN THE INSTALLATION
1. Privately owned vehicle of personnel/visitors should be registered and are subject to the identification
and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicles should provide the security as to the complete details of their duration of
stay, person to be visited, and other information.
4. All vehicles of visitors should be given a sign/sticker to be place on the windshield.
5. Traffic warning signs should be installed in all entrance in order to guide the visitors in their
destination as well to provide them with the necessary safety precautions while they are inside the
installation.
6. Security personnel must constantly supervise parking area and make frequent spots searches of
vehicles found there.
B. PERSONNEL SECURITY
PERSONNEL SECURITY - It includes all the security measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to the government, from gaining access to classified matter or
to any security facility, and to prevent appointment, or retention as employees of such individual.

53 | P a g e
Purpose of Personnel Security
1. To ensure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees while they are carrying
out they function.

Scope of Personnel Security


1. Personnel Security Investigation {PSI}
2. Security Education
PRINCIPLE of Personnel Security
The Security “Chain”: Personnel Security is the “weakest link” in the security “chain”. This
weakness can best be minimized or eliminated by making in it personnel security conscious through
good training program. Security depends upon the action of the individuals. The superior must instruct
his subordinate so that they will know exactly what security measures to take in every instance. A safe
will not lock itself. An individual must be properly instructed and must do the locking.
WHAT IS PERSONNEL SECURITY INVESTIGATION
It is a process of inquiry into the character, reputation, discretion and loyalty of an individual in
order to determine a person’s suitability or access to classified matter prior to the granting of security
clearance. Put it in another way, it is the process of inquiring into a person’s suitability to be given a
security clearance.
AUTHORITY FOR INVESTIGATION
The authority for personnel security investigation emanates from the highest official who is responsible
for the achievement and maintenance of sound security in his office or unit.

Definition of Sensitive Position


A “Sensitive Position” is any position within the government, police and military, the occupant of
which could bring about by virtue of the position a material adverse effect to national security.
TYPES OF PERSONNEL SECURITY INVESTIGATION
National Agency Check (NAC) - This is an investigation of an individual made on the basis of written
information supplied by him in response to an official inquiry, and can be used as reference by the
appropriate agencies. It is simply a check on the files and records of national agencies. The national
agencies checked under this type of investigation are the following.
Local Agency Check (LAC) - This type of investigation consists of written inquiries sent to appropriate
local government agencies, former employees, character references and school listed by the person
under investigation. The local agencies normally check besides past employment, school, and
character references, the following:
a. The locality where the individual is a resident.
54 | P a g e
b. Mayor, Police, Fiscal, Judge of the locality where the individual is a resident.

3. Background Investigation (BI)


Complete Background Investigation (CBI)
This is consists of the investigation of the background of the individual, including all the
circumstances of his personal life.
Partial Background Investigation (PBI)
This is consists of the investigation of the background of the individual, but limited only to some
of the circumstances of his personal life which are deemed pertinent to the investigation. Normally, the
request for investigation will indicate the specific personal circumstance to be covered. This type of
background investigation is also used to further verify questionable information contained in another
investigation report.
FACTORS CONSIDERED IN A PERSONNEL SECURITY INVESTIGATION
1. Loyalty
2. Integrity
3. Discretion
4. Morals
5. Character
6. Reputation
MOTIVES THAT CAUSE PEOPLE TO BE DISLOYAL
1. Revenge
2. Material Gain
3. Personal Prestige
4. Friendship
5. Ideological Beliefs

TYPES OF SECURITY CLEARANCES


1. Final – it is valid for five years unless sooner revoked by the issuing authority.
2. Interim – It is valid for two years unless sooner revoked by the issuing authority.
SECURITY EDUCATION
It is primarily designed to enable the office or unit to achieve and maintain sound and effective security.
It provides the means or ways by which all personnel and employees are trained to acquire the
necessary knowledge and principles to develop in them such desirable security habits and attitudes as
to make them security conscious and discipline.

55 | P a g e
Is conducted to develop security awareness among employees in the company. It should cover
all employees, regardless of rank or position.
What is a Security Education Program
The exposure and teaching of employees on security and its relevance to their work.

What are the Objectives of Security Education Program

1. Guidance for all supervisory and executive levels of the organization;

2. A mandatory indoctrination on security for all new personnel before their assignment to their
respective jobs;
3. Development of high-degree of security consciousness among the selected supervisors and other
key personnel in a program that should be containing and supported by top management;

4. A down-the-line security program aimed at installing consciousness and dedication through


demonstration, lectures, motivations, and suggestion.

5. To let all the employees informed that they all belong to the organization and that non-awareness
and non-concern to the security program is tantamount to disloyalty.

6. To develop discipline, loyalty and belongingness. These attributes when fully imbued will result in
effectiveness and efficiency.

Requisites of Effective Security Education Program

Security education program to be effective must have the support and sanction of top
management, the main thrust being to acquaint all personnel on the reasons for the security measures.
This program should be given to all personnel from the work group that has no access to classified
endeavors, to the supervisors and executives handling sensitive plans and policies of the industrial firm.
The program is given a “follow-through” which will be continuing and tailored to the specific group levels
depending on their access to restricted work and activity.

SEVEN PHASE OF SECURITY EDUCATION

1. Initial Interview
2. Training conference
3. Refresher Conference
4. Security Reminders
5. Security Promotion
6. Special Interview
7. Debriefing
56 | P a g e
What is Security Orientation?

This consists of initial briefings made for new personnel. They are made to acquaint themselves
with security rules and regulation. They are also made aware of the security practices and procedures
in the office or unit.

What is Security indoctrination?

This is a continuous and systematic program designed to meet the security needs of the office
or unit. It aims to train all personnel so that each may possess the skill and vigilance in the performance
of their security responsibilities.

What is Security Seminars?

Attending lecture and seminars on security will widen the personnel’s horizons and will probably make
them more security-conscious and discipline.

SECURITY TRAINING

The goal of training is to teach specific method of performing a task or responding to a given
situation. The subject matter taught is usually narrow in scope. Training usually involves two stages:
The prescribed procedures are first presented and explained, then practical unit they become, second
nature of reflective. Training is focused on how to most effectively accomplish task whenever a
particular situation arises. Training is experimental and goal oriented.

Training – is educational, information, skill development process that brings about anticipated
performance through a change in comprehensive and behavior.

SUBJECTS OR AREA OF STUDY THAT MUST BE GIVEN DURING THE TRAINING

1. Public relation

2. Courtesy and Discipline

3. First Aid

4. Report Writing

5. Crisis Management

6. Proper Maintenance and Law Full Use of Firearms

7. The Law on Arrest, Searches, Seizures, Evidence and strike

8. Crime against Person and Property


57 | P a g e
9. Installation Security

C. DOCUMENT AND INFORMATION SECURITY

DOCUMENT SECURITY

Is the branch of security involved in the protection of documents and classified papers from loss,
access by unauthorized person; theft, damage and compromise through disclosure. The term
document in security matters, covers any form of recorded information either printed, written, drawn,
painted, sound, recording films, maps etc.. The objective is to secure and control the sensitive
information contained therein so as not to prejudice the firm, company or agency.

Responsibility for the Protection of Document and Information

1. Security of document and information is the department officer’s responsibility. Effective security is
dependent on the character and loyalty of the personnel having access to classified matters

2. Security of document and information should be the primary concern of everyone in government
service. It should be emphasized that it is the duty of all personnel to be discreet in the use and
handling of information obtained in an official capacity.

PURPOSE OF PROTECTING CLASSIFIED MATERIALS

1. Deter and impede potentials spy

2. Assist in security investigations by keeping accurate records of the moment of classified materials.

3. Enforce the use of “Need to Know” principle.

TWO KINDS OF DOCUMENT

1. Personal – letters, diary’s and notebooks. These should be treated usually the same with official
document.

2. Official – orders, manuals, letters, maps and magazines. You may be careful and follow the chain of
commands.

CATEGORIES OF DOCUMENT

1. Category A

 Information which contains reportable time sensitive, order of battle and significant information.
 It should be given priority because it is critical information.
 It must be forwarded without delay.
 It is critical to friendly operation.

58 | P a g e
 It requires immediate action.

2. Category B

 Anything that contains communication, cryptographic document, or system that should be


classified as secret and requires special handling.
 Higher authorities should declassify it.

3. Category C

 Other information, which contains something that, could be an intelligence value.


 Contains exploitable information regardless of its contents.
 Unscreened materials/documents should be categorized as Category C.

4. Category D

 No value, yet lower level will never classify document as category D.


 No decision must be made at the lower echelon that document has no value. It is the
responsibility of eh higher headquarters.

FOUR CATEGORIES OF CLASSIFIED MATTER

1. TOP SECRET

These are information and materials, the unauthorized disclosure of which would cause
exceptionally grave damage to the nation, politically, or from a security aspect. This category is
reserved for the nation’s closest secrets and is to be used with great reserve. It is covered with legal
size bond paper lined with a ½ -inch green border.

Classification Authority - rest exclusively with the head of the department.

Reproduction - may be copied, extracted or reproduced only when the classifying authority has
authorized such action shall be carried out under the supervision of an authorized officer.

Inventory - The head of the department shall required physical inventory of all TOP SECRET matter in
the custody of his department at least twice a year.

Storage - in a safe, steel filing cabinet, or other steel container.

In secure open room or vault which is approved for such use by the head concerned

59 | P a g e
Destruction - Destruction shall be accomplished by burning or pulping by the custodian in the presence
of a witnessing officer designated by the responsible head. A certificate of destruction shall be prepared
and forwarded to the originating office.

2. SECRET

These are information and materials, the unauthorized disclosure of which would endanger national
security, cause serious injury to the interest or prestige of the nation or any government activity or
would be of great advantage to a foreign land. It is covered with legal size bond paper lined with a 1/2 –
inch red border.

CLASSIFICATION AUTHORITY - same as top secret.

REPRODUCTION – same as top secret.

INVENTORY - the head of the department shall required physical inventory of al SECRET matters in
the custody of his department at least once a year.

STORAGE - in a steel filing cabinet equipped with a steel lock-bar and combination padlock of which
the manufacturer’s identification numbers have been obliterated.

DESTRUCTION – same as top secret.

3. CONFIDENTIAL

These are information and materials, the unauthorized disclosure of which while not endangering the
national security would be prejudicial to the interest or prestige of the nation or any government activity,
or would cause administrative embarrassment or unwarranted injury to an individual or would be of
advantage to a foreign nation. It is covered with legal size bond paper lined with a ½-inch blue border.

CLASSIFICATION AUTHORITY - Commissioned officer of the PNP, and their counterparts in the AFP
and government agencies are authorized to assign CONFIDENTIAL classification to any matter related
in the performance of their duties.

REPRODUCTION - the copying, extracting from or reproduction of CONFIDENTIAL matter is


authorized except when the originator or higher authority has specifically denied this authority.

INVENTORY - is not required in this category. However, proper custody and maintenance of the
documents are required, based on the existing rules and regulations of records management and
administration.

STORAGE – Same as SECRET matter

60 | P a g e
DESTRUCTION - Same as SECRET matter except that the presence of a witnessing officer and
record of destruction are not required anymore.

4. RESTRICTED {White or no color}

Information and materials which requires special protection other than that determined to be TOP
SECRET, SECRET, and CONFIDENCIAL. Cover sheet is not necessary, what is important is a bold
“RESTRICTED” word at the top and at the bottom of the bond paper.

TERMINOLOGIES

1. SECURITY CLEARANCE - It is a certification by a responsible authority that the person described is


cleared for access to classified matter the appropriate level. Persons are not entitled to have access to
classified matter solely by virtue of their status or office. It is a requirement that the dissemination of
classified matters be limited strictly to persons whose official duty requires knowledge or possession
thereof.

2. CLASSIFY - “Classify” is assigning an information or material to one of the four security classification
categories after determining that such information or material requires security protection as prescribe
by PNP Regulation 2000-012, while UPGRADING is the changing of the classification of classified
matter to a category higher than that previously assigned to it.

3. DECLASSIFY The act of changing the assigned classification of a document or materials and as part
of the process; it involves notification of cognizant authority.

4. DISSEMINATION OF CLASSIFIED DOCUMENT AND INFORMATION

Dissemination of classified documents and information shall be restricted to properly cleared


persons whose official duties require knowledge or possession thereof. Responsibility for the
determination of “need to know” rests upon both the individual who has possession, knowledge or
control of the information involved, and the recipient.

5. “NEED TO KNOW” AND “COMPARTMENTATION”

“Need to know” is the term given to the requirement that dissemination of classified documents
and information be limited strictly to those persons whose official government, police or military duty
requires knowledge or possession thereof, while “COMPARTMENTATION” IS THE granting of access
to classified document or information only to properly cleared persons when such classified documents
or information are required in the performance of their official duties, and restricting them to specified
physical confines when feasible.

6. “SECURITY OFFICER”- It refers to properly trained and cleared individual who assists the head of
the department in discharging the responsibilities of safeguarding classified documents or matters.
61 | P a g e
THE INFORMATION CYCLE

1. Creation Stage – information is discovered and developed.

2. Use – the second stage of its existence some action is taken with the information.

3. Storage and Retrieval – one information has been used; it may be stored for future use.

4. Transfer – transferring information from active to inactive storage represents another stage in the
information cycle.

5. Disposition – the final rate of recorded information is the last stage in the information cycle.

How information is lost?

1. Information is seldom compromise through electronic bugging, use of sophisticated equipment by


industrial spies.

2. It can also be lost through negligence and inadvertent disclosure by the owner of the establishment
or person in authorized possession.

3. It can also deliberately stolen by an insider or person trusted to have access to it.

62 | P a g e

You might also like