You are on page 1of 363

Industrial Security

Management

DR. WILFREDO C. DOMINGO, CSP, CSMS


Resource Speaker
Coverage

 Brief History of Industrial Security in the


Philippines
 Private Security Industry in the
Philippines Today
 Definition of Terms
 Licensing and Operation
 Qualification for Operators
Coverage

 Minimum Requirements
 Firearms Restrictions
 Confiscation of SG Firearm
 Cancellation of Agency License
 Grounds for Disqualification
 Guard Qualification
 Private Detective Qualification
 Qualification of Security Officer
 Qualification for Consultants
Coverage

 Basic Security Concepts


 Basic Elements of Security System
 Types of Physical Barriers
 Principles of Physical Security
 Lines of defense
 Types of Perimeter Barriers
 Building Exteriors
 Building Interior
 Basic Component of Alarm Systems
Coverage

 Types of Triggering Device


 Means of Transmitting Alarm
 Types of Alarm Systems
 Types of Protective Lighting
 Purposes of Protective Lighting
 Types of Lighting Equipment
 Considerations that influence the
effectiveness of protective lighting
 Areas to be lighted
Coverage

 Protective Safes & Vaults


 File Room
 Security Hazards
 Degree of Risks to Security
 Personnel Security Investigation
 Types of Background Investigation
 Documents often subject for verification
 VIP Security
 Definition of Terms in VIP Security
Coverage

 Components of VIP Vehicle Convoy


 Measures for Securing VIPs
 Security Measures for the Office
 Security Measures for Home and Family
Brief History of Industrial
Security in the Philippines
 Private security business in the
Philippines began on March 1, 1933
when the City Council of Manila passed
City Ordinance No. 2162 granting
license and recognition to the “Special
Watchman Agency” owned by the
brothers Juan and Pedro Jimenez. The
agency will later be renamed “Jimenez
Security Agency”.
Brief History of Industrial
Security in the Philippines
 During the outset of the Second World
War (WW II), private security business
were hampered and eventually ceased
during the Japanese Occupation of the
Philippines
 After the end of WW II law enforcement
agencies such as the NBI and Police
found their resources inadequate to cope
with rising criminality throughout the
country
Brief History of Industrial
Security in the Philippines
 Private security agencies stepped in to fill
the gap of securing private individuals,
their estates and industries in the near
incapability of law enforcement at the time
in providing adequate protection for their
various private interests
 Due to the absence of proper legislation in
monitoring and accounting the actions of
private security agencies, a period of
unregulated growth prevail for many years
Brief History of Industrial
Security in the Philippines
 On 30 May 1958, the Philippine
Association of Detective and Protective
Agency Operators (PADPAO) was
formally organized with the objective of
petitioning congress to formally enact
legislation that will regulated the private
security agencies throughout the country
 Congress eventually passed Republic
Act No. 5487 regulating private security
agency services
Brief History of Industrial
Security in the Philippines
 On 1 June 1969, Republic Act No, 5487
was passed directing the Chief of the
Philippine Constabulary (PC) to create a
unit with the specific purpose of
monitoring and regulating private
security businesses
 On 4 August 1969, the PC activated the
Security and Investigation Supervisory
Office (SIASO)
Brief History of Industrial
Security in the Philippines
 The SIASO was later renamed
Constabulary Supervisory Office for
Security and Investigation Agencies
(PCSUSIA)
 Upon the integration of the PC and the
INP it was renamed as the PC/INP
SUSIA
Brief History of Industrial
Security in the Philippines
 On 3 October 1972 Presidential Decree
(PD) No. 11 of former President Ferdinand
Marcos was passed in order to
encompass and defined all forms of
contracted private security services within
the entire Philippine Archipelago
 On 17 January 1973, PD No. 100 was
passed in order to include government
employed security personnel securing
government installations and buildings
Brief History of Industrial
Security in the Philippines
 With the abolition of the PC/INP and the
creation of the Philippine National Police,
the PC/INP SUSIA was renamed the
Security Agencies and Guards
Supervision Division or SAGSD
Private Security Industry in the
Philippines Today
 A continuing growth industry generating
not less than =P= 22 Billion pesos per
year in salaries alone
 With not less than 1,700 private security
agencies operating nationwide with a
total manpower employment of 240,000
plus private security practitioners
 A continuing contributing organization to
the country’s peace and order program.
Legal Bases of Industrial
Security in the Philippines
1. Natural Authority.
The highest law is the law of self-
preservation.
By instinct, man naturally reacts to
protect himself, his family, his honor,
freedom, liberty and property from
danger, threat or hazard. He does it
personally and/or thru the help of
others.
Legal Bases of Industrial
Security in the Philippines
The Filipinos even before the coming of
early chinese traders were already
organized into tribes. Each tribe has its
own chieftain but also of the members.
The inherent mechanisms of self-
preservation became the unwritten law
of the early Filipinos to protect
themselves and their property against
the natural and man-made hazards.
Legal Bases of the Industrial
Security in the Philippines
2. Constitutional Authority
2.1. The prime duty of the Government
is to serve and protect people. The
Government may call upon the people to
defend the State and, in the fulfillment
thereof, all citizens may be required,
under conditions provided by law, or to
render personal military or civil service. (
Art. II Sec. 4 of the 1987 Philippine
Constitution).
Legal Bases of the Industrial
Security in the Philippines
2.2. No person shall be deprive of life,
liberty or property without due process of
law, nor shall any person be denied the
equal protection of the laws. ( Art. III
Sec. 1 of the 1987 Philippine
Constitution ).
Legal Bases of the Industrial
Security in the Philippines
2.3. Private property shall not be
taken for public use without just
compensation ( Art. III Sec. 9 of
the 1987 Philippine Constitution
).
Legal Bases of the Industrial
Security in the Philippines
The Constitution protects not only ownership but
also possession, enjoyment, use and disposition
of private property by their rightful owners subject
to such limitations imposed by law. In this
regards, private property to be taken by the
government in its exercise of the power of the
eminent domain must satisfy two important
conditions, namely: public use and just
compensation.
Legal Bases of the Industrial
Security in the Philippines
2.4 The right of the people to be secure in their
persons, houses, papers, and effects against
unreasonable searches and seizures of whatever
nature and for any purpose shall be inviolable,
and no search warrant or warrant of arrest shall
be issue except upon probable cause to be
determined personally by the judge after
examination under oath or affirmation of the
complainant and the witnesses he may produce,
and particularly describing the place to be
searched and the persons or things to be seized.
(Art. III, Sec. 2 of the Philippine Constitution).
Legal Bases of the Industrial
Security in the Philippines
3. Statutory Authority
3.1. The Revised Penal Code. ( Act No.
3815, as amended). The applicable
provisions of the code on crime against
persons, personal liberty and security and
property have bearing on the security and
protection of one’s life, liberty and property.
Legal Bases of the Industrial
Security in the Philippines
3.2. Private Security Agency Law. ( R.A.
5487 as amended). This law governs the
operation, administration of security
agency, and activities, qualifications, duties
and licensing of security guards, watchmen
and private detectives. In short, it is the
intention of this law to professionalize the
security services in order to upgrade the
level of security protection.
Legal Bases of the Industrial
Security in the Philippines
3.3. Presidential Decree No. 11. ( Amending
R.A. 5487 ). P.D. 11 amended the Sec 3 (d)
which defines watchman or security guard,
watchman or security guard agency, Sec 4
who may organize a security or watchman
agency and the Sec. 18 of the penal
provisions of R.A. 5487.
Legal Bases of the Industrial
Security in the Philippines
3.4. P.D. 100 ( Amending R.A. 5487 & P.D. 11 ). The
following are amended by P.D 100 further amended the
sec. 3 (d) of R.A. 5487 which further define the watchman
or security guard or watchman or security guard agency;
Further amended sec. 4 by adding as the last
paragraph thereof;
Amended the sec. 5 & 8 of Private Security Agency
Law by inserting before the final provision thereof;
Amended the sec. 9 that provides employees need not
be licensed;
Amended the sec. 11 by adding as the second
paragraph thereof; and
Amended the sec 16 paragraph one, which provides for
limitations and prohibitions.
Legal Bases of the Industrial
Security in the Philippines
3.5. P.D. 1919 ( Amending R.A. 5487, P.D. 11 and 100).
The following sections are further amended; sec. 3 (d) of
R.A. 5487 as amended, as further amended to expand
the definition of watchman or security guard, watchman or
security guard agency;
Sec. 18 of the Private security agency law as amended
is further amended by providing a third paragraph thereof;
Paragraph 3 of sec. 8 of R.A. 5487, as amended is
further amended the fees to be paid and bonds; and
Paragraph one and sec. 16 of the private security
agency law as amended is further amended which
provide the limitations and prohibitions of security agency.
Three Aspect of Security

1. Physical Security – is the sum total of all physical


protection employed or installed to secure assets. Ex.
Human guards, Perimeter fence/barrier and security
devices.
Three Aspect of Security

2. Personnel Security – is the sum total


of procedures followed, inquiries
conducted, and criteria applied to
determine the work suitable of a
particular applicant or retention or
transfer of a particular employee.
Example :
Three Aspect of Security

a. Procedure – Complete or partial


background investigation is conducted to
determine whether the applicant should
hire or not, or the same investigation is
conducted to determine whether the
employee should remain in his present
position or to be transferred to less or non-
sensitive position.
Three Aspect of Security

b. Inquiry – it is a process of determining the


loyalty, honesty, integrity, reputation, and
others of a particular applicant or
employee.
c. Criteria – Enumerated standard like
education, experience, age, citizenship,
and family background, potential are being
verified if true or not.
Three Aspect of Security
3. Document and Information Security – is the sum
total of all policies, regulation, practices, enforce to
safeguards the contents and integrity of any
classified information or document from
compromise or loss. Example
a. Policy – Security document and information is the
responsibility of all concerned.
b. Regulation – anybody found guilty of violating
document and information security shall deal with
accordingly.
Three Aspect of Security

c. Doctrine – Access to information is


based on the “ need to know “ and not
by position.
d. Practice – Authority to have access to
classified information is not
permanent but can be withdrawn by
the originating authority.
TYPE OF SECURITY
1. Physical Security – Part of security concerned
with the physical measures designed to safeguard
personnel to prevent unauthorized access to
equipment, facilities, materials, documents, and to
protect them from espionage, sabotage, damage
or theft.
2. Industrial Security – a type of security applied to
business groups engaged in industries like
manufacturing, assembling, research and
development, processing, warehousing and even
agriculture.
TYPE OF SECURITY

3. Bank Security – this type of security is concern


with bank operations. Its main objective is the
protection of bank cash and assets, its personnel
and clientele. Security personnel are trained to
safeguard bank and assets while in storage, in
transit and during transactions.
TYPE OF SECURITY

4. Hotel Security – a type of security


applied to hotels where its properties are
protected from pilferage, loss, damage
and the function in the hotel restaurants
are not disturbed and troubled by
outsiders or the guest themselves. This
type of security employs house
detectives, uniforms guard and
supervisor and insures that hotel guests
and their personal effects safeguarded.
TYPE OF SECURITY

5. VIP Security – a type of


security applied for the
protection of top-ranking
officials of the government or
private entity, visiting persons
of illustrious standing and
foreign dignitaries.
TYPE OF SECURITY

6. Document Security – Protection of


document, classified paper and vital
records from loss, access to
unauthorized persons, damage,
theft and compromise through
proper storage and procedures.
TYPE OF SECURITY

7. Operational Security – This


involves the protection of process,
formulas, patents, and industrial
and manufacturing activities from
espionage, infiltration, loss
compromise or photo copying.
TYPE OF SECURITY

8. Communication Security – The


protection resulting from the application
of various measures which prevent or
delay the enemy or unauthorized person
in gaining information through
communication. This includes
transmission, cryptographic and physical
security
TYPE OF SECURITY

9. Other Special Types of Security


 Air Cargo Security
 School Security
 Supermarket Security
 Personnel Security
TYPE OF SECURITY

 School Security – a type of security that


is concern with the protection of
students, faculty members, and school
properties. Security personnel are
trained to protect the school property
from theft, vandals, handling campus
riots and detecting the use of intoxicated
drugs and alcohol by the students.
TYPE OF SECURITY

 Supermarket or Mall Security – a type


of security which is concern with the
protection of the stores, warehouses,
storage, its immediate premises and
properties as well as the supermarket
personnel and customers. Security
personnel are trained to detect “
shoplifter “, robbery, and bomb
detection and customer relation.
Three Line of Physical
Defense
1. First line of Defense – example: like
perimeter fences/ barriers or guard at
the gate
2. Second line of Defense – example; like
the doors, floor, windows, wall, roof,
and grills, and other entries to a
building.
3. Third line of defense – like steel
cabinets, lacks, safes vaults and
interiors file rooms.
Definition of Terms

 Security is defined as:


1. Protection against any type of crime to
safeguard life, assets and operation by
the use of various methods and
devices;
2. Freedom from fear and danger;
3. Defense against crime.
Threats – Defined as positive
inimical (harmful) acts
Hazards – Defined as positive
inimical (harmful) conditions
Vulnerability – Measure of how
open an establishment is to
intrusion, attack or injury from
the outside
Risk – The probability of
occurrence of an event that will
lead to loss. The risk could be
classified as virtually certain,
highly improbable, improbable
and probability unknown
Security Survey – is the critical,
on site examination and
analysis to ascertain the
security status, identify
deficiencies or excesses,
determine protection needed
and make recommendations
Security Guard – Is any natural
person who offers or render
personal services to watch or
guard residential or business
premises or both, government
building, establishment and/or
their premises, for hire and
compensation
Security Supervisor – Is charged
with directing the work and
observing the behavioral
performance of the guard
under his unit.
Private Detective – Is any natural
person, not a member of the
regular police force or the
A.F.P., who does detective
work for hire, reward or
commission.
 Security Guard Force – as a group
of forces of men selected trained or
organized into functional group for
the purpose of protecting
operational processes from those
disruption which impeded efficiency
or halt operation at a particular
plant, facility, institution or special
activity.
Security Planning – is a
corporate and executive
responsibility. It involves
knowing the objectives of the
security and the means and the
method to reach these objective
or goal must then evolved.
Security Survey – is the process
of conducting an exhaustive
physical examination and
thorough inspection of all
operation system and
procedures of a facility.
Security Inspection – is the
process of conducting physical
examination to determine
compliance with establishment
security policies and
procedures as a result of
security survey
Security Hazard – Is any act or
condition which may result in
the compromise of information,
loss of life, loss or destruction
of property or disruption of the
objective of the installation.
Security Education Program – a
program given to employees of an
installation by lecture and other
means pertaining to measures and
safeguards to be taken to protect
the interest of the installation from
loss , damage , sabotage , pilferage
, and other criminal acts.
 Asset Protection Program – it
is the sum total of protection
scheme encompassing the
entire security spectrum,
designed to eliminate , reduce
or control threats, hazards, risk
or dangers to company assets.
Definition of Terms

Security Cabinet – Added


protection of important vital
papers, plans, data, special
correspondence, cash and
other essential documents.
Such as vault, safe and file
room.
Definition of Terms

Security Alarm System –


combination of compatible
intrusion and detection device
so arranged and wired as to
support one another.
Definition of Terms

Security Lighting – the


providing of sufficient
illumination to areas during
hours of darkness to insure
visibility and to act as deterrent
to the intruders.
Definition of Terms

Physical Barriers – Any


physical means to impede,
delay, or prevent intrusion into
a protected area.
Definition of Terms

Master Keying System – a


system use in big installation
whereby keys can open a
groups of locks. This is possible
by the use of interchangeable
cylinder cores in the locks.
Definition of Terms

Remote Station System – a


system where the alarm signal
is transmitted to a remote
location manned and operated
by a independent party or
police department.
Definition of Terms

Barriers – Place between the


protective intruders and the
matter to be protected
Definition of Terms

Restricted area -If access is


limited only to the authorized,
this particular place
Desirable Qualities of Security
Supervisor
1. Physical and nervous Energy – It is
impossible to be a supervisor
unless one possess an adequate
amount of Physical and nervous
Energy to permit him to take an
active interest in his work
2. Sense of Purpose and
Direction – any good
supervisory leader will have in
his mind a definite purpose
which he hopes to achieve; he
will then direct all his energy
toward reaching the goal.
3. Enthusiasm- A man love his work and
make him enjoy performing it fully,
performing it just what it done
4. friendliness and affection -To lead, a
supervisor must have two qualities. In
like manner, his subordinates will act
the same way and the organization will
be well on the way to success.
5. Integrity -The quality of the followers will
most likely to falter and soon desert their
leader.
6. Decisiveness -A supervisor must make
a decision. He is responsible for that
decision. If he can not decide or denied
having made the decision, he is not a
capable leader.” It is better to decide
wrong than not to able to decide “ can
never be truer.
7. Technical Mastery – a good supervisor
must know and master the skill and
knowledge that are necessary for his
job.
8. Intelligence – The supervisor as a leader
must have adequate knowledge to do
his job.
9. Teaching Skill – A leader must be able
to teach in his men what he want to be
done.
10. Faith – He must have faith in the work
he is doing. He must have faith in his
superior.
 Bow street runners - Historical, it is
considered as the first detective agency
in the words
 Scotland -is the agency that established
the first internal affairs unit
 Pinkerton -the detective agency
popularized the motto “ we never sleep”
 Sir Robert Peel -In the history of
security management and intelligence,
who introduced the idea of plain clothes
police detectives?
 August Volmer- the pioneer in police
service started the high I.Q. detective
mystiques
Desirable Qualities of Security
Guard
1. Alertness – This is a desirable qualities
of security guard as it determines his
effectiveness, it must be therefore
develop by every one to become
security guard.
2. Judgment – Sound and good judgment
is more than the use of common sense.
It is the arriving at wise and timely
decision.
3. Confidence – Is the state of being sure,
a state of mind free from doubt or
misgiving. This attributes include faith
in oneself and in his abilities, which is
attained by job knowledge.
4. Physical Fitness – Security guard work
is strenuous and demanding. In the
protection of plant even the guard’s life
may depend on his physical fitness
5. Tactfulness – A security guard’s
ability to deal with others
successful without offending
6. Self-Control – is the ability to take
hold oneself regardless of
provoking situation.
Types of Security Guards

1. Company Guard – Recruited and


employed by the company.
2. Agency Guard – A guard hired by the
company belonging privately license
security guard in a contractual basis.
3. Government Guard – A security guard
recruited and employed by the
government.
Qualification of Security Guard

1. He must be a Filipino Citizen – it is


submitted that a naturalized Filipino
citizen will qualify as the law did not
require a natural born citizen. However,
a foreigner who is already employed as
a security guard, watchman or private
detective prior to the approval of the
5487 is exempted under this citizenship
requirement.
Qualification of Security Guard

2. He must be at least high school graduate – The


law here imposes the minimum academic
requirement. A college graduate is considered
more qualified plus of course other
requirements.
3. He must be mentally sound and physically fit –
considering the nature of the job and other
responsibility of the guard, wathcman and
private detective, only those that are endowed
with the basic or inherent qualification , among
other , should be allowed to engage in this
profession.
Qualification of Security Guard

4. He must be at least 18 years old but not


more than 50 years old – Medical
science has proven that age between
this range make man more productive.
5. He must be at least 5’4” and not less
than 120 pounds – here, the law
imposes only minimum requirement
about height and weight.
Private Detective Qualification

 Private Detective Qualification


1. Must possess all the general
qualifications of a Security Guard
2. Must be a graduate of the following:
 Bachelor of Laws or B.S. Criminology
 Criminal investigation course offered by
the PNP, NBI other gov’t agency or training
school accredited by government
 Advance ROTC/CMT graduate
General Functions of SG

 Security guard duties vary with the type


of installations facilities in the plant
establishment, location, social condition
and other factors. However, duties
assigned to guards are outline in the
installation program. With the scope of
the authority, guards forces achieve the
objectives by the combination of action
and work performance like the following
General Functions of SG

1. Enforce company rules and regulations,


2. Operate & enforce the personnel identification
system,
3. Patrol & observed designated areas,
perimeter, structure, installation,
4. Take into custody a person attempting or
giving unauthorized access in restricted
limited and controlled areas,
5. Check rooms, building, storage rooms of the
security interest and after working hours,
check proper locking of doors and gates
General Functions of SG
6. Perform escort duties when required,
7. Respond to protective alarm signals or other indications
suspicious activities and emergencies.
8. Safeguard equipment and materials against sabotage,
unauthorized access, loss theft or damage,
9. Act quickly in situations affecting security of installation
and personnel to fire accidents, internal disorder, and
attempt to commit criminal acts,
10. Control and regulate vehicles and personnel traffic within
the compound as well as parking of vehicles,
11. Other duties that is necessary in the security guards
function.
Functions of private detective

1. Background investigation,
2. Locating missing persons,
3. Conduct surveillance work,
4. Such other detective works as may
become the subject matter of contract
between the agency it’s clients. Except
not contrary to law, public order, public
policy, public morale, and good custom.
Licensing and Operation:
Qualification for Operators
 Qualification of a Private Security
Agency Operator
1. Filipino Citizen with 100% ownership of
corporation and capital
2. At least 25 years old upon application of
license
3. College graduate or a commissioned
officer of the AFP in the inactive service
4. Good moral character
Licensing and Operation:
Minimum Requirements
 Minimum requirements for agency
operation
1. Security agency should have a
minimum of 200 Security Guards (SG)
and a maximum of 1,000 SG’s
2. Operators should not have an interest
in more than one Security Agency
3. Security agency firearms must number
not exceeding one firearm per 2 SG
Licensing and Operation:
Minimum Requirements
3. Cannot use handguns in the .45 caliber
category or high powered firearms such
as the 5.56mm M16 which can only be
issued and approved by the PNP under
certain circumstances
4. Can only employ firearms in the .12
gauge, caliber .22 and .38 only
Licensing and Operation:
Firearms Restrictions
 Restrictions in the Carrying of Firearms
1. Firearms to be issued to SG only when
on duty
2. SG should be in proper uniform upon
assumption of post
3. Firearms to be carried only within the
confines of his post/jurisdiction as
stated in his Duty Detail Order
Licensing and Operation:
Confiscation of SG Firearm
 Justification for Confiscation of Firearm
1. When Firearm (F/A) is about to be used
in the commission of a crime
2. When F/A is actually being used in the
commission of a crime
3. When F/A had just been used in the
commission of a crime
4. When F/A being carried by SG is
unlicensed or not authorized by law
Licensing and Operation:
Confiscation of SG Firearm
5. When SG is unlicensed to exercise his
profession
6. When confiscation of F/A is directed by
the court
7. When F/A is carried or used outside of
the property being serviced without
proper authority
Licensing and Operation:
Cancellation of Agency License
 Grounds for cancellation of Security
License to Operate
1. Submission of falsified documents or
reports to the PNP-SAGSD
2. Submission of a falsified license to
prospective clients
3. Engaging in cut-throat competition
4. Practice of Kabit system
5. Posting of SG outside its jurisdiction
Licensing and Operation:
Cancellation of Agency License
6. Failure to employ the minimum of 200
qualified and license security guards
7. Violation of the minimum wage law
8. Employment of unlicensed SG’s
9. Engagement in dangerous activities
which are inimical to public safety or
national security
Licensing and Operation:
Grounds for Disqualification
 Persons Disqualified to become
Agency Operator
1. Dishonorable dismissal or discharge
without honor from the PNP, AFP,
government entity or government
owned or controlled corporation
2. Mental incompetence
3. Addiction to the use of narcotic / drugs
Licensing and Operation:
Grounds for Disqualification
4. Election or appointment in the
government whose position may be
called upon to enforce or implement the
provisions of RA 5487 as amended
5. Conviction of any crime involving moral
turpitude
Licensing and Operation:
Guard Qualification
 Guard Qualification
1. Must be a Filipino citizen
2. At least a High School graduate
3. Be mentally sound and physically fit
4. At least 18 years old but not more than
50 years old
5. At least 5’4” in height and not less than
120lbs in weight
Licensing and Operation:
Private Detective Qualification
 Private Detective Qualification
1. Must possess all the general
qualifications of a Security Guard
2. Must be a graduate of the following:
 Bachelor of Laws or B.S. Criminology
 Criminal investigation course offered by
the PNP, NBI other gov’t agency or
training school accredited by government
 Advance ROTC/CMT graduate
Licensing and Operation:
Qualification for Scty Officer
 Security Officer Qualification
1. Filipino citizen
2. Holder of Baccalaureate Degree
3. Physically and mentally fit
4. Graduate of a Security Officer Training
Course
5. Retired police or AFP personnel
6. Must not possess any disqualification
for security agency operators
Licensing and Operation:
Qualification for Consultants
 Security Consultants Qualification
1. Must hold the same requirements of a
private detective
2. Holder of Masters Degree in
Criminology, Public Administration,
MNSA, Industrial Security, etc.
3. Must have at least ten (10) years
experience in the operation and
management of security business
Basic Security Concepts:
Elements
 Basic Elements of a Security System
1. Human guards
2. Physical barriers
3. Interior controls/procedures
4. Devices/equipment
Basic Security Concepts/
objective: Barriers
 Barriers accomplish the following:
1. Define the boundary of the property to be
secured
2. Create a physical and psychological
deterrent
3. Delay intrusion thus facilitating
apprehension
Basic Security Concepts:
Barriers
4. Assist in the more efficient use of
manpower
5. Facilitate improve pedestrian and
vehicular flow
Purpose of Positive Barrier

1. Controlling Vehicular and pedestrian


traffic flow.
2. Checking identification of personnel
entering or departing.
3. Defining the buffer zone for more highly
classified areas.
Principles of Physical Security

1. The type of access necessary will


defend upon a number of variable
factors and therefore may be achieve in
a number of ways.
2. There is no impenetrable barrier
3. Defense is depth barriers after barriers
4. Delay provided against surreptitious
and non-surreptitious entry
5. Each installation is different.
Barriers - Place between the
protective intruders and the matter
to be protected
Basic Security Concepts:
Barriers
 Types of Physical Barriers
1. Natural Barrier
2. Structural Barrier
3. Human Barrier
4. Animal Barrier
5. Energy Barrier
Natural Barrier

1. Deals with the Natural features of the


earth and climate, it includes bodies
of waters, cliff , canyons, dense,
mountains, marshes, ravines,
deserts or other terrain that are
difficult to traverse
Bodies of water
Canyons
Cliffs
Dense
Mountains
Marshes
Ravines
Deserts
Terrains
Structural Barrier

these are features constructed by


man regardless of their original intent
that tends to delay the intruders.
Examples are walls, doors, windows,
locks, fences, safe, cabinets or
containers etc.
Walls
Doors
Windows
Locks
Fences
Safe
Human Barriers

persons being used in providing a


guarding system or by the nature of
their employment and location, fulfill
security functions. Ex. Guards, office
personnel, shop workers, etc.
Guards
Office Personnel
Shop Workers
Animal Barrier

animal are used in partially providing


a guarding system. Dogs are usually
trained and utilized to serve as guard
dogs. German shepherds are best
suited for security functions. Goose
and turkeys could also be included.
Dogs
Geese
Turkeys
Energy Barriers

it is the employment of mechanical,


electrical, electronic energy imposes a
deterrent to entry by the potential
intruders or to provide warning to
guard personnel. These are protective
lighting, alarm system and any
electronic devices used as barriers.
Protective Lighting
Alarm System
Electronic Devices
Direction: Choose the letter of the
correct answer.
1. These barriers include mountains, cliff, canyon,
rivers, seas, marshes, deserts or terrains, difficult
to traverse and they belong to;

A. Natural Barriers B. Energy Barriers


C. Physical Barriers D. Human Barriers
2 . Below are the major classifications of guard
forces except:

A. Agency guard B. Company guard


C. Government guard D. Detective guard
3. It refers to any physical means to impede, delay or
prevent intrusion into a protective area

A. Alarm B. Barrier
C. Cabinet D. Lock
4. Under Physical Security, what should be placed
between the protective intruders and largest
installation?

A. Barriers B. Hazards
C. Net D. Risk
5. The barriers which are structural constructive like
fences, wall, floor, roof, grills and the like…

A. Physical Barriers B. Natural Barriers


C. Energy Barriers D. Human Barriers
6. What is the system of natural or man made
barriers placed between the potential intruders
and the object, person and matters being
protected?

A. Manager Security B. Guard Security


C. Physical Security D. Personnel Security
7. It is a natural or man made structure or physical
device which is capable of restricting, detecting,
or delaying illegal entry to an installation…

A. Barriers B. Fences
C. Hazards D. Wall
8. The state or quality of being secured freedom from
fear or danger, the assurance or certainly refers
to…

A. Security B. Safety Inspection


C. Security Guard D. security Personnel
9. What kind of barrier is established to protect the
surrounding of an installation or plants?

A. Animal Barriers B. Energy Barriers


C. Human Barriers D. Structural Barriers
10. What is the first formally licensed private
security agency in the country?
A. Blue Dragon Watchman Agency
B. Kaizen Watchman Agency
C. Lanting Watchman Agency
D. Special Watchman Agency
11. What is considered as the most important
aspect of security? It is the sum total of
procedures followed, inquiries conducted and
criteria applied to determine the work suitable to
a particular applicant or the retention or transfer
of a particular employee.
A. Document B. Information
C. Personnel D. Physical
12. It refers to the thing, which protects
important papers, plans, data, special
correspondence, cash and other
essential documents such as vault, safe
and file room.
A. Security Barriers B. Security Box
C. Security Cabinet D. Security Case
13. What program is given to employees of an
installation by means of lecture and other
means pertaining to measures and safeguards
to be taken to protect the interest of the
installation from loss, damage, sabotage,
pilferage and other criminal acts?
A. Security Asset Protection Program
B. Security Education Program
C. Security Survey Program
D. Security training Program
14. What form of physical security is
involved with security plants and
business enterprises, the safeguarding
of personnel, processes, properties and
operation?
A. Agency B. Company
C. Government D. Industrial
15. It is a corporate and executive
responsibility. It involves knowing the
objectives of the security and the means
and the method to reach these
objectives or goals must then evolve.
A. Forecasting B. Organizing
C. Planning D. staffing
16. In security, this refers to any condition,
which may result in the compromise of
information, loss of life, loss or
destruction of property or disruption of
the objectives of the installation.
A. Crime B. Crisis
C. Disaster D. Hazard
17. It refers to any natural person who
offers or renders personal service to
watch or guard residential or business
premises or both, government buildings,
establishment and/or their premises, for
hire and compensation.
A. Detective B. Investigator
C. Security Officer D. Watchman
18. What program refers to the sum total of
protection of scheme encompassing the entire
security spectrum, designed to eliminate,
reduce or control threats, hazards, risk or
dangers to company assets?
A. Security Asset Protection Program
B. Security Education Program
C. Security Survey Program
D. Security training Program
19. It refers to the combination of
compatible intrusion and detection
device so arranged and wired as to
support one another which alerts
employees of the installations that an
intruder has illegally entered a restricted
area.
A. Alarm B. Barrier
C. Lighting D. Lock
20. How many is the minimum number of
guards prescribed by law that should be
maintained by a security agency to
operate?
A. 100 B. 200
C. 500 D. 1000
21. It is otherwise known as the Private
Security Agency Law of 1969.
A. RA 4864 B. RA 5487
C. RA 6975 D. RA 8551
22. What is the process of conducting an
exhaustive physical examination and
thorough inspection of all operation
system and procedures of a facility?
A. Security Audit B. Security Inspection
C. Security Survey D. Security Test
23. Who is in charge with directing the
work and observing the behavioral
performances of the watchmen under
his unit?
A. Security detective
B. Security investigator
C. Security Specialist
D. Security supervisor
24. What is the process of conducting
physical examination to determine
compliance with establishment’s security
policies and procedures as a result of
security survey?
A. Inspection B. Instrumentation
C. Interrogation D. Investigation
25. It refers to any physical means to
impede, delay or prevent intrusion into a
protected area .
A. Alarm B. Barrier
C. Cabinet D. Lock
26. What is the minimum weight
requirement for a security guard
prescribed by law?
A. 100 lbs B. 120 lbs
C. 150 lbs D. 200 lbs
27. The Security Agency Guard
Supervision Division is under what
unit/group of the PNP?
A. Civil Security B. Police Security
C. Private Security D. VIP Security
28. At least how many feet is the standard
height of a barrier including the Top
Guard?
A. 5 B. 6
C. 7 D. 8
29. Before, security guards could be
employed even with out undergoing
training provided there was a permit
coming from…
A. District Representative
B. Municipal Mayor
C. Provincial Governor
D. Senior Councilman
30. What is an additional overhang of
barbed wire placed in vertical perimeter
fence facing upward and outward?
A. Guard Control station
B. Overhang Barrier
C. Top Guard
D. Tower
31. It is a mechanical, electric, hydraulic or
electronic device designed to prevent
entry and to prevent removal of items.
A. Alarm B. Barrier
C. Lighting D. Lock
32. It is a heavily-constructed container
and part of the building structure used
for keeping and protecting cash,
documents and negotiable instruments.
A. Cabinet B. File Room
C. Safe D. Vault
33. Below are the major classifications of
guard force except…
A. Agency B. Company
C. Government D. Industry
34. What aspect of security is concerned
with the physical measures designed to
the safeguard personnel to prevent
unauthorized access to equipment,
facilities, materials, and documents and
to protect them from sabotages, damage
or theft?
A. Document B. Information
C. Personnel D. Physical
35. What are records that are irreplaceable and
reproduction of those does not have the same
value as the original such as records needed to
recover cash to replace building, equipment,
raw materials, finished product, work in process
and records needed to avoid delay in
restoration of production, sales and service?
A. Essential Documents B. Important Documents
C. Useful Documents D. Vital Documents
36. What is a check made on an individual
usually seeking employment through
subject’s records in the police files,
educational institutions, place of
residence, and former employers?
A. Applicant Investigation
B. Background Investigation
C. Credit Investigation
D. Criminal Investigation
37. The number of people authorized to
enter this area should be strictly limited,
and the area should be under
surveillance at all times.
A. Controlled Area B. Exclusive Area
C. Limited Area D. Restricted Area
38. Who shall responsible for the entire operation
and administration/management of the
security agency that is directly responsible to
the agency operation/owner/Board of
directors?
A. Administration Manager
B. Operation Manager
C. Security manager
D. Detachment Manager
39. What type of protective alarm where the light
beam is transmitted at a frequency of a several
thousand vibration per second which is
connected by a wire to a control station and
when an intruder crosses the beam, he breaks
contact with the coil which thus activities the
alarm?
A. Audio Detective Device
B. Microwave Motion Detection Device
C. Photoelectric or Electric Eye
D. Vibration Detection Device
40. What is a term used in England for
look picker, safecrackers, and
penetrators of restricted areas or rooms?
A. Key master B. Lupin
C. Padlock boy D. Peterman
41. What type of lock is used in
automobile industry and generally used
in car door?
A. Combination B. Disc Tumbler
C. Lever D. Warded
42. What type of key is used to a single
lock only?
A. Change B. Controlled
C. Exclusive D. Limited
43. What is an educational, informational
and skill development process that
brings about anticipated performance
through a change in performance and
behavior?
A. Security Education
B. Security Inspection
C. Security Survey
D. Security Training
44. The following are the firearms that
may be used by a security guard except.
A. Cal. 22 B. Cal. 38
C. Cal. 45 D. Shotgun
45. What type of pilferer is one who steals
with preconceived plan and takes away
any or all types of items or supplies for
economics gain?
A. Accidental B. Casual
C. Chronics D. Systematic
46. What is the work of a manager where
he arranges the work and the workers so
as to produce an effective and efficient
performance?
A. Leading B. Organizing
C. Planning D. Staffing
47. What type of man made hazard is
considered one of the most annoying
and common hazards which security has
to deal with because if this activity is not
controlled, this can become a financial
drain if not a menace to smooth and
orderly operation of the company?
A. Accident B. Negligence
C. Pilferage D. Vandalism
48. Who is responsible for the
professionalization of the personnel,
procurement or recruitment, confirming
of awards, mobility and issuance of
firearms?
A. Administration Manager
B. Operation Manager
C. Security Manager
D. Detachment Manager
49. This involves the protection of
processes, formulas, patents, and
industrial and manufacturing activities
from espionage, infiltration, loss,
compromise or photocopying.
A. Communication Security
B. Document Security
C. Information Security
D. Operational Security
50. Storage system like steel cabinet,
locks, safes, vaults and interior file
rooms are considered_______ line of
defense.
A. First B. Second
C. Third D. Fourth
51. What type of protective bank alarm is
usually placed in the teller’s top cash
drawer and connected to the alarm
system using a wire connector?
A. Auxiliary B. Bill Trap
C. Propriety D. Ultrasonic
52. What part of the alarm system carries
message to the signaling apparatus?
A. Annunciator B. Circuit
C. Sensor D. Trigger
53. What is a metallic container used for
the safekeeping of documents or small
items in an office or installation?
A. Cabinet B. File room
C. Safe D. Vault
54. What is the medium or structure, which
defines the physical limits of an installation
or areas to restrict or impede access
thereof?
A. Access Barriers B. Inside Barriers
C. Outside Barriers D. Perimeter Barriers
55. At least how many feet is the standard
height of a barrier excluding the top
guard?
A. 5 B. 6
C. 7 D. 8
56. It is the sum total of all policies,
regulation, doctrines, practice, enforce to
safeguard the contents and integrity of
any classified information from
compromise or loss.
A. Document B. Management
C. Personnel D. Physical
57. Who is in charge in canvassing
clientele and implementing the contract
and agreement? He is also responsible
for the conduct of investigation and
training?
A. Administration Manager
B. Operation Manager
C. Security Manager
D. Detachment Manager
Basic Security Concepts:
Physical Security
 Principles of Physical Security
1. Access is dependent upon variable
factors and therefore may be achieved
in a number of ways
2. There is no impenetrable barrier
3. Defense should be in-depth
Basic Security Concepts:
Physical Security
 Principles of Physical Security
4. Delay should be provided against
surreptitious and non-surreptitious entry
5. Each installation is different
Break
Basic Security Concepts:
Physical Security
 Lines of defense
1. Perimeter Barriers
2. Building Exterior
3. Interior Controls
Basic Security Concepts:
Physical Security
 Types of Perimeter Barriers
1. Wire fences – barbed wire, chain link
and concertina.
 Solid and Full View
2. Building Walls – walls, floors, roofs and
masonary walls.
3. Bodies of water – River, lake, marsh,
cataract, and sea pond.
Types of perimeter Barrier
Openings.
1. Gates and Doors
2. Sidewalk elevator
3. Utilities Openings
4. Clear Zone
Additional Protective Barriers

1. Top Guard
2. Guard Control Station
3. Tower
4. Barrier Maintenance
5. Protection and Depth
6. Signs and Notices
Basic Security Concepts:
Physical Security
 Building Exteriors
1. Windows
2. Roofs
3. Ventilation openings/air ducts
4. Clear zones and perimeter lights
5. Close Circuit Television (CCTV) System
6. Guarded entrances and exits
7. Vehicle parking
Basic Security Concepts:
Physical Security
 Building Interior
1. Pass system
2. Close Circuit Television System
3. Restricted or Controlled Areas
4. Locks
5. Sensors and alarms
Basic Security Concepts:
Component of Alarm Systems
 Basic Component of Alarm Systems
1. Triggering device
2. Power source
3. Transmission lines
4. Annunciator
Basic Security Concepts:
Component of Alarm System
 Types of Triggering Device
1. Magnetic (passive and active)
2. Light (photo, laser and receptors)
3. Weight
4. Seismic
5. Sonic and Audio
6. Heat
7. Movement
Types of Alarms System

1. Metallic foil or wire


2. Photoelectric or Electric eye
3. Audio detection device
4. Vibration detection device
5. Microwave Motion detection
device
6. Ultrasonic Motion detection
device
7. Capacitance or Electrostatic
detection device
Other types of Protective
Alarm ( Bank Alarm )
1. Foot Rail Activation
2. Bill Traps
3. Knee or Thigh Buttons
4. Foot Buttons
5. Double Squeeze Buttons
Basic Security Concepts:
Component of Alarm System
 Photo Electric Optics and Laser Sensors
Basic Security Concepts:
Component of Alarm System
 Magnetic
Basic Security Concepts:
Component of Alarm System
 Weight and Seismic
Basic Security Concepts:
Component of Alarm System
 Means of Transmitting Alarm
1. Landline (analog and fiber optic cables)
2. Radio signal (VHF, UHF and CB)
3. Cellphone
4. Internet
Types of Alarm Systems

1. Central Station Alarm


2. Proprietary Alarm
3. Local
4. Auxillary System
5. Local Alarm – by- Chance
System
6. Dial Alarm System
Purpose of Protective Lighting

1. Provide sufficient illumination to the


areas during hours of darkness
2. Lighting can help improve visibility so
that intruder can be seen and identified
and, if possible, apprehended
3. Lighting also gives that psychological
fear and that serve as a deterrent to
thieves, pilferer, trespassers and
saboteurs.
Importance of Protective
Lighting.
1. Serves as deterrent to violators
2. Assisting security force
3. Serves as a essential elements of an
integrated physical security program
Basic Security Concepts:
Security Lighting
 Types of Protective Lighting
 Stationary
 Standby/Emergency Lighting
 Movable
 Emergency
Basic Security Concepts:
Security Lighting
 Stationary Luminary – this is
common type consisting of
series of fixed luminaries to
flood given area continuously
overlap
Types of Stationary Lighting

1. Glare projection Type. The intensity is


focused to the intruder while the
observer or guard remained in the
comparative darkness.
2. Controlled lighting. The lighting is
focused say on the pile of items, rather
than the background.
 Standby Lighting. This syste4m is similar to
continuous lighting but us turn on manually or
by special device or other automatic means
 Movable Lighting. This consists of stationary or
portable, manually operated search light
 Emergency Lighting. This type may be
duplicative of existing system. This is bstandby
which can be used in the event of electric
failure
Type of Light Lamps

 Incandescent Lamp. These are common


lights bulbs of the type found in the
home
 Gaseous-discharge Lamp. Protective is
somewhat limited, since they require a
period of from two to five minutes to
light.
Types of Gaseous-discharge
Lamp
 Mercury-Vapor Lamps. These lamps
give a blue-green color light due to the
presence of mercury vapor.
 Sodium-vapor Lamps. These lamps
emits yellow light. It is efficient bulb and
due to its color, it is placed usually in
areas to connote concern like bridges.
Basic Security Concepts:
Security Lighting
 Types of Lighting Equipment
1. Floodlights
2. Searchlights
3. Fresnel lights
4. Street lights
 Floodlights. These lights project light in a
concentrated beam. They are appropriate for use
in instances which call for illumination of
boundaries, building or fences.
 Searchlights. These are highly focused
incandescent lamps used to pinpoint potential
trouble spot
 Fresnel Lights. These are wide beam units, primary
used to extend the illumination in long, horizontal
strips to protect the approaches to the perimeter
barriers.
 Street Lights. These produce diffused light rather
than directional beam. They are widely used in
parking areas.
Basic Security Concepts:
Security Lighting
 Considerations that influence the
effectiveness of protective lighting
1. Brightness
2. Silhouette seeing
3. Contrast
4. Shadow illumination
Basic Security Concepts:
Security Lighting
 Areas to be lighted
1. Vehicular gate
2. Pedestrian gate
3. Parking areas
4. Perimeter
5. Sensitive areas
6. Thoroughfares
What is Lock ?

A mechanical, electrical,
hydraulic or electronic device
designed to prevent entry into a
building, room, container or
hiding place, and to prevent the
removal of items without the
consent of the owner
What is Padlock?

A portable and detachable lock


having or sliding hasp which
passes through a staple ring or
the like and is then made fast or
secured
What is Peterman?

A term used in England for lock


picker, safecrackers, and
penetrators of restricted areas
or rooms
Types of Locks

 Warded Locks. This type of lock must therefore


be use only to have privacy, but not to provide a
degree of security
Disc Tumbler Locks. Designed for the
use of the automobile industry and
are in general use in car doors today
Lever Locks. Are difficult to define in
term of security, since they vary
greatly in their effectiveness
 Combination Locks. Are difficult to
defeat, since they cannot be picked by
few experts can so manipulate the
device as to discover the combination
Code-Operated Lock. Are the
combination type locks in that no key
are used. They are open by pressing a
series of numbered buttons in the
proper sequence.
 Electromagnetic Locks. Are the device
holding a door closed by magnetism.
Card-Operated Locks. Are electrical
or, more usually, electromagnetic.
Coded card either notched, embossed
or containing an embedded pattern of
copper flocks are used to operate
such locks
Types of Key

 Change Key. A key to a single lock within a


master keyed system.
 Sub-Master Key. A key that will open all the
lock within a particular area or grouping in a
given facility.
 Master Key. A special key capable of opening a
series of locks
 Grand Master Key. A key that will open
everything in a system involving two or more
master key groups.
Basic Security Concepts:
Protective Safes & Vaults
 Definition of Safe
 Metallic container used primarily for
safekeeping of documents and small items
 Usually 750lbs in weight or anchored to the
building floor or embedded in a concrete
wall if lighter than 750lbs
 Sidewalls are at least 1 inch thick
 Door is 1 ½ inch thick
 Usually fireproof for at least 2 to 3 hours
Basic Security Concepts:
Protective Safes & Vaults
 Definition of Vault
 Heavy structure of reinforced concrete and
steel at least 12 inches thick and fire
resistant storage facility for valuable
documents, large amount of monies,
jewelries, etc.
 Resistant to moisture and condensation
Basic Security Concepts: File
Room
 Definition of File Room
 Constructed of lighter materials than a
vault but larger in capacity
 Usually fire proof for at least 1 hour
 Stores only important documents
Basic Security Concepts:
Security Hazards
 Human Hazards – an act or condition
caused by humans which affects the
safe operation of a facility. This include
sabotage, theft, pilferage and espionage
 Natural Hazards – caused by natural
phenomena which results in damage,
disturbance and problems of the normal
functions. These includes floods, fires,
earthquakes, lightning storms, typhoons
and volcanic eruptions
Basic Security Concepts:
Degree of Risks to Security
 Factors which determines the degree or
risks to security
 Relative criticality of operation – refers to
the importance of the establishment with
reference to the national economy and
security
 Relative vulnerability – refers to the
susceptibility of a plant or establishment to
damage, loss or operations due to various
hazards
Basic Security Concepts:
Degree of Risks to Security
 Other factors considered for protection of
plants or installation
 Location or size of an installation
 Number and general characteristics of the
personnel
 Kinds of products
 Cost of security protection
Basic Security Concepts:
Personnel Security Investigation
 Definition of Personnel Security
Investigation
 Security measures designed to prevent
unsuitable individuals or persons of
doubtful loyalty and character from being
lawfully employed by a company or
institution
Basic Security Concepts:
Personnel Security Investigation
 Types of Background Investigation
 Partial Background Investigation – Involves
superficial investigation of a persons
character or personal history, often
relaying on documents submitted by the
person under investigation
 Complete Background Investigation –
Involves verification of a person’s personal
history and character, often by conducting
interviews, document authentication, etc.
Basic Security Concepts:
Personnel Security Investigation
 Documents often subject for verification
 Birth certificate
 Baptismal and church records
 School records
 Employment records
 Military or police service records
 Credit records
 Character references
 Social organizations
 Others
Factors to Consider in the
Conduct of a BI
1. Loyalty. Faithful allegiance to the
Philippine Government and its duly
constituted authorities.
2. Integrity. Uprightness in character,
soundness of moral principle, freedom
from moral delinquencies
3. Discretion. The ability or tendency to
act or decide with prudence, the habit
of wise judgment
4. Morals. Distinctive identifying qualities
which serve as an index to the
essential or intrinsic nature of a person
5. Character. The sum of traits that have
been impressed by nature, education
and habit upon the individual
6. Reputation. Opinion or estimation in
which one is generally held. It is what a
person is reported to be whereas
character is what a person is
Pass or Badge System

1. Single Pass System. Wherein the badge or


pass coded for authorization to enter specific
areas is issued to an employees who keeps it
in his possession until authorization is charge
or until he terminates
2. Pass Exchange System. Which he exchange
one –color coded pass at the entrance to the
controlled area for another which carries a
different color specifying the limitations of his
authorization.
3. Multiple Pass System. Which
provides an extra measures of
security by requiring that an
exchange take place at the
entrance to each restricted area
within the controlled area
Types of Control Area

 Controlled Area. Are those area access


is restricted as to entrance or movement
by all but authorized personnel and
vehicles.
 Limited Area. Are those within the
controlled area where a greater degree
of security is required.
 Exclusion Area. Are used only for
handling and storage of high value cargo
and classified documents.
Types of Documents

 Class I- Vital Document. In this category


are records that are irreplaceable,
records of which reproduction does not
have the same value as the original
records needed to recover.
 Class II- Important Documents. This
include records the reproduction of
which will close considerable expense
and the labor considerable delay.
 Class III-Useful Documents. This include
records whose loss might cause inconvenience
but could be readily replace and which would
not in the meantime present an insurmountable
obstacle to the prompt restoration of the
business
 Class IV-Non-essential Documents. These
records are duly files, routine in nature even if
lost or destroyed, will not effect operation or
administration
Security Ranks, Positions and
Staffing Pattern
a. Security Management Staff.
1. Security Director (SD)-Agency
manager/chief security officer
2. Security Executive Director (SED)-Asst.
agency manager/asst. chief security
officer;
3. Security Staff Director (SSD)-Staff
director for operation and staff director
for administration.
b. Line leadership Staff.
1. Security supervisor 3- Detachment
Commandants
2. Security Supervisor 2- Chief Inspector
3. Security Supervisor 1- Inspector
c. Security Guard
1. Security Guard 1 – Watchman/guard
2. Security Guard 2 – Shift-in-charge
3. Security Guard 3 – Post – in - Charge
Security Consultant. Is optional
but must possess all
qualifications listed in sec. Rule
III of Rules and Regulations,
implementing R.A. 5487
Staffing Pattern

a. The agency manager is automatically the


Chief security director who shall be
responsible for the entire operation and
administration/management of the security
survey. He is directly responsible to the
agency operator/owner/board of Directors.
b. The assistant agency manager. Is
automatically the security executive director,
assist the agency security director and take
the operational and administrative
management when the manager is absent.
c. The Staff Director for Operation. Is the
staff assistant of the security manager
for the efficient operation of the agency.
This position includes the responsibility
to canvass clientele and the
implementation of the contract and
agreement. He is also responsible for
the conduct of investigation and the
conduct of training.
d. The Staff Director for Admin. Is the staff
assistant of the agency manager for the
effective and efficient administration
and management of the agency. He is
responsible for the professionalization
of the personal,
procurement/recruitment, confirming of
awards, mobility and issuance of Fas.
e. The Detachment Commander. Is the
field or area commander of the agency.
f. The Chief Inspector. It shall be
responsible for inspecting the entire
area covered by the detachment.
g. Security Inspector. Is responsible for
the area assigned by the chief
Inspector of the Detachment
Commander
h. Post –in-charge. Is responsible for the
entire detailed security office within a
certain shift for a particular period
i. Shift –in-charge. Is responsible for the
security officer who are scheduled in a
certain shift for a particular period
ii. Security Guard. Is the one actually
posted as watchman and or guard or
as defined in sec. 1b, Rule 1 of these
Rules and Regulations.
Function of Management

1. Planning. Is the work of manager to anticipate


a course of action
a. Forecasting
b. Establishing Objectives
c. Programming
d. Schedule
e. Budgeting
f. Administering Policies
g. Establishing Procedure
2. Leading. Is the work a manager
performs to effect active participation
from his subordinates.
a. Decision making
b. Motivating
c. Communicating
d. Selecting people
e. Developing People
3. Organizing. Is the work a manager
performs by arranging the work and the
workers so as to produce an effective
and efficient performance.
a. Developing organization structure
b. Delegating
c. Establishing relationship
4. Controlling. Is the work a manager
perform to assess and regulate work in
progress and to assess the results.
a. Establishing performance standard
b. Performance measuring
c. Performance evaluating
d. Performance correcting
SECURITY PLANNING

Is a corporate and an executive


responsibility
Content of Security Plan

1. Situation. This part of security plan will


explain the historical background of the
organization of it’s security picture.
2. Mission. This part of security plan will
cover what the plan is all about and
what it intends to do.
3. Execution. In this part of the plan, the
concept of the project will be outlined
and explained.
4. Administrative and Logistic. This plan
involves the listing of security
equipment, like intrusion alarms, fire
alarms, automatics fire extinguisher,
flashlights, and other aids.
5. Command and Signal. This pertains to
the channels of communication needed
when implementing the project until in
full operation.
SECURITY SURVEY

 Is a critical on site examination and


analysis of an industrial plant, business,
home, or public or private institution
done to ascertain the facility’s current
security status, to identify deficiencies or
excesses in current practices, to
determine what protection needed and to
make recommendation for improving the
overall level of security at that location.
Purpose of Security Survey

1. To determine existing state of


security
2. To locate weaknesses in defense
3. T determine degree of protection
required
4. To produce recommendations
establishing a total security
program
Objective of Security Survey

1. To determine existing vulnerabilities to


injury, death, damage or destruction by
natural causes.
2. To determine existing vulnerabilities of
corporate assets due to outside
criminal activity.
3. To determine existing vulnerabilities of
corporate assets due to criminal activity
within the organizations.
4. To determine the existing
conditions of physical security of
corporate property
5. To measure compliance of
employees to security rules.
6. To conduct internal audit to
determine fraud.
Security Survey Sequence of
Action
1. Examine and analyze the site and the
organization. This may be done by
proprietary ( in-house) personnel or by
security consultant.
2. Ascertain the organization’s current
security status. One purpose of the
survey is to collect information on the
organization’s current policies,
procedures and technology and verify
that they are being implemented.
3. Determine the level of protection
needed. Because the survey is an
evaluation of the organization’s current
defenses and will be used to develop
future plan, it must be done thoroughly
and systematically.
4. Make recommendation. The security
survey finding should include practical
cost effective measures that raise the
overall level of protection.
SECURITY PLANNING AND
SURVEY
1. Verify the need.
2. Obtain organizational support
3. State the survey’s objectives
4. Determine how data will be gathered.
5. Develop alternatives
6. Prepare a schedule of activities
7. Implement the plan
SECURITY INSPECTION

 Is an important part of security


management process which insure
that risks are recognized and
covered in security programs and
that programs are necessary and
cost-effective.
TYPES OF SECURITY
INSPECTION
Continuous Inspection. To keep
pace with constant changes in
the organization, changes in
our security in term of attitudes,
life-style and moral values.
 Formal Inspections. Is one to which
some fanfare is attached, it is usually
preceded by an announcement.
 Informal Inspections. Are usually the
result of a long and firmly entrenched
inspection program, understood by all
and accepted as part of the
organizational life.
 Structural Inspection. As opposed to an
unstructured inspection, is one that
moves systematically, perhaps even
rigidly, from one designated inspection
point to the next.
 Unstructured Inspections. In contrast,
would approach the warehouse unit in a
more random manner, with less
methodical attention to small specifics.
SECURITY EDUCATION
PROGRAM
Is to acquaint all the employees
the rationale behind the security
measures and to insure their
cooperation at all times.
OBJECTIVE OF SECURITY
EDUCATION PROGRAM
1. Guidance for all supervisory and executive
levels of the organization
2. A mandatory indoctrination on security for all
new personnel before their assignment to their
respective jobs.
3. Development of a high degree of security
consciousness among the selected
supervisors and other key personnel in a
program that should be continuing and
supported by top management.
4. A down the line security program aimed
at instilling consciousness and
dedication through demonstrations
lecturers motivation and suggestions.
5. To let all the employee force be
informed that they all belong the
organization and that non awareness
and non concern to the security
program is tantamount to disloyalty
Seven phase of Security
Education
1. Initial interview.
a. It must leave an impression on the
individual of the seriousness of security
b. Should stress the importance of the
security of the company and to the
individual
c. To explain to the individual the
penalties that could result from
violations of security regulations.
2. Training Conference.
a. The training conference should be held
during the initial processing or training
period.
b. The conference should last from two to
four hours depending upon the
complexities of the security
requirements pertaining to particular
positions.
3. Refresher Conference.
a. It reminds individuals of their
responsibilities.
b. It can be used as a forum to resolve
problems that have arisen in the since
the last conference
c. To explain new regulations, changes in
regulations and new requirement that
may have been levied by the company
4. Security Reminder.
a. Use of stickers, slogans and symbols
on pencils, coffee cups, napkins and
telephone. There are certain rules to
consider in the use of poster.
b. Poster should be placed at points of
observation such as entrances and
exits, cafeteria, passageways and
bulletin board.
5. Security Promotion. One of these is
personal recognition. If the company
will take the time and effort to select
and recognize officially a person in the
security field or any individual who has
done an effective security job.
6. Special Interview.
a. He should recognize and make on the
spot corrections of faulty or careless
security practice.
b. He should set the example in
sound security practices and
procedures.
c. He should exhibit a healthy
attitude toward security and not
prejudice his subordinates with its
something we are required to do
attitude.
7. Security Training. Is an
educational, information, skill
development process that
brings about anticipated
performance through a change
in comprehensive and behavior.
Types of Security Training
Program
1. General Seminar
2. Interrogation Workshop
3. Testifying in Court seminar
4. Report Writing Workshop
5. Supervisory Training
Subject or area of study that must
be given during the training
1. Public Relation. Almost always the first
contact of the public during office hours
or off hours.
2. Courteous and Discipline. A guard
does not interact with his fellow guards
and immediate supervisors only but
also with top managers, customers,
clients and the public in general.
3. First Aid. The guards with equip the
basic know-how on how to respond to
an emergency situation.
4. Report Writing. The guard is required
to submit report in writing by his
immediate superiors and/or clients.
Reports are considered documentary
evidence.
5. Crises Management. The guards must
be trained to handle and respond
effectively to any crises situation
whether natural or man made.
6. Proper Maintenance and Law Full Use
of Firearms. The guard should be
taught and trained on how when and
why to shoot with gun.
7. The Law on Arrest, Searches,
seizures, Evidence and Strike.
8. Crime Against Persons and
Property.
9. Installation Security.
10.Pertinent Provisions of 1987
Constitution.
TYPES OF HUMAN HAZARD

1. Human carelessness
2. Accidents
3. Disaffection
4. Disloyalty
5. Subversion
6. Sabotage
7. Espionage
8. Pilferage
9. Theft
10. Vandalism
PILFERAGE

Is one of the most annoying


and common human hazards
which security has no deal with.
This activity it uncontrolled can
become a financial drain if not a
menace to smooth and orderly
operation.
TYPES OF PILFERER

1. Casual Pilferer. Is one who steals due


to his inability to resist the unexpected
opportunity and has little fear by
detection.
2. Systematic Pilferer. Is one who steals
with pre convinced plan and take away
any or all types of items or supplies for
economic gain.
TYPES OF HAZARDS

1. NATURAL HAZARDS
2. MAN-MADE OR HUMAN HAZARDS
TYPES OF NATURAL
HAZARDS
1. Flood cause by typhoons and
continuous rains.
2. Earthquakes
3. Fire
4. Storms ( typhoon, cyclone, tornado &
hurricane)
5. Volcanic
6. Lightning storms
7. Extreme temperature and humidity
Anatomy of Pilferage

Items become more vulnerable


when they are transferred from
one place to another.
Basic Security Concepts: VIP Security
VIP Security- a person of great importance or
influence, especially a dignitary who commands
special treatment
 Also referred to as Personal Security
 Utilized in the protection of ranking officials, foreign
dignitaries and prominent private individuals from
harm, kidnapping and other types of threats.
Basic Security Concepts: VIP
Security:
1. Close in security – Refers to the
protective detail that provides close
physical security to the principal
2. Effectiveness – Refers to the desired
outcome due to decisive and
measurable result
3. Principal – Refers to the person which
is being protected and secured
Basic Security Concepts: VIP
Security
4. Perimeter Security – The working
protective detail that involves placement
of security personnel, alarms,
barricades and other means to provide
better physical protection, surveillance
and intelligence for the benefit of the
principal
Basic Security Concepts: VIP
Security
5. Protective Security – An individual or
a group assigned to protect a
principal
6. Threat – Harassment or intimidation
specifically targeting the principal
Basic Security Concepts: VIP
Security
 Components of VIP Vehicle Convoy
1. Escort vehicles – usually positioned at
the front portion of the convoy
2. Counter attack/Recon Vehicle – always
fronting the principal vehicle to neutralize
any possible threat
3. Decoy vehicle – identical vehicle meant
to confuse would be assassins
4. Shield vehicle – shields principals vehicle
Basic Security Concepts: VIP
Security
 Measures for securing VIPs
1. Avoid patterns and routines
2. Plan vehicle routes in advance. Study
the terrain to and fro
3. Always travel in convoy
4. Avoid heavily congested roads or
thoroughfares
5. Always drive near the center lane of a
highway or road
Basic Security Concepts: VIP
Security
6. Avoid high profile vehicles which could
give away the identity of the VIP
7. Be alert for surveillance
8. Never discuss details of your travel
plans within hearing range of non
security personnel
Basic Security Concepts: VIP
Security
 Security Measures for the Office
1. Do not place desk near windows or
stand near windows that are not bullet
proof or have blinds
2. Vary routes going within the building
3. Utilize package control and inspection
measures
Basic Security Concepts: VIP
Security
4. Conduct thorough background checks
of all employees
5. Be discreet in conversing publicly
regarding your plans within hearing of
persons with doubtful loyalty
Basic Security Concepts: VIP
Security
 Security Measures for Home and
Family
1. Consider security of the immediate
vicinity of your home
2. Make your residence burglar proof
3. Be wary of telephone lines, it maybe
tapped
4. Instruct household help regarding basic
security precautions
Basic Security Concepts: VIP
Security
5. Do not entertain people wanting to
photograph you, your family and your
home
6. Ensure family members have escorts
when leaving the premises
7. Background check all household help
8. Do not let in strangers without verification
of his/her identity
9. Do not hand out business cards
Identify the Role of VIP Protector

 Before we can begin to protect people


from assassination we can have to have
basic understanding about why people
carry out an assassination and what
general methods have been used in the
past
Cause of Assassinations and Methods of Attacked

1. Revolutionary or Political Cases


A. Groups or individuals fanatical in their
desire to change the existing
government often resort to
assassination to accomplish their goals.
B. The targeted individual represent the
government which the assassin believes
is the cause of repression, unfairness,
persecution, etc. The assassin hopes to
overthrow the existing government by
eliminating its representative.
2. Economic Causes – Motivated by the
belief that the victim is responsible for
poor economic conditions affecting a
nation, group of people, or assassin
directly.

3. Ideological Causes
A. When the assassin is convinced that
the victim is endangering principles that
the assassin believes to be the
paramount importance.
B. Ideological causes of assassination can
stem from religious and social beliefs.
The assassin hopes to change the
existing system by eliminating key
figures in the religious or the social
system or they may wish to draw
attention to his or her group through the
use of terror.

4. Personal Causes – Motivated revenge,


jealousy, hate, rage, or other strictly
personal drive.
5. Psychological Causes
A. Mental Derangement, fanaticism or
emotional instability are factors in most, it
not all, actual attacks.
B. Trigger Men almost always exhibit
psychological problems even if the real
reasons for the assassination are
revolutionary, economic, etc.
C. It is not at all unusual to find more than
one cause of assassination. Psychological
causes, however, are the most common.
Throughout history almost every nation of the
world has experienced an assassination or an
attempted assassination directed against its VIP
or leaders.
Examples:

1. President John F. Kennedy


(Assassinated)
2. Prime Minister Thatcher (Attempted)
3. Pope John Paul II (Attempted)
4. Prime Minister Olaf Palme of Sweden
(Assassinated)
5. President Ronald Reagan (Attempted)
6. President Pinochet of Chile (Attempted)
7. Imelda Marcos (Attempted)
8. President Anwar Sadat of Egypt
(Assassinated)
9. President elect Bashir Gemayel of
Lebanon (Assassinated)
10. President Zia of Pakistan
(Assassinated)
11. President Park of Korea (Attempted)
and the last one is Q.
12. FORMER SENATOR of the Philippines
in August 1983 (Assassinated)

Attack Methods and Weapons Utilized for


Assassination

1. Weapons at Close Range


2. Weapons at Distance
3. Explosives
4. Kidnapping
Threat Analysis and Reactions

 Is the process of conducting an exhaustive


physical examination and thorough inspection
of all operational system and procedures of a
facility for the following purposes;
1. To determine existing state of security
2. To locate weaknesses in defenses
3. To determine degree of protection required
4. To produce recommendation establishing a
total security program
Who should conduct a security
Analysis
1. Staff security personnel or
2. Qualified security specialist (
Both of whom should have had
training in the field )
C. No checklist exists that could
be universally applied for
survey purposes as no two
facilities are alike
D. A security measure is
known by a number of different
terms

1. Risk analysis
2. Risk assessment
E. Key steps in a risk
assessment process
1. To determine value, impact and cost of
any asset should it be lost due to
natural or man-made forces
2. To determine the degree of vulnerability
of the facility to damage ort attack by
natural or man-made forces
3. To determine the degree of probability
that natural or man-made forces will
strike at any given facility.
F. The vulnerability of a facility to
damage or attack may be
determined by a number of ways;
1. An inspection of the facility by the
experienced inspector.
2. Examination of the facility’s record of
losses
3. A determination whether the high-value
property or items are properly
safeguarded from theft by insiders.
G. Security surveys as a general
rule cover one or more the
following objectives
1. To determine existing vulnerabilities to
injury, death, damage or destruction by
natural causes.
2. To determine existing vulnerabilities of
corporate assets due to outside
criminal activity
3. To determine existing vulnerabilities of
corporate assets due to criminal activity
within organization
4. To determine existing conditions of
physical security of corporate property
5. To measure effectiveness of current
security police.
6. To measure compliance of employees
to security rules
7. To conduct internal audit to determine
fraud
8. To inspect overall condition
within facility which cause
security problem
9. To investigate environmental
conditions in the community
from a standpoint of interaction
within the facility
H. There is a similarity between physical
security surveys and crime prevention,
but one of the differences is that physical
security measures are oriented more
toward the security property and facility
whereas crime prevention measures
focus on the deterrence of criminal
activity regardless of the physical
safeguards available.
I. Some key points relative to
conducting a security survey are;
1. Written authority to conduct the survey
should be obtained
2. Any previous surveys should be
reviewed
3. An orientation tour should be made
4. Photographs should be taken of objects
or situations that are difficult to
described
5. There should be a review with
local plant supervisors of all
deficiencies noted during survey
so immediate corrective action can
be taken
6. Follow-up survey should be
conducted to ascertain if
deficiencies have been corrected
7. A cost benefit analysis is a direct
comparison of the costs of the
operation of the security unit and all
security measures with the amount of
corporate property saved or recovered
as well as reduction of losses caused
by injuries and lost production time.
8. No security measure should be
recommended which is not cost-
effective
Security Survey Report Format

 TO
 FROM
 SUBJECT
A. INSTRUCTION

1. Authority for the survey


2. Date and Times was made
3. Survey Personnel
4. Escort
B. Name and Mission of
Installation/activity
1. Description of Surveyed Unit ( Use map
showing the installation)
2. Mission ( purpose of installation, its
functions, major activities, products
manufactured/stored and other factors
affecting security
3. Relationship with other Higher
Organization
C. Physical Security

1. Perimeter Barrier
a. Situation ( List down the security
deficiencies noted)
b. Recommendation ( For each situation,
give the corresponding security
measure
2. Guard Force and Guard System
a. Situation
b. Recommendation
3. Personnel Identification and Movement
Control
a. Situation
b. Recommendation
4. Protective Light
a. Situation
b. Recommendation
5. Alarms and Communication System
a. Situation
b. Recommendation
6. Restricted Areas
a. Situation
b. Recommendation
7. Storage Security
a. Situation
b. Recommendation
8. Utilities
a. Situation
b. Recommendation
9. Emergency Plan
10. Situation
11. Recommendation
D. Personnel Security
1. Data Concerning Key Personnel
2. Clearance Program
a. Situation
b. Recommendation
3. Security Program
a. Situation
b. Recommendation
4. Morale of Employees
a. Situation
b. Recommendation
5. Absentee rate and Labor Turnover
a. Situation
b. Recommendation
E. Document and information
security
1. Rules and regulations to safeguard
Classified Matters
a. Situation
b. Recommendation
2. The key function of the personnel
security
a. Situation
b. Recommendation
Questions?
TO PASS THE INDUSTRIAL SECURITY
WITH FLYING COLORS!
Good day and
God bless!

You might also like