PDF Document 2
PDF Document 2
INDUSTRIAL
SECURITY
concepts
REMARK GALAN, RCrim
Top 5, CLE
❑ Historical Background of Security
NATURAL
• Environment HAZARDS
• Information
• Money
• People
• Facility • Efficiency
• Equipment • Stability
• Materials
• Product
SECURITY • Profitability
• Market • Growth
• Reputation • Sustainability
• Time
MAN-MADE
HAZARDS
Origins and Development of Security
World Setting:
Henry Fielding – a magistrate who proposed a permanent,
professional and adequately paid security force.
Allan Pinkerton – a copper from Scotland and Chicago Police
Department’s first detective, established what was to become one
of the oldest and largest private security operations in the United
States, The Pinkerton Agency. He is also credited with hiring the
first woman detective.
Wells and Fargo Company – a freight transportation company,
employed their own detectives and security personnel, known as
shotgun riders. This is owned by Henry Wells and William
Fargo.
Brinks, Inc. – pioneered the armoured car and courier
service. This is owned by Washington Perry Brink.
Edwin Holmes – he offered the first burglar alarm service in
the US in 1858.
William J. Burns – a former Secret Service investigator and
head of the Bureau of Investigation (forerunner of FBI),
started the Burns Detective Agency in 1909 which became the
sole investigating agency for the American Bankers’
Association.
Baker Industries – initiated a fire control and detection
equipment business.
American Society for Industrial Security International – it is
the first security professional organization. It was formed in
1955 and this also signifies the modern age of security.
Philippines Setting:
Jimenez Security Agency (formerly the Special Watchman
Agency) –
the first formally licensed private security agency in the
Philippines dated March 1, 1933.
This was owned, managed and operated in the City of Manila by
brothers Juan and Pedro Jimenez.
Philippine Association of Detective and Protective Agency
Operators (PADPAO) –
on May 30, 1958, it was formally organized in accordance of RA
5487 in setting the standards and minimum requirements for the
operation of the security agency.
June 13, 1969, Philippine Congress
enacted RA 5487 (Private Security
Agency Law). This law assigned the
most important role of security guard
force in assisting the police in
safeguarding lives and properties.
August 4, 1969, PC issued Staff Memo creating the
PCSIASO (PC Security and Investigation Agency
Supervisory Office). After barely 2 months another
Staff Memo was issued renaming PCSIASO to
PCSOSIA.
1. Physical Security
It is the broadest branch of security.
It is the physical measures adopted to
prevent unauthorized access to
equipment, facilities, materials, documents,
and to safeguard them against espionage,
sabotage damage and theft.
2. Communication Security
It refers to the
protection of
guests, assets,
personal effects and
other properties in
hotels, inns and other
similar
establishments.
4. Bank Security
A specialized type of
physical security
protecting the assets,
personnel and
operation of a bank.
5. Operational Security
1. Natural barrier
2. Structural barrier
3. Human barrier
4. Animal barrier
5. Energy barrier
❑ Perimeter barrier
1. Fences
2. Walls
3. Bodies of Water
❑ FENCE
It is an independent structures
designed to control physical and
visual access between outside areas.
❑ Types of Fence
a. It must be
constructed at least
7 feet tall excluding
top guard.
b. It must be of 9
gauge or heavier.
c. The mesh openings
are not be larger
than 2 inches per
side.
e. It should be twisted and barbed salvage at
top and bottom.
f. It must be securely fastened to rigid metal or
reinforced concrete.
g. It must reach within 2 inches of hard ground
or paving.
h. On soft ground, it must reach below surface
deep enough to contemplate for shifting soil
and sand.
2. Barbed Wire Fence
a. Standard concertina
barbed wire is
commercially
manufactured wire
coil of high strength
steel barbed wire
clipped together at
intervals to form
cylinder.
b. Opened concertina
wire is 50 ft. long
and 3 ft. in
diameter.
❑ Building walls
1. Top guard
2. Guard Control Stations
3. Tower
4. Barrier maintenance
5. Signs and Notices
6. Cellar guard
1. Top guard
Is an additional
overhang of barbed
wire fence placed on
vertical perimeter
fences facing upward
and outward with a
45 degree angle with
3 to 4 strands of
barbed wires spaced
6 inches apart.
2. Guard Control
Stations
Normally provided
at main perimeter
entrance to secure
areas located out of
doors and manned
by guards on full time
basis .
3. Tower
Are house-like
structures above
the perimeter
barriers.
4. Barrier maintenance
Control signs
should be erected
where necessary in
the management of
unauthorized
ingress to preclude
accidental entry.
What is a Pass System?
A pass or badge is issued by security for
personnel to be admitted in the installation.
This system precludes those visitors with
escorts and personal use and not for the
restricted areas like exclusive, limited and
controlled areas.
Recommended pass systems:
Single Pass or Badge System- the badge or pass coded for
authorization to enter specific areas is issued to an employee
who keeps it in his possession until his authorization is
terminated.
Pass or Badge Exchange System- an exchange takes place at
the entrance of each controlled area. Upon leaving the
personnel surrenders his badge or passes and retrieve back his
basic identification.
Multiple pass system- this provides an extra measure of
security by requiring that an exchange take place at the
entrance of each restricted area.
❑ Protective lighting
It consist of a series
of fixed luminaries at
range to flood a
given area
continuously during
hours of darkness.
It is the most familiar
type of security
lighting.
A. Glare Projection
Intensity is
focused to the
intruder while the
observer remains in
comparative
darkness.
B. Controlled lighting
Lighting is
focused on the
pile of items rather
than the
background.
2. Standby Lighting
Similar to continuous lighting but is turn on
manually or by special device or other
automatic means, when there is suspicion of
entry.
Used in times of
power failure or
other emergencies
when other systems
are inoperative.
❑ Types of Lighting
Equipment
▪ Floodlights
Used for outdoor
security lightning
including the
illumination of
boundaries, fences,
and buildings.
▪ Searchlights
Used to pinpoint
potential trouble
spots.
▪ Fresnel lights
Is a raised source of
light on the edge of a
road or path.
Produce diffused
light rather than
directional beam.
❑ Alarm
Security device
fitted to property,
usually a house or
a car, to make
warning sound if
break- in or theft is
attempted.
❑ Protective Alarms
1. Warded Locks
It is designed for
the use of the
automobile
industry and are
general use in car
doors today.
The delay afforded
is approximately 5
to 10 minutes.
3. Lever Locks
1. Safe
A metallic container
used for safekeeping of
documents or small
items in an office or
installation.
Its weight must be at
least 750 lbs.
Walls should be at least
1 inch thick.
Doors should be made
of steel and at least 1 ½
thick.
Safe Cracking Methods
It is a cubicle in a
building constructed
little lighter than a vault
but of bigger size to
accommodate limited
people to work on the
records inside.
File room should at
most be 12 feet high.
Must have a watertight
doors and at least one
(1) hour fire proof.
❑ RA 5487 (Private Security Agency Law)
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. Not less than eighteen (18) years of age
nor more than fifty (50) years of age;
e. Has undergone a pre-licensing training
course.
❑ Exemptions from Pre- Licensing Training
a. Filipino citizen;
b. Holder of Baccalaureate Degree;
c. Physically and mentally fit; and
d. Has graduated from a Security Officer
Training Course.
❑ Security Consultant
a. Filipino citizen;
b. Physically and mentally fit;
c. Holder of Masters Degree in Criminology,
Public Administration, Industrial Security
Administration and or Law;
d. Must at least ten (10) years experience in
the operation and management of security
business.
Definition of Terms:
1. Controlled Areas
Areas which access is restricted as to
entrance or movement by all authorized
personnel and vehicles.
It should be additionally marked by a
fence.
Access to it should be limited.
2. Limited Areas
Are those within the controlled area where a
greater degree of security is required.
3. Exclusion Areas
Used only for handling and storage of high
valued cargo and classified documents.
The area should be under surveillance at all
times.
❑ Kinds of Sensitive Information
1. Trade Secret
Consist of any formula, pattern, device, or
compilation of information which is used
in one’s business and which gives him an
opportunity to gain an advantage over
competitors who do not know or use it.
2. Patent
It is a grant made by the government to
an inventor, conveying, and securing to
him the exclusive rights to make, use,
and sell his invention for a term of 20
years.
❑ Threats in Protection of Sensitive
Information
i. Eavesdropping
Unauthorized listening.
Entering into a private place with intent to
listen surreptitiously to private conversation
or to observe to conduct of any other person.
ii. Wiretapping
Method of
collecting
information
through
interception of
telephone
conversation.
ii. Bugging
Placing of
hidden
microphone to a
target installation
to collect
information.
❑ Seven Phases of Security Education
Program
Major Risk:
1. Nuclear Attack
2. Natural Catastrophe
3. Civil Disturbances and Malicious
Destruction
❑ Risk Analysis – examination of the
vulnerability, probability, and criticality of
potential threats.
I. Pilferage
It is the act of stealing of small items.
It is one of the most common and
annoying hazards which security has to
deal with.
❑ Types of Pilferer
a. Casual Pilferer
❑ Saboteur
One who destroy company properties or
perform other explicit activities which would
result to disturbance, to cause financial drain,
postponement of operation, threaten, or to
attach negative impression.
III. Espionage
The practice of spying, excessive or
offensive spying.
1. Continuous Inspection
2. Formal Inspection
3. Informal Inspection
4. Structured Inspection
5. Unstructured Inspection
2. Formal Inspection
Preceded by an announcement and
the unit under inspection prepares for
events.
3. Informal Inspection
Executed in a spirit of understanding
and cooperation.
4. Structured Inspection
There is a format or logical sequence.
5. Unstructured Inspection
Conducted in random manner. There is
no format and logical sequence.
❑ Emergency – It is a sudden,
unexpected occurrence or set of
circumstances demanding immediate
action.
❑ Disaster – Unscheduled event that
usually caused by emergency.
❑ Crisis – It is the turning point of a
disaster or emergency.
END