Orca Share Media1681190250194 7051422991153764960
Orca Share Media1681190250194 7051422991153764960
___________________________________________________
LEARNING MODULE
FOR
_____________________________________________________
WEEK 1
COURSE OUTLINE
Each chapter in this module contains a major lesson involving the history and
development of Industrial Security Concept, And the importance of security management in
the field of Law Enforcement. The units are characterized by continuity, and are arranged in
such a manner that the present unit is related to the next unit. For this reason, you are
advised to read this module. After each unit, there are exercises to be given. Submission of
task given will be every Monday during your scheduled class hour.
GETTING STARTED:
(Week 1)
Specific Objectives
At the end of the topic the student must be able to understand the following:
INTRODUCTION
Security today covers different fields, business or industry; it may include the
World security, Nations security or even Human security. Security as a topic and
subject is global, national, and local in nature and scope. This is because the principle
Security is defined operationally as safety from harm or danger, a term that has
different dimensions in psychology, public safety, defense and military matters, and
information access.
predictable environment which an individual or group may pursue its ends without
disruption or harm, and without fear of such disturbance or injury. The concept of
Throughout the year’s men started practicing the utilization of workers and
equipment in order to protect his well-being and property. Thus, the civilized man
adopts security measures to have adequate protection against unsecured and unsafe
conditions. This probably led to the establishment of the "police' an institution today
The incredible growth of the security industry in the Philippines now a day is
evident. Most companies are using guard forces, protective barriers, communication
and electronic hardware and other state-of-the art protection methods and techniques
in their asset protection. However, every installation cannot escape the emerging
complicated security problems like the deteriorating peace and tranquility, the threat
of terrorism and the social conditions of the community. A determine intruder can
sneak in the properties of another while the owner is asleep out on a trip or anytime of
the day and divest all valuable items which he can find. The incidents of fire and other
WHAT IS SECURITY?
Security is a state or quality, condition of being secured, freedom from fear, harm,
work involves active and passive measures so that effective defense can be
Active measures are the physical barriers, security lighting use of vaults, locks
and others. Passive measures are those that will dates man from committing such
acts for fear of being caught, charged in court, or get dismissed; Security education
Basically, it was the action of man against man that led to many unsecured and
unsafe conditions. Reason could be economic, revenge, or just plain greed and
avarice. Whatever is the motive, the civilized man needs adequate protection.
always a primordial Interest. Security exists to prevent or avert any loss or damage to
properties, loss of life and limbs and to some extent, the prevention of crime. If
something happens and we were not able to prevent the happening, this is simply
SECURITY MOTTO
The security motto is "Vigilatut Quiescant" meaning "He watches that they
may sleep". The essence of this motto still holds true today and could be considered
an international motto not only for the police but also for security guards. The local
motto being observed today by security guards and personnel is "observe and report"
because it’s part of their basic function to report to the authorities or management any
primary reason of the existence of a security forces in the industrial business and all
other functions are inherent in order to attain its existence in the business. The
importance of security is the preventive and the proactive mindset. Everyone must be
The following are international security principles which are very important in
security management. The discussion and explanation are found in the different
TARGET HARDENING
CRIME PROOFING
COURTEOUS DETERRENT
universal in the sense that the application is applicable to the different industry, fields,
system, and business. The following are the basic principles of security management.
1. Security is everybody's concern.
11. Good security must start from the too with executives who help create
15. Harm or danger may come from outside or inside of the facility.
“Many security holes exist because people “Temporarily” adopt insecure practices,
and then forget to close the security hole. As long as people tolerate security botches,
Anonymous
2. Constitutional authority
3. Statutory authority
Liberty and security and property have bearing on the security and protection
amended the Sec.3 (d) which defines Watchman or Security Guard, Watchman
agency and the Sec. 18 of the penal provision of Republic Act No. 5487.
100)
F. Republic Act No. 6975 (DILG LAW)- this is the law authorizing the PNP the
The following are the different factors why security personnel in the industry
have to plan and prepare. The different terminology stated are the challenges that the
security industry has to face today. It is because of threat, hazard, risk and
vulnerabilities that create the existence of security management in the business or
industry.
To address the different stages of events and conditions the risk might bring
about, the guard has specific functions to perform. The functions of the security are
resources.
3. Investigative Functions. These functions are performed with the following
objectives:
loss.
To identify the person responsible and liable for the event and subsequent
event.
Crime prevention is using instinct, common sense, and action to eliminate or greatly
“The value of security is better measured by what does not happen that by what does”
-Sennewald
Progress Check (Exercises 1)
Specific Objectives
At the end of the topic the student must be able to understand the following:
OPPORTUNITY
DESIRE
ABILITY
prevention you have no control over the first two elements because it
remains in the imagination of the person with interest. However, you can
Reactive measures will come into play to point out what was wrong? What
was the problem? Identify the criminal and solve the crime.
TYPES OF CONTROL
running the business and managing people. They inform people on how the
detection systems. Access control lists, and data encryption and logical
control.
3. Physical controls monitor and control the environment of the work place
and computing facilities. They also monitor and control access to and from
such facilities.
(e.g. doors, locks, heating and air conditioning, smoke and fire alarms, fire
locks, etc.)
ACCESS CONTROL
bank teller he is Dr. Peckley (a claim of identity). The bank teller asks
to see a photo ID, so he hands the teller his driver's license. The bank
teller checks the license to make sure it has Dr. Peckley printed on it
claiming to be Dr. Peckley. If the photo and name match the person,
then the teller has authenticated that Dr. Peckley is who he claimed to
be.
includes palm prints, finger prints, voice prints, and retina (eye) scans.
Strong authentication requires providing information from two of the
something you know plus something you have. This is called two
factor authentications.
they are permitted to access and what actions they will be allowed to
Authorization.
The above stated concept is better known as IAA (Identify-
same.
In the field of security, there are only three areas covering the different
INFORMATION
SECURITY
FIGURE 1
Page 1 of 153
TYPES OF SECURITY
1. Hotel Security - A type of security applied to hotels where its properties are
protected from pilferage, loss, damage and the function in the hotel
restaurants are not disturbed and troubled by outsiders or the guest
themselves. This type of security employs house detectives, uniforms guard
and supervisor and insures that hotel guests and their personal effects
safeguarded.
2. Bank Security - This type of security is concern with bank operations. Its
main objective is the protection of bank cash and assets, its personnel and
clientele. Security personnel are trained to safeguard bank and assets while
in storage, in transit and during transactions.
Page 2 of 153
Progress Check (Exercises 2)
ESSAY: Discuss in your own words (COPY ANS ASNWER) 10 points Each
Page 3 of 153
(WEEK 3)
Specific Objectives
At the end of the topic the student must be able to understand the following:
(Guarding)
1. PATROLLING
Page 4 of 153
a. Critical Point (CP). Critical Point is a resource whose lose or damage is
detrimental to the organization. It is also a condition which can provide
opportunity for risks to occur.
b. Area Control Point (ACP). Area Control Point is a point in the AOR where
the guard can have a maximum sensory coverage and reasonable physical
control of the situation.
c. Fixed Area Control Point (FACP). Is a set point on a particular location in
the area of responsibility, from where the guard shall record his location at a
particular time?
d. Transient Area Control Point (TACP) is the actual location of the guard
while on patrol.
e. Control Area (CA). It is the area surrounding the TACP. Experiments
conducted show that a guard can be physically effective within a radius of 50
meters without obstruction. This area is also called area of liability because it
is the area where a guard can control a subject within his capability.
2. RECORDING
The two basic types of security records are reports and logbooks.
Examples of these are the unusual incident report and the investigation report.
Reports are also used to summarize routine operational activities within a specific
period of time. Examples are the daily operations Report and the Weekly Summary
Report.
Operations Journal is used to record all the guard activities and observation during
his tour of duty. It is used to record the general compliance of the guard to the
Page 5 of 153
performance of the all other functions.
1. VISITOR CONTROL
Access control is the process of preventing the intrusion of critical spaces and
areas within the facility by unauthorized persons.
"Not until just before dawn do people sleep best; not until people get old do they
become wise".
Chinese proverb
Page 6 of 153
CHAPTER 2
R.A.No.5487
On June 01, 1969, R.A. No. 5487 (which was approved and promulgated on
June 13, 1969) otherwise known as "Private Security Agency Law" was enacted
making the Philippine constabulary (PC) as the sole authority to supervise all Private
Security Agencies, Company Guard Forces, and their Security Guards through the
sponsorship in congress by Cong. Toulon Natividad. The purpose of this Act is to
govern the organization and management of the foregoing forces. Later, the control
of Guard Forces was removed from the Philippine constabulary and was transferred
to the National Intelligence and Security Agency (NISA) now NICA (National
Intelligence Coordinating Agency). Since then, several Presidential Decrees (P D.'s)
were issued amending certain portions R.A. No. 5487 such as P.D. No. 1 1 issued
on October 30, 1972, amending certain sections of R.A. No. 5487 particularly
Section 4, who may organize a security and watchman agency; P.D. No. 100 on
January 17, 1973, further amending Sections 3, 4, 5, 8 and 9 hereof which provide
for the improvement of Philippine Constabulary now Philippine National Police (PNP)
to deputize any private detectives, watchman or security guard to assist the PC in
cases of emergency disaster or calamity; Section 1 1 which prescribed the minimum
membership requirements for any Private Detectives, Watchman or Security Agency
to be granted license to operate and its Implementing Rules and Regulations which
further amended R.A. No. 5487 and P.D. No 1 1 and 100.
The 2003 Revised Rules and Regulations implementing Republic Act No. 5487 (As
amended)
Page 7 of 153
Pursuant to section 17 of RA No.5487, as amended Section 24, 25 and 26 of
Executive No.262, and in consultation with the Philippine Association of Detective
and Protective Agency Operators, Incorporated (PADPAO), these are revised rules
and regulations governing the Organization and operation of private security
agencies, company security forces and government security units. Scope includes
originally promulgated rules and newly introduced rules and regulation designed to
professionalized the security industry. Substantial revision are made and introduced
due to the professionalization process that PNP has envision for our Private security
industry in order to make the security business a more credible and reliable sector of
our community.
R.A. NO. 5487 — The act that regulates the organization and operation of private
detective, watchman and security guard agencies in the Philippines. This act was
approved on June 13, 1969. It is otherwise known as "The Private Security Agency
Law" has been amended by P.D. no. 100 dated January 17, 1973.
PNPSAGSD - This is the unit under the Philippines National Police which is charged
with the supervision, direction and control of all security agencies in the Philippines.
Page 8 of 153
watchman, security guard or private detective after payment of dues or fees.
Person — Shall include not only natural but also juridical persons such as single
proprietorship, corporations, companies or association, duly organized and
registered with the Security Exchange Commission and /or the Department of Trade
and Industry.
Private Security Service — Shall include the act of providing or rendering service
to watch an establishment whether public or private, building, compound/area or
property, to conduct access control/denial in any form whether physical, manually or
scientifically by electronic monitoring system, for the purpose of securing such
property and at the same time ensuring safety and protection of person within such
areas, to maintain peace and order with in such areas, to conduct private security
training and investigation.
Private Detective Service — Shall include among others the act of providing
personal security protection, inquiry and information gathering, pre-employment
verification and individual background profiling, providing assistance in civil liability
and personal injury cases, insurance claims, and fraud, child custody and protection
cases, for the purpose of assisting in gathering information leading to determination
and / or prevention of criminal acts and/or resolution of legal, financial and personal
problems, private Security Industry Shall cover those in the legal financial and
personal problems.
Private detective — Shall mean any person who does detective work for hire,
Page 9 of 153
reward or commission, other than members of the AFP, Guard of the Bureau of Jail
Management Penology, Municipal or city jail guards, and members of the PNP or of
any other Law Enforcement agency of the government.
Private Security Agency (PSA) -- Shall mean any person association, partnership,
firm or private corporation. who contracts, recruits, trains, furnishes or post any
security guard, to perform its functions or solicits individuals, businesses, firms, or
private, public or government-owned or controlled corporation to engage his/its
service or those of his/its security guards, for hire. commission or compensation thru
subscription or as consultant/trainer to any private or public corporation whose
business or transaction involve national security or interest like the 0Rration and/or
management of domestic or ocean vessels, airplanes, helicopters, seaports,
airports. landing strips etc., or as consultant on any security related matter. Or to
provide highly specialized security, detective and investigation services like gangway
security, catering security, passenger profiling, baggage examination, providing
security on board vessels or aircraft, or other security needs that PNPSAGSD may
approve.
Page 10 of 153
any private or public corporation or as consultant on any detective related matter, or
to provide highly specialized detective and investigation services, or other detective
needs that PNPSAGSD CSG may approve.
Company Guard Force (CGF) — A security force maintained and operated by any
private company/corporation utilizing any of its employees to watch, secure or guard
its business establishment premises, compound or properties.
PNP — As used herein mean the Philippine National Police, which was organized
pursuant to the provision of RA No.6975 otherwise known as DILG LAW.
SAGSD — As used herein shall refer to the current PNP Civil Security Group
Security Agency and Guard Supervision Division or any other PNP office that may
be designated later as the primary office for supervision of the implementation of
these rules and regulations.
Page 11 of 153
Duty Detail Order - Is a written order/schedule issued by a superior officer usually
the private security agency/branch manager or operation officers to security guard
and detective?
(WEEK 4)
Specific Objectives
At the end of the topic the student must be able to understand the following:
Page 12 of 153
C. New applicant for license to operate
Minimum capitalization of one million (1 with minimum bank deposit of five
hundred thousand (P500,00.00) pesos in order to stat its business.
D. Membership
No regular license shall be granted to any private security agency unless it
has minimum of two hundred (200) licensed private security personnel under its
employment. No regular license shall be granted to any company guard's force or
private detective agency unless it has a minimum of thirty (30) licensed private
security personnel under it employment. The maximum member of private security
personnel that a PSA/CGF/PDA may employ shall be one thousand (1000). The
Validity of all LTO is two (2) years.
E. Application of LTO
The application shall contain the full name of the applicant, his age, civil
status, his residents and location of business. New applicant — Applicant from NCR
may file their application for license to exercise profession with the personnel
licensing section, SAGSD, Civil Security group, Camp Crime, Quezon City.
Applicants from the province may file their application with the Firearms, Explosives,
Security Agencies and Guard Section (FESAGS). Regional Operation and Plan
Division (ROPD) of the Police Regional Office concerned
G. Payroll
Payroll shall be filed with the main office within fifteen (15) days after pay day.
H. Possession of Firearm
Ratio — One (1) firearm for every two (2) — (1:2) security guards in its
Page 13 of 153
employed. No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500
units.
a. The firearm first be registered with the FED before issuance and shall not
be used or transferred in places other than those specially authorized by the
Director, CSG.
Stocking of Ammunition
PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed
firearms Individual issue to each security guard shall be limited to one half of such
basic load or (25) rounds for every security guard.
1. Handgun
2. Shotgun
3. Riot gun of prescribed caliber
Page 14 of 153
1. Firearm
2. Handcuff
3. Nightstick
The security force of any installation must be organized in accordance with the
principles of responsibility and authority. Each personnel must be assigned to a
position which corresponds to his experience, skills, training and knowledge. This is
to carry out different functions efficiently and effectively and thus insures smooth flow
of the organization. The security positions may be classified into the following:
Page 15 of 153
d. He the overall head of both various staff departments and field units where he
may delegate corresponding authority commensurate to their assigned
responsibility.
e. He implements policies promulgated by the policy making body and executed
by the President.
f. He directs controls and supervises all offices and field units of the force in
their respective assigned tasks.
g. He performs other functions as directed by the President of the
Company/Corporation.
Page 16 of 153
a. Personnel Strengths
b. Replacement
c. Discipline, Law and order
d. Morale and Personnel Services
e. Personnel Procedures
f. Interior Management
g. Personnel Adviser
Page 17 of 153
f. Performs necessary program and fiscal administration.
g. Supervise all matters pertaining to supply.
h. Determine the allocation of service personnel.
i. Plan for maintenance and repair of equipment.
8. Office of the Inspectorate and Special Projects (Special Staff)
This office assists the General Manager in inquiring into, and reports upon natters
pertaining to the performance of the different staff, units, towards the attainment of
corporate objectives. It also inquires on the state of discipline, efficiency and
economy of the company. The Inspectorate Staff conducts inspections,
investigations and submits.
reports to the General Manager. In the Performance of its duties and functions, the
General Manager is provided relevant information pertaining to meritorious conduct
and performance of a unit or individual. This office is also tasked to conduct overt
and covert inspections and investigations and other related services.
Page 18 of 153
e. He conducts inspection of his units and institutes corrective measures on the
spot on those problems he may detect or brought to his attention. If not
possible, he brings the problem to the Security manager of the establishment.
11. Assistant Detachment Commander
Detachment with more than twenty (20) security personnel assigned may be
provided with an Assistant Detachment Commander who will be the principal
assistant of the Detachment Commander.
In the absence of the Detachment Commander, he performs
the duties of the Detachment Commander.
12. Shift-in-Charge
a. The Shift-ln-Charge shall be responsible to the Detachment Commander as
far as his shift is concerned.
b. He forms his men at least 30 minutes before posting time seeing to it that all
are in proper uniform and presentable.
c. He disseminates instructions coming from his Detachment Commander/OTC
or those relayed to him by his counter-part, the outgoing SIC.
d. He inspects the post as often as he can to ensure that his men are on the
alert and performing their duties effectively.
e. He performs other duties as may be directed by the Detachment Commander
or by the ADC.
13. SECURITY GUARD on DUTY/POST
a. The Security Guard (SG) on Duty/ Post must always carry his license to
practice his profession, Xerox copy of the firearm's license assigned to him,
and his duty detail order, authorizing him to carry his issued firearm within his
area of jurisdiction.
b. If the Security Guard is manning a fixed post especially entrance or exit
points, he must maintain a guard's logbook and enters in the same logbook all
events/passages of VIP's vehicles and inspections or visits of Security
Manager/Director of the Client/Firm.
c. Guard must observe and apply religiously the provisions of the Code of
Ethics, Code of Conduct, and the General Orders of the Security Guard when
on post.
Page 19 of 153
d. He may perform special task as may be directed by his shift supervisor, DC
and or ADC, like control of visitors, inspections of bags of person intrusion
coming of unauthorized in and going person out of in the establishment,
vehicle cargoes, or prevents the particular area, etc.
(WEEK 5&6)
Specific Objectives
At the end of the topic the student must be able to understand the following:
Page 20 of 153
As a Security Guard, my fundamental duty is to protect lives and properties
and maintained order within the vicinity or place of duty, protect the interest of my
employer and our clients and the security and stability of our government and
country without compromise and prejudice, honest in my action, words and
thoughts, and do my best to upholds the principles: MAKADIOS, MAKABAYAN
AT MAKATAO.
2. E thical Standard
As security guard/detective, his fundamental duty is to serve the
interest or mission of his agency in compliance with the contract entered into with
the clients or customers of the agency he is to serve thus,
1. 1. He shall be honest in thoughts and deeds both in his official actuation,
obeying the laws of the land and the regulations prescribed by his
agency and those establish by the company he is supposed to serve;
2. 2. He shall not reveal any confidential matter committed to him as a
security guard and such other matters imposed upon him by law;
3. 3. He shall act all times with decorum and shall not permit personal
feelings, prejudices and undue friendship to influence his actuation in the
performance of his official functions;
4. 4. He shall not compromise with criminal and other lawless elements to
the prejudice of the customers or clients and shall assist government
relentless drive against lawlessness and other forms of criminality;
5. 5. He shall carry out his assigned duties as required by law to the best of
his ability and shall safeguard life and property of the establishment he is
assigned to;
6. 6. He shall wear his uniform, badge, patches and insignia properly as a
symbol of public trust and confidence as an honest and trustworthy
security guard, watchman and private detective;
7. 7. He shall keep his allegiance first to the government he is assigned to
serve with loyalty and utmost dedication;
8. He shall diligently and progressively familiarize himself with the rules and
regulations lay down by his agency and those of eh customers or clients;
Page 21 of 153
9. He shall at all times be courteous, respectful and salute his superior
officers, government officials and officials of the establishment where he
is assigned and the company he is supposed to serve;
10. He shall report for duty always in proper uniform and neat in his
appearance and;
11. He shall learn at heart and strictly observe the laws and regulations
governing the use of firearm.
3. Code of Conduct
1. He shall carry with him at all times during his tour of duty his license
identification card and duty detail order with an authority to carry firearms;
2. He shall not use his license and privileges to the prejudice of the public, the
client or customer and his agency;
3. He shall not engage in any unnecessary conversation with anybody except in
the discharge of his work and shall at all times keep himself alert during his
tour of duty;
4. He shall not read newspapers, magazines, books, etc., while actually
performing his duties;
5. He shall not drink any intoxicating liquor immediately before and during his
tour of duty;
6. He shall know the location of eh alarm box near his post and sound the alarm
in case of fire or disorder;
7. He shall know how to operate any fire extinguishers at his post;
8. He shall know the location of the telephone and/or telephone number of the
police precincts as well as the telephone number of the fire stations in the
locality;
9. He shall immediately notify the police in case of any sign of disorder, strike,
riot or any serious violations of the law;
10. He or his group or guards shall not participate or integrate any disorder,
strike, riot or any serious violations of the law;
11. he shall assist the police in the preservation and maintenance of peace and
order and in the protection of life, property/ having in mind that the nature of
his responsibilities is similar to that of the latter;
Page 22 of 153
12. He shall familiarize himself with the Private Security Agency Law (R.A. 5487)
as amended, and the PNP SAGSD implementing rules and regulations;
13. When issued a pass he should not lend his pass to anybody;
14. He shall always in proper uniform and shall always carry with him his basic
requirements, and equipment such as writing notebook, ball pen, nightstick
(baton) and/or radio. He shall endeavor at all times to merit and be worthy of
the trust and confidence of the agency he represents and the client he serves.
4. General Order
1. To take charge of this post and all companies property in view and
protect/preserve the same with utmost diligence;
2. To walk during tour of duty in military manner, keeping always in the alert and
observing everything that takes place within sight or hearing;
3. To report all violations of orders I am instructed to enforce;
4. To repeat all calls from post more distant from the guardhouse where I am
station;
5. To quit my post only when properly relieved;
6. To receive, obey and pass out to the relieving guard all order from company
officers or officials, supervisors post in charge or shift leaders;
7. To talk to no one except in the line of duty;
8. To sound or call the alarm in case of fire or disorder;
9. To call the superior officer in any case not covered by instructions;
10. To salute all company officials, superiors in the agency, ranking public officials
and commission officers of the AFP and officers of the PNP;
11. To be especially watchful at night and during the time of challenging to
challenge all persons on or near my post and to allow no one to pass or loiter
without proper authority.
Page 23 of 153
2. Am I with stout heart, intense loyalty and complete dedication to surmount all
obstacles and challenges in the daily situation?
3. Is I FIT to perform my duty for the day?
4. Am I in possession of my National License?
5. Am I in proper, neat and clean uniform (polished insignias, belt buckles and
shoes) complete with night stick and/or firearms?
6. Am I presentable in appearance (regular haircut, shaved mustache and beard
and trimmed fingernails)?
7. Am I fully acquainted and well-versed with the duties and responsibilities of a
security guard?
8. Am I thoroughly oriented with the special orders for my post?
1. Don't sit, lean against a wall, stand like a "MATCH BOX", converse
unnecessarily with passer-by and/or acquaintances and smoke while on post.
2. Don't fraternized; be overly familiar with employees and personnel of the
office/entity where you are assigned in the performance of your guard duties
Remember; "familiarity Breeds Contempt".
3. Don't abandon giving the service and/or assistance to the customers of your
client entity, in order to attend to official/officials of the entity, who arrives while
you are still assisting the customers. Bear in mind that customers are very
important persons (VIP) and therefore they should be accorded preferential
treatment and consideration.
4. Don't display lack of keenness in and a feeling of responsibility for the job
assigned to you.
5. Don't forget that you are a cog in the wheel of progress of the entity you are
serving and that in the success of failure of that entity you are bound to have
your due share.
6. Don't let down your guard. Always be on the alert both in mind and body.
Page 24 of 153
1. Don't carry your firearm outside the premises of your place of work without a
mission order.
2. Don't assume that a gun is not loaded. A gun presumed unloaded can kill.
3. Don't load your gun unless you are ready to use it, or to told to do so, by
proper authority.
4. Don't insert your trigger finger or any finger in the trigger guard unless you are
ready to shoot.
5. Don't pull the slide of your pistol without removing its magazine.
6. Don't jerk your gun in any manner.
7. Don't point your gun to yourself or to anybody else unless you are ready to
shoot.
8. Don't peep at the muzzle of your gun unless you have separated the barrel
from the gun or removed away the drum from the barrel.
9. Don't play with your gun loaded or not loaded.
10. Don't tinker with your gun. Give it to an expert the moment you notice
anything wrong to it.
11. Don't forget that accidents don't just happen. They are caused by
carelessness or plain stupidity.
12. Don't allow your firearms to be dirty or rusty.
Page 25 of 153
9. Be alert to give service. What counts most in life is what we do for others.
Add to this a good sense of humor, a big dose of patience, and a dash of
humility and you will be rewarded many fold.
R.A. No. 5487 and its implementing rules and regulations prescribed the
minimum requirements for guard to be able to secure a license to exercise
profession as a security guard, private detective, security officers and security
consultant.
Page 26 of 153
No person shall be licensed as security officer unless he has the
following qualifications:
1. Filipino Citizen;
2. Holder of Baccalaureate Degree; 3. Physically and mentally fit; and
3. Has graduated from Security Officers Training Course or its equivalent.
1. Filipino Citizen
2. Physically and mentally fit
3. Holder of a baccalaureate degree preferably Bachelor of Law, BS
Criminology.
1. Graduate of a criminal Investigation Course offered by the PNP or the NBI or
any police training school, or detective training in any authorized/recognized
training center; and
2. Advance ROTC/CMT graduate or its equivalent.
Page 27 of 153
6. Self-control
7. Interest
8. Loyalty
9. Responsible and
10. Trustworthy
Page 28 of 153
2. Color of Uniforms
a. Private Security Agency — Navy blue (upper and lower)
b. Company Security Forces — Light blue/light gray for upper and navy blue for
lower.
c. Government Security Forces — White for upper and navy blue for lower.
"Security is protecting goods from dangerous people while; safety is protecting people from
dangerous people”.
Anonymous
(WEEK 7)
Page 29 of 153
Physical Security is defined as a system of barriers placed between the
property rights and assets. These measure consist of barriers and devices that
and active physical security barriers will differentiate the significant and importance
The type of access will depend on the number of variable factors and may
Page 30 of 153
The following specific reason are the basic principles why there is a need to
system that would provide guidelines on the initials steps to be taken in protecting
the facility. The concepts are called the 9D’s. These are presented according to the
concept.
1. Define –this is the initial step to be taken in order to determine what are to be
protected which includes the type of the facility, nature of business, type of
customers, materials, policies and its perceived threats and risk. In this area,
Page 31 of 153
deny or prevent surreptitious or non- surreptitious entry to the asset at risk.
5. Detect- this concerns to the ability of the system and personnel to detect
organization.
delay and/or verify the subject of the activity. Security personnel should be
understand the circumstances surrounding the incident. Its purpose is to: (1)
9. Defend- the final option is to protect the facility when the proceeding concepts
seen to be ineffective. In this aspect, the ability of the personnel to deal with
1. Minimum Security
may be in the form of simple intrusion or a serious armed attack. The Protective
objects, therefore, are simple physical barriers such as doors and windows with
ordinary locks.
Page 32 of 153
This system is designed to impede and detect some unauthorized activity that
threatens safety. This consists of physical barriers and basic alarms system that
will announce the threat. However, small business offices, stores or warehouse
3. Medium-Level Security
external and internal activities. The system should have the following
features:
monitored 24 hours.
4. High-Level Security
and internal activities. This system is composed of all the measures and devices
incorporated in the three (3) levels above- cited plus the following:
physical barriers.
Page 33 of 153
c) Security lighting equivalent to at least .02-foot candle of light around
ways radios with police linkages, cellular phones, duress alarms, etc.
assistance is needed.
and internal activities. This system consists of all previously- cited resource and
redundancy to allow the strength of one particular component to offset the weakness
Page 34 of 153
of another. As a general rule, the more layer, the more efficient and more difficult to
foil or defeat the system. The maximum security depends upon the total system not
maximum prison cell, Military bases, nuclear facilities, research laboratories, special
manufacturing sites and facilities, embassies, etc. practice this highest level of
to modern man’s attempt to discourage intruder, pilfer, and other entrants of devious
intent.
1. Natural Barrier- Such as rivers, cliffs, and ravines, etc. which delay or make
2. Man-made Barriers- Are structural construction like fences walls, floors, roofs,
grills, bars, roads block, or other physical means to deter or impede penetration.
Kinds of Barrier
original intent that tends to delay the intruder. Example are walls doors,
Page 35 of 153
nature of their employment and location, fulfill security functions. Examples are
Dogs are usually trained and utilized to serve as guard dogs. Germans
shepherds are best suited for security function. While not completely fool-
proof, the proverbial dog should provide a good way of discourage unwanted
warning to guard personnel. These are protective lighting, alarm system and
apprehension of intruders.
2. Second line of defense – Doors, floors, windows, walls, roofs, and grills, and
3. Third line of defense- Storage system like steel cabinets, safes, vaults and
interior files.
Page 36 of 153
Perimeter Barrier
Basically, it is the first line of defense of an Installation. This is maybe in the form of
fence, building walls or even bodies of water. The function and location of the facility
1. Inside Perimeter
2. Outside Perimeter
1. Fence
2. Wall
3. Bodies of Water
A. WIRE FENCE
Slack at the bottom: Not to exceed two inches if the fence is not taut then it
inches.
Page 37 of 153
Steel fence post: The round type should be at least two inches in diameter
and the H-beam type must measurable no less than two inches at the
smallest diameter.
Fence posts: Fence post should be set in concrete or in firm soil using
Fence top: There should be something on the top of the fence to deter
persons attempting to go over the fence good example would be the use of
barbed wire overhang, holding the stands of barbed- wire should be two feet
expected approach.
Fence area: The area surrounding the fence should be cleared of trees and
vegetation and or the materials which would offer concealment to the intruder
Fence Gate: Gate should be limited to the number necessary for efficient and
Fence opening: all opening in the fence in excess of 96 inches must be lock
barred, or screened in such away many only be unlocked and opened from
Multiple fence: If used, multiple fence should be at least ten feet apart and
the overhang on the top of the inner fence should point inward rather that
away from the installation maximum distance any two parallel fence should
Wire fencing can be barbed wire, chain link and concertina. Chain link is for
permanent structure, barbed wire for semi-permanent, and concertina for the least
Page 38 of 153
permanent and also can be used as a temporary road block or impediment during
strikes and crowd control. Wire fences are attractive and low in maintenance cost;
they offer fewer hazards to people because of the absence of barbs, and the
TYPES OF FENCE
1. Solid Fence
2. Full-View Fence
Page 39 of 153
Types of Full-View Fence:
The mesh openings are not to be larger than 2 inches per side.
Page 40 of 153
Page 41 of 153
Barbed Wire Fence
Barbed wire fencing should not be less than 7 feet high excluding top guard.
Barbed wire fencing must be firmly affixed to post high excluding top guard.
The distance between strands will not exceed 6 inches and midway
between parts.
Page 42 of 153
Standard concertina barbed wire is commercially manufactured wire coil of
cylinder.
Page 43 of 153
B. BUILDING WALL
Wall, Floor, roof or their combination serve also as barriers and they should
be of such construction to provide uniform protection just like the wire fencing.
Masonry walls as perimeter barrier should have the same heights as the
chain lick and surmounted by the barbed wire top guard; if the height of the masonry
Wall can be made of stone slabs like adobe or hollow bound by concrete with
post at regular intervals to prevent the wall from topping due to wind, or scouring
facilities, security must sit down with design engineers so that area where sensitive
Page 44 of 153
LEA 121: Introduction to Industrial Security Concept
Page 45 of 153
C. BODIES OF WATER
Bodies of water like river, lake, marsh, sea pond or any other bodies of water
forming a part of the wall, building or fencing should never be considered adequate
natural perimeter barrier. Additional security measures like wire fence, concrete
perimeter.
Page 46 of 153
Perimeter Barrier Opening
Gates and Doors- When not in use and controlled by guards. Lock should
Utilities Opening- Sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional
desirable between the barriers and exterior structures and natural covers
unauthorized entry.
Clear zones of 20 feet or more should exist between the perimeter barriers
A clear zone of 50 feet or more should exist between the perimeter barrier
and structure within the protected areas except when a building wall
Page 47 of 153
Security Specification for windows or opening
Windows or opening less than 18 feet above ground. Roof, ledges, etc. or
less than 14 feet directly or diagonally, opposite uncontrolled widows in other walls,
fire, escapes or other opening of 96 square inches or larger should be grilled or have
fences upward and outward with a 45-degree angle with 3 to4 strands of barbed
wire spaced 6 inches apart. This increase the protective height and preventive
easy access
Page 48 of 153
2. Guard Control Stations- This is normally provided at the main perimeter
time basis. Sentry station should be near a perimeter for surveillance at the
entrance.
Page 49 of 153
3. Tower Guard- This house like structure above the perimeter barriers. The
The high-tech security equipment does not mean it will replace the
Page 50 of 153
from employing additional security guards is certain. The deployment of
security guard is still dependent on the security plan of the company hence;
guard and guard sulystem is still very important subject matter to be included
Detect intruders
Sound Alarm
B. Human Barriers
emergencies
General orientation
Communication.
Page 51 of 153
Refresher course and advance training in specific subjects.
Fixed post.
Patrol
4. Guard supervision
Personal supervision
Artificial Supervision
1. Recorded tour- Guard takes with him on his your of duty a form which must
5. Guard Communication
PROTECTIVE LIGHTING
The idea that lighting can provide improve protection for people and
illumination during the hours of darkness. Ideally, the security guard can have
establishment.
Lighting can help improve visibility so that intruder can be seen and
Page 52 of 153
identified and, if possible, apprehended.
1. Continuous Lighting- The most familiar type of outdoor security lighting, this
b. Glare projection type- The intensity is focus to the intruders while the
c. Controlled Lighting- The lighting is focused on the pile of items, rather than
the background. The width of the lighted strip can be controlled and adjusted to
selected or special locations which will require lighting only for a short period of
time.
Listed below are the general lighting sources that are mostly used in providing
Page 53 of 153
1. Incandescent Lamp- It is the least expensive in terms of energy consumed
and has the advantage of providing instant illumination when the switch is on.
luminous gas.
provides a light source of higher luminous efficiency and better color rendition.
4. Fluorescent- This provides good color rendition, high lamp efficiency as well
as long life. However, it cannot project light over long distance and thus are not
5. High pressure sodium vapor- This has gained acceptance for exterior
emit a golden white to light pink color and this provide high lumen efficiency and
Four types is lighting equipment are generally used or associated with security
lighting.
These are:
needs, including the illumination of boundaries, fences and buildings and for the
Page 54 of 153
2. Street light- This lighting equipment received the most widespread notoriety
3. Search light- This are highly focused incandescent lamp and are designed
4. Fresnel light- This is wide beam units, primary used to extend the
and the areas to be protected l. Each sutuat6 requires careful study to provide
the best visibility practicable for security duties identification of badges and
detection of intruders inside or outside the buildings and other structures and
4. Torrent only. It should be used on a perimeter fence line only where the
within the perimeter, which are under specific observation. Such areas include
Page 55 of 153
vital buildings, storage, and vulnerable control points in communication,
power and water distribution system. In interior areas where night operations
area.
his security director must give specific considerations to the following areas:.
protected areas.
reduced visibility, and that standby Lighting is maintained and periodically tested
Page 56 of 153
entire line to provide a stable ground potential.
Areas to be Lighted
1. Perimeter fence
3. Pedestrian Gate- should be lighted about 25 feet on either side of the gate if
possible and the range for vehicular gates should be twice that of street lighting
strictly controlled.
5. Parking are- This include vital building, storage depots, and vulnerable
7. Storage, large opened working areas, piers, docks, and other sensitive
areas.
Proprietary system
Local Alarm
Page 57 of 153
Auxiliary Alarm
Kinds of Alarm
Foot Rail Activator I'd place on the floor in such a position that tellers
may activate the alarm by placing the front of their foot to engage the
activation bar.
Foot Rail do not acquire any obvious use of the teller's hand and their
hands may kept in full view of the robbers for reason of safety, because foot
Disadvantage
Tellers with platform shoes, itchy feet, or using brooms and other
Page 58 of 153
Bill Traps
Bill Traps or currency activation devices are usually place in the teller's
cash drawer and connected to the alarm system using a wire connector.
frequently remove the currency and activate the alarm. This is particularly
helpful when the employees are immediately force to leave their station
Foot button
Like the foot rail permit alarm activation relatively safely while both
the needs of each installation are different, like a set of fingerprints. Some
Page 59 of 153
factors that determine the requirements of the installation will include the
following:
4. Accessibility
12. Savings in manpower and money for a period of time if alarm is used
1. A detection unit should initiate the alarm upon intrusion of a human being in
the area or vicinity up an intrusion of a human being in the area or vicinity to the
Page 60 of 153
should be manned at all times.
3. An enunciator console indicating the audible and /or aural signal and the
specific location of incident so that proper action can be made by security and
other units
competitors or saboteurs.
1. Alarm devices are physical safeguards used to assist security but not a
2. It assists the guards to extend their hearing and vision even in areas where
4. Maintenance of alarm system must be regularly made, the signal line must
5. New and improved intrusion hardwires are being developed and placed in the
Page 61 of 153
Luck is one of the most widely used physical security devices in the
the owner of the installation or his security officer needs to understand the
weaknesses and strengths of each type of lock including the door, window or
because highly-skilled burglars more often concentrate on the lock and its
reasons that locks are considered as delaying devices which cannot really top a
determine intruders from destroying the lock just to launch an attack. Hands,
knowledge of the basic principles of locking systems will enable the installation
owner or the security officer to evaluate any lack and determine its quality and
Lock
place.
Types of lock
Page 62 of 153
b. Pin tumbler lock
2. Padlock
3. Combination lock
5. Electrical lock
6. Card-operated lock
Types of key
Change key
Master key
Once an effective key control has been installed , positive control of all
1. Key cabinet
2. Key record
3. Inventories
4. Audits
5. Daily report
Page 63 of 153
Principles of Key Control Management
2. Key issued on daily basis, or this issued for a pacific on time purpose, should
4. When the key is lost, the circumstances should be investigated and set forth
in writing. In some instance, if the lost key provides access to sensitive area,
5. All keys should be physical inspected periodically to ensure that they have
6. Careful record should be kept of such instance. The list should be reviewed
such key.
used, and they should be issued only to limited list of personnel specially
selected by management.
8. Key should not be marked or should not identify doors are locks they open.
Page 64 of 153
9. Master key should be mark identifying them as a master key.
The same penalty shall be imposed upon any person who shall make
such tool. If the offender is a locksmith , shall suffer the penalty of prison
c. Iniki other than those intended by the owner for use in the lock forcibly open
by the offender.
SECURITY CABINET
Page 65 of 153
The final line of defense at any facility is in the high security storage
depend of a size and quantity , which the nature of the business dictates.
specialized function and it will depend on the owner of the facility which type
that is to be used.
Any safe that weigh less than 750 lbs. should be anchored to a building
structure.
Safe as a general rule, require the door to be made of steel and at least
11/2 thick.
a. Fire insurance-a safe should not have at any one time a temperature above
b. Hazard test-test to determine if sudden rise in temperature will not cause the
safe to rupture. If the safe can withstand 2000 degrees fahrenheit for 30
Page 66 of 153
minutes and will not crack or open, then it has passed the explosion test.
part of the building structure used to keep and protect cash , document and
negotiate double instruments . Vault are bigger than safe but smaller than a file
room.
thickness.
Electrical conduits into the vaults should not exceed 11/2 in diameter.
Vault floor should be higher by 4 inches with the surrounding floors and if
in level with the floor buttons, storage container should be raised at least
Vault should not be made part of the wall due to moisture and
3. Fire room- a cubicle in a building constructed a little lighter than a Vault but
the interior cubage should not more than 10,000 cubic feet
It must have a water light door and at least fire proof for one hour.
Page 67 of 153
The supporting structure, the walls, floor and roof should be made fire-
proof.
these are insufficient to maximize the effort of the guard force. A control point
This is to ensure that only those persons who have the right and authority will
reproduce;
2. They should contain as clear and recent photograph of the bearer preferably
in the color;
3. The photograph should be at least one inch square and should be updated
Page 68 of 153
every two or three years or when there is any significant change in facial
appearance; and
1. Personal recognition
2. Artificial recognition
1. Single-pass systems
1. The system should have a complete record of all badges and identification
cards issued, return, mutilated or lost by serial number and cross indexed
alphabetical.
2. The supervisor from time to time for its accuracy and authenticity should
3. Passes and badges reported lost should be validated and security personnel
Page 69 of 153
1. Controlled area
2. Limited area
3. Exclusionary area
prevent or deter the entry of authorized visitors , but since some traffic is
which regularly handle a great deal of merchandise both in and out , have a
highly classified government project . Both , however , must work from the
movements;
Page 70 of 153
Visitors Movement Control
for admission of visitor as well as the limitation thereat. This security measure
would depend on the sensibility of the installation, but would include the
following;
2. Photograph
3. Escort
4. Visitor entrances
5. Time traveled
portals is a fact of life, they must be dealt with in order to prevent theft and
installation, offices and work area without proper authority. This basic precept
those in vehicles should also be checked as many pilfered items are hidden in
Page 71 of 153
3. Any personnel/visitor entering the installation with the package should
deposit the same to the security and in return deceives and numbered tag,
subject to the vehicles should be subjected for search at the entrance and exit
of installation
1. All visitors with vehicles should provide key security as to the complete
windshield.
3. Traffic warning sign should be installed in all entrances in order to guide the
visitors in their destination as well to provide them with the necessary safety
Page 72 of 153
At any physical barrier, a security system must possess the ability to
provided . This will be dependent on the degree of security needed for the
protection of property comma activities and other processes within the building.
personnel who have the direct involvement with the installation , construction
and operation and maintenance of the equipment and systems and or use of
the materials contained within the restricted area . A clear-cut policy on the
CHAPTER 4
PERSONAL SECURITY
Page 73 of 153
Personnel security is the protection of the company assets against loss of
life and damage to property. Its main concern is the security and safety of each
people and organization. In personal security, the people in in the organization are
considered the greatest threat to the security organization because they create the
security holes.
most important. This is for the simple reason that security involves people, both as
employees, either through theft and sabotage. This emphasizes the need to set up a
system of hiring the people for the company period personal security is considered
1. To ensure that a firm hires those employees best suited for the firm; and
Page 74 of 153
1. Personnel security investigation (PSI)
2. Security education
3. Does the applicant have other reasons for applying , aside from employment
Page 75 of 153
PSI should be properly documented in order to facilitate the conduct of
information.
background investigation
profiling
Loyalty
integrity
discretion
morals
character
reputation
Components of complete BI
Page 76 of 153
present residence address character reference
neighborhood investigation
Barangay clearance
court clearance
information issued during the interview, such as those discovered in the BI,
Page 77 of 153
which confirms or denies which given by the applicant.
deception during the interview stage. This includes the use of a Polygraph
which the agents true identity and role remains unknown , in order to obtain
Page 78 of 153
Security location is conducted to develop security awareness among
the employees the rationale behind the security measures and to ensure their
supervisors and other people now in a program that should be continuing and
5. To let all employee force be informed that they all belong to the organization
1. Initial interview
3. Refresher conference
4. Security reminders
Page 79 of 153
5. Security promotion
whether from the state or external states, from violent individuals and and
sub-state actors comma from domestic abuse, or from predatory adults. For
crime.
ORGANIZATIONAL STRUCTURE
1. Area security
engagement.
2. Perimeter security
Page 80 of 153
Secures the immediate area surrounding the place of engagement.
3. Advanced security
This are the advanced security at the place of engagement before the
4. Close-in security
5. Reserve security
6. Routine security-
1. Victim
2. Assassin
4. Opportunity
Page 81 of 153
there has been an escalation in the demand for bodyguards. Thereby, BRAIN
(Meaning muscular in power) has been offered as the basis for bodyguard
selection. And the bodyguard should fit the image and lifestyle of the individual
he is guarding.
respond effectively.
respond effectively.
remove the individual being protected while the other neutralized the threat. The
offending the public or those in the area. The primary objective is to protect the
target person, not apprehend the attacker. Escape is it certainly more important
than winning the "skirmish" meaning minor and primary conflict or dispute.
6. If one bodyguard is utilized, he/she will usually walk in front and slightly to the
7. When two bodyguards or utilized, one will take a positioned in front to the left.
Page 82 of 153
While the second, will take a position to the rear and slightly to the right.
Protection in transit
overall protection plan will make it more difficult for an abduction to plant of an
ambush or to interpret period the individual should never walk alone in and
usually attempt to escape and attack by leaving the vehicle. the body of the
vehicle will provide a place of safety and while the vehicle can be utilized to
Vehicle security
comma when not in use , the vehicle should be parked in a locked garage
under guard and nor on the street . The doors of the vehicle should be locked
Page 83 of 153
The potential victim, should not use to vehicle at all time, but should
commercial organization which has been checked out and cleared. Locking
the soul in caps and locks for the hoods our suggested. Gas tanks should
never contain less than half a tank to avoid running out of fuel.
Attacks tactics
1. Moving attacks-The approach will usually be made from the left or passing
side, and the attacker will attempt to move over into the path of the victim's
vehicles, forcing it to stop. Approach, would be from the right in the left side
drive countries period the ideal location for abduction is where cross street are
turn off is available to allowed attacker an easy quick way to escape. If two
vehicles are used to attack, one will cut off the victim's vehicle, forcing it to stop.
The second maybe then move up on the left side. The abductor will make the
attack, take the victims from his vehicles and escape as quickly as possible.
2. Ambush attack-The kidnapper will attempt to stop the victim's car within a
happening in at least two or three blocks of normal city driving. Vehicles that
Page 84 of 153
are packed in the roadway or in unusual position comma obstructions,
constructions, etc. Should be viewed with concern, also side street or road
access. Ramps, underpasses, service roads, etc. Our potential trouble spots,
those in traffic ahead. Also the lane nearest the center of the roadway should
normal traffic speeds while is in front , behind and on the sides of the vehicles
4. Professional criminals.
"There is no way of estimating how many bottles have been lost , how many ships have
been sunk , or how many lives have been sacrificed because someone intentionally or
unintentionally betrayed a military secret"
Author unknown
Page 85 of 153
CHAPTER 5
INFORMATION SECURITY
1. Personal — Letters, diary and notebooks. These should be treated usually the
same with official document.
2. Official —Orders, manuals, letters, overlays, maps and magazines. You may be
careful and follow the chain of command.
Page 86 of 153
Document/information cycle
Each document or information has a life cycle in the sense that its
usefulness has a beginning and an end. It passes various stages from the
time it is created until it is finally disposed. This cycle consists of the following:
1. Creation 5. Retention/Purging
2. Classification 6. Transfer
3. Storage 7. Disposition
4. Retrieval
Categories of Document
1. Category A
Information which contains reportable time sensitive, order of battle and
Significant information.
It should be given priority because it is critical information.
It must be forwarded without delay.
It is critical to friendly operations.
It requires immediate action.
2. Category B
Anything that contains communications, cryptographic documents, or
systems that should be classified a secret and requires special handling.
Higher authorities should declassify it.
3. Category C
Other information, which contains something that, could be an intelligence
value.
Contains exploitable information regardless of its contents.
Unscreened materials/documents should be categorized as Category C.
4. Category D
No value, yet lower level will never classify documents as category D.
Page 87 of 153
No decision must be made at the lower echelon that document has no value.
It is the responsibility of eh higher headquarters.
1. TOP SECRET (green color code) — is any information and materials the
unauthorized disclosure of it would cause exceptionally grave damage to the
nation, politically, economically and military operation.
2. SECRET (red color code) — is any information and material, the
unauthorized disclosure of it would endanger national security cause serious
injury to the interest or prestige Of the nation or any governmental activity or
advantage to a foreign nation.
3. CONFIDENTIAL (blue color code) — Is any information or material, the
unauthorized disclosure of it would be prejudicial to the interest and prestige
of the national or governmental activity or would cause administrative
embarrassment or unwanted injury to and be of advantage to and be of
advantage to a foreign country.
4. RESTRICTED (white or no color code) — is any information and material
which requires special protection other than those determines confidential,
secret and top secret. In the security management application, top secret is
not used, classified matter will starts on secret classification. This is because
the applications is limited or focused only to the industry•
Page 88 of 153
different classifications. Documents separated from file or group shall be
handled in accordance with their individual classification.
Transmittal of documents or endorsements which do not contain classified
information or which contain information classified lower than that of the
preceding element or enclosure shall include a notation for automatic
downgrading.
Correspondence, Indexes, receipts, reports of possession transfer or
destruction, catalogs, or accession list shall not be classify if any reference to
classified matter does not disclosed classified information.
Classified matter obtained from other department shall retain the same
original classification.
Types of Document
Page 89 of 153
These include records the reproduction of which
will close considerable expense and labor, or considerable delay.
Security of information is based on the premise that the government has the
right and the duty to protect official papers from unwarranted and
indiscriminate disclosure;
The authority and responsibility for the preparation and classification of
classified matters rest exclusively with the originating office;
Classified matter shall be classified according to their contents and not to the
Classification of files in which they are held or another document to which
they are referred;
Classification shall made as soon as possible by placing appropriate marks
on the matter to be classified; and
Each individual whose duties allow access to classified matter or each
individual who possess knowledge of classified matter while it is in his
position shall insure that dissemination of such classified matter is on the
"need to know" basis.
Page 90 of 153
1. Trade Secret — This consist of any formula, pattern, device or compilation of
information which is used in one's business and which gives him an
opportunity to gain an advantage over competitors who do not know or use it.
It may be a formula for a chemical compound a process of manufacturing,
treating or preserving materials, a pattern for machine or device, or a list of
customers. It differs from other secret information as to single or ephemeral
events. A. trade secret is a process or device for continuous use in the
protection of the business.
2. Patent — this is a grant made by the government to an inventor, conveying or
securing to him the exclusive right to make, use, or sell his invention for term
of years.
Requirements for obtaining a patent are specific; to qualify for a patent the
invention must be more than novel and useful. It must represent a positive
contribution beyond the skill of the average person.
A much lower of novelty is required of a trade secret.
A trade secret remains secret as long as it continues to meet trade secret
tests while the exclusive right to patent protection expires after 17 years.
Realizing that the most serious threat to trade secrets is the employee, a
measure of protection is often realized through the use of employee agreements
which restrict the employee's ability to disclose information without specific
authorization to the company. The following countermeasures may be adopted:
Page 91 of 153
Communication Security
DEFINITION OF TERMS
Communication — the transfer of thought from We mind of one person to the mind
of another thought a common medium or channel.
Page 92 of 153
Communication — is the process of sending and receiving messages to achieve
The following are the common equipment being used for communication
a. Alertness — Give the impression that you are alert and wide awake and
interested as the person calling;
b. Pleasantness — Build a pleasant office image with voice of smile;
c. Naturalness — Use simple language and avoid slang;
d. Distinctness — Speak clearly and relax to avoid garbled transmission; and
e. Expressiveness — Normal tone of voice in moderate manner not to fast and
not too slow.
Page 93 of 153
1) Use of phonetics alphabet and numerals:
10-20 = location
Page 94 of 153
“Whether or not gas will be employed in future wars is a matter of conjecture, but the effect
is so deadly to the unprepared that we can never afford to neglect the question”
CHAPTER 6
SECURITY PROBLEMS
Types of Hazard
Page 95 of 153
1. Natural Hazard — these are hazards which arise from natural phenomena.
The following are types of natural hazard or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Storms (typhoons, cyclones, tornado and hurricane)
d. Lighting storms
e. Extreme temperature and humidity
2. Human-man made Hazard --- These are hazards which are the result of a
state of mind, attitude, weaknesses or character traits of one or more persons.
They can be acts of commission or omission, both overt and covert, which can
disrupt operation of a plant or installation. The following are types of human or
manmade hazards:
a. Carelessness — Accidents and dissatisfaction
b. Disloyalty —Subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism, etc.
Description of a Saboteur
1. He is the most dangerous for whom security will have to deal with while
planning and implementing security measures and techniques.
2. He is an ordinary looking as the next guy but in his mind, he has the training in
deception, knowledgeable in incendiaries, explosives, chemistry, bacteriology,
mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.
Page 96 of 153
1. Use of an efficient, alert and trained guard force.
2. Use of Physical security aids like barriers, personnel and vehicular control,
intrusion devices, communication systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination.
10. Good housekeeping methods
11. Effective and compatible emergency planning
12. Regular audit.
13. Continuing background checks.
Espionage as a security hazard
Description of an Espionage Agent
1. He is very dangerous adversary and his skills in deception and his cunning
should never be under estimated.
2. He is usually a person of extensive training and will be highly effective in
gaining the confidence of people and of extracting information of value to be
relayed to his employer or handler.
3. Even how well-Trained an espionage agent he might be, he’s human like the
saboteur and he can be defeated in his own game if proper methods and
techniques are undertaken.
Some methods Employed by Espionage Agent
1. Stealing or information from employees.
2. Stealing information from records or others sources.
3. Using various methods of reproducing documents products, equipment or
working models.
4. Using "front" as commercial concerns, travel agencies, associations, business
groups and other organizations to obtain confidential information or data.
5. Using various form or threats to obtain information.
Page 97 of 153
6. Using blackmail techniques by exposing intimate and personal details
concerning an individual or organization.
7. Picking or securing information in social and other gatherings.
8. Penetration and operational tactics.
Page 98 of 153
5. Other methods of subversion like untied fronts, mob action, terrorism and
sabotage will do to gain the subversive ends.
Pilferage
This is one of the most annoying and common human hazards which
security has to deal with. This activity if uncontrolled can become a financial
drain if not a menace to smooth and orderly operation. Due to this, security
force has to concentrate large number men to check this nefarious and
disconnecting activity. Petty pilferage is frequent, hard to detect' difficult to
prove and win conviction but definitely dangerous to ignore.
Types of Pilferer
1. Casual Pilferer
2. Systematic Pilferer
Anatomy of Pilferage
1. Where need or desire exists and opportunity is present, theft is almost sure to
result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when
supplies or goods are transported or transferred from one place to another.
Page 99 of 153
conceal pilfered items in his vehicle.
4. Disposal of items — there is a need for "fences" "brokers", or "clearing
houses" for these "hot" items.
CRISIS MANAGEMENT
The hostage taking of Chinese nationals that happen in Manila is a
lesson to learn for our government. The PNP recognizes different pitfalls on
the operation from negotiation to assault. In this case, crisis management
plays a very significant role in dealing with the problem. In security
management, crisis management is very important tool in dealing with the day
to day operation of the security business hence; we have this topic included in
this book.
Emergency Defined
Is the systematic management of disaster from the initial stage to its termination
using various tools to minimizes loss of lives, damage to property and enhance
rehabilitation.
Disaster Defined
Types of Emergency
1. Earthquake
2. Typhoon
3. Tsunamis
4. Volcanic eruption Fire
5. Fire
6. Explosion (Bomb, flammable liquids, gases, etc.)
1. Stay calm.
2. Always sound the building fire alarm immediately. If the alarm fails to operate,
warn other occupants by knocking on doors and shouting warnings.
3. Before opening the door, feel it with the back of your hand. If it is hot, do the
following (if it is not hot go to step 4).Open the windows. Seal cracks around
the door with towels, tape, bed clothing or similar items to keep out the
smoke. If you are trapped, hang a sheet, jacket, or shirt or other object out the
window that will attract attention. Shout for help. Remain calm until firefighters
reach you from the hallway or window. Their first duty upon arriving at a fire is
to search for persons trapped in the burning building.
4. If you are able to leave the room, do so immediately and: Take your key with
you in case you are forced to return. Close all doors behind you as you exit.
This will retard the spread of smoke and lessen damage. Go to the nearest
exit or stairway. Do not use an elevator. If smoke, heat or fire blocks your exit,
go to an alternate exit. If all exits from a floor are blocked go back to your
room and follow the procedures described above in 4.
1. Follow the cardinal rule: Wherever you are, remain calm and do not panic.
2. If you are inside the building, follow these guidelines.
a. During the earthquake, perform the DROP, COVER and HOLD action.
Take cover under strong desk or table and keep head and neck
protected.
b. Stay away from glass, windows, shelving, and other equipment which
can present a cutting, crushing, hitting or fall danger.
c. Stay where you are. Do not run outside while earthquake is in progress.
Wait until it is safe to go outside.
d. DO NOT use the elevators, even if they are working, and check stairwells
for integrity before using.
e. Evacuate safely and orderly after the earthquake has ended.
3. If you are outside the building or in an open space, follow these guidelines.
a. During the earthquake, perform the DROP, COVER and HOLD action.
b. Move away from buildings, streetlights, and utility wires.
Stay alert for aftershocks. Do not return to your work area until directed.
1. Staff in the immediate area should attempt to evacuate the area by any route
that does not expose them to threat.
2. Once safe, notify security from within premises or externally, who will respond
to the threat immediately and contact the police.
3. If evacuation of the immediate area is not possible, staff should take whatever
action necessary to stay out of harm's way.
1. Don't be a hero: remain calm, accept your situation and be patient; reassure
others if they start to panic
2. Follow the instructions of the hostage taker
3. Do not do or say anything that might provoke the individual holding you
hostage
4. Don't speak unless spoken to but be courteous and cooperative
5. Don't be argumentative with the hostage taker or with other hostages and
avoid sudden movement that could alarm the hostage taker
6. During any rescue attempt, lie down on the floor and keep your hands visible,
unless otherwise directed by the police. Police may not be able to distinguish
hostages from hostage-taker and may consider you a threat.
SECURITY MEASURES
SECURITY INVESTIGATION
Tools of Investigation
1. Absence of eyewitness/witnesses
2. Motives Unknown
3. Lack of physical clues (evidence)
1. Objective —all facts are discussed as perceived without any distortion and
the manner of presentation is free from unwarranted opinion.
2. Thorough — Full detail, exhaust all available means, factual to arrive in a
sound and convincing conclusion.
3. Relevant Significant and demonstrated its relation to one another.
4. Accurate — Free from error.
5. Current — Terminology is generally accepted
1. Preliminary Investigation
2. Investigation Proper
3. Methods of Investigation
a. Information c. Interview
b. Interrogation d. Instrumentation
Investigation Report
a. Administrative Data
1) Date
2) File Number
3) Complaint
4) Reporting Investigator
5) Office of Origin
6) Status
7) Distribution
e. Enclosures Photographs,sketches,
Date
SUBJECT:
l. AUTHORITY
This section should contain a brief statement of when, where and by
whom the investigation was made and should cite the authority for making it.
V. CONCLUSION
This represents concise summary of the results of the investigation directly
consequent from and supported by facts. These logically follow from the facts of
case of found and set forth in the report. They are usually stated in the order
naturally suggested by the statement of the allegations or facts.
VI. RECOMMENDATIONS
This should contain the practical suggestions as to appropriate action to be
taken to make suitable position of all phases of the case. They should follow, as far
as practicable, the same sequence as was used in the presentation of conclusion.
_________________________
Investigator
Security should not be considered or look upon as expense of the institution, but
employees.
3. REFRESHER CONFERENCE
4. SECURITY REMINDERS
The Institution should post or distribute security reminders from time to
time. This kind of security education employs the indirect approach, such as posters
and fliers. Security reminders should be replaced periodically.
5. SECURITY PROMOTION
Security promotion is the act of emphasizing the importance and role of
security in achieving the company's objectives, especially among senior executives.
It involves employee cooperation and support especially from among the top brass
of the various security measures being implemented
Security Survey
In the world of security management, security survey is very important tool to
evaluate and assist the security conditions of an institution or establishment. It is a
tedious work and yet rewarding for the security personnel. It is in security survey
where we can identify our vulnerabilities (weakness) and criticalities (vital) in
security. Knowing the vulnerabilities and criticalities in an institution or establishment
will give us an idea and preference which is too prioritized in security. The basic
instrument for determining security vulnerability is the security survey. Most
description of security surveys refers principally to checklists, audits or inventories of
security conditions.
5. Develop alternatives
Security Inspection
Another important activity, which is necessary to insure the integrity of the overall
security programs, is security inspection. This complements security survey in its
attempt to prevent losses of company properties.
1. Continuous Inspection
2. Formal or Informal
3. Structured or Unstructured Inspection
"A direct comparison of the cost of operation of the security unit and all the existing
security measures with the amount of the corporate assets saved or recovered as
well as reduction of losses caused by injuries and lost production."
7. SECURITY REMINDERS
The Institution should post or distribute security reminders from time to
time. This kind of security education employs the indirect approach, such as posters
and fliers. Security reminders should be replaced periodically.
8. SECURITY PROMOTION
Security promotion is the act of emphasizing the importance and role of
security in achieving the company's objectives, especially among senior executives.
It involves employee cooperation and support especially from among the top brass
of the various security measures being implemented
Security Survey
In the world of security management, security survey is very important tool to
evaluate and assist the security conditions of an institution or establishment. It is a
tedious work and yet rewarding for the security personnel. It is in security survey
where we can identify our vulnerabilities (weakness) and criticalities (vital) in
security. Knowing the vulnerabilities and criticalities in an institution or establishment
will give us an idea and preference which is to prioritized in security. The basic
instrument for determining security vulnerability is the security survey. Most
description of security surveys refers principally to checklists, audits or inventories of
security conditions. It measures compliance of employees to security policy and
guidelines. Security Survey is defined as a critical on-site examination and analysis
of an industrial plant, business, a home or public or private institution done to
ascertain the facility's current security status, to identify deficiencies or excess in
Security Inspection
Another important activity, which is necessary to insure the integrity of the
overall security programs, is security inspection. This complements security survey
in its attempt to prevent losses of company properties.
"A direct comparison of the cost of operation of the security unit and all the existing
security measures with the amount of the corporate assets saved or recovered as
well as reduction of losses caused by injuries and lost production."
a. To determine the value, impact and cost of any asset should it be lost
due to natural or man-made forces;
b. To determine the degree of vulnerability of the facility to damage or
attack by natural or man-made forces; and
c. To determine the degree of probability that natural or man-made forces
will strike any given facility.
Date
To: _____________________
Subject: ______________________
From: ________________________
A. INTRODUCTION
C. PHYSICAL SECURITY
1. Perimeter Barriers
a. Situation as surveyed
b. Recommendation
a. Situation as surveyed
b. Recommendation
a. Situation as surveyed
b. Recommendation
4. Protective lighting
a. Situation as surveyed
b. Recommendation
a. Situation as surveyed
b. Recommendation
6. Restricted Areas
a. Situation as surveyed
b. Recommendation
a. Situation as surveyed
b. Recommendation
a. Situation as surveyed
b. Recommendation
E. PERSONNEL SECURITY
2. Clearance Program
a. Situation as surveyed
b. Recommendation
a. Situation as surveyed
b. Recommendation
4. Morale of employee
a. Situation as surveyed
b. Recommendation
a. Situation as surveyed
b. Recommendation
a. Situation as surveyed
a. Classified system
b. Receipting system
d. Transmission system
e. Reproduction system
f. Destruction system