0% found this document useful (0 votes)
104 views152 pages

Orca Share Media1681190250194 7051422991153764960

This document provides an overview and outline for an introductory course on industrial security concepts. 1. It introduces the topic of security management and discusses the importance of security in industry. 2. The primary duty of security is prevention of crime and protection of property and life. 3. Key principles of security management are discussed including security being everyone's concern and the need for defense in depth.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views152 pages

Orca Share Media1681190250194 7051422991153764960

This document provides an overview and outline for an introductory course on industrial security concepts. 1. It introduces the topic of security management and discusses the importance of security in industry. 2. The primary duty of security is prevention of crime and protection of property and life. 3. Key principles of security management are discussed including security being everyone's concern and the need for defense in depth.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 152

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

National Highway, Crossing Rubber, Tupi, South Cotabato

COLLEGE OF CRIMINAL JUSTICE EDUCATION

___________________________________________________
LEARNING MODULE

FOR

LEA 223: INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

_____________________________________________________

WEEK 1

February 22, 2021

COURSE OUTLINE

COURSE CODE : LEA 223

TITLE : Introduction to Industrial Security Concept

TARGET POPULATION : 2nd year Student of Criminal Justice Education

INSTRUCTOR : MR. CARLO JONE V. BALISI, RCRIM


Overview:

Industrial Security Management emphasizes the general security techniques


and the ethical responsibilities of those involved. The work covers general security
management, security personnel management, operational management, public
relations and the perils of mismanagement. Individual chapters address topics like
role of security personnel in organizational structures, hiring and training of security
personnel, motivating them to produce goal-oriented behavior, building an internal
security culture and relationships with law enforcement and the community. The book
also talks about the limitations and hurdles in the prevention of crime and how these
can be minimized. Written by experts in their field, the book covers almost all aspects
of industrial security, including many of those new techniques and developments
brought in by computers.

Instruction to the Learner

Each chapter in this module contains a major lesson involving the history and
development of Industrial Security Concept, And the importance of security management in
the field of Law Enforcement. The units are characterized by continuity, and are arranged in
such a manner that the present unit is related to the next unit. For this reason, you are
advised to read this module. After each unit, there are exercises to be given. Submission of
task given will be every Monday during your scheduled class hour.

GETTING STARTED:

(Week 1)

Specific Objectives

At the end of the topic the student must be able to understand the following:

1. To know the importance of Security Management.


2. To identify the different principles of security.
3. To know the primary duty of security.
Chapter: 1

INTRODUCTION

Security today covers different fields, business or industry; it may include the

World security, Nations security or even Human security. Security as a topic and

subject is global, national, and local in nature and scope. This is because the principle

of security management is universal in the application.

Security is defined operationally as safety from harm or danger, a term that has

different dimensions in psychology, public safety, defense and military matters, and

information access.

Security, in its semantic and philosophical sense, implies a stable, relatively

predictable environment which an individual or group may pursue its ends without

disruption or harm, and without fear of such disturbance or injury. The concept of

security is an organizational sense is a means by which safety and stability can be

attained by wide variety of institutional and cultural patterns.

Throughout the year’s men started practicing the utilization of workers and

equipment in order to protect his well-being and property. Thus, the civilized man

adopts security measures to have adequate protection against unsecured and unsafe

conditions. This probably led to the establishment of the "police' an institution today

responsible for law and order as well as public safety.

The incredible growth of the security industry in the Philippines now a day is

evident. Most companies are using guard forces, protective barriers, communication
and electronic hardware and other state-of-the art protection methods and techniques

in their asset protection. However, every installation cannot escape the emerging

complicated security problems like the deteriorating peace and tranquility, the threat

of terrorism and the social conditions of the community. A determine intruder can

sneak in the properties of another while the owner is asleep out on a trip or anytime of

the day and divest all valuable items which he can find. The incidents of fire and other

disaster should also be considered in the asset protection.

Hence, a basic understanding on the concept and methods of security is a

primordial concern of everybody in the industry.

WHAT IS SECURITY?

Security is a state or quality, condition of being secured, freedom from fear, harm,

danger, loss, destruction or damages, to secure is to make safe or be protected.

 Freedom from fear or danger (protection) or defense against crime

 Security is a condition of being protected against danger or loss.

 The subjective meaning of security as "freedom from anxiety or fear" resonates

in the origins of the word Latin "Se-Cura”.

The security of any business establishment today is a complex process. Security

work involves active and passive measures so that effective defense can be

established against crimes.

Active measures are the physical barriers, security lighting use of vaults, locks
and others. Passive measures are those that will dates man from committing such

acts for fear of being caught, charged in court, or get dismissed; Security education

programs, investigation, fire prevention seminars; personal security checks are

examples of passive security.

Basically, it was the action of man against man that led to many unsecured and

unsafe conditions. Reason could be economic, revenge, or just plain greed and

avarice. Whatever is the motive, the civilized man needs adequate protection.

THE PHILOSOPHY OF SECURITY

The essence of the existence of security in the business establishment,

company or institution is prevention. Prevention being the reason of their existence is

always a primordial Interest. Security exists to prevent or avert any loss or damage to

properties, loss of life and limbs and to some extent, the prevention of crime. If

something happens and we were not able to prevent the happening, this is simply

called the lapses of security.

SECURITY MOTTO

The security motto is "Vigilatut Quiescant" meaning "He watches that they

may sleep". The essence of this motto still holds true today and could be considered

an international motto not only for the police but also for security guards. The local

motto being observed today by security guards and personnel is "observe and report"

because it’s part of their basic function to report to the authorities or management any

observed illegal or legal activities in their area of jurisdiction.


THE PRIMARY DUTY OF SECURITY

Security is synonymous to the word prevention. Prevention of crime is the

primary reason of the existence of a security forces in the industrial business and all

other functions are inherent in order to attain its existence in the business. The

importance of security is the preventive and the proactive mindset. Everyone must be

vigilant even if high-tech gadgetry is available.

INTERNATIONAL SECURITY PRINCIPLES

The following are international security principles which are very important in

security management. The discussion and explanation are found in the different

chapter of this book.

 THE "NEED TO KNOW" PRINCIPLE DOCTRINE OF LEAST PRIVILEGE

 PRINCIPLE OF DEFENSE IN DEPTH

 TARGET HARDENING

 CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED)

 CRIME PROOFING

 COURTEOUS DETERRENT

PRINCIPLES OF SECURITY MANAGEMENT

In the parlance of security management, the following are considered universal

principles which are considered basic foundation in security management. It is

universal in the sense that the application is applicable to the different industry, fields,

system, and business. The following are the basic principles of security management.
1. Security is everybody's concern.

2. Security is good only as far as its weakest link.

3. No single security system or element can stand alone.

4. High relative security can be achieved in depth.

5. Each installation or establishment is different and unique.

6. What do you want to protect will determine the degree of protection.

7. Security measures could only be effective when enforced.

8. The most effectiveness single component of any security program is security

awareness of all employees.

9. Security is consistency through obscurity.

10. Security is preventive measure and counter measure.

11. Good security must start from the too with executives who help create

corporate value of security.

12. Security is a way of life.

13. There is no absolute security.

14. No two facilities have the same security needs.

15. Harm or danger may come from outside or inside of the facility.

“Many security holes exist because people “Temporarily” adopt insecure practices,

and then forget to close the security hole. As long as people tolerate security botches,

they will occur”.

Anonymous

THE LEGAL BASES AND CONCEPTS OF SECURITY MANAGEMENT


1. Natural authority

2. Constitutional authority

3. Statutory authority

A. The Revised Penal Code. (Act No.3815, as amended)

The applicable provisions of the Code on Crime against Person, Personal

Liberty and security and property have bearing on the security and protection

of one's life, liberty and property.

B. Private Security Agency Law (R.A. No. 5487 as amended)

This law governs the operation, administration of security agency, and

activities, qualification, duties and licensing of security guards, watchman and

private detectives. In short, it is the intention of this law to professionalize the

security services in order to upgrade the level of security protection.

C. Presidential Decree No. 11 (Amending RA No. 5487) presidential Decree 11

amended the Sec.3 (d) which defines Watchman or Security Guard, Watchman

or Security Guard Agency, Sec.4 who may organize a security or watchman

agency and the Sec. 18 of the penal provision of Republic Act No. 5487.

D. Presidential Decree No. 100 (Amending RA No. 5487 & PD 11)

E. Presidential Decree No. 1919 (Amending RA No. 5487, PD No. 1 1 and

100)
F. Republic Act No. 6975 (DILG LAW)- this is the law authorizing the PNP the

control and supervision of security agency in the Philippines.

FACTORS THAT BRING ABOUT UNSECURED CONDITIONS OR SITUATIONS

The following are the different factors why security personnel in the industry
have to plan and prepare. The different terminology stated are the challenges that the
security industry has to face today. It is because of threat, hazard, risk and
vulnerabilities that create the existence of security management in the business or
industry.

Threat is activity that could lead to a loss

Hazard is a condition that could lead to a loss

Risk is a potential loss/damage to an asset.

Vulnerability is a weakness that can be gained to an access to an asset.

THE SECURITY FUNCTIONS CYCLE

To address the different stages of events and conditions the risk might bring

about, the guard has specific functions to perform. The functions of the security are

classified as to their basic purpose, namely:

1. Preventive Functions. These functions are performed to address threats and

deter or prevent the risk from occurring.

2. Reactive Functions. These functions are performed to address emergency

situations when risks are occurring to prevent further loss or damage of

resources.
3. Investigative Functions. These functions are performed with the following

objectives:

 To reconstruct the circumstances of a risk occurrence t possibly recover the

loss.

 To identify the person responsible and liable for the event and subsequent

loss and justify sanctions against the said person.

 To find ways to prevent the recurrence of the loss.

With the adoption of the new preventive measures is another start of

preventive stage of the security functions cycle.

COMPONENTS OF SECURITY MANAGEMENT

1. Preventive measures - are important tools and elements used in prevention of

an incident from happening.

2. Counter measures - are programs implemented to avoid repetition of the same

event.

Crime prevention is using instinct, common sense, and action to eliminate or greatly

reduce criminal's opportunity. A large share of responsibility in reducing criminal

opportunity lies in the awareness, understanding and everybody's commitment

“The value of security is better measured by what does not happen that by what does”
-Sennewald
Progress Check (Exercises 1)

FILL IN THE BLANKS (COPY ANS ASNWER) 2 points Each

1. _________________ It is defined as a state or quality, condition of being


secured, freedom from fear, harm, danger, loss, destruction or damages, to
secure is to make safe or be protected.
2. _________________ It is defined operationally as safety from harm or danger, a
term that has different dimensions in psychology, public safety, defense and
military matters, and information access.
3. _________________ It is the applicable provisions of the Code on Crime against
Person, Personal Liberty and security and property have bearing on the
security and protection of one's life, liberty and property.
4. _________________ It is a Latin word which subjective meaning of security as
"freedom from anxiety or fear".
5. _________________ It is a condition that could lead to a loss.
6. _________________ These functions are performed to address threats and
deter or prevent the risk from occurring.
7. _________________ These functions are performed to identify the person
responsible and liable for the event and subsequent loss and justify sanctions
against the said person.
8. _________________ What law defines Watchman or Security Guard,
Watchman or Security Guard Agency, Sec.4 who may organize a security or
watchman agency and the Sec. 18 of the penal provision of Republic Act No.
5487.
9. _________________ It is the motto of security which means "He watches that
they may sleep".
10. _________________ It is defined as are programs implemented to avoid
repetition of the same event.
WEEK 2:

Specific Objectives

At the end of the topic the student must be able to understand the following:

1. To know the Triad of Crime or the Elements of crime.


2. To identify the Division of security management.
3. To know the Triangular function of law enforcement in reaction
measures.
TRIAD OF CRIME

OPPORTUNITY

DESIRE
ABILITY

There are three elements that should be satisfied in order to complete


commission of crime. They are Desire, Opportunity and Ability. Eliminate

one of these elements and no crime will happen. Practically, in crime

prevention you have no control over the first two elements because it

remains in the imagination of the person with interest. However, you can

have great control in the commission of crime if you eliminate Opportunity,

which is the very essence of crime prevention effort.

TRIANGULAR FUNCTIONS OF LAW ENFORCEMENT


REACTIVE MEASURES
PROACTIVE MEASURES COUNTER
MEASURES
It is important to note that proactive measures and reactive measures are

totally different from countermeasures, although they have similar objective.

Proactive measures are designed to prevent crime from happening while

countermeasures are designed to prevent a crime from happening again.

Reactive measures will come into play to point out what was wrong? What

was the problem? Identify the criminal and solve the crime.

TYPES OF CONTROL

1. Administrative controls consist of approved written policies, procedures,

standards and guidelines. Administrative control from the framework for

running the business and managing people. They inform people on how the

business is to be run and how day to day operations are to be conducted.


2. Logical controls (also called technical control) use software and data to

monitor and control access to information and computing systems.

(E.g. passwords, network and host based firewalls, network intrusion

detection systems. Access control lists, and data encryption and logical

control.

3. Physical controls monitor and control the environment of the work place

and computing facilities. They also monitor and control access to and from

such facilities.

(e.g. doors, locks, heating and air conditioning, smoke and fire alarms, fire

suppression system, cameras, barricades, fencing, security, guards, cable

locks, etc.)

ACCESS CONTROL

Identification is an assertion of who someone is or what something is.


1. Authentication is the act of verifying a claim of identity. When Dr.

Miller Peckley goes into a bank to make a withdrawal, he tells the

bank teller he is Dr. Peckley (a claim of identity). The bank teller asks

to see a photo ID, so he hands the teller his driver's license. The bank

teller checks the license to make sure it has Dr. Peckley printed on it

and compares the photograph on the license against the person

claiming to be Dr. Peckley. If the photo and name match the person,

then the teller has authenticated that Dr. Peckley is who he claimed to

be.

There are three different types of information that can be used

for authentication: something you know (e.g. include such things as

a PIN, a password, or your mothers' maiden name.), something you

have (e.g. include a driver's license or a magnetic swipe card.) or

something you are refers to biometrics. Example of biometrics

includes palm prints, finger prints, voice prints, and retina (eye) scans.
Strong authentication requires providing information from two of the

three different types of authentication information. For example,

something you know plus something you have. This is called two

factor authentications.

On computer systems in use today, the Username is the most

common form of identification and the password is the most common

form of authentication. Usernames and passwords have served their

purpose but in our modern world they are no longer adequate.

Usernames and passwords are slowly being replaced with more

sophisticated authentication mechanism.

• After a person, program or computer has successfully been identified

and authenticated it must be determined what information resources

they are permitted to access and what actions they will be allowed to

perform (run, view, create, delete, or change.) This is called

Authorization.
The above stated concept is better known as IAA (Identify-

Authenticate-Authorize) security sequence or known also as security control

protection sequence process in security management.

THE PRINCIPAL DIVISIONS OF SECURITY MANAGEMENT

In the business world, the major areas of security management is

considered universal, whatever countries, what industry, the application is the

same.

In the field of security, there are only three areas covering the different

types, kinds or specialization in security. They are the following: (Figure 1)

1. Physical Security is the sum total of all physical protection employed

or installed to secure assets.


2. Personnel Security is the sum total of procedures followed, inquiries

conducted, and criteria applied to determine the work suitable of a

particular applicant or retention or transfer of a particular employee.

3. Information Security is the sum total of all policies, regulation,

practices, enforce to safeguards the contents and integrity of any

classified information or document from compromise or loss.


PRINCIPAL DIVISIONS OF SECURITY MANAGEMENT

WHAT KIND OF SECURITY?

PHYSICAL SECURITY PERSONNEL SECURITY

INFORMATION
SECURITY

WHAT PROCESS OR SYSTEM?

FIGURE 1

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 1 of 153
TYPES OF SECURITY

1. Hotel Security - A type of security applied to hotels where its properties are
protected from pilferage, loss, damage and the function in the hotel
restaurants are not disturbed and troubled by outsiders or the guest
themselves. This type of security employs house detectives, uniforms guard
and supervisor and insures that hotel guests and their personal effects
safeguarded.

2. Bank Security - This type of security is concern with bank operations. Its
main objective is the protection of bank cash and assets, its personnel and
clientele. Security personnel are trained to safeguard bank and assets while
in storage, in transit and during transactions.

3. School Security - A type of security that is concern with the protection of


Students faculty members, and school properties. Security personnel are
trained to protect the school property from theft, vandals, handling campus
riots and detecting the use of intoxicated drugs and alcohol by the students.

4. Supermarket or Mall Security - A type of security which is concern with the


protection of the stores, warehouses, storage, its immediate premises and
properties as well as the supermarket personnel and customers. Security
personnel are trained to detect "shoplifter", robbery, and bomb detection and
customer relation.

5. Aviation Security - A type of security which is concern with the protection of


the Airline Industry.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 2 of 153
Progress Check (Exercises 2)

ESSAY: Discuss in your own words (COPY ANS ASNWER) 10 points Each

1. Discuss the divisions of security management in its differences

2. Discuss the triangular function of law enforcement reactive measure.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 3 of 153
(WEEK 3)

Specific Objectives

At the end of the topic the student must be able to understand the following:

1. To know the Science and Art of Security.


2. To identify the Major Activities of Security.
3. To familiarize the Private Security Law.

The Science and Art of Security

(Guarding)

Guarding is an activity where one watches over or shields another person or


property from danger, harm, loss or damage. Guarding is a science because it is a
body of knowledge which is composed of time-tested principles and theories and the
application of such.

Guarding as an art requires skills in performing specifically prescribed


functions. It involves the use of human intelligence, physical senses, physical
attributes, experience and flexibility to address a desired security need or result

Major Activities of Security

The basic functions of security are classified as preventive, reactive, and


investigative.

1. PATROLLING

Patrolling is an activity where the continuously observes the surroundings of the


facility for any unusual situation or condition that can be inimical to its security and
safety.

The area to be patrolled is basically called the Area of Responsibility (AOR)

The Components of an Area of Responsibility

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 4 of 153
a. Critical Point (CP). Critical Point is a resource whose lose or damage is
detrimental to the organization. It is also a condition which can provide
opportunity for risks to occur.
b. Area Control Point (ACP). Area Control Point is a point in the AOR where
the guard can have a maximum sensory coverage and reasonable physical
control of the situation.
c. Fixed Area Control Point (FACP). Is a set point on a particular location in
the area of responsibility, from where the guard shall record his location at a
particular time?
d. Transient Area Control Point (TACP) is the actual location of the guard
while on patrol.
e. Control Area (CA). It is the area surrounding the TACP. Experiments
conducted show that a guard can be physically effective within a radius of 50
meters without obstruction. This area is also called area of liability because it
is the area where a guard can control a subject within his capability.

2. RECORDING

Recording is the process of preserving information obtained by the guard while on


duty and while on duty and while performing his specific functions.

The two basic types of security records are reports and logbooks.

Examples of these are the unusual incident report and the investigation report.

Reports are also used to summarize routine operational activities within a specific
period of time. Examples are the daily operations Report and the Weekly Summary
Report.

Logbooks are used for recording the performance or routine functions.

Logbooks are classified according to their application namely, Operations Journal


and Technical Logbooks.

Operations Journal is used to record all the guard activities and observation during
his tour of duty. It is used to record the general compliance of the guard to the

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 5 of 153
performance of the all other functions.

All guards shall maintain a security operations journal while on duty.

The Technical Logbook

A Technical logbook is a record of the compliance of the guard of a specific


security function or procedure. A technical logbook generally has a prescribed format
for the information solicited and it is accomplished in strict chronological order. Its
contents are classified and it is proprietary to the client/organization. Examples of
these are the Visitors Logbook and Materials Logbooks.

1. VISITOR CONTROL

Controlling is an important function in the security work, this is an activity that


challenge the security personnel the use of their technical knowledge and expertise
in security. Controlling includes the use keen observation, observing the people
entering a building, observing the object getting in and getting out of the building,
observing the places around the corner of the building and observing the events
happening inside and outside the building. This is known in security as the observe
and report principles which is focus in the application of the POPE doctrine
(People, Object, Places and Events).

Visitor control is the process of screening out undesirable or illegitimate persons


from entering the facility premises.

Access control is the process of preventing the intrusion of critical spaces and
areas within the facility by unauthorized persons.

"Not until just before dawn do people sleep best; not until people get old do they
become wise".

Chinese proverb

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 6 of 153
CHAPTER 2

R.A.No.5487

THE PRIVATE SECURITY AGENCY LAW

ORGANIZATION AND ADMINISTRATION OF SECURITY GUARD FORCE

On June 01, 1969, R.A. No. 5487 (which was approved and promulgated on
June 13, 1969) otherwise known as "Private Security Agency Law" was enacted
making the Philippine constabulary (PC) as the sole authority to supervise all Private
Security Agencies, Company Guard Forces, and their Security Guards through the
sponsorship in congress by Cong. Toulon Natividad. The purpose of this Act is to
govern the organization and management of the foregoing forces. Later, the control
of Guard Forces was removed from the Philippine constabulary and was transferred
to the National Intelligence and Security Agency (NISA) now NICA (National
Intelligence Coordinating Agency). Since then, several Presidential Decrees (P D.'s)
were issued amending certain portions R.A. No. 5487 such as P.D. No. 1 1 issued
on October 30, 1972, amending certain sections of R.A. No. 5487 particularly
Section 4, who may organize a security and watchman agency; P.D. No. 100 on
January 17, 1973, further amending Sections 3, 4, 5, 8 and 9 hereof which provide
for the improvement of Philippine Constabulary now Philippine National Police (PNP)
to deputize any private detectives, watchman or security guard to assist the PC in
cases of emergency disaster or calamity; Section 1 1 which prescribed the minimum
membership requirements for any Private Detectives, Watchman or Security Agency
to be granted license to operate and its Implementing Rules and Regulations which
further amended R.A. No. 5487 and P.D. No 1 1 and 100.

Purpose of the promulgation of the Revised 2003 Implementing Rules and


Regulations

It is designed to professionalize the security industry as envisioned by the


Philippine National Police in order to make the security business a more
credible and reliable sector in our community.

The 2003 Revised Rules and Regulations implementing Republic Act No. 5487 (As
amended)

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 7 of 153
Pursuant to section 17 of RA No.5487, as amended Section 24, 25 and 26 of
Executive No.262, and in consultation with the Philippine Association of Detective
and Protective Agency Operators, Incorporated (PADPAO), these are revised rules
and regulations governing the Organization and operation of private security
agencies, company security forces and government security units. Scope includes
originally promulgated rules and newly introduced rules and regulation designed to
professionalized the security industry. Substantial revision are made and introduced
due to the professionalization process that PNP has envision for our Private security
industry in order to make the security business a more credible and reliable sector of
our community.

The new provision includes rules on the utilization of security personnel in


which the types of services is to be provided, such as post service, conduction
service, armored service and other security service. The training program for private
security personnel was expanded aimed at developing the skills and knowledge to
suit current and future application. Hence, it now includes specialized courses on
Intelligence and investigation, Basic Crisis Management, Bomb Disposal Training,
Bank Security Training and Basic Aviation Security.

Basic Facts and Terminology

R.A. NO. 5487 — The act that regulates the organization and operation of private
detective, watchman and security guard agencies in the Philippines. This act was
approved on June 13, 1969. It is otherwise known as "The Private Security Agency
Law" has been amended by P.D. no. 100 dated January 17, 1973.

Duty Detail Order/Letter of Instruction - is a written instruction issued by the


agency to its guards to perform lawful activity at specific time, place and date. It shall
include the make, model and serial no. of the firearm issued to the guard and the
name of the operation officer or manager of the agency.

PNPSAGSD - This is the unit under the Philippines National Police which is charged
with the supervision, direction and control of all security agencies in the Philippines.

Permit — A document issued by CPNP or his duly authorized representatives


authorizing a person to engage in the occupation, calling or employment of

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 8 of 153
watchman, security guard or private detective after payment of dues or fees.

Person — Shall include not only natural but also juridical persons such as single
proprietorship, corporations, companies or association, duly organized and
registered with the Security Exchange Commission and /or the Department of Trade
and Industry.

Private Security Service — Shall include the act of providing or rendering service
to watch an establishment whether public or private, building, compound/area or
property, to conduct access control/denial in any form whether physical, manually or
scientifically by electronic monitoring system, for the purpose of securing such
property and at the same time ensuring safety and protection of person within such
areas, to maintain peace and order with in such areas, to conduct private security
training and investigation.

It shall include the act of contracting recruiting, training, furnishing or posting


any security guard, to do its function or solicit individuals, businesses, firms, or
private, public or government - owned or controlled corporation to engages his/its
service or those of his/its security guard, for hire, commission or compensation thru
subscription or as a consultant/trainer to any private or public corporation.

Private Detective Service — Shall include among others the act of providing
personal security protection, inquiry and information gathering, pre-employment
verification and individual background profiling, providing assistance in civil liability
and personal injury cases, insurance claims, and fraud, child custody and protection
cases, for the purpose of assisting in gathering information leading to determination
and / or prevention of criminal acts and/or resolution of legal, financial and personal
problems, private Security Industry Shall cover those in the legal financial and
personal problems.

Security Guard —Sometimes called private security guard or watchman shall


include any person who offers or renders personal service to watch or secure either
a residence or business establishment or both for hire or compensation, and with a
license to exercise profession.

Private detective — Shall mean any person who does detective work for hire,

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 9 of 153
reward or commission, other than members of the AFP, Guard of the Bureau of Jail
Management Penology, Municipal or city jail guards, and members of the PNP or of
any other Law Enforcement agency of the government.

Private security Personnel Shall be natural persons which Include private


security guards, private detectives, security consultant, security officers and others
that may be classified later, rendering performing security and/or detective services
as employed by private security agencies and/or private firms,

Government Security Personnel Shall be natural persons which include


government security guards, detective, security consultant. security officers and
others that may be classified later except those of the AFP. PNP. BJMP. Municipal or
City Jail guards rendering/performing security and/or detective services as employed
by government entities.

Private Security Agency (PSA) -- Shall mean any person association, partnership,
firm or private corporation. who contracts, recruits, trains, furnishes or post any
security guard, to perform its functions or solicits individuals, businesses, firms, or
private, public or government-owned or controlled corporation to engage his/its
service or those of his/its security guards, for hire. commission or compensation thru
subscription or as consultant/trainer to any private or public corporation whose
business or transaction involve national security or interest like the 0Rration and/or
management of domestic or ocean vessels, airplanes, helicopters, seaports,
airports. landing strips etc., or as consultant on any security related matter. Or to
provide highly specialized security, detective and investigation services like gangway
security, catering security, passenger profiling, baggage examination, providing
security on board vessels or aircraft, or other security needs that PNPSAGSD may
approve.

Private Detective Agency (PDA) — Shall mean any person, association,


partnership, firm or private corporation, who contracts, recruits, trains, furnishes or
post any private detective, to Perform its functions or solicits individuals, businesses,
firms, or private, public or government-owned or controlled corporation to engage
his/its service or those of his/its detectives,

For hire, commission or compensation thru subscription or as consultant/trainer to

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 10 of 153
any private or public corporation or as consultant on any detective related matter, or
to provide highly specialized detective and investigation services, or other detective
needs that PNPSAGSD CSG may approve.

License to Exercise Profession(LEP) — Shall mean any document issued by the


chief PNP or his duly authorized representative recognizing a person to be qualified
to perform his duties as private security or training personnel.

License to Operate (LTO)—ls license Certificate document, issued by the C/PNP or


his duly authorized representative, authorizing a person to engage in employing
security guard or detective, or a juridical person to establish, engage, direct, manage
or operate an individual or a private detective agency or private security
agency/company security force after payment of the prescribed dues or fees as
provided.

Company Guard Force (CGF) — A security force maintained and operated by any
private company/corporation utilizing any of its employees to watch, secure or guard
its business establishment premises, compound or properties.

Government Guard Unit (GGU) — As a security unit maintained and operated by


any government entity other than military or police, which is established and
maintained for the purpose of securing the office or compound and/or extension of
such government entity.

PNP — As used herein mean the Philippine National Police, which was organized
pursuant to the provision of RA No.6975 otherwise known as DILG LAW.

SAGSD — As used herein shall refer to the current PNP Civil Security Group
Security Agency and Guard Supervision Division or any other PNP office that may
be designated later as the primary office for supervision of the implementation of
these rules and regulations.

PADPAO — Refers to the Philippines Association of Detective and Protective


Agency operators, Inc., Which is an association of all licensed security agencies and
company security forces. PADPAO is authorized to issue the implementing rules and
regulations

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 11 of 153
Duty Detail Order - Is a written order/schedule issued by a superior officer usually
the private security agency/branch manager or operation officers to security guard
and detective?

(WEEK 4)

Specific Objectives

At the end of the topic the student must be able to understand the following:

1. To know the Typical Structure of Security Organization.


2. To identify the Basic Guidelines in Security Organization.
3. To familiarize Types of Security Guard Force.

Basic Guidelines in Security Organization

A. Who may organize and maintain a PSA and PDA?

Any Filipino citizen or corporation association, partnership may organize and


maintain PSA and PDA. one hundred percent (100%) is owned and controlled by
Filipino citizen.

B. Basic age basic requirements age requirement of an operator of an operator


of Agency The basic age requirement of an operator or manager of agency is not
less than twenty-five (25) years old of age.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 12 of 153
C. New applicant for license to operate
Minimum capitalization of one million (1 with minimum bank deposit of five
hundred thousand (P500,00.00) pesos in order to stat its business.

D. Membership
No regular license shall be granted to any private security agency unless it
has minimum of two hundred (200) licensed private security personnel under its
employment. No regular license shall be granted to any company guard's force or
private detective agency unless it has a minimum of thirty (30) licensed private
security personnel under it employment. The maximum member of private security
personnel that a PSA/CGF/PDA may employ shall be one thousand (1000). The
Validity of all LTO is two (2) years.

E. Application of LTO
The application shall contain the full name of the applicant, his age, civil
status, his residents and location of business. New applicant — Applicant from NCR
may file their application for license to exercise profession with the personnel
licensing section, SAGSD, Civil Security group, Camp Crime, Quezon City.
Applicants from the province may file their application with the Firearms, Explosives,
Security Agencies and Guard Section (FESAGS). Regional Operation and Plan
Division (ROPD) of the Police Regional Office concerned

F. Renewal of license to operate


All applications for renewal of license to operate shall filed at least sixty (60)
days before expiry date of LTO subject of the renewal application filed/accepted
thereafter shall penalized for late filing. In addition to other renewal requirements
under provision of these rules and regulation, no application shall approve unless a
certification is issued by FED-CSG of the effect that all licensed firearms of the
agency concerned are updated/renewed for at least one (1) year forthcoming during
the validity of the renewed LTO.

G. Payroll
Payroll shall be filed with the main office within fifteen (15) days after pay day.

H. Possession of Firearm
Ratio — One (1) firearm for every two (2) — (1:2) security guards in its

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 13 of 153
employed. No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500
units.

l. Restriction to possess high powered firearms

a. The firearm first be registered with the FED before issuance and shall not
be used or transferred in places other than those specially authorized by the
Director, CSG.

J. The total number of high-powered firearms that an agency or security force/unit is


authorized to possess shall not exceed ten percent (10%) of the total number of
security guards of watchmen in its employed.

Stocking of Ammunition
PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed
firearms Individual issue to each security guard shall be limited to one half of such
basic load or (25) rounds for every security guard.

Security Guard Force


Is a group of forces of men selected, trained or grouped into functional
unit for the purpose of protecting operational process from disruption which would
impede efficiency or halt operations at a particular plant, facility, installations or
special activities?

Types of Security Guard Force

1. Company guard force


2. Private security guard force
3. Government guard force

Firearm/weapons authorized for used by the security guard while on duty

1. Handgun
2. Shotgun
3. Riot gun of prescribed caliber

Basic three weapons of security guard

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 14 of 153
1. Firearm
2. Handcuff
3. Nightstick

Justification for a guard's firearm to be confiscated

1. When firearm to be used or being used in the commission of crime.


2. If carried while guard is not on tour of duty
3. There is written court order.
4. Firearm is carried outside the property, compound or establishment serviced
by the agency without proper authority.

Basic Equipment of a Security Guard

1. Pen and Paper (logbook)


2. Whistle
3. Communication Gadgets (warlike talkie)
4. Flashlight
5. Medicine Kit

TYPICAL STRUCTURE OF A SECURITY ORGANIZATION

The security force of any installation must be organized in accordance with the
principles of responsibility and authority. Each personnel must be assigned to a
position which corresponds to his experience, skills, training and knowledge. This is
to carry out different functions efficiently and effectively and thus insures smooth flow
of the organization. The security positions may be classified into the following:

1. Office of the General Manager I Security Director


a. The office of the General Manager/Security Director is vested with the
authority and responsibility of running the security force by authority of the
President of the Company/Corporation.
b. The General Manager/Security Director is directly responsible to the
President of the Company/Corporation in the operations and administration of
the security force.
c. He is the principal adviser to the president on matters involving security
operations and administration of the security force.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 15 of 153
d. He the overall head of both various staff departments and field units where he
may delegate corresponding authority commensurate to their assigned
responsibility.
e. He implements policies promulgated by the policy making body and executed
by the President.
f. He directs controls and supervises all offices and field units of the force in
their respective assigned tasks.
g. He performs other functions as directed by the President of the
Company/Corporation.

2. Office of the Executive Secretary of the General Manager


a. He is the principal administrative assistant to the General
Manager/Security Director.
b. He prepares communications initiated by the General Manger/Security
Director.
c. He maintains records of scheduled conferences, appointments and other
engagements and advises the GM/SD of such activities.
d. He records and checks outgoing communications signed by the GM/SD as
to its completeness as well as to ensure the timely dispatch to the
addressee through the administrative section.
e. To perform other duties as directed by the General Manager/Security
Director.

3. Office of the Assistant General Manager/Security Executive Director


a. The security Executive Director is the Assistant Manager of the Security
Force and takes the Operational and Administrative Management of the
security force in the absence of the GM/SD.
b. He is directly responsible to the GM/SD.
c. He performs other duties as directed by GM/SD.
4. Office of the Human Resources and Administrative Manager/Staff Director
for Personnel and Administration
Miscellaneous administrative functions:

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 16 of 153
a. Personnel Strengths
b. Replacement
c. Discipline, Law and order
d. Morale and Personnel Services
e. Personnel Procedures
f. Interior Management
g. Personnel Adviser

5. Office of the Operations Manager/Staff Director for Operation


This office is the principal staff on Operations, training, intelligence and
investigation.

6. Office of the Finance


This office is principally concerned with budgeting, finance, reports control and
program review and analysis. Exercises supervision over the management of
engineering activities of the company and the accounting Office. Renders advice,
assistance and guidance to GM/SD on financial management. Specific duties
and functions of the Finance Office are:
a. Accounting
b. Credit and collection
c. Bookkeeping
d. Billing
e. Payroll
f. Disbursing
7. Office of the Logistic Manager
This office is in charge of the following:
a. Coordinates plans and supervise the implementation of directives.
b. Develops, administer, and coordinates research and development on
logistical matters.
c. Collects computes and evaluates statistical data on logistical matters.
d. Recommends logistics budget policy including budget planning.
e. Prepares estimates and/or requirements to ensure that logistical plans
support for corporate plans.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 17 of 153
f. Performs necessary program and fiscal administration.
g. Supervise all matters pertaining to supply.
h. Determine the allocation of service personnel.
i. Plan for maintenance and repair of equipment.
8. Office of the Inspectorate and Special Projects (Special Staff)
This office assists the General Manager in inquiring into, and reports upon natters
pertaining to the performance of the different staff, units, towards the attainment of
corporate objectives. It also inquires on the state of discipline, efficiency and
economy of the company. The Inspectorate Staff conducts inspections,
investigations and submits.
reports to the General Manager. In the Performance of its duties and functions, the
General Manager is provided relevant information pertaining to meritorious conduct
and performance of a unit or individual. This office is also tasked to conduct overt
and covert inspections and investigations and other related services.

9. Office of the Communications Officer


The communications Officer who is a licensed radio operator is the principal
adviser of the General Manager on communication matters particularly radio
communication. He is responsible directly to the General Manager.

10. The Detachment Commander/Officer-in-Charge


A Detachment Commander shall command and be responsible for a certain
detachment with fifteen (15) or more security personnel under him. He is directly
responsible to the Security manager of the installation.
a. He prepares and executes the security plan of his detachment in relation to
the security requirements of the establishment being guarded.
b. He is responsible for the enforcement and Implementation of rules and
regulations/ policies.
c. He receives instructions from the Security Manager and implements the same
as required.
d. He has full operational and administrative control of all his units to include his
assistant and shift-in-charge/supervisor.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 18 of 153
e. He conducts inspection of his units and institutes corrective measures on the
spot on those problems he may detect or brought to his attention. If not
possible, he brings the problem to the Security manager of the establishment.
11. Assistant Detachment Commander
Detachment with more than twenty (20) security personnel assigned may be
provided with an Assistant Detachment Commander who will be the principal
assistant of the Detachment Commander.
In the absence of the Detachment Commander, he performs
the duties of the Detachment Commander.

12. Shift-in-Charge
a. The Shift-ln-Charge shall be responsible to the Detachment Commander as
far as his shift is concerned.
b. He forms his men at least 30 minutes before posting time seeing to it that all
are in proper uniform and presentable.
c. He disseminates instructions coming from his Detachment Commander/OTC
or those relayed to him by his counter-part, the outgoing SIC.
d. He inspects the post as often as he can to ensure that his men are on the
alert and performing their duties effectively.
e. He performs other duties as may be directed by the Detachment Commander
or by the ADC.
13. SECURITY GUARD on DUTY/POST
a. The Security Guard (SG) on Duty/ Post must always carry his license to
practice his profession, Xerox copy of the firearm's license assigned to him,
and his duty detail order, authorizing him to carry his issued firearm within his
area of jurisdiction.
b. If the Security Guard is manning a fixed post especially entrance or exit
points, he must maintain a guard's logbook and enters in the same logbook all
events/passages of VIP's vehicles and inspections or visits of Security
Manager/Director of the Client/Firm.
c. Guard must observe and apply religiously the provisions of the Code of
Ethics, Code of Conduct, and the General Orders of the Security Guard when
on post.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 19 of 153
d. He may perform special task as may be directed by his shift supervisor, DC
and or ADC, like control of visitors, inspections of bags of person intrusion
coming of unauthorized in and going person out of in the establishment,
vehicle cargoes, or prevents the particular area, etc.

(WEEK 5&6)

Specific Objectives

At the end of the topic the student must be able to understand the following:

1. To know the Science and Art of Security.


2. To identify the Security Guard's Professional Conduct and Ethics.
3. To familiarize the Basic qualifications of an Agency Operator/ Manager
Agency.

Security Guard's Professional Conduct and Ethics


1. Security Guard's Creed

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 20 of 153
As a Security Guard, my fundamental duty is to protect lives and properties
and maintained order within the vicinity or place of duty, protect the interest of my
employer and our clients and the security and stability of our government and
country without compromise and prejudice, honest in my action, words and
thoughts, and do my best to upholds the principles: MAKADIOS, MAKABAYAN
AT MAKATAO.
2. E thical Standard
As security guard/detective, his fundamental duty is to serve the
interest or mission of his agency in compliance with the contract entered into with
the clients or customers of the agency he is to serve thus,
1. 1. He shall be honest in thoughts and deeds both in his official actuation,
obeying the laws of the land and the regulations prescribed by his
agency and those establish by the company he is supposed to serve;
2. 2. He shall not reveal any confidential matter committed to him as a
security guard and such other matters imposed upon him by law;
3. 3. He shall act all times with decorum and shall not permit personal
feelings, prejudices and undue friendship to influence his actuation in the
performance of his official functions;
4. 4. He shall not compromise with criminal and other lawless elements to
the prejudice of the customers or clients and shall assist government
relentless drive against lawlessness and other forms of criminality;
5. 5. He shall carry out his assigned duties as required by law to the best of
his ability and shall safeguard life and property of the establishment he is
assigned to;
6. 6. He shall wear his uniform, badge, patches and insignia properly as a
symbol of public trust and confidence as an honest and trustworthy
security guard, watchman and private detective;
7. 7. He shall keep his allegiance first to the government he is assigned to
serve with loyalty and utmost dedication;
8. He shall diligently and progressively familiarize himself with the rules and
regulations lay down by his agency and those of eh customers or clients;

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 21 of 153
9. He shall at all times be courteous, respectful and salute his superior
officers, government officials and officials of the establishment where he
is assigned and the company he is supposed to serve;
10. He shall report for duty always in proper uniform and neat in his
appearance and;
11. He shall learn at heart and strictly observe the laws and regulations
governing the use of firearm.

3. Code of Conduct
1. He shall carry with him at all times during his tour of duty his license
identification card and duty detail order with an authority to carry firearms;
2. He shall not use his license and privileges to the prejudice of the public, the
client or customer and his agency;
3. He shall not engage in any unnecessary conversation with anybody except in
the discharge of his work and shall at all times keep himself alert during his
tour of duty;
4. He shall not read newspapers, magazines, books, etc., while actually
performing his duties;
5. He shall not drink any intoxicating liquor immediately before and during his
tour of duty;
6. He shall know the location of eh alarm box near his post and sound the alarm
in case of fire or disorder;
7. He shall know how to operate any fire extinguishers at his post;
8. He shall know the location of the telephone and/or telephone number of the
police precincts as well as the telephone number of the fire stations in the
locality;
9. He shall immediately notify the police in case of any sign of disorder, strike,
riot or any serious violations of the law;
10. He or his group or guards shall not participate or integrate any disorder,
strike, riot or any serious violations of the law;
11. he shall assist the police in the preservation and maintenance of peace and
order and in the protection of life, property/ having in mind that the nature of
his responsibilities is similar to that of the latter;

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 22 of 153
12. He shall familiarize himself with the Private Security Agency Law (R.A. 5487)
as amended, and the PNP SAGSD implementing rules and regulations;
13. When issued a pass he should not lend his pass to anybody;
14. He shall always in proper uniform and shall always carry with him his basic
requirements, and equipment such as writing notebook, ball pen, nightstick
(baton) and/or radio. He shall endeavor at all times to merit and be worthy of
the trust and confidence of the agency he represents and the client he serves.

4. General Order
1. To take charge of this post and all companies property in view and
protect/preserve the same with utmost diligence;
2. To walk during tour of duty in military manner, keeping always in the alert and
observing everything that takes place within sight or hearing;
3. To report all violations of orders I am instructed to enforce;
4. To repeat all calls from post more distant from the guardhouse where I am
station;
5. To quit my post only when properly relieved;
6. To receive, obey and pass out to the relieving guard all order from company
officers or officials, supervisors post in charge or shift leaders;
7. To talk to no one except in the line of duty;
8. To sound or call the alarm in case of fire or disorder;
9. To call the superior officer in any case not covered by instructions;
10. To salute all company officials, superiors in the agency, ranking public officials
and commission officers of the AFP and officers of the PNP;
11. To be especially watchful at night and during the time of challenging to
challenge all persons on or near my post and to allow no one to pass or loiter
without proper authority.

5. Security Guard's Daily Self-Appraisal


1. Am I PUNCTUAL in all my daily office schedules, formations, obligations and
duties?

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 23 of 153
2. Am I with stout heart, intense loyalty and complete dedication to surmount all
obstacles and challenges in the daily situation?
3. Is I FIT to perform my duty for the day?
4. Am I in possession of my National License?
5. Am I in proper, neat and clean uniform (polished insignias, belt buckles and
shoes) complete with night stick and/or firearms?
6. Am I presentable in appearance (regular haircut, shaved mustache and beard
and trimmed fingernails)?
7. Am I fully acquainted and well-versed with the duties and responsibilities of a
security guard?
8. Am I thoroughly oriented with the special orders for my post?

6. Don'ts for the Security Guard

1. Don't sit, lean against a wall, stand like a "MATCH BOX", converse
unnecessarily with passer-by and/or acquaintances and smoke while on post.
2. Don't fraternized; be overly familiar with employees and personnel of the
office/entity where you are assigned in the performance of your guard duties
Remember; "familiarity Breeds Contempt".
3. Don't abandon giving the service and/or assistance to the customers of your
client entity, in order to attend to official/officials of the entity, who arrives while
you are still assisting the customers. Bear in mind that customers are very
important persons (VIP) and therefore they should be accorded preferential
treatment and consideration.
4. Don't display lack of keenness in and a feeling of responsibility for the job
assigned to you.
5. Don't forget that you are a cog in the wheel of progress of the entity you are
serving and that in the success of failure of that entity you are bound to have
your due share.
6. Don't let down your guard. Always be on the alert both in mind and body.

7. Don'ts in Handling Firearm

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 24 of 153
1. Don't carry your firearm outside the premises of your place of work without a
mission order.
2. Don't assume that a gun is not loaded. A gun presumed unloaded can kill.
3. Don't load your gun unless you are ready to use it, or to told to do so, by
proper authority.
4. Don't insert your trigger finger or any finger in the trigger guard unless you are
ready to shoot.
5. Don't pull the slide of your pistol without removing its magazine.
6. Don't jerk your gun in any manner.
7. Don't point your gun to yourself or to anybody else unless you are ready to
shoot.
8. Don't peep at the muzzle of your gun unless you have separated the barrel
from the gun or removed away the drum from the barrel.
9. Don't play with your gun loaded or not loaded.
10. Don't tinker with your gun. Give it to an expert the moment you notice
anything wrong to it.
11. Don't forget that accidents don't just happen. They are caused by
carelessness or plain stupidity.
12. Don't allow your firearms to be dirty or rusty.

8. Ten Commandments of Human Relation

1. Speak to People. There is nothing as nice as a cheerful word of greeting.


2. Smile at people. It takes 72 muscles to frown, only 14 to smile.
people by name. The sweetest music to anyone's ears is the sound of his
own name.
3. Be friendly and helpful. If you would have friends, be friendly.
4. Be cordial. Speak and act as if everything you do is genuine pleasure.
5. Be genuinely interested in people. Your cam like almost everybody if you
try.
6. Be generous with praise — cautious with criticism.
7. Be considerate with the feelings of others. It will be appreciated.
8. Be thoughtful of the opinions of others. There are usually three sides to a

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 25 of 153
9. Be alert to give service. What counts most in life is what we do for others.
Add to this a good sense of humor, a big dose of patience, and a dash of
humility and you will be rewarded many fold.

Criteria in the selection of Security Guard

R.A. No. 5487 and its implementing rules and regulations prescribed the
minimum requirements for guard to be able to secure a license to exercise
profession as a security guard, private detective, security officers and security
consultant.

Basic qualifications of an Agency Operator/ Manager Agency

1. The operator or manager of an agency including, managers of branch offices,


must be:
1. Filipino Citizen;
2. Not be less than 25 years of age;
3. College graduate and/or a Commissioned officer, inactive or retired service or
retired from the AFP or PNP.
4. Has taken a course/seminar on industrial Security Management and/or must
have adequate training or experience in the security business; and
5. Good moral character.
2. New applicant for license to operate shall be required to obtained minimum
capitalization of one million pesos (PI with a minimum bank deposit of five
hundred thousand pesos (P500,000) in order to start its business operation.

Basic qualifications of a Security Consultant


1. Filipino Citizen
2. Physically fit
3. Holder of Master degree of Criminology, MPA, MNSA, Industrial Management or
LL.B.
4. Must have at least ten (10) years’ experience in the operation and management
of security business.

Basic qualifications of a Security Officer

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 26 of 153
No person shall be licensed as security officer unless he has the
following qualifications:

1. Filipino Citizen;
2. Holder of Baccalaureate Degree; 3. Physically and mentally fit; and
3. Has graduated from Security Officers Training Course or its equivalent.

Basic qualifications of a Private Detective


No person shall be licensed as a private detective unless possesses the
following qualifications:

1. Filipino Citizen
2. Physically and mentally fit
3. Holder of a baccalaureate degree preferably Bachelor of Law, BS
Criminology.
1. Graduate of a criminal Investigation Course offered by the PNP or the NBI or
any police training school, or detective training in any authorized/recognized
training center; and
2. Advance ROTC/CMT graduate or its equivalent.

Basic qualifications of a Private Security Guard:


No person shall be licensed as security guard unless he possesses the
following qualification:
1. Filipino Citizen;
2. High school graduate;
3. Physically and mentally fit;
4. Not less than 18 years of age nor more than 50 years old.(for new applicant
and SGS in supervisory position); and
5. Has undergone a pre-licensing training course or its equivalent

Desirable qualities of Security Guard


1. Alertness
2. Judgment
3. Confidence
4. Physical fitness
5. Tactfulness

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 27 of 153
6. Self-control
7. Interest
8. Loyalty
9. Responsible and
10. Trustworthy

Licenses in the Security Profession


1. License to Operate — Before a Private Security Agency (PSA) can
operate, it has to secure a License to Operate (LTO) categorized as either
Temporary or Regular. A temporary license is issued by the PNP thru Civil
Security Group Directorate after the applicant /licensee should have
complied with all the requirements while it has less than two hundred
guards. A regular license to operate is issued to the PSA once it is
qualified of having two hundred (200) or more license security guard in its
employ duly posted. Regular license is renewable every two (2) years.
2. Security Guard License - Before a security guard can practice his
profession; he shall possess valid security license. The use of expired
license is not allowed. In case of doubt, licenses may be verified at the
PNP SAGSD whether valid or fake.
3. Firearm's license — All firearms of the security agency should be covered
with firearms license issued by the PNP through its Firearms Explosive
Division under the Civil Security Group, renewable every two years. No
duplication of two or more firearms with the same make and serial number
shall be covered by one license.

Guard's Uniforms, Equipment and Paraphernalia

1. Set of Uniforms for Security Personnel


a. Headgear — Pershing cap for men and two ply cap for women.
b. Service Bush Jacket — Intended for Directorial and staff officers.
c. Service Shirt
d. Service Trouser
e. Service belt
f. Footwear

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 28 of 153
2. Color of Uniforms
a. Private Security Agency — Navy blue (upper and lower)
b. Company Security Forces — Light blue/light gray for upper and navy blue for
lower.
c. Government Security Forces — White for upper and navy blue for lower.

3. Ornaments and Patches

a. National badge d. Collar device

b. Cap device e. Name cloth

c. Regulation buckle f. Agency/unit name cloth

4. Equipment and Paraphernalia


a) Leather pistol belt with regulation buckle
b) Holster, black leather for pistol
c) Night stick with horizontal handle
d) Whistle with lanyard
e) Handheld radio
f) Pocket notebook and ball pen

"Security is protecting goods from dangerous people while; safety is protecting people from
dangerous people”.
Anonymous

(WEEK 7)

Chapter 3: PHYSICAL SECURITY

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 29 of 153
Physical Security is defined as a system of barriers placed between the

potential intruder and the matter to be protected. It is the foundation of security. It is

the first thing in security management.

Physical security measures are used to defined, protect, and monitor

property rights and assets. These measure consist of barriers and devices that

would detect, impede and prevent unauthorized access to equipment, facilities,

material and document and to safeguard them against espionage, sabotage,

damage and theft. In security management, physical security is known as the

broadest because it compasses many aspects of physical protection. The passive

and active physical security barriers will differentiate the significant and importance

of physical security in the industry.

Foundation of Physical Security

 System of ‘’ Defense in depth, called ‘’compartmentalization’’.

 Deny entry (Accumulated Delay time)

Basic Principles of Physical Security

 The type of access will depend on the number of variable factors and may

be achieved in a number of ways.

 There is no impenetrable barrier.

 Defense in depth means barrier after barrier.

 Delay provide surreptitious and non- surreptitious entry.

 Each installation is unique and different.

Reasons in Establishing Physical Security

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 30 of 153
The following specific reason are the basic principles why there is a need to

install tangible and visible physical security system.

 Freedom from unauthorized intrusion

 Freedom from theft, damage and arson

 Freedom from outside interruption

Physical Security Concepts

These concepts are used in physical security and in establishing protective

system that would provide guidelines on the initials steps to be taken in protecting

the facility. The concepts are called the 9D’s. These are presented according to the

recommended chronological order for the purposes of systematic institution of each

concept.

1. Define –this is the initial step to be taken in order to determine what are to be

protected which includes the type of the facility, nature of business, type of

customers, materials, policies and its perceived threats and risk. In this area,

personnel are expected to know the ‘’intestine’’ of the building.

2. Direct- after determining the scope of the responsibility, procedures on

ingress and egress of people, visitors, employees and materials should be

established and conform to the standard of the company or organization This

includes response and evacuation during emergencies.

3. Deter- rigorous and consistent enforcement of comprehensive security

program will present a comfortable, safe and secure environment for

customers and the public in general and will discourage would be

perpetrators or person of interest to gain access. Visual evidence is the key.

4. Deny- this serves as one of the objectives of physical barriers which is to

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 31 of 153
deny or prevent surreptitious or non- surreptitious entry to the asset at risk.

Scrutinization is the key.

5. Detect- this concerns to the ability of the system and personnel to detect

unauthorized access to the facility.

6. Disseminate- this condition and cooperation in security profession should co-

exist. Communication is imperative especially when penetration has been

detected in the area of concentration to inform authorized person in the

organization.

7. Delay- when penetration is noted and disseminated, the next thing to do is to

delay and/or verify the subject of the activity. Security personnel should be

firm but courteous. Inspection and scrutinization are viral.

8. Detain- when opportunity warrants, arrest should be immediately made to

understand the circumstances surrounding the incident. Its purpose is to: (1)

recover assets; and (2) deter other perpetrators/intruders.

9. Defend- the final option is to protect the facility when the proceeding concepts

seen to be ineffective. In this aspect, the ability of the personnel to deal with

the present situation is critical.

Levels of Physical Security

1. Minimum Security

This system is designed to impede unauthorized external activities, which

may be in the form of simple intrusion or a serious armed attack. The Protective

objects, therefore, are simple physical barriers such as doors and windows with

ordinary locks.

2. Low- level Security

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 32 of 153
This system is designed to impede and detect some unauthorized activity that

threatens safety. This consists of physical barriers and basic alarms system that

will announce the threat. However, small business offices, stores or warehouse

could be protected with low-level system.

3. Medium-Level Security

This system is designated to impede, detect and assess most unauthorized

external and internal activities. The system should have the following

features:

a) An advance intrusion device installed apart the secured areas

monitored 24 hours.

b) A physical barriers and/or guard dogs set up in a parameter before or

beyond the confined of the asset being protected.

c) A detailed security personnel (preferably unarmed)

d) But with ‘’ mano-mano’’ combat training and equipped with basic

communication gadgets capable to warn and/or get off site assistance.

Entities and sites such as large manufacturing plants, large bonded

warehouses, and mega malls are suited for medium-level security.

4. High-Level Security

This system is designed to impede, detect and assess unauthorized external

and internal activities. This system is composed of all the measures and devices

incorporated in the three (3) levels above- cited plus the following:

a) Close-Circuit Television (CCTV)

b) A parameter alarm system remotely monitored at or near the high

physical barriers.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 33 of 153
c) Security lighting equivalent to at least .02-foot candle of light around

the entire protected area is required.

d) A highly trained, well screened guard force or unarmed watched

people who are equipped with adequate advance means of

communications such as uninterrupted dedicated telephone lines, two-

ways radios with police linkages, cellular phones, duress alarms, etc.

e) Electronic controls designed to restrict access to authorized persons

within the facility.

f) Pre- defined arrangement with police for ready response and

assistance is needed.

g) Coordination with other law enforcement authorities is also needed.

5. Maximum Security System

This system is designed to impede, detect, assess and neutralized external

and internal activities. This system consists of all previously- cited resource and

should incorporate the following:

a) A highly- sensitive sophisticated and advance alarm system too strong

to be foiled be alone individual remotely monitored in one or more

protected locations and properly set up with back-up source of power.

b) An armed highly- trained and well-screened guard force detailed 24

hours and equipped with contingency armed system coupled with

neutralizing or containing any threats against the protected facility unit

the arrival of the off-site assistance.

Maximum security is security-in-depth, a system with sufficient diversity and

redundancy to allow the strength of one particular component to offset the weakness

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 34 of 153
of another. As a general rule, the more layer, the more efficient and more difficult to

foil or defeat the system. The maximum security depends upon the total system not

on its individual component. Highly sensitive establishments and places such as

maximum prison cell, Military bases, nuclear facilities, research laboratories, special

manufacturing sites and facilities, embassies, etc. practice this highest level of

physical security system.

Physical Barrier refers to any physical whether natural or man-made

capable or restricting, deterring, delaying or preventing illegal and unauthorized

access to an installation. The purpose of protective lighting at night have contributed

to modern man’s attempt to discourage intruder, pilfer, and other entrants of devious

intent.

Two general types of Physical Barrier

1. Natural Barrier- Such as rivers, cliffs, and ravines, etc. which delay or make

more difficult the entry of the intruder.

2. Man-made Barriers- Are structural construction like fences walls, floors, roofs,

grills, bars, roads block, or other physical means to deter or impede penetration.

Kinds of Barrier

1. Natural Barrier- it includes bodies of water, mountains, marshes, ravines,

deserts or other terrain that are difficult to traverse.

2. Structural Barrier- These are features constructed be man regardless of their

original intent that tends to delay the intruder. Example are walls doors,

windows, locks, fences, safe, cabinets or container etc.

3. Human- Barrier- Persons being used in providing a guarding system or by the

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 35 of 153
nature of their employment and location, fulfill security functions. Examples are

guards, office personnel, shop workers, etc.

4. Animal Barrier- Animals are used in partially providing a guarding system.

Dogs are usually trained and utilized to serve as guard dogs. Germans

shepherds are best suited for security function. While not completely fool-

proof, the proverbial dog should provide a good way of discourage unwanted

people to the establishment. Goose and turkeys could also be included.

5. Energy Barrier- It is the employment of mechanical, electrical, electronic

energy imposes a deterrent to entry by the potential intruder or to provide

warning to guard personnel. These are protective lighting, alarm system and

any electronic devices used as barriers.

Generally, a barrier is use for the following purposes

1. Outline the physical limits of an area.

2. Create a physical and psychological deterrent to unauthorized entry.

3. Prevent penetration therein or delay intrusion, thus, facilitating

apprehension of intruders.

4. Assist in more efficient and economical employment of guards.

5. Facilities and improve the control and vehicular traffic.

Three Lines of Physical Defense

1. First line of defense – Perimeter fence / barriers

2. Second line of defense – Doors, floors, windows, walls, roofs, and grills, and

other entries to the buildings.

3. Third line of defense- Storage system like steel cabinets, safes, vaults and

interior files.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 36 of 153
Perimeter Barrier

A medium or structure which define the physical limit of an installation or area

that restricts or impedes access thereto. It is any physical barrier used to

supplement the protection of an inside or outside perimeter. The main purpose of

perimeter barrier is to deny or impede access or exit of unauthorized person.

Basically, it is the first line of defense of an Installation. This is maybe in the form of

fence, building walls or even bodies of water. The function and location of the facility

itself usually determine the perimeter of the installation.

Classification of a Perimeter Barrier

1. Inside Perimeter

2. Outside Perimeter

Types of Perimeter Barrier

1. Fence

2. Wall

3. Bodies of Water

A. WIRE FENCE

Minimum acceptable requirements for fence used as security barrier:

 Height: Eight feet at minimum.

 Slack at the bottom: Not to exceed two inches if the fence is not taut then it

should extend even closer to the ground.

 Wooden fence post: Minimum horizontal dimension of four inches by four

inches.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 37 of 153
 Steel fence post: The round type should be at least two inches in diameter

and the H-beam type must measurable no less than two inches at the

smallest diameter.

 Fence posts: Fence post should be set in concrete or in firm soil using

commercial drive anchors, to a depth of three feet; Maximum distance

between posts in ten feet.

 Fence top: There should be something on the top of the fence to deter

persons attempting to go over the fence good example would be the use of

barbed wire overhang, holding the stands of barbed- wire should be two feet

long and should be extended at 45-degree angle in the direction of the

expected approach.

 Fence area: The area surrounding the fence should be cleared of trees and

vegetation and or the materials which would offer concealment to the intruder

or would aid him in scaling.

 Fence Gate: Gate should be limited to the number necessary for efficient and

safe operation of the installation.

 Fence opening: all opening in the fence in excess of 96 inches must be lock

barred, or screened in such away many only be unlocked and opened from

the inside and only be selected personnel.

 Multiple fence: If used, multiple fence should be at least ten feet apart and

the overhang on the top of the inner fence should point inward rather that

away from the installation maximum distance any two parallel fence should

not exceed 150 feet.

Wire fencing can be barbed wire, chain link and concertina. Chain link is for

permanent structure, barbed wire for semi-permanent, and concertina for the least

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 38 of 153
permanent and also can be used as a temporary road block or impediment during

strikes and crowd control. Wire fences are attractive and low in maintenance cost;

they offer fewer hazards to people because of the absence of barbs, and the

openings are small to prevent passage of pilfered article.

TYPES OF FENCE

1. Solid Fence

2. Full-View Fence

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 39 of 153
Types of Full-View Fence:

 Chain Link Fence

 It must be constructed of 7 feet material excluding top guard.

 It must be of 9 gauges or heavier.

 The mesh openings are not to be larger than 2 inches per side.

 It should be twisted and barbed salvage at top and bottom.

 It must be securely fastened to rigid metal or reinforced concrete.

 It must within 2 inches of hard ground or paving.

 On soft ground, it must reach below surface deep enough to compensate

for shifting soil or sand.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 40 of 153

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 41 of 153
 Barbed Wire Fence

 Standard barbed wire is twisted, double-strand, 12-gauge wire with 4 point

barbs space on equal distance apart.

 Barbed wire fencing should not be less than 7 feet high excluding top guard.

 Barbed wire fencing must be firmly affixed to post high excluding top guard.

 The distance between strands will not exceed 6 inches and midway

between parts.

Concertina Wire Fence

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 42 of 153
 Standard concertina barbed wire is commercially manufactured wire coil of

high strength steel barbed wire clipped together at intervals to form a

cylinder.

 Opened concertina wire is 50 feet long and 3 feet in diameter.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 43 of 153
B. BUILDING WALL

Wall, Floor, roof or their combination serve also as barriers and they should

be of such construction to provide uniform protection just like the wire fencing.

Masonry walls as perimeter barrier should have the same heights as the

chain lick and surmounted by the barbed wire top guard; if the height of the masonry

is less than the prescribed, additional chain link as ‘’topping’’.

Wall can be made of stone slabs like adobe or hollow bound by concrete with

post at regular intervals to prevent the wall from topping due to wind, or scouring

facilities, security must sit down with design engineers so that area where sensitive

activity will be done should be given special emphasis in protective walls.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 44 of 153
LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 45 of 153
C. BODIES OF WATER

Bodies of water like river, lake, marsh, sea pond or any other bodies of water

forming a part of the wall, building or fencing should never be considered adequate

natural perimeter barrier. Additional security measures like wire fence, concrete

walling, security patrolling and floodlighting at night may be necessary of the

perimeter.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 46 of 153
 Perimeter Barrier Opening

 Gates and Doors- When not in use and controlled by guards. Lock should

be changed from time to time and should be covered under protective

locks and key control.

 Side-walk-elevators- These provide access to areas within the perimeter

barrier and should be locked and guarded.

 Utilities Opening- Sewers, air intakes, exhaust tunnels and other utility

openings which penetrate the barrier and which have cross sectional

areas of 96 square inches or more should be protected be bars, grills,

water filled traps or other structural means providing equivalent to that

portion of the perimeter barriers.

 Clair Zones- An obstructed area or a ‘’clear zone’’ should be maintained

on both sides of the perimeter barrier. A clear zone of 20 feet or more is

desirable between the barriers and exterior structures and natural covers

that may provide concealment for assistance to a person seeking

unauthorized entry.

 Specification on clear zones:

 Clear zones of 20 feet or more should exist between the perimeter barriers

and exterior structure, parking areas and natural or man-made features.

 A clear zone of 50 feet or more should exist between the perimeter barrier

and structure within the protected areas except when a building wall

constitutes part of the perimeter barrier.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 47 of 153
Security Specification for windows or opening

Windows or opening less than 18 feet above ground. Roof, ledges, etc. or

less than 14 feet directly or diagonally, opposite uncontrolled widows in other walls,

fire, escapes or other opening of 96 square inches or larger should be grilled or have

steel bar protections.

Additional Protective Measure

1. Top Guard- Additional overhang of barbed wire placed on vertical perimeter

fences upward and outward with a 45-degree angle with 3 to4 strands of barbed

wire spaced 6 inches apart. This increase the protective height and preventive

easy access

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 48 of 153
2. Guard Control Stations- This is normally provided at the main perimeter

entrance to secure areas located out-of-doors, and manned by guards on full-

time basis. Sentry station should be near a perimeter for surveillance at the

entrance.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 49 of 153
3. Tower Guard- This house like structure above the perimeter barriers. The

higher the tower, the more visibility it provides. It gives a psychological

unswerving effect to violators. By and large guard towers, weather

GUARD AND GUARD SYSTEM

The high-tech security equipment does not mean it will replace the

deployment of security guard. It will help reduce expenditures of a company

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 50 of 153
from employing additional security guards is certain. The deployment of

security guard is still dependent on the security plan of the company hence;

guard and guard sulystem is still very important subject matter to be included

in the discussion of this book.

A. Function that must be accomplished by the guard system

 Detect intruders

 Sound Alarm

 Apprehend unauthorized personnel and

 Identify authorized personnel.

B. Human Barriers

1. Guard Procurement: Selection criteria

 Must be eligible for security clearance

 Vigorous and physically able to serve in the capacity of a guard

 Intelligence necessary to accomplished the guard function

 The ability to make rapid decisions and to react in a calm way

emergencies

 Loyalty and discretion are required attributes and

 Experience is highly desirable although not usually mandatory.

2. Guard training: Programs of training should include

 General orientation

 Instruction in security procedures of the installation, first aid, and

Communication.

 Instruction in traffic control, riot control, and self-defense.

 Weapons qualifications to include maintenance and safety.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 51 of 153
 Refresher course and advance training in specific subjects.

3. Guard employment: Two basic techniques of guard employment

 Fixed post.

 Patrol

4. Guard supervision

 Personal supervision

 Artificial Supervision

1. Recorded tour- Guard takes with him on his your of duty a form which must

have the time punched on it at each station.

2. Supervisory Tour- This is where the guard sends signals to guard

headquarters from each station that he checks.

5. Guard Communication

a. Primary Communication b. Emergency Communication

PROTECTIVE LIGHTING

The idea that lighting can provide improve protection for people and

facilities is as old as civilization. Protective Lighting is the single most cost-

effective deterrent to crime because it creates a psychological deterrent to the

intruders. The main concern of security protective Lighting is to provide

illumination during the hours of darkness. Ideally, the security guard can have

a better observation and identification of would be intruders into the

establishment.

Purposes of Protective Lighting

 It provides sufficient illumination to the areas during hours of darkness

 Lighting can help improve visibility so that intruder can be seen and

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 52 of 153
identified and, if possible, apprehended.

 It serves as deterrent to would-be thieves.

Types of Protective Lighting

1. Continuous Lighting- The most familiar type of outdoor security lighting, this

is designed to provide two specific results, glare projection and controlled

lighting. It consists of a series of fixed luminaries at range to flood a given area

continuously during the hours of darkness.

b. Glare projection type- The intensity is focus to the intruders while the

observer or guard remained in the comparative darkness,the lighting is toward

of the approach of an entrance to an installion.

c. Controlled Lighting- The lighting is focused on the pile of items, rather than

the background. The width of the lighted strip can be controlled and adjusted to

suit the security needs.

d. Standby Lighting- It is designed for reserve or standby use or to

supplement continuous systems. A standby system can be most useful to

selectively light a particular area in an occasional basis.

2. Movable or Portable Lighting- This system is manually operated and is

usually made up of movable search or floodlights that can be located in

selected or special locations which will require lighting only for a short period of

time.

3. Emergency Lighting- This system is used in times of power failure or other

emergencies when other system are inoperative.

General Types of Lighting Source

Listed below are the general lighting sources that are mostly used in providing

indoor or outdoor Lighting.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 53 of 153
1. Incandescent Lamp- It is the least expensive in terms of energy consumed

and has the advantage of providing instant illumination when the switch is on.

2. Mercury Vapor Lamp- It is considered more efficient that he incandescent

and used widespread in exterior lighting. This emits a purplish-white color,

caused by an electric current passing through a tube of conducting and

luminous gas.

3. Metal halide- It has similar physical appearance to mercury Vapor but

provides a light source of higher luminous efficiency and better color rendition.

4. Fluorescent- This provides good color rendition, high lamp efficiency as well

as long life. However, it cannot project light over long distance and thus are not

desirable flood type lights.

5. High pressure sodium vapor- This has gained acceptance for exterior

lighting of parking areas, roadways, buildings and commercial interior

installations. Constructed on the same principle as mercury vapor lamps, they

emit a golden white to light pink color and this provide high lumen efficiency and

relatively good color rendition.

Types of Lighting Equipment

Four types is lighting equipment are generally used or associated with security

lighting.

These are:

1. Floodlight- This can be used to accommodate most outdoor security lighting

needs, including the illumination of boundaries, fences and buildings and for the

emphasis of vital areas or particular buildings.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 54 of 153
2. Street light- This lighting equipment received the most widespread notoriety

for its value in reducing crime.

3. Search light- This are highly focused incandescent lamp and are designed

to pinpoint potential trouble spots.

4. Fresnel light- This is wide beam units, primary used to extend the

illumination in long, horizontal strips to protect the approaches to the perimeter

barrier. Fresnel projects a narrow, horizontal beam that is approximately 180

degrees in the horizontal and from 15 to 30 degrees in the vertical plane.

Protective Lighting Requirement

1. Protective lighting needs at installation and facilities depend on each situation

and the areas to be protected l. Each sutuat6 requires careful study to provide

the best visibility practicable for security duties identification of badges and

people at gate, inspection of vehicles, prevention of illegal entry, and

detection of intruders inside or outside the buildings and other structures and

inspection of unusual or suspicious circumstances.

2. When such lighting provisions are impractical, additional security posts,

patrols, sentry dog patrols, or other security means will be necessary.

3. Protective Lighting should not be used as a psychological de.

4. Torrent only. It should be used on a perimeter fence line only where the

perimeter fence is under continuous or periodic observation.

5. Protective Lighting may be desirable for those sensitive areas or structures

within the perimeter, which are under specific observation. Such areas include

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 55 of 153
vital buildings, storage, and vulnerable control points in communication,

power and water distribution system. In interior areas where night operations

are conducted, edequate lighting on the area facilitates detection of

unauthorized person's approaching or attempting malicious acts within the

area.

General Consideration in Protective Lighting

In planning a protective Lighting system, the owner of the installation or

his security director must give specific considerations to the following areas:.

1. The determination of lighting needs must be dependent upon the threat,

perimeter extremities, surveillance capabilities, and available guard forces.

2. Protective Lighting must be designed to discourage unauthorized entry and

to facilitate detection of intruders approaching or attempting to gain entry into

protected areas.

3. The Protective Lighting must be continuously operates during periods of

reduced visibility, and that standby Lighting is maintained and periodically tested

for use during times of emergency and mobilization alerts.

4. Cleaning and replacement of lamps and luminaries, particularly with respect

to costs and means required an available.

5. The effects of local weather conditions may be a problem in cases where

fluorescent units are used.

6. Fluctuating or erratic voltages in the primary power sources.

7. Requirements for grounding of fixtures and use of common ground on an

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 56 of 153
entire line to provide a stable ground potential.

Areas to be Lighted

1. Perimeter fence

2. Building face perimeter

3. Pedestrian Gate- should be lighted about 25 feet on either side of the gate if

possible and the range for vehicular gates should be twice that of street lighting

is recommended in these application, but floodlights can be used if glare is

strictly controlled.

4. Vehicular Gate- Normally manned by guards inspecting credentials, as well

as inspecting for contraband or stolen property, it is critical that the area to be

lighted to at least one foot candle.

5. Parking are- This include vital building, storage depots, and vulnerable

control points in communication power, light and we're distribution system.

6. Thoroughfare- Used for pedestrian, vehicles or forklift should be lighted to

0.01 candles for security purpose.

7. Storage, large opened working areas, piers, docks, and other sensitive

areas.

Types of Protective Alarm System

 Central Station System.

 Proprietary system

 Local Alarm

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 57 of 153
 Auxiliary Alarm

 Local Alarm by chance System

 Dial alarm system.

Kinds of Alarm

o Audio Detection Device

o Vibration Detection Device

o Metallic foil or wire

o Laser Beam Alarm

o Photoelectric or Electric Eye Device

o Microwave Motion Detection Device

Foot Rail Activator

Foot Rail Activator I'd place on the floor in such a position that tellers

may activate the alarm by placing the front of their foot to engage the

activation bar.

Foot Rail do not acquire any obvious use of the teller's hand and their

hands may kept in full view of the robbers for reason of safety, because foot

Rail can be activated very obtrusively.

Disadvantage

Tellers with platform shoes, itchy feet, or using brooms and other

articles will often inadvertently cause a false alarm.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 58 of 153
Bill Traps

Bill Traps or currency activation devices are usually place in the teller's

cash drawer and connected to the alarm system using a wire connector.

When currency is removed from the devices, the alarm is activated.

The advantage of these devices is that the robbers themselves

frequently remove the currency and activate the alarm. This is particularly

helpful when the employees are immediately force to leave their station

without having opportunity to activate the alarm safely.

Knee or Thigh Button

This is installed inside the desk or tellers station which can be

activated by knee or thigh pressure. They are commonly found in location

where personnel usually perform their duties from seated position.

Foot button

Like the foot rail permit alarm activation relatively safely while both

hands remain clear from the view of the robbers.

Double squeeze buttons

Required pressure on both side of the device and therefore the

probability of accidental alarm is reduce.

Utilization of alarm devices

The selection of proper alarm system is not a simple matter, because

the needs of each installation are different, like a set of fingerprints. Some

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 59 of 153
factors that determine the requirements of the installation will include the

following:

1. Nature of the area or installation

2. Critically of the area or complex

3. Vulnerability of the area or complex

4. Accessibility

5. Location of installation and areas to be protected

6. Construction and types of buildings

7. Hours of normal operations

8. Availability of other types of protection

9. Initial and recurring cost of installed alarm system

10. Design and salvage value of desired equipment

11. Response time of the security force and local police

12. Savings in manpower and money for a period of time if alarm is used

Desirable characteristics of intrusion alarm system

Intrusion alarm devices are designed to detect and not to prevent

criminal acts and should be used normally as an adjunct and not a

replacement of the human guard forces. The primary consideration on the

choice of a particular alarm system includes stability, durability and reliability.

Desirable characteristics furthermore should include:

1. A detection unit should initiate the alarm upon intrusion of a human being in

the area or vicinity up an intrusion of a human being in the area or vicinity to the

protected area or object

2. Panel board central in enunciator operating console- monitoring activities

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 60 of 153
should be manned at all times.

3. An enunciator console indicating the audible and /or aural signal and the

specific location of incident so that proper action can be made by security and

other units

4. Fail-safe features which give alarm in the annunciator when something is

wrong with the system.

5. System should difficult to temper or render ineffective by outsiders,

competitors or saboteurs.

Protective Alarm devices

1. Alarm devices are physical safeguards used to assist security but not a

replacement in the protection of assets and lives in the installation.

2. It assists the guards to extend their hearing and vision even in areas where

they are not physically present.

3. The alarm system whether a local, a central, proprietary, or an auxiliary type

are to inform the guard either visually or aurally of an attempt or a break-in

within the premises being protected.

4. Maintenance of alarm system must be regularly made, the signal line must

be protected, and there must be alternate source of power.

5. New and improved intrusion hardwires are being developed and placed in the

market but again , the human guard is irreplaceable in spite of computerization

and the arrival of super sophisticated devices in security alarm systems.

PROTECTIVE LOCKS AND KEY CONTROL MANAGEMENT

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 61 of 153
Luck is one of the most widely used physical security devices in the

asset protection program of an installation. It complements other physical

safeguards of the installation against any possible surreptitious entry. However,

the owner of the installation or his security officer needs to understand the

weaknesses and strengths of each type of lock including the door, window or

walls to be used to achieve maximum benefits from its application. This is

because highly-skilled burglars more often concentrate on the lock and its

surrounding mechanism in order to make a forcible entry. It is for these obvious

reasons that locks are considered as delaying devices which cannot really top a

determine intruders from destroying the lock just to launch an attack. Hands,

knowledge of the basic principles of locking systems will enable the installation

owner or the security officer to evaluate any lack and determine its quality and

effectiveness in a particular application.

Lock

A lock is defined as a mechanical, electrical , hydraulic or electronic

device designed to prevent entry into a building , room , container or hiding

place.

Types of lock

1. Key operated mechanical lock

Four general groups and key control

a. Disc tumbler lock

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 62 of 153
b. Pin tumbler lock

c. Lever tumbler lock

d. The warded lock

2. Padlock

3. Combination lock

4. Code- operated lock

5. Electrical lock

6. Card-operated lock

Types of key

 Change key

 Sub master key

 Master key

 Grand master key

Key control management

Once an effective key control has been installed , positive control of all

keys must be gained and maintained. This can be accomplished only if it is

established in conjunction with the installation of new locking device. The

following methods can be used to maintain effective control;

1. Key cabinet

2. Key record

3. Inventories

4. Audits

5. Daily report

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 63 of 153
Principles of Key Control Management

The essence of key control in a security system can never be

overemphasized, key control management will assist protective system in

use. The following pointers will be helpful in any system.

1. A Key depositor for securing keys during non-working should be centrally

located, locked and kept under supervision of security personnel.

2. Key issued on daily basis, or this issued for a pacific on time purpose, should

be accounted for daily.

3. Key should be counted and signed for by security supervision at the

beginning of each working day.

4. When the key is lost, the circumstances should be investigated and set forth

in writing. In some instance, if the lost key provides access to sensitive area,

lock should be change.

5. All keys should be physical inspected periodically to ensure that they have

not been lost though unreported as such.

6. Careful record should be kept of such instance. The list should be reviewed

periodically to determine whether all those authorized should continue to hold

such key.

7. Master key should be in minimum. If possible, sub master key should be

used, and they should be issued only to limited list of personnel specially

selected by management.

8. Key should not be marked or should not identify doors are locks they open.

Code should be made to this effect.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 64 of 153
9. Master key should be mark identifying them as a master key.

10. Key and locks should be change at least once in 12 months.

Laws related on Key Control Management

Statutory Prohibition of Rey

ART. 304 (revised penal code). Position of picklocks or similar tools

Any person who shall without lawful cause have in possession of

picklocks or similar tools especially to the commission of the crime of robbery.

Shall be punished by arresto mayor in its maximum period to prison

correctional in its minimum period

The same penalty shall be imposed upon any person who shall make

such tool. If the offender is a locksmith , shall suffer the penalty of prison

correctional in its medium and maximum period.

ART. 305 (revised penal code). False key:

The term"false key" shall be deemed to include:

a. The tool mentioned in the next preceding articles

b. Genuine keys stolen from the owner.

c. Iniki other than those intended by the owner for use in the lock forcibly open

by the offender.

SECURITY CABINET

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 65 of 153
The final line of defense at any facility is in the high security storage

where papers , records , plants or cashable instrument , jewelry store other

especially valuable assets are protected. These security containers will

depend of a size and quantity , which the nature of the business dictates.

In protecting property , it is essential to recognize that protective containers are

designed to secure against burglary or fire. Each type of equipment has a

specialized function and it will depend on the owner of the facility which type

that is to be used.

Three (3) types of security cabinet

1. Safe-a metallic container used for the safekeeping of documents or small

items in an office or installation . Safe can be classified as either robbery or

burglary resistance defending upon use and need.

 At least 750 lbs. anchored

 Any safe that weigh less than 750 lbs. should be anchored to a building

structure.

 It’s bad you should at least 1 inch thick still or equal.

 Safe as a general rule, require the door to be made of steel and at least

11/2 thick.

Test for safe fire resistance:

a. Fire insurance-a safe should not have at any one time a temperature above

350 degrees Fahrenheit.

b. Hazard test-test to determine if sudden rise in temperature will not cause the

safe to rupture. If the safe can withstand 2000 degrees fahrenheit for 30

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 66 of 153
minutes and will not crack or open, then it has passed the explosion test.

c. Fire and impact test-aimed at determining the strength of a safe to withstand

the collapse of a building the fire.

2. Vault- a heavily constructed fire and burglar resistance container is usually a

part of the building structure used to keep and protect cash , document and

negotiate double instruments . Vault are bigger than safe but smaller than a file

room.

 The vault door should be made of the at least 6 inches in thickness.

 Vaults walls, ceiling, and floor reinforced concrete at least 12 inches in

thickness.

 Electrical conduits into the vaults should not exceed 11/2 in diameter.

 Vault floor should be higher by 4 inches with the surrounding floors and if

in level with the floor buttons, storage container should be raised at least

4 inches above the floor.

 Vault should not be made part of the wall due to moisture and

condensation caused by temperature.

 Standard vault, to reduce destroying of too much record, should not be

more than 5,000 cubic feet.

 The vault must be resistive up to 6 hours.

3. Fire room- a cubicle in a building constructed a little lighter than a Vault but

of bigger sized to accommodate limited people to work on the record inside

 The file room should at must be 12 feet high.

 the interior cubage should not more than 10,000 cubic feet

 the ventilation should be through the door

 It must have a water light door and at least fire proof for one hour.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 67 of 153
 The supporting structure, the walls, floor and roof should be made fire-

proof.

PERSONAL IDENTIFICATION AND TRAFFIC CONTROL MOVEMENT.

In every installation, the use of protective barriers, security lighting,

communication and electronics hardware provide physical safeguards but

these are insufficient to maximize the effort of the guard force. A control point

must be established for positive personal identification and check system.

This is to ensure that only those persons who have the right and authority will

be given the necessary access to the area.

The most practical and generally accepted system of personnel

identification is the use of identification cards badges passes. Generally

speaking, this system designates when, where, how identification cards

should be displayed, and to whom. This helped security personnel eliminate

the risk of allowing the access of an authorized personnel within the

establishments. To be effective the following should be considered.

1. Badge must be tamper-resistant comma which mean that they should be

printed or imposed on a distinctive stuck with a series of design difficult to

reproduce;

2. They should contain as clear and recent photograph of the bearer preferably

in the color;

3. The photograph should be at least one inch square and should be updated

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 68 of 153
every two or three years or when there is any significant change in facial

appearance; and

4. Should additionally contain vital statistics such as date of birth , height ,

weight , color of hair and eyes , sex and thumbprints.

Types of personal identification

1. Personal recognition

2. Artificial recognition

Use of Pass System

1. Single-pass systems

2. Pass exchange system

3. Multiple pass system

Badge and Pass Pontrol

1. The system should have a complete record of all badges and identification

cards issued, return, mutilated or lost by serial number and cross indexed

alphabetical.

2. The supervisor from time to time for its accuracy and authenticity should

check the lists.

3. Passes and badges reported lost should be validated and security personnel

at the entrance gate be informed through conspicuous posting

Types of controlled area

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 69 of 153
1. Controlled area

2. Limited area

3. Exclusionary area

Traffic Control System:

Controlling traffic in and out within a facility is essential to the physical

security program perimeter barriers , locked doors and screened window

prevent or deter the entry of authorized visitors , but since some traffic is

essential to every operation , no matter how highly , classified it may be ,

provision must be made for the control of this movement.

Specific solution will depend upon the nature of the business ,

obviously retail establishment , which encouraged high-volume traffic and

which regularly handle a great deal of merchandise both in and out , have a

problem of a different dimension from the industrial operation working on a

highly classified government project . Both , however , must work from the

same general principles towards providing the greatest possible security

within the efficient and effective operation of the job at hand.

1. Identification of employees and visitor and directing or limiting their

movements;

2. Control of all incoming and outgoing packages; and

3. Control of tracks and private vehicles.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 70 of 153
Visitors Movement Control

Security should establish proper methods of establishing the authority

for admission of visitor as well as the limitation thereat. This security measure

would depend on the sensibility of the installation, but would include the

following;

1. Visitors log book

2. Photograph

3. Escort

4. Visitor entrances

5. Time traveled

Package Movement Control

Every facility must establish a system for the control of package

entering or leaving the premises. Since transporting of packages through the

portals is a fact of life, they must be dealt with in order to prevent theft and

miss appropriation of company properties. Thus;

1. No packages shall be authorized to be brought inside the industrial

installation, offices and work area without proper authority. This basic precept

help reduce if not eliminate pilferage, industrial espionage or sabotage.

2. Outgoing packages carried by personnel should be closely inspected and

those in vehicles should also be checked as many pilfered items are hidden in

the surface of the vehicles leaving the compound.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 71 of 153
3. Any personnel/visitor entering the installation with the package should

deposit the same to the security and in return deceives and numbered tag,

which he/she will use in claiming his/her package upon departing.

Vehicle movement control and identification.

Vehicular traffic within the boundaries of any facility must be carefully

controlled for safety as well as to control the transporting of pilfered goods

from the premises. Thus;

1. Private owned vehicle of personnel/visitor should be registered and are

subject to the vehicles should be subjected for search at the entrance and exit

of installation

1. All visitors with vehicles should provide key security as to the complete

details of the duration of state, person to be visited, and other information.

2. All vehicles of visitors should be given a sign/sticker to be placed on the

windshield.

3. Traffic warning sign should be installed in all entrances in order to guide the

visitors in their destination as well to provide them with the necessary safety

precaution while they are inside the installation.

4. Security personnel must constantly supervised parking areas and make

frequent spots searches of vehicles from there.

Building Access Control

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 72 of 153
At any physical barrier, a security system must possess the ability to

distinguish among authorized persons, unauthorized visitors , and other

unauthorized persons . This is to assist the security personnel protect sensitive

information within the installation.

Appropriate warning sign should be posted at the building perimeter

period special restricted and three facilities to public access should be

provided . This will be dependent on the degree of security needed for the

protection of property comma activities and other processes within the building.

The access to the restricted area shall be limited to authorized

personnel who have the direct involvement with the installation , construction

and operation and maintenance of the equipment and systems and or use of

the materials contained within the restricted area . A clear-cut policy on the

access control should be disseminated to all personnel of the insulation

"As long as people live, they will continue to make mistakes"


"Human errors create security holes".

CHAPTER 4

PERSONAL SECURITY

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 73 of 153
Personnel security is the protection of the company assets against loss of

life and damage to property. Its main concern is the security and safety of each

people and organization. In personal security, the people in in the organization are

considered the greatest threat to the security organization because they create the

security holes.

Of the three major aspects of security, personal security is considered as the

most important. This is for the simple reason that security involves people, both as

an asset to be protected and as source of security threats. It is an acknowledged

fact that losses are attributed mainly to negligence or active participation of

employees, either through theft and sabotage. This emphasizes the need to set up a

system of hiring the people for the company period personal security is considered

the weakest link in security management.

Purpose of Personnel Security

1. To ensure that a firm hires those employees best suited for the firm; and

2. Once hired, to assist in providing the necessary security to these employees

while they are carrying out their functions.

Scope of Personnel Security

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 74 of 153
1. Personnel security investigation (PSI)

2. Security education

Key functions of personnel security

1. It serves as a screening device in hiring suitable employees.

2. It provides background investigation services of both potential and present

employees for possible assignment to sensitive position.

3. It handles investigation of employees suspected of wrong doing.

4. It develops security awareness among employees.

5. It attempts to ensure the protection of employees from discriminatory hiring

terminating procedures as well as unfounded allegation of illegal or unethical

activities and conduct.

Personnel security investigation

Personnel security investigation (PSI) is a process of inquiry into the

character reputation, discretion , integrity , morals and loyalty of an individual to

determine the suitability for appointment or access to classified matter.

In PSI, the security manager should determine the following:

1. Is the information given true or false.

2. Is the applicant perhaps concealing information?

3. Does the applicant have other reasons for applying , aside from employment

for example , may be to conduct intelligence gathering against the company.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 75 of 153
PSI should be properly documented in order to facilitate the conduct of

administrative or criminal procedure in the event of discovery of derogatory

information.

Personnel security investigation has three general techniques:

 background investigation

 positivity vetting, and

 profiling

General techniques of PSI

Background investigation (BI) - this technique is very expensive but

necessary is personal security . It serves to verify information on the application

form and to obtain other information pertinent to the decision to employ

Factors to consider in the conduct of BI

 Loyalty

 integrity

 discretion

 morals

 character

 reputation

Components of complete BI

 Applicant's Name  date of birth

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 76 of 153
 present residence address  character reference

 personal history  employment history

 marital history  military history

 residence history  foreign travel history

 citizenship  criminal record

 physical Data  credit records

 educational history  applicant signature

 organization membership  s. date of application

 neighborhood investigation

Types of local agency check (LAC)

 Barangay clearance

 city or municipal clearance

 local police clearance

 court clearance

Types of national agency check (NAC)

 National bureau of investigation (NBI) clearance

 PNP directorate for intelligence (DI) clearance

 intelligence service AFP (ISAFP) clearance

1. Positive vetting- is the process of inspecting or examining with careful

thoroughness the essence of vetting is a personal interview conducted under

stress period it is based on information previously given by the applicant. Other

information issued during the interview, such as those discovered in the BI,

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 77 of 153
which confirms or denies which given by the applicant.

2. Prowling- is the process whereby a subject reaction in a future critical

situation is predicted by observing his behavior, or by interviewing him , or

analyzing his responses to a questionnaire , such as an honest test. The Reid

Report is an example of honesty test.

3. Deception Detection Techniques- this process of using devices in detecting

deception during the interview stage. This includes the use of a Polygraph

Psychological Stress Evaluator and Voice Analyzer.

4. Financial and lifestyle inquiry- this type of investigation seeks to gather

information on income and mode of living, sometimes referred to as the

earning- to-debt ratio.

5. Undercover investigation- this is the replacement of an agent in a role in

which the agents true identity and role remains unknown , in order to obtain

information for criminal prosecution or for recovery or limitation of assets losses.

6. Exit interview- this is a valuable tool because it gives departing employees

an opportunity to list grievances. It offers security managers an opportunity to

learn of problems not previously known period incorporating a checklist of

company- issued property and confronting a departing employee of this has

resulted in reducing losses of company property period.Debriefing an employee

is also incorporated into the exit interview to remind employees of their

continuing legal obligation to safeguard confidential company information.

SECURITY LOCATION PROGRAM

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 78 of 153
Security location is conducted to develop security awareness among

employees in the company. It should cover all employees, regardless of rank

or position. The basic goal of security declaration program is to acquaint all

the employees the rationale behind the security measures and to ensure their

cooperation at all times.

Objectives of Security Education

1. Guidance for all supervisory and executive levels of the organization.

2. A mandatory in indoctrination on security for all new personal before their

assignment to their prospective jobs.

3. Development of a high degree of security consciousness among the selected

supervisors and other people now in a program that should be continuing and

supported by top management.

4. I was the lion security program in stealing consciousness and education

through the demonstration, lectures, motivations and suggestion.

5. To let all employee force be informed that they all belong to the organization

and that man awareness to the security program is tantamount to disloyalty.

6. That the program is also to develop discipline , loyalty and belongingness.

Phases of security Education Program

1. Initial interview

2. Orientation and training

3. Refresher conference

4. Security reminders

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 79 of 153
5. Security promotion

EXECUTIVE PROTECTION (VIP SECURITY)

The executive protection aims to protect people from physical violence,

whether from the state or external states, from violent individuals and and

sub-state actors comma from domestic abuse, or from predatory adults. For

many people, the greatest source of anxiety is crime, particularly violent

crime.

1. VIP- Very important person

Ex. State president, high-ranking public and private officials, etc.

2. ESCORT- ONE OR MORE PERSONS ACCOMPANYING ANOTHER TO

GIVE GUIDANCE OR PROTECTION OR TO PAY HONOR

3. BODYGUARD-a person or a group of persons usually armed and

responsible for the physical safety of one or more specific person.

ORGANIZATIONAL STRUCTURE

1. Area security

 Covers the surrounding areas of engagement.

 Conducts prophylactic (neutralize the area), operations in the area of

engagement.

2. Perimeter security

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 80 of 153
 Secures the immediate area surrounding the place of engagement.

 Usually these are the uniformed men.

3. Advanced security

 This are the advanced security at the place of engagement before the

arrival of the VIP.

 Sanitize the engagement area.

4. Close-in security

 Accompanies the VIP wherever he goes.

 Maximum of four (4) persons.

5. Reserve security

 On standby for possible black-up/re-enforcement.

6. Routine security-

 neutralize the possible route of the VIP party.

Four Common Elements in all assassination

1. Victim

2. Assassin

3. Modus Operandi (Mode of Operation)

4. Opportunity

Reasons why do they need bodyguard

As a result of the "increased concern about the kidnapping threat"

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 81 of 153
there has been an escalation in the demand for bodyguards. Thereby, BRAIN

is needed and not BRAWN

(Meaning muscular in power) has been offered as the basis for bodyguard

selection. And the bodyguard should fit the image and lifestyle of the individual

he is guarding.

Some protection techniques while moving on foot.

1. Individuals in the vicinity of the persons being protected should be observed

specially their hands.

2. If a weapon is displayed, the weapons should be attacks so as to be ready to

respond effectively.

3. The bodyguard should anticipate potential attacks so as to be ready to

respond effectively.

4. If a threatening situation begins to develop the individuals being protected

should immediately be removed from the danger area.

5. If two bodyguards are used in attacks develop, one bodyguard should

remove the individual being protected while the other neutralized the threat. The

bodyguards should adequately protect the individual being guarded without

offending the public or those in the area. The primary objective is to protect the

target person, not apprehend the attacker. Escape is it certainly more important

than winning the "skirmish" meaning minor and primary conflict or dispute.

6. If one bodyguard is utilized, he/she will usually walk in front and slightly to the

left of the person being protected.

7. When two bodyguards or utilized, one will take a positioned in front to the left.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 82 of 153
While the second, will take a position to the rear and slightly to the right.

Protection in transit

I'm individual is particularly vulnerable while moving from one place to

another, hence a regular rout e and time travels should be established.

Frequent changes of direction, time, mode of transport, coordinated within the

overall protection plan will make it more difficult for an abduction to plant of an

ambush or to interpret period the individual should never walk alone in and

populated areas,. And automobile during an attempted abduction may be

used not only as means of transportation but as defensive shield or even as

an attack weapon period therefore, an individual in an automobile should not

usually attempt to escape and attack by leaving the vehicle. the body of the

vehicle will provide a place of safety and while the vehicle can be utilized to

take evasive action so that it will be possible to escape from an attack.

Vehicle security

The vehicle utilized by a potential kidnap victim should not be placed

on attended in a parking stall with the individual name on it . If possible

comma when not in use , the vehicle should be parked in a locked garage

under guard and nor on the street . The doors of the vehicle should be locked

and all windows tightly closed , whether occupied or non occupied .

Consideration can be given to the installation of tamper alarm on the vehicles

and "panic" or trouble alarms bottoms in the parking.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 83 of 153
The potential victim, should not use to vehicle at all time, but should

change automobile daily impossible . All serving should be done by a

commercial organization which has been checked out and cleared. Locking

the soul in caps and locks for the hoods our suggested. Gas tanks should

never contain less than half a tank to avoid running out of fuel.

Attacks tactics

Two types of attack tactics against vehicles:

1. Moving attacks-The approach will usually be made from the left or passing

side, and the attacker will attempt to move over into the path of the victim's

vehicles, forcing it to stop. Approach, would be from the right in the left side

drive countries period the ideal location for abduction is where cross street are

turn off is available to allowed attacker an easy quick way to escape. If two

vehicles are used to attack, one will cut off the victim's vehicle, forcing it to stop.

The second maybe then move up on the left side. The abductor will make the

attack, take the victims from his vehicles and escape as quickly as possible.

2. Ambush attack-The kidnapper will attempt to stop the victim's car within a

zone he established by blocking the roadway or by shooting the driver.

The Driver Rule

The drivers should always be planning ahead and be alert as to what is

happening in at least two or three blocks of normal city driving. Vehicles that

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 84 of 153
are packed in the roadway or in unusual position comma obstructions,

constructions, etc. Should be viewed with concern, also side street or road

access. Ramps, underpasses, service roads, etc. Our potential trouble spots,

and so particular attention should be given to them. Adequate maneuvering

distance should be maintained between the potential victim’s vehicles and

those in traffic ahead. Also the lane nearest the center of the roadway should

be used, it allows maneuvering room. The drivers should maintain near

normal traffic speeds while is in front , behind and on the sides of the vehicles

which seems to be a leading or following the rear vision mirror should be

done constantly , since most attack or originate from the rear.

Four categories of kidnappers

1. Neither opportunities nor novice criminals

2. Religious or politically motivated individuals.

3. Mentally deranged individual

4. Professional criminals.

"There is no way of estimating how many bottles have been lost , how many ships have
been sunk , or how many lives have been sacrificed because someone intentionally or
unintentionally betrayed a military secret"
Author unknown

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 85 of 153
CHAPTER 5
INFORMATION SECURITY

The protection of the company property information from the


inadvertent disclosure and destruction of documents is the paramount focus
of information security management. It is closing the window of exposure.
Information security in the industry is defined as

The sum total of all policies, regulation, practices, enforce to


safeguards the contents and integrity of any classified information or
document from compromise or loss.
Access to information security is based on the required broad principles known as C-
I-A TRIAD.

 Confidentiality — the assurance that information is accessible only to those


authorized to have access.
 Integrity — the assurance that information and processing methods are
accurate and complete.
 Availability — the assurance that authorized users have access to
information and associated assets when needed.

Purpose of Protecting Classified Materials

 Deter and impede potential spy


 Assist in security investigations by keeping accurate records of the moments
of classified materials.
 Enforce the use of "Need to Know" principle

Two (2) Kinds of Document

1. Personal — Letters, diary and notebooks. These should be treated usually the
same with official document.

2. Official —Orders, manuals, letters, overlays, maps and magazines. You may be
careful and follow the chain of command.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 86 of 153
Document/information cycle

Each document or information has a life cycle in the sense that its
usefulness has a beginning and an end. It passes various stages from the
time it is created until it is finally disposed. This cycle consists of the following:

1. Creation 5. Retention/Purging
2. Classification 6. Transfer
3. Storage 7. Disposition
4. Retrieval

Categories of Document
1. Category A
 Information which contains reportable time sensitive, order of battle and
Significant information.
 It should be given priority because it is critical information.
 It must be forwarded without delay.
 It is critical to friendly operations.
 It requires immediate action.

2. Category B
 Anything that contains communications, cryptographic documents, or
systems that should be classified a secret and requires special handling.
 Higher authorities should declassify it.

3. Category C
 Other information, which contains something that, could be an intelligence
value.
 Contains exploitable information regardless of its contents.
 Unscreened materials/documents should be categorized as Category C.

4. Category D
 No value, yet lower level will never classify documents as category D.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 87 of 153
 No decision must be made at the lower echelon that document has no value.
It is the responsibility of eh higher headquarters.

Three (3) Security Concepts


1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the
value of document.
3. Training is necessary for the practice of "Need to Know/' principle.

Four (4) Types of Classified Matter

1. TOP SECRET (green color code) — is any information and materials the
unauthorized disclosure of it would cause exceptionally grave damage to the
nation, politically, economically and military operation.
2. SECRET (red color code) — is any information and material, the
unauthorized disclosure of it would endanger national security cause serious
injury to the interest or prestige Of the nation or any governmental activity or
advantage to a foreign nation.
3. CONFIDENTIAL (blue color code) — Is any information or material, the
unauthorized disclosure of it would be prejudicial to the interest and prestige
of the national or governmental activity or would cause administrative
embarrassment or unwanted injury to and be of advantage to and be of
advantage to a foreign country.
4. RESTRICTED (white or no color code) — is any information and material
which requires special protection other than those determines confidential,
secret and top secret. In the security management application, top secret is
not used, classified matter will starts on secret classification. This is because
the applications is limited or focused only to the industry•

Rules of Classification of Documents

 Documents shall be classified according to their content.


 The overall classification of a file or of a group of physically connected
therein. Pages, paragraphs, sections or components thereof may bear

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 88 of 153
different classifications. Documents separated from file or group shall be
handled in accordance with their individual classification.
 Transmittal of documents or endorsements which do not contain classified
information or which contain information classified lower than that of the
preceding element or enclosure shall include a notation for automatic
downgrading.
 Correspondence, Indexes, receipts, reports of possession transfer or
destruction, catalogs, or accession list shall not be classify if any reference to
classified matter does not disclosed classified information.
 Classified matter obtained from other department shall retain the same
original classification.

Protection of insensitive information

Proprietary information is information that in some special way relates to


the status or activities of the possessor and over which the possessor asserts
ownership. In the business community, proprietary information relates to the
structure, products or business methods of the organization. It is usually protected in
some way against causal or general disclosure.

All proprietary information is confidential, but not all confidential


information is proprietary. For examples confidential personnel data in
employee files is not considered as proprietary although the company treats it
as confidential.

Types of Document

Class I — Vital Documents:


In this category these are records that are irreplaceable,
records of which reproduction does not have the same value as the original; records
needed to recover cash, to replace building, equipment’s, raw materials, finished
products, and work in process and records needed to avoid delay in restoration of
production, sales and services.

Class I l — Important Documents:

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 89 of 153
These include records the reproduction of which
will close considerable expense and labor, or considerable delay.

Class Ill — Useful Document:


These include records whose loss might cause inconvenience
but could be readily replaced and which would not in the meantime present an
insurmountable obstacle to the prompt restoration of the business.

Class IV — Non—essential Documents:


These records are daily files, routine in nature even if lost or
destroyed, will not affect operation or administration. This class represent the bulk of
records which should not be even attempted to be protected in the event of
disasters, They should, however, be kept in ordinary files ready for reference, if
needed, and usually discarded after some period of time.

Basic Consideration in Document and Information Security

 Security of information is based on the premise that the government has the
right and the duty to protect official papers from unwarranted and
indiscriminate disclosure;
 The authority and responsibility for the preparation and classification of
classified matters rest exclusively with the originating office;
 Classified matter shall be classified according to their contents and not to the
Classification of files in which they are held or another document to which
they are referred;
 Classification shall made as soon as possible by placing appropriate marks
on the matter to be classified; and
 Each individual whose duties allow access to classified matter or each
individual who possess knowledge of classified matter while it is in his
position shall insure that dissemination of such classified matter is on the
"need to know" basis.

Types of Proprietary Information

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 90 of 153
1. Trade Secret — This consist of any formula, pattern, device or compilation of
information which is used in one's business and which gives him an
opportunity to gain an advantage over competitors who do not know or use it.
It may be a formula for a chemical compound a process of manufacturing,
treating or preserving materials, a pattern for machine or device, or a list of
customers. It differs from other secret information as to single or ephemeral
events. A. trade secret is a process or device for continuous use in the
protection of the business.
2. Patent — this is a grant made by the government to an inventor, conveying or
securing to him the exclusive right to make, use, or sell his invention for term
of years.

Primary Distinctions between Patents and Trade Secrets

 Requirements for obtaining a patent are specific; to qualify for a patent the
invention must be more than novel and useful. It must represent a positive
contribution beyond the skill of the average person.
 A much lower of novelty is required of a trade secret.
 A trade secret remains secret as long as it continues to meet trade secret
tests while the exclusive right to patent protection expires after 17 years.

Proprietary Information Protection Program

Realizing that the most serious threat to trade secrets is the employee, a
measure of protection is often realized through the use of employee agreements
which restrict the employee's ability to disclose information without specific
authorization to the company. The following countermeasures may be adopted:

1. Policy and procedure statements regarding all sensitive information.


2. Pre and post-employment screening and review.
3. Non-disclosure agreements from employees, vendors, contractors and
visitors.
4. Non-competitive agreements with selected employees.
5. Awareness programs.
6. Physical security measures
7. Informed monitoring of routine activities

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 91 of 153
Communication Security

The ability of an ancient man centuries ago to communicate by means


of signs could be as the key for surviving the Stone Age era. And comes the
new generation where he signs have been transformed into higher forms as
man learned the start of gregarious living by means of oral or written way of
communication. This ideal way of transferring thoughts and ideas made man
supreme and progressive and later developed the Medium or common
language and the channel of which the language could be transferred to a
certain distance.

Today, civilized man communicates with an accepted and sophisticated


written or oral language. The medium has been improved by the introduction
of radio and electronics, but still man could not understand his neighbor and
vice-versa. This is due to the complexity of our lives at present and the
introduction of new languages and sub-dialects.

In security profession, it could not be denied that the field of operation


is concentrated on dealing with different people and it is deemed proper for
anu security personnel to know the most common medium of communication
to make him effective on the performance of his job.

DEFINITION OF TERMS

Communication — the transfer of thought from We mind of one person to the mind
of another thought a common medium or channel.

Conference — the exchange of thoughts or opinions by conversions, or seminar.


The exchange could be from oral, written and other forms.

Medium of Communication — Refers to the common language known for two or


more individuals who want to exchange thought or ideas with each other.

Example: English - is the dominant medium of communication in the world.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 92 of 153
Communication — is the process of sending and receiving messages to achieve

Channel of Communication — Refers to the equipment’s being used to transfer


thoughts or ideas.

The following are the common equipment being used for communication

1. Hand held radio or Walkie talkie — Communication on electromagnetic waves


transmitted through the space.
2. Basic types of radios:
a. Amateur radio — For hobby and emergency purposes; and
b. Commercial radio — for business purposes.

Cardinal principles in using radio

a. Speak clearly and distinctly at all times;


b. Think and act promptly on emergency situation;
c. Thorough understanding of the capacity of the communication system; and
d. Knowledge of the rules and regulation and the use of codes if deemed
necessary.

Requisites for modulation/voice transmission

a. Alertness — Give the impression that you are alert and wide awake and
interested as the person calling;
b. Pleasantness — Build a pleasant office image with voice of smile;
c. Naturalness — Use simple language and avoid slang;
d. Distinctness — Speak clearly and relax to avoid garbled transmission; and
e. Expressiveness — Normal tone of voice in moderate manner not to fast and
not too slow.

Duty cycle of PTT

As a rule transmitting message in short duration carries 3 to 5 words at


a time

Approaches to adhere the duty cycle

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 93 of 153
1) Use of phonetics alphabet and numerals:

Ex. From Alpha to Zebra 2.

2) Use of 2400-hour system and Zulu time;


3) Police ten APCO signals:

Ex. 10-1 = receiving poorly

10-2 = loud and clear

10-4 = copied message

10-9 = repeat message

10-20 = location

10-28 = identify yourself/call sign 1

0-32 = radio check

4) Use mores codes.

APCO — Association Public Safety Communication Officers Inc.

PTT -- Press to Talk

3. Telephone — combination of apparatus of converting speech energy to electrical


wave then transmit the same to a certain point then finally re-convert the electrical
energy to audible sound

4. Intercom — wired system of communication being used with in a building or


compound for direct exchange of calls.

5. Audio Hailer — portable transistorized and battery-operated amplifier that


magnify the voice of the USER

6. Computer Facsimile — modern type of communication equipment

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 94 of 153
“Whether or not gas will be employed in future wars is a matter of conjecture, but the effect
is so deadly to the unprepared that we can never afford to neglect the question”

General John J. Pershing

CHAPTER 6

SECURITY PROBLEMS

Any act or condition which may results in the compromise of


information, loss of life, and loss or destruction of property or disruption of the
activity of the installation.

The extent and degree of risk to security is dependent on:

a. Relative criticality of operation — is the importance of the firm with reference


to the natural economy and security b.
b. Relatively vulnerability — is the susceptibility of the plant or establishment to
damage loss or disruption of operation due to various hazards.

Types of Hazard

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 95 of 153
1. Natural Hazard — these are hazards which arise from natural phenomena.
The following are types of natural hazard or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Storms (typhoons, cyclones, tornado and hurricane)
d. Lighting storms
e. Extreme temperature and humidity
2. Human-man made Hazard --- These are hazards which are the result of a
state of mind, attitude, weaknesses or character traits of one or more persons.
They can be acts of commission or omission, both overt and covert, which can
disrupt operation of a plant or installation. The following are types of human or
manmade hazards:
a. Carelessness — Accidents and dissatisfaction
b. Disloyalty —Subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism, etc.

Sabotage as a security hazard

Description of a Saboteur

1. He is the most dangerous for whom security will have to deal with while
planning and implementing security measures and techniques.
2. He is an ordinary looking as the next guy but in his mind, he has the training in
deception, knowledgeable in incendiaries, explosives, chemistry, bacteriology,
mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.

Possible Targets of Saboteur


1. Armed Forces Installation
2. Natural resources Mines. forests, farms and farm products
3. Industries Buildings. power sources, machinery, fuel, etc.
4. Warehouses depots, communications, public utilities, etc.
Countermeasures against Sabotage

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 96 of 153
1. Use of an efficient, alert and trained guard force.
2. Use of Physical security aids like barriers, personnel and vehicular control,
intrusion devices, communication systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination.
10. Good housekeeping methods
11. Effective and compatible emergency planning
12. Regular audit.
13. Continuing background checks.
Espionage as a security hazard
Description of an Espionage Agent
1. He is very dangerous adversary and his skills in deception and his cunning
should never be under estimated.
2. He is usually a person of extensive training and will be highly effective in
gaining the confidence of people and of extracting information of value to be
relayed to his employer or handler.
3. Even how well-Trained an espionage agent he might be, he’s human like the
saboteur and he can be defeated in his own game if proper methods and
techniques are undertaken.
Some methods Employed by Espionage Agent
1. Stealing or information from employees.
2. Stealing information from records or others sources.
3. Using various methods of reproducing documents products, equipment or
working models.
4. Using "front" as commercial concerns, travel agencies, associations, business
groups and other organizations to obtain confidential information or data.
5. Using various form or threats to obtain information.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 97 of 153
6. Using blackmail techniques by exposing intimate and personal details
concerning an individual or organization.
7. Picking or securing information in social and other gatherings.
8. Penetration and operational tactics.

Countermeasures against Industrial Espionage


1. Careful and complete pre-employment measures designed to control threats
of industrial espionage.
2. Continuing personnel check on employees and particularly personnel on
sensitive positions even already employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.

Subversive activity as a security hazard Threats of Subversive Activity


1. It can be local or national in nature and their mission is to undermine the
authority weaken the organization, and eventually take over. This can be in
business or any activity.
2. This can be in the form of rumor mongering, propaganda, undermining
morale, and injecting defeatist attitudes, and other emotional approaches.
3. It is an activity not easy to detect.

Countermeasures to Subversive Activity


1. The spreading of rumors, written materials, slogans or any other devices to
confuse the work population and discredit the government should be
immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and "slow
downs" can be called to disrupt the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in
organizing movements for peace, anti-colonials, anti-trade and anti-
imperialism.
4. Employees or outside personnel seeking memberships in "paper
organizations" should report this activity to security.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 98 of 153
5. Other methods of subversion like untied fronts, mob action, terrorism and
sabotage will do to gain the subversive ends.

Pilferage as a Business Hazard


1. Pilferage is one of the most annoying and common human hazards which
security has to deal with. This activity if uncontrolled can
2. Become financial drain if not a menace to smooth and orderly operation.
3. Failure to detect shortage and inaccurate inventories will cause inventory
losses, which may be labelled as pilferage.

Pilferage
This is one of the most annoying and common human hazards which
security has to deal with. This activity if uncontrolled can become a financial
drain if not a menace to smooth and orderly operation. Due to this, security
force has to concentrate large number men to check this nefarious and
disconnecting activity. Petty pilferage is frequent, hard to detect' difficult to
prove and win conviction but definitely dangerous to ignore.
Types of Pilferer
1. Casual Pilferer
2. Systematic Pilferer

Anatomy of Pilferage
1. Where need or desire exists and opportunity is present, theft is almost sure to
result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when
supplies or goods are transported or transferred from one place to another.

Factors considered by a Pilferer to be Successful on his Act


1. Location of items to be pilfered — The systematic •pilferer surveys shopping
and store areas, or through contracts from the firms.
2. Access to the items — Techniques can be from fake documents, bribing of
guards, outsmarting security, creating disturbance and other methods to
divert attention while pilferage goes on.
3. Removal of item — This can be done as wearing the stolen shoes or shorts,
concealment in body or vehicles, use of false documents, etc. Driver may

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 99 of 153
conceal pilfered items in his vehicle.
4. Disposal of items — there is a need for "fences" "brokers", or "clearing
houses" for these "hot" items.

Countermeasures for Casual Pilferage


1. "Spot" check on outgoing vehicles and persons.
2. An aggressive security education and indoctrination program with emphasis
that "crime does not pay".
3. Superiors should set example of integrity and desirable moral climate for
employees in the establishment.
4. All employees must be enjoined to report or any loss to security.
5. Inventory and control methods should be done especially to pilferable items.
6. Control of tools equipment and sets.

Countermeasures for Systematic Pilferage


1. Guards and electronic surveillance on all exits.
2. Package and material control system.
3. Parking area outside perimeter fence of establishment.
4. Careful screening and background checks on applicants to weed out potential
thieves.
5. Investigation of all losses quickly and efficiently to determine "modus
operandi" or obtain clues.
6. Alert all patrols to check areas and buildings for possible concealment of
stolen properties.
7. Install mechanical, electrical, electronic detection and alarm devices where
needed and applicable.
8. Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking facilities and
areas for vehicles and persons.
10. Store bulk quantities of pilfer able items in enclosed security areas and
distribute them to using section in limited quantities.
11. Establish accurate inventory and accounting methods for procurement, use
and disposal.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 100 of 153


12. Establish close liaison with governmental law enforcement and intelligence
agencies.

CRISIS MANAGEMENT
The hostage taking of Chinese nationals that happen in Manila is a
lesson to learn for our government. The PNP recognizes different pitfalls on
the operation from negotiation to assault. In this case, crisis management
plays a very significant role in dealing with the problem. In security
management, crisis management is very important tool in dealing with the day
to day operation of the security business hence; we have this topic included in
this book.

Crisis — is a decisive point of a condition, improper handling on which immediately


places under threat or danger of one's life, limbs, freedom and property.

Crisis Management — it is the totality of action of handling or responding to a given


crisis situation.

Crisis Management Plan — is a complete and comprehensive plan of actions


designed to protect life, limbs, freedom and property, before, during and after any
given crisis situation.

Two Kinds of Crisis According to Origin


a. Natural Crisis - Events caused by the force of nature
b. Man-made Crisis — Events caused through instrumentality of men.

Work Stoppage — is a condition of an enterprise whereby normal work operation is


a result of a strike and lockout.

Two Major Causes of Work Stoppage


a. Strike — is a temporary stoppage of work by concerned action or employees
as a result of a current labor industrial dispute.
b. Lockout — is the temporary refusal of any employer to furnish work.

Roles of SIG during Strike and Lockout

1. Maintenance of Peace and Order


2. Protection of Life and property

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 101 of 153


3. To provide security to any personnel

EMERGENCY and DISASTER MANAGEMENT

Emergency planning is one of the harsh realities that an installation will


encounter is the occurrence of a disaster or emergency. Any of these can be
regarded as a potential event, occurrence or condition outside the scope of
normal business activities with significant potential for death, injury, property
damage, assets diversions or other favourable impact upon the installation. It
is for this reason that the owner of the installation or its executives will decide
in advance what to do and how to counter the effects of any emergency in
order to assure continuity of operations.

Emergency Defined

Emergency is a sudden, generally unexpected occurrence or set of circumstances


demanding immediate action.

Disaster Management Defined

Is the systematic management of disaster from the initial stage to its termination
using various tools to minimizes loss of lives, damage to property and enhance
rehabilitation.

Disaster Defined

Disaster is the unscheduled event that causes emergency. It upsets the


performance of valued activities of the community in two ways: there is a drastic
increase in demand for certain services and there is reduction in the capability to
perform services.

Types of Emergency

1. Earthquake
2. Typhoon
3. Tsunamis
4. Volcanic eruption Fire
5. Fire
6. Explosion (Bomb, flammable liquids, gases, etc.)

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 102 of 153


7. Building collapse
8. Leakage of gas or toxic fumes
9. Bomb threat
10. Strikes
11. Work accidents
12. Enemy attack/action

Key Steps in Emergency Planning

1. Get in touch with local civil authorities.


2. Visit neighbouring plant/installation.
3. Survey the installation for possible hazard and take immediate action to
lessen or eliminate them.
4. Call an organization meeting of heads of services, employee representatives
and key personnel.
5. Establish an organization with specific task to function immediately before,
during and following a disaster.
6. Define the disaster programs.
7. Establish a method for utilizing resources on hand and for obtaining additional
resources at the time of disaster or emergency.
8. Provide a recognizable means for moving -from normal operation to the
emergency mode of operation.

Basic Considerations in Emergency Planning

1. Goals of the emergency plan.


2. Emergency plan should be in writing.
3. The plan should be precise and specific.
4. A separate plant should be prepared for each type of disaster, which has a
probability of occurring.
5. Key elements of plan: what to do and who will do it.
6. General and individual awareness.
7. Checklist before formulating a detailed emergency plan.

Emergency Response Team


An emergency response team must be established to become active during

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 103 of 153


increased threat levels or when an emergency situation occurs: Your special threat
plan must describe the organization, training and function of the team. The ERT
must consider the following:
1. Who will make decisions and have final authority for the team as a whole.
2. Who will be members of the team and what are their responsibilities?
3. What will be the mission of the team?
4. The tasks of the other agencies or individuals.
5. The training needed to prepare team members to operate in stressful
situations
6. Contingency planning beyond that involved in normal day-to-day operations
against threats.
7. The unexpected – The incident will not take place as planned

Responding to an emergency situation requires special capabilities and


considerations. First, the ERT must identify the kind of emergency. Then, the
operation plan (OPLAN) formulated for the said emergency must be put into effect
as quickly as possible.

Responding to Tactical Situation

1. Bombing — if the terrorist/adversary plant bombs, then you must assume


other bombs have been planted. Remove everyone from the scene to a safe
area. Anyone near the scene at the time of the explosion must be interviewed.
Keep in mind that the people being interviewed may, in fact, be the
terrorist/adversary who planted the bomb. Explosive Ordinance Division
(EOD) must further check suspected devices.
2. Ambush/Attack — Always assumes the terrorist/adversary are still in the
area. The initial response force renders aid to the victims and
3. Establishes a defensive perimeter. Clearing of the area is conducted before
crime scene investigation begins. All vehicles and exits from the area must be
controlled and inspected.
4. Kidnapping — In most cases of kidnapping, you will not be aware that a
kidnapping has occurred until the terrorist has the victim safely secured
elsewhere. The immediate response is to dispatch teams to provide
protection for other possible targets, including members of the victim's family.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 104 of 153


Then, the Emergency Response Team is activated. The team can materially
aid the commander in dealing with the kidnapping. They could recommend
possible courses of action.
5. Hostage/Barricade situation — The worst possible scenario you could be
confronted with is a prolonged hostage/barricade situation. The initial
response force secures and isolates the incident scene. No one must be
allowed to enter or leave. Witness's names are recorded, and the witnesses
are directed to a safe location to wait for further debriefing. The Emergency
Response Team is then activated.
6. Arson — Terrorist/Adversary use incendiary devices to commit arson. This is
done during an organized civil disturbance (throwing a firebomb) or against a
specifically targeted building. They also use incendiary devices to destroy
vehicles. As with bombs, they often use time delay mechanisms to allow
themselves time to leave the area before the fire occurs.

Security Measures against Bombs and Bomb Threats


Although it is very hard to detect the attack of a terrorist or adversary, an
establishment can possibly minimize if not totally eliminate the occurrence of
bombing incident within its premises. The following measures are suggested.
1. Strictly implement the inspection procedures of all bags, knapsacks, boxes,
merchandise etc. that will enter the premises.
2. Suspicious locking package, paper bags, etc. left alone should be cautiously
scrutinized as possible bomb(s).
3. When suspected bombs are noted, security personnel/employees to
immediately contact the authorities.
4. Be observant of people roaming around your area doing nothing. Vendors
with tricycles, knapsacks/bags should be driven out. They may be used as
couriers of
5. Security personnel must always observe people leaving behind
bags/packages/boxes in the garbage cans/bins in the premises.
6. Be observant of cars/motorcycles riding individually who are suspiciously
observing constantly the establishment.
7. Be cautious in opening envelopes and packages sent by unknown individual
and return

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 105 of 153


8. The greatest safeguard against the effect of bomb threats is to prevent entry
of unauthorized persons into certain area, whenever possible.
9. Restricted entry and positive identification of staff and visitors can be
significant in assessing he seriousness of any given threat.

Don'ts in Handling Suspected Bomb Packages

1. Don't attempt to open package.


2. Do not submerge in water due to conductivity of electrical circuit and /or
possible violent reaction of chemical agent.
3. Do not indiscriminately shake or jar suspected package due to the possibility
of disturbing the trigger mechanism.
4. Do not cut the string or unwrapped package due to the possibility of pressure
release type device.
5. Do not puncture or cut the box with metallic object as the possibility of electric
power maybe employed.
6. Do not accept identifications markings on any suspected package as
legitimate.
7. Do not allow radio transmission within the vicinity
8. Do not switch on the lights or any electrical switches just to light up dark
room/areas.
9. Do not use sirens, megaphone or any loud noise-emitting device.

Responding to Bomb Threats


Each threat received through any means of communications should be
treated as real and must be forwarded immediately to the proper authorities. Training
is essential to deal properly with a bomb threat incident. Instruct all personnel,
especially those at the telephone switch board on what to do if a bomb threat is
received. The receiving party must remain calm and courteous. Try to obtain as
much information as possible from the caller. Take not of the following procedures:
1. Get the identity of the caller.
2. Take note of the following characteristics: male or female voice; young middle
age, or old sounding voice; accent of voice; speech impediments or peculiar
voice characteristics; any background noise; does the voice sound familiar.
3. The exact words of the person placing the call.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 106 of 153


4. Show no emotion on the phone.
5. Know the exact location of the bomb.
6. Ask for the description of the bomb/composition of the explosive.
7. Repeat the message to the caller whenever possible and ask for confirmation.
8. The receiving party should remain calm and courteous. He should listen
carefully and write down accurately the information the caller provides.
9. If possible, refer the caller to a supervisor in authority to extract more
information.
10. Apply delaying tactics and engage the caller in prolonged conversation.
11. Take note of the exact time the caller hung up.
12. The person receiving the bomb threat should attempt to ask the caller certain
questions. when is the bomb going to explode? Where is the bomb right now?
What type of bombs it is? What does the bomb looks like? What will cause
the bomb to explode Q Why did you place the bomb?
13. Remember that the caller may not answer your question, but any additional
information that he may relate will be helpful.
14. It may be advisable to inform the caller that the building is occupied and the
detonation of a bomb could result in death or serious injury to many innocent
people.
15. Once the telephone threat is received, notify your local police at once.

Handwritten or Typed Notes

Documents and other materials received should be carefully handled


to preserve marks, fingerprints, etc., for examination by competence authorities.
These should be forwarded immediately to proper authorities for analysis and
evaluation. Written messages should never be ignored.

Person to Person or Direct Threat

1. Notify security supervisor immediately.


2. Keep the person making the threat or indicating knowledge of a threat under
surveillance until relieved by the superior.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 107 of 153


3. Take note of the age, height, weight, sex, color of eyes/hair/skin, clothing,
unusual characteristics such as lameness or any peculiarities of the person
under surveillance. Observe other personal behavior, if any.
4. If the person leave the scene, take note of the make, model, color, plate
number and marking of the vehicle used.
5. Do not underestimate the size of the package like just a pack of cigarette or
lighter, it could be a powerful explosive.
6. Above all, DON'T PANIC.

What to do if a suspected bomb is located

1. Evacuate personnel at least 300 feet away from the bomb.


2. Turn off the electrical and gas units.
3. Do not touch or move unknown objects.
4. Secure the area.

WHAT TO DO IN CASE OF FIRE

1. Stay calm.
2. Always sound the building fire alarm immediately. If the alarm fails to operate,
warn other occupants by knocking on doors and shouting warnings.
3. Before opening the door, feel it with the back of your hand. If it is hot, do the
following (if it is not hot go to step 4).Open the windows. Seal cracks around
the door with towels, tape, bed clothing or similar items to keep out the
smoke. If you are trapped, hang a sheet, jacket, or shirt or other object out the
window that will attract attention. Shout for help. Remain calm until firefighters
reach you from the hallway or window. Their first duty upon arriving at a fire is
to search for persons trapped in the burning building.
4. If you are able to leave the room, do so immediately and: Take your key with
you in case you are forced to return. Close all doors behind you as you exit.
This will retard the spread of smoke and lessen damage. Go to the nearest
exit or stairway. Do not use an elevator. If smoke, heat or fire blocks your exit,
go to an alternate exit. If all exits from a floor are blocked go back to your
room and follow the procedures described above in 4.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 108 of 153


5. If smoke is present keep low to the floor. Take short breaths to avoid inhaling
any more smoke than necessary.
6. Leave the building immediately. When the Firefighters arrive, direct them to
the fire.
7. After leaving the building, stand clear. Follow the directions of Firefighters. Do
not reenter the building for any reason until the fire department has declared it
safe. FIRE PROTECTION AND PREVENTION
8. It is the first five minutes that count in extinguishing a fire. After that, the fire
grows rapidly and is more difficult to extinguish.
9. Fire is the oldest enemy as well as friend of mankind. Fire out Of control is
impersonal and indifferent as to what it destroys. Fire under control supplies
heat, warmth, power and energy to industrial plants to enable manufacture of
the necessities of life. Fire is common. Strike a match to light a cigarette (a
half million matches are struck every minute) and you have a fire under
control. Throw the match away still burning: let it fall among combustible
materials, such as grass, paper, flammable liquids, and in a very few minutes
you have a fire out of control.
10. Carelessness is not the most serious offense and the cause of great loss of
life and enormous property damage through fire. The carelessly thrown
cigarette or still-burning match, the paper-littered area, the poorly lubricated
machine or improperly disposed flammable material in the plant are careless
causes Of fire that may start as a flickering flame and then quickly, stealthily
spread out into an uncontrollable conflagration of smoke and flame snuffing
out lives, destroying vital property and material.
11. The main job of a security guard is to protect life and property. It is extremely
important that he knows exactly what to do in the event a fire occurs. Properly
placed and perfectly maintained equipment and frequent inspections,
knowledge of fire protective equipment, its operation and how to apply that
equipment if needed are Musts for every plant and security guard.
12. The duties and responsibilities of security guards in regard to fire
extinguishers, fire trucks sprinklers systems.

SURVIVING A BANK ROBBERY


Guidelines to be observed if you are in a bank then a robbery occurs; take

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 109 of 153


note of these following steps. They can save your life.

DURING THE ROBBERY:

1. Remain calm. Do not panic.


2. Follow the bank robber's instruction. Do not anticipate any commands. Do not
do more than you are told. Do not play hero.
3. Do not make unnecessary movements so as not to draw attention to yourself.
Remember, you do not know the robber's state of mind. He could be trigger-
happy and shoot you.
4. Be observant. You may not be able to look at the robber's face, but you can
use your other senses. How did the robber's voice sound? Did the robber
have a smell?
5. Note departure of robber — which side of the bank did he exit?

AFTER THE ROBBERY:

1. Do not touch anything inside the bank or crime scene.


2. Cooperate with the police investigation by giving details of what you have
witnessed.
3. There should be only one spokesperson assigned by the bank management.
4. Security clearance is necessary before any action will be taken.

EARTHQUAKE SAFETY GUIDELINES

1. Follow the cardinal rule: Wherever you are, remain calm and do not panic.
2. If you are inside the building, follow these guidelines.
a. During the earthquake, perform the DROP, COVER and HOLD action.
Take cover under strong desk or table and keep head and neck
protected.
b. Stay away from glass, windows, shelving, and other equipment which
can present a cutting, crushing, hitting or fall danger.
c. Stay where you are. Do not run outside while earthquake is in progress.
Wait until it is safe to go outside.
d. DO NOT use the elevators, even if they are working, and check stairwells
for integrity before using.
e. Evacuate safely and orderly after the earthquake has ended.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 110 of 153


f. Stay alert for aftershocks. Do not return to your work area until directed.

3. If you are outside the building or in an open space, follow these guidelines.
a. During the earthquake, perform the DROP, COVER and HOLD action.
b. Move away from buildings, streetlights, and utility wires.
Stay alert for aftershocks. Do not return to your work area until directed.

HOSTAGE TAKING EMERGENCY PROCEDURES

IF YOU DISCOVER A HOSTAGE SITUATION

1. Staff in the immediate area should attempt to evacuate the area by any route
that does not expose them to threat.
2. Once safe, notify security from within premises or externally, who will respond
to the threat immediately and contact the police.
3. If evacuation of the immediate area is not possible, staff should take whatever
action necessary to stay out of harm's way.

IF YOU ARE TAKEN HOSTAGE

1. Don't be a hero: remain calm, accept your situation and be patient; reassure
others if they start to panic
2. Follow the instructions of the hostage taker
3. Do not do or say anything that might provoke the individual holding you
hostage
4. Don't speak unless spoken to but be courteous and cooperative
5. Don't be argumentative with the hostage taker or with other hostages and
avoid sudden movement that could alarm the hostage taker
6. During any rescue attempt, lie down on the floor and keep your hands visible,
unless otherwise directed by the police. Police may not be able to distinguish
hostages from hostage-taker and may consider you a threat.

SECURITY MEASURES

SECURITY INVESTIGATION

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 111 of 153


Security Investigation is a reactive measure in security management, we have to
admit that there is no such thing as perfect crime, only imperfect investigation. We
cannot prevent crime in totality, an incident or a crime may always happen but at
least at a minimum and security investigation constitute a small pie in the security
management job.

Security Investigation - Is a planned and organized determination of facts


concerning specific loss or damage of assets due to threats, hazards or unsecured
conditions. It is the identification and location of criminals, and gathering of evidence
that will be used as evidence in court to convict them.

The general principle of Security Investigation is never to try to cover up an incident


or complaint.

Elements of Security Investigation

1. Investigator 3. Subject of Investigation


2. Purpose

Tools of Investigation

1. Information — Knowledge which the investigator gathers from other persons.


a. Acquired from regular sources Conscientious and public-spirited citizens,
company files, school files or records file of other agencies.
b. Acquired from cultivated sources — Paid informants, bartenders, cab
drivers, acquaintances, etc.
2. Interrogation — The skillful questioning of a person who is reluctant to divulge
information concerning the offense under investigation.
3. Interview — The simple questioning of a witness who has no personal reason
to withhold information.
4. Instrumentation — The application of instruments and methods of physical
sciences to the detection of crimes. In other words, the sum total of the
application of all sciences in crime detection otherwise known as
criminalistics.

Three Fold aims of Investigation

 To identify the offender

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 112 of 153


 To locate the offender
 To provide evidence for his guilt

Methods Identifying the Offender

1. Confession — acknowledged disclosed or admitted.


2. Eyewitness/testimony — Solemn declaration.
3. Circumstantial evidence — Evidence which gives ground for belief as to
fact or guilt.
4. Associative evidence- related to the crime Standard Methods of Recording
Investigative Data

1. Photography 7. Tape recording of sound


2. Sketching the crime scene 8. Video tape recording of objects
and
3. Written notes sound
4. Developing and lifting fingerprints 9. Written statement of subjects and
5. Gathering physical evidence witnesses
6. Plaster cast

Difficulties in the Investigation

1. Absence of eyewitness/witnesses
2. Motives Unknown
3. Lack of physical clues (evidence)

Qualities of an Effective Investigation

1. Objective —all facts are discussed as perceived without any distortion and
the manner of presentation is free from unwarranted opinion.
2. Thorough — Full detail, exhaust all available means, factual to arrive in a
sound and convincing conclusion.
3. Relevant Significant and demonstrated its relation to one another.
4. Accurate — Free from error.
5. Current — Terminology is generally accepted

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 113 of 153


Guidelines in Investigation

1. Preliminary Investigation

P — Proceed to the scene promptly and safely

R -- Render assistance to the victim, if any

E — Effects the arrest of the offender

L — Locates and identifies the witnesses

I — Interview the complainant and witnesses

M — Maintains the crime scene and protects the evidence

I -- Interrogate the suspect/offender

N — Note all conditions, events and remarks

A — Arrange for the collection of evidence

R — Reports the incident fully and accurately

Y — Yields the responsibility to the follow-up investigation

2. Investigation Proper

a. Photograph the crime scene. c. Crime scene sketch

b. Search the crime scene d. Care of evidence

3. Methods of Investigation

a. Information c. Interview

b. Interrogation d. Instrumentation

Investigation Report

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 114 of 153


1. Purpose

a. Record — The report provides a permanent official record of the


investigation.
b. Leads — The report provides other investigators with information
necessary to further advance the investigation.
c. Prosecutive action — The report is a statement of facts on which
designated authorities may base a criminal, corrective or disciplinary
action.

2. Nature and Qualities

a. Report must be objective statement of the investigation findings.


b. The report must be an official record of the information relevant to the
investigation that the investigator submits to his superior.
c. The report must be clear, brief accurate, Impartial but complete.
d. The report must not be a place of the investigator's opinion or other
irrelevant facts foreign to the case.
e. The report is complete when it answers the questions of when, where,
who, what, why and how.
f. The report is accurate when it is a true representation of facts of the case.
g. The report is clear when it is developed logically and chronologically

3. Parts of the Report

a. Administrative Data

1) Date
2) File Number
3) Complaint
4) Reporting Investigator
5) Office of Origin
6) Status
7) Distribution

b. Synopsis — Brief in description of the actions of the perpetrator as


established in the body of the report.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 115 of 153


c. Details of the report — Objective of the investigation.

d. Conclusion and Recommendation Includes the investigator opinion,


conclusions and recommendations.

e. Enclosures Photographs,sketches,

f. Sworn statement, etc.

4. Format of a Report (see next page)

INVESTIGATION REPORT FORMAT


CONFIDENTIAL
(Letterhead)
____________________

Date

FOR: (The Chief or Commander who assigned the case)

SUBJECT:

l. AUTHORITY
This section should contain a brief statement of when, where and by
whom the investigation was made and should cite the authority for making it.

ll. MATTERS INVESTIGATED


This section of the report represents the mission of the investigator. In
essence, it answers the question: what is the investigation all about?

Ill. FACTS OF THE CASE


This presents the real truth respecting the matters investigated. The
description "completeness", clarity are particular applicable to this section. It should
be coherent presentation of all pertinent facts that shall be free form argument or
bias and fully supported by evidence.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 116 of 153


IV. DISCUSSION
This section set forth when appropriate, the presumption and inferences from
all the circumstances in the case to give the directing authority the clearest possible
picture. It should contain such related factual matter of argument as may be
necessary in addition to the facts presented, to establish the conclusions and
recommendation based thereon.

V. CONCLUSION
This represents concise summary of the results of the investigation directly
consequent from and supported by facts. These logically follow from the facts of
case of found and set forth in the report. They are usually stated in the order
naturally suggested by the statement of the allegations or facts.

VI. RECOMMENDATIONS
This should contain the practical suggestions as to appropriate action to be
taken to make suitable position of all phases of the case. They should follow, as far
as practicable, the same sequence as was used in the presentation of conclusion.

_________________________

Investigator

Security Education Program


Security Education program plays a vital role in security management. The
people or employees should be aware of the security program of the institution
related to the security and safety. There being aware of the security program would
promote confidence and cooperation among the employee in their contribution to a
secured and safety workplace considering that they are called Multiplier Force. In
the absence of a security personnel in the area, the employee can be the eyes and
ears of the company in the protection of assets and this could be the greatest
contribution of the employee to the company in terms of crime prevention.

Security should not be considered or look upon as expense of the institution, but

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 117 of 153


rather as a system to increase profitability of an institution (PREVENTION — AVERT
LOSSES).

Security Education is conducted to develop security awareness among employees


of the institution. It should cover all employees' regardless of Rank and Position.

Security Awareness Results in

• Better understanding of the relationship between security and successful


operations.

• Knowledge of a personal obligation under the security program.

• Understanding of the relation between security program objectives and


measures.

• Familiarization with the sources in carrying out personal and departmental


responsibilities under the security program.

• Compliance with statutory and regulatory requirements, as well as contract


obligations.

SECURITY EDUCATION MAY BE CONDUCTED IN A NUMBER OF WAYS,


THRUOUGHOUT THE EMPLOYEES/FACULTY STAY IN THE INSTITUTION.

1. DURING INITIAL INTERVIEW


During the initial interview, the interviewer may already provide the following
information.

• Overview of the Security Policies.

• Employee Accountability and Corresponding Penalties

2. DURING TRAINING AND ORIENTATION


Security Education should also be included in the Training and Orientation of
new

employees.

3. REFRESHER CONFERENCE

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 118 of 153


The Institution should conduct regular refresher conference. The
Security Officer shall accomplish the following: Review Guidelines and Policies.

 Explain/lntroduce New Policies.


 Determine if faculty/employee has a security problem.
 Gather information of probable violations of Company Policies.
 Ask for Recommendation or Comments about existing Policies.
 Conduct survey on security issues.

4. SECURITY REMINDERS
The Institution should post or distribute security reminders from time to
time. This kind of security education employs the indirect approach, such as posters
and fliers. Security reminders should be replaced periodically.

5. SECURITY PROMOTION
Security promotion is the act of emphasizing the importance and role of
security in achieving the company's objectives, especially among senior executives.
It involves employee cooperation and support especially from among the top brass
of the various security measures being implemented

Security Survey
In the world of security management, security survey is very important tool to
evaluate and assist the security conditions of an institution or establishment. It is a
tedious work and yet rewarding for the security personnel. It is in security survey
where we can identify our vulnerabilities (weakness) and criticalities (vital) in
security. Knowing the vulnerabilities and criticalities in an institution or establishment
will give us an idea and preference which is too prioritized in security. The basic
instrument for determining security vulnerability is the security survey. Most
description of security surveys refers principally to checklists, audits or inventories of
security conditions.

It measures compliance of employees to security policy and guidelines. Security


Survey is defined as a critical on-site examination and analysis of an industrial plant,
business, a home or public or private institution done to ascertain the facility's
current security status, to identify deficiencies or excess in current practices, to
determine what protection is needed and to make recommendations for improving

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 119 of 153


the overall level of security at that installation. As previously noted, security survey is
a general term that often encompasses other related procedures.

Objectives of Security Survey

1. To determine existing vulnerabilities to injury, death, damage, or destruction


by natural causes.
2. To determine existing vulnerabilities of corporate assets due to outside
criminal activity.
3. To determine existing vulnerabilities of corporate assets due to criminal
activity within the organization.
4. To determine existing conditions of physical security of corporate property.
5. To measure compliance of employees to security.

Planning a Security Survey

1. Verify the need

2. Obtain organization support

3. State the survey's executives

4. Determine how data will be gathered

5. Develop alternatives

6. Prepare a schedule of activities.

Security Inspection

Another important activity, which is necessary to insure the integrity of the overall
security programs, is security inspection. This complements security survey in its
attempt to prevent losses of company properties.

Security inspection is conducted for two reasons: to check on the degree of

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 120 of 153


compliance with the recommended countermeasures and to determine the
effectiveness and adequacy of the countermeasures which are in effect.

Types of Security Inspection

1. Continuous Inspection
2. Formal or Informal
3. Structured or Unstructured Inspection

Security Inspection-the checking of compliance of security policies and regulations


of particular company.

The Three Basic Types of Surveys:

1. Building Inspection — This consist of advices to the client or recipient of


the Survey of the vulnerabilities of the building in accordance to the
physical characteristics of the facility.
2. Security Survey — This will be conducted on the whole complex in
contrast to doing only a portion of the site.
3. Security Analysis — is a more in-depth study that includes risk
management, analysis of risk factors, environmental and physiological
security measures, analysis of crime patterns, and fraud and internal theft.

ULTIMATE SECURITY SURVEY

1. Security are often called RISK ANALYSIS SURVEYS' or RISK ASSESMENT


SURVEYS'
2. A Security Survey is defined as the process of conducting an exhaustive physical
examination of all operational systems and procedures of a facility for the
following purposes:
a. To determine existing state of security
b. Identifying weaknesses in defenses;
c. To determine the degree of protection required,

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 121 of 153


d. To produce recommendations for a total security system.
3. The survey should be undertaken by either suitably trained staff security
personnel, or a fully qualified independent security specialist.
4. No universal checklist can be applied to all sites for survey purposes, as no two
facilities are alike.
5. Before commencing a security survey:
 Written authority should be obtained from the site director;
 Previous surveys should be reviewed;
 An orientation tour should be made;
 Photographs should be taken of things will be difficult to describe in a
report.
6. After completing the survey an immediate review of the findings should be
undertaken with the plant supervisor so that urgent deficiencies can be
addressed.

(Only with authority)

7. A follow-up survey should always be conducted to ensure improvements and


recommendations have been made.
8. Any survey report including lists of recommendations is incomplete without
including a cost-benefit analysis, which is;

"A direct comparison of the cost of operation of the security unit and all the existing
security measures with the amount of the corporate assets saved or recovered as
well as reduction of losses caused by injuries and lost production."

9. No security measure should be recommended which is not cost effective.


10. Key stages in the risk assessment process are:
a. To determine the value, impact and cost of any asset should it be lost
due to natural or man-made forces;
b. To determine the degree of vulnerability of the facility to damage or
attack by natural or man-made forces; and
c. To determine the degree of probability that natural or man-made forces
will strike any given facility.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 122 of 153


11. The vulnerability of a facility to damage or attack may be determined in a number
of ways:
a. By an inspection of the facility by an experienced inspector;
b. An examination of the facility's record of losses; and
c. Determining whether the high-value property or items are properly
protected from theft by insiders.
12. Security surveys have a number of objectives:
a. To determine existing vulnerabilities to injury, death, damage or
destruction by natural causes;
b. To determine existing vulnerabilities of corporate asses due to outside
criminal activities;
c. To determine existing vulnerabilities to corporate assets due to criminal
activities within the company;
d. To determine existing conditions of physical security regulations;
e. To measure effectiveness of current manning;
f. To measure compliance by employees to company security
regulations;
g. To conduct an internal audit to determine fraud;
h. To inspect the overall condition within the facility which causes security
problems;
i. To investigate environmental conditions in the community from a
standpoint of interaction with the facility
13. There is a similarity between a physical security surveys and crime prevention
surveys, but the primary differences are:
a. Physical security measures are oriented more towards security of
property and facilities whereas;
b. Crime prevention measures focus on the deterrence of criminal activity
regardless of the physical safeguards in place

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 123 of 153


6. REFRESHER CONFERENCE
The Institution should conduct regular refresher conference. The
Security Officer shall accomplish the following:

 Review Guidelines and Policies.


 Explain/introduce New Policies.
 Determine if faculty/employee has a security problem.
 Gather information of probable violations of Company Policies.
 Ask for Recommendation or Comments about existing Policies.
 Conduct survey on security issues.

7. SECURITY REMINDERS
The Institution should post or distribute security reminders from time to
time. This kind of security education employs the indirect approach, such as posters
and fliers. Security reminders should be replaced periodically.

8. SECURITY PROMOTION
Security promotion is the act of emphasizing the importance and role of
security in achieving the company's objectives, especially among senior executives.
It involves employee cooperation and support especially from among the top brass
of the various security measures being implemented

Security Survey
In the world of security management, security survey is very important tool to
evaluate and assist the security conditions of an institution or establishment. It is a
tedious work and yet rewarding for the security personnel. It is in security survey
where we can identify our vulnerabilities (weakness) and criticalities (vital) in
security. Knowing the vulnerabilities and criticalities in an institution or establishment
will give us an idea and preference which is to prioritized in security. The basic
instrument for determining security vulnerability is the security survey. Most
description of security surveys refers principally to checklists, audits or inventories of
security conditions. It measures compliance of employees to security policy and
guidelines. Security Survey is defined as a critical on-site examination and analysis
of an industrial plant, business, a home or public or private institution done to
ascertain the facility's current security status, to identify deficiencies or excess in

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 124 of 153


current practices, to determine what protection is needed and to make
recommendations for improving the overall level of security at that installation. As
previously noted, security survey is a general term that often encompasses other
related procedures.

Objectives of Security Survey

1. To determine existing vulnerabilities to injury, death, damage, or destruction by


natural causes.
2. To determine existing vulnerabilities of corporate assets due to outside criminal
activity.
3. To determine existing vulnerabilities of corporate assets due to criminal activity
within the organization.
4. To determine existing conditions of physical security of corporate property.
5. To measure compliance of employees to security.

Planning a Security Survey

1. Verify the need


2. Obtain organization support
3. State the survey's executives
4. Determine how data will be gathered
5. Develop alternatives
6. Prepare a schedule of activities.

Security Inspection
Another important activity, which is necessary to insure the integrity of the
overall security programs, is security inspection. This complements security survey
in its attempt to prevent losses of company properties.

Security inspection is conducted for two reasons: to check on the degree of


compliance with the recommended countermeasures and to determine the
effectiveness and adequacy of the countermeasures which are in effect.

Types of Security Inspection

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 125 of 153


1. Continuous Inspection
2. Formal or Informal
3. Structured or Unstructured Inspection

Security Inspection-the checking of compliance of security policies and regulations


of particular company.

The Three Basic Types of Surveys:

1. Building Inspection — This consist of advices to the client or recipient of the


Survey of the vulnerabilities of the building in accordance to the physical
characteristics of the facility.

2. Security Survey — This will be conducted on the whole complex in contrast to


doing only a portion of the site.

3. Security Analysis — is a more in-depth study that includes risk management,


analysis of risk factors, environmental and physiological security measures, analysis
of crime patterns, and fraud and internal theft.

ULTIMATE SECURITY SURVEY

1. Security is often called RISK ANALYSIS SURVEYS' or RISK


ASSESMENT SURVEYS.
2. A Security Survey is defined as the process of conducting an exhaustive
physical examination of all operational system and procedures of a facility
for the following purposes.
a. To determine existing state of security
b. Identifying weaknesses in defences;
c. To determine the degree of protection required
d. To produce recommendations for a total security system.
3. The survey should be undertaken by either suitably trained staff security
personnel, or a fully qualified independent security specialist.

4. No universal checklist can be applied to all sites for survey purposes, as


no two facilities are alike.

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 126 of 153


5. Before commencing a security survey:

Written authority should be obtained from the site director;

Previous surveys should be reviewed;

An orientation tour should be made;

Photographs should be taken of things will be difficult to describe in a


report.

6. After completing the survey an immediate review of the findings should


be undertaken with the plant supervisor so that urgent deficiencies can be
addressed.

(Only with authority)

7. A follow-up survey should always be conducted to ensure


improvements and recommendations have been made.

8. Any survey report including lists of recommendations is incomplete


without including a cost benefit analysis, which is;

"A direct comparison of the cost of operation of the security unit and all the existing
security measures with the amount of the corporate assets saved or recovered as
well as reduction of losses caused by injuries and lost production."

9. No security measure should be recommended which is not cost effective.

10. Key stages in the risk assessment process are:

a. To determine the value, impact and cost of any asset should it be lost
due to natural or man-made forces;
b. To determine the degree of vulnerability of the facility to damage or
attack by natural or man-made forces; and
c. To determine the degree of probability that natural or man-made forces
will strike any given facility.

11. The vulnerability of a facility to damage or attack may be determined in a


number of ways:

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 127 of 153


a. By an inspection of the facility by an experienced inspector;
b. An examination of the facility's record of losses; and
c. Determining whether the high-value property or items are properly
protected from theft by insiders.

12. Security surveys have a number of objectives:

a. To determine existing vulnerabilities to injury, death, damage or destruction by


natural causes;
b. To determine existing vulnerabilities of corporate asses due to outside
criminal activities;
c. To determine existing vulnerabilities to corporate assets due to criminal
activities within the company;
d. To determine existing conditions of physical security regulations;
e. To measure effectiveness of current manning;
f. To measure compliance by employees to company security regulations;
g. To conduct an internal audit to determine fraud;
h. To inspect the overall condition within the facility which causes security
problems
i. To investigate environmental conditions in the community from a standpoint of
interaction with the facility.

Security Survey Report Format

Date

To: _____________________

Subject: ______________________

From: ________________________

A. INTRODUCTION

1. Authorization for the survey

2. Date and hours survey was made

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 128 of 153


B. NAME AND MISSION OF INSTALLATION

1. Description of surveyed unit

2. Mission of the installation

C. PHYSICAL SECURITY

1. Perimeter Barriers

a. Situation as surveyed

b. Recommendation

2. Guard force and Guard system

a. Situation as surveyed

b. Recommendation

3. Personnel identification & movement control

a. Situation as surveyed

b. Recommendation

4. Protective lighting

a. Situation as surveyed

b. Recommendation

5. Alarm and communication system

a. Situation as surveyed

b. Recommendation

6. Restricted Areas

a. Situation as surveyed

b. Recommendation

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 129 of 153


7. Utilities

a. Situation as surveyed

b. Recommendation

D. OTHER SITUATIONS AND RECOMMENDATIONS

a. Situation as surveyed

b. Recommendation

E. PERSONNEL SECURITY

1. Data concerning key personnel

2. Clearance Program

a. Situation as surveyed

b. Recommendation

3. Security education program

a. Situation as surveyed

b. Recommendation

4. Morale of employee

a. Situation as surveyed

b. Recommendation

5. Absence rate & labor turn-over

a. Situation as surveyed

b. Recommendation

F. DOCUMENT AND INFORMATION SECURITY

1. Rules and regulations to safeguard sensitive information

a. Situation as surveyed

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 130 of 153


b. Recommendation

Note: Discuss each item like:

a. Classified system

b. Receipting system

c. Storage of sensitive information

d. Transmission system

e. Reproduction system

f. Destruction system

g. Preparation and marketing system

G. ENCLOSURE AND EXHIBITS

(State the number and title of three enclosure/ exhibits).

LEA 121: Introduction to Industrial Security Concept

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY, INC.

Page 131 of 153

You might also like