Lea 2
Lea 2
Lea 2
INDUSTRIAL SECURITY
CONCEPTS
LYEN CAREL T. GARCIA, RCRIM
TOP 1
CLE JUNE 2022
ROFESSIONAL REGULATION COMMISSION
PROFESSIONAL REGULATORY BOARD OF CRIMINOLOGY
TABLES OF SPECIFICATION
LAW ENFORCEMENT ADMINISTRATION 15%
Number of
Items
and Distribution
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 100
15
State and apply the theories, concepts, and philosophy of security and safety; 2
Organize and assess the related laws in security and detective agency operations, management and 5
administration;
Translate and construct the basic industrial security concepts of security survey, security plan, security test 4
and evaluation, personnel check, technical surveillance, and security management.
SECURITY
Is defined as the state or quality of being secured, freedom
from fear or danger, assurance, or certainty. To secure is to make safe
or be protected.
Passive Measures are - Those that will deter man from committing such act
for fear of being caught charged in court or get dismissed.
• Security education programs, investigation, fire
prevention seminars, personal security checks.
MAJOR DIVISIONS OF INDUSTRIAL
SECURITY
• Physical Security - this concern with the physical measures adopted to
prevent unauthorized access to equipment, facilities, material and document
and to safeguard them against espionage, sabotage, damage, loss and theft.
BROADEST TYPE OF SECURITY
• Personnel Security- this is as important as physical security. Personnel security
starts even before the hiring of an employee and remains to be
maintained for as long as the person is employed. Its purpose is to insure
that a firm hires those best suited to assist the firm in achieving its goals
and objectives and once hired assist in providing necessary security to the work
force while carrying out their functions.
• Document and Information Security- this involves the protection of
documents and classified papers from loss, access by unauthorized
persons, damage, theft and compromise through disclosure. Classified
documents need special handling. Lack of indoctrination and orientation among the
personal handling them can result in the leakage, loss, theft and unauthorized
disclosure of the documents.
OTHER TYPES OF SECURITY
COMMUNICATION SECURITY
□ It is the protection resulting from various application of various measures
that prevent or delay the enemy or unauthorized persons in gaining
information through the communication system. This includes:
A. Transmission Security – protect transmission from interceptions
B.Cryptographic Security – result from the provisions of technically
sound crypto-systems and their proper use.
C.Physical Security – providing of safeguards to equipment and materials
from access by unauthorized person
HOTEL SECURITY
BANK SECURITY
DOCUMENT SECURITY – protection of documents and classified
papers
PERSONAL SECURITY – protection of personnel especially ranking
officials (VIP security)
CRISES SECURITY – Part of VIP security involved in hostage or
kidnapping of VIPs
INDUSTRIAL SECURITY
OPERATIONAL SECURITY – deals primarily with the protection of
processes, formula or patents and other industrial and manufacturing
activities from espionage, infiltration, loss, compromise or
photocopyinh
SCHOOL SECURITY
SUPERMARKET SECURITY
ETC.
Origins and Development of Security
World Setting:
• Henry Fielding – a magistrate who proposed a permanent, professional
and adequately paid security force.
• Allan Pinkerton – a copper from Scotland and Chicago Police
Department’s first detective, established what was to become one
of the oldest and largest private security operations in the United
States, The Pinkerton Agency. He is also credited with hiring the first
woman detective.
• Wells and Fargo Company – a freight transportation company,
employed their own detectives and security personnel, known as shotgun
riders. This is owned by Henry Wells and William Fargo.
• Brinks, Inc. – pioneered the armored car and courier service. This is
owned by Washington Perry Brink.
• Edwin Holmes – he offered the first burglar alarm service in the US
in 1858.
• William J. Burns – a former Secret Service investigator and head of
the Bureau of Investigation (forerunner of FBI), started the Burns
Detective Agency in 1909 which became the sole investigating agency
for the American Bankers’ Association.
• Baker Industries – initiated a fire control and detection equipment
business.
• American Society for Industrial Security International – it is
the first security professional organization. It was formed in 1955
and this also signifies the modern age of security.
Brief History of Security in the Philippines
- The private security business began on March 11, 1933, when the
first
formally licensed private security agency “Special Watchman Agency”
started operations;
-RA 5487 was passed on June 13, 1969 through the continuous lobbying of
the incorporators and officers of PADPAO, which set the standards and
minimum requirements for the operations of security agencies.
-With the passage of RA 6975, this unit was absorbed by the Philippine National
Police;
-Later it was made into a division of the PNP Civil Security Group and
was renamed Security Agencies and Guard Supervision Division (SAGSD);
-It was renamed to PNP Supervisory Office for Security Investigation Agency
(SOSIA).
LEGAL BASIS OF INDUSTRIAL
SECURITY IN THE PHILIPPINES
1. NATURAL AUTHORITY
The highest law is the law of self-preservation. By instinct man,
man
naturally reacts in order to protect himself, his family, his honor, freedom,
liberty and property from danger, threat, or hazard.
2. CONSTITUTIONAL AUTHORITY
The prime duty of the Government is to serve andprotect the
people. (Art. II, Sec. 4 of the 1987 Phil. Constitution)
3. STATUTORY AUTHORITY
The Revised Penal Code (Act No 3815)
Private Security Agency Law (RA 5487)
PHYSICAL SECURITY
TOPICS:
PHYSICAL SECURITY
PERIMETER BARRIERS
SECURITY LIGHTINGS OR PROTECTIVE LIGHTINGS
PROTECTIVE ALARMS
FIRE ALARM SYSTEMS
PROTECTIVE LOCKS
KEY CONTROL
PROTECTIVE CABINETS
PHYSICAL SECURITY
• a system of barriers placed between the potential intruder
and the objects/matter to be protected.
• It is the broadest branch of security, which is concerned
with physical measures adopted to prevent unauthorized
access to equipment, facilities, materials and documents and to
safeguard them against espionage, sabotage, damage and theft.
PRINCIPLES OF PHYSICAL SECURITY
In every establishment, physical measures are needed to deny
unauthorized access or intrusion because of the following:
1. ENEMY AGENTS MUST/WILL ALWAYS SEEK ACCESS
2.THERE IS NO IMPENETRABLE BARRIER – they are willing to
devote enough time, money, personnel, materials and imagination in passing
barriers.
3.DEFENSE IN DEPTH MEANS BARRIER AFTER BARRIER – there
should be integration of all barriers adopted in the installation.
4. SURREPTITIOUS VERSUS NON-SURREPTITIOUS ENTRY
SURREPTITIOUS (not observable) – the greatest hazard, because
it is usually difficult to determine
NON-SURREPTITIOUS (observable)
5. EACH INSTALLATION IS DIFFERENT – each installation will have
different problems to overcome. The security procedures will not be adequate
for all installation.
BARRIERS
Can be defined as any structure or physical device capable of
restricting, deterring, delaying, illegal access to an
installation
GENERAL TYPES OF PHYSICAL
BARRIER:
1.NATURAL BARRIER – include mountains, rivers, seas, desserts or
terrain difficult to traverse. To be fully effective, these barriers must be
under surveillance of guards.
2.STRUCTURAL OR MAN-MADE BARRIER –
structural
constructions made by man like fences, walls, floors, roofs, grill or
other physical means to deter or impede penetration.
SPECIFIC TYPES OF PHYSICAL
SECURITY BARRIERS (SHANE)
1.STRUCTURAL BARRIERS – constructed by man (walls,
ceilings, doors)
2.HUMAN BARRIERS – guards who stand between intruder and the
matter to be protected.
3. ANIMAL BARRIERS – shepherd dogs (Geese – cheapest)
4. NATURAL BARRIERS – mountains, cliffs, rivers, seas etc.
5.ENERGY BARRIERS – electrical and electronic devices
(protected lighting, alarms, etc)
PERIMETER BARRIERS
It is a mediumor structure which defines the
physical limits of an installations or area to restrict or impede access
3.Sidewalk elevators are elevated parts of the land near the perimeter
barrier that provides access to areas within the perimeter barriers and should
be locked and guarded
B. Controlled lighting
□ Lighting is focusedonthe pile of items rather than
the background.
2. Standby Lighting
□ Similar to continuous lighting but is turn on manually or by
special device or other automatic means, when there is suspicion
of entry.
4. Emergency Lighting
□ Used in times of power failure or other emergencies when other
systems are inoperative.
Types of Lighting Equipment
Floodlights
□ Used for outdoor security lightning including the illumination of boundaries,
fences, and buildings.
Searchlights
□Used to pinpoint potential trouble spots.
Fresnel lights
□ Used to extend the illumination in long, horizontal strips to protect the
approaches to the perimeter barrier.
□ Approx 180 degrees(Horizontal) and 15 to 30 degrees (Vertical)
Street lights
□ Is a raised source of light on the edge of a road or path.
□ Produce diffused light rather than directional beam.
□ They are widely used in parking areas
TYPES OF LIGHT LAMPS
1.INCANDESCENT LAMP – most common light bulb, instant ,
illumination to using wire filament, have low initial cost
2.FLUORECENT LAMP – Tube lamps, it cannot project
light over long distances, desirable as flood type lights
3.GASEOUS DISCHARGE LAMP – require period of 2 to 5
minutes to light
Mercury Vapor – Blue Green or Purplish-white color, considered
more efficient and is widespread in exterior lighting
Sodium Vapor – Yellow/amber color, used in areas where
insect predominate
2. CIRCUITS/TRANSMISSION LINE
Carries messages to the signaling apparatus
It is the communication channel that conveys the information from all
sensors in the system to the signal by means of wire, radio waves.
3. ENUNCIATOR/ANNUNCIATOR/SIGNALING SYSTEM
The actual alarm may be audible or silent, a bell, buzzer,
phone ringing, or flashing of light.
TYPES OF ALARM DETECTION
SYSTEM
Central Alarm System
A type of protective alarm system where the central station is
located outside the installation. When the alarm is sounded,
central station notifies the police and other agency.
Proprietary System
This functions they same way as the central station system except it
is owned, operated by the facility.
Response to all alarms is by the facilities own
security or fire personnel.
Local Alarm System
Consist of ringing up a visual or audible alarm near the object to
be protected.
In case of alarm, response be made by local guards and other
personnel within sight or hearing.
Auxiliary System
In this system, installation circuits are led into local police or
fire department by leased telephone lines.
High incidence of false alarms have made this system
unpopular with public fire and police personnel
Local Alarm by Chance System
This is a local alarm system in which a bell or siren is sounded with
no predictable response.
The hope is that a neighbor or passing patrol car will reach the
alarm and call for police assistance, but such a call is purely a
matter of chance.
DEVICES
FIRE HYDRANT
It is a mechanical device strategically located in an installation or in a
street where a fire hose will be connected so that the water will be available
to extinguished a fire.
FIRE EXTINGUISHER
Is a fire fighting equipment which can is a fire fighting equipment which can
be portable or in cart that is used to put out fire depending on the
contents to extinguish certain types of fire.
PROTECTIVE LOCKS
Generally speaking, LOCKS are the CHEAPEST security
investment that can be made.
Locking device is simply a mechanism that extends the door or
window into a wall that hold them.
It must be recognized that any lock will eventually yield to attack.
They must be thought of only as delaying devices.
DEFINITION OF TERMS
LOCK
definedas mechanical, electrical, hydraulic or electronic device designed to
prevent entry to a building or room.
KEY
instrument for lockingandunlocking; a metal bar with notches or grooves that
when inserted into a lock and turned, operates the lock’s mechanism
PADLOCK
A portable anddetachable lock having a pivotedor sliding hasp which possess
through a staple ring, or the like and is made fast or secured.
PETERMAN
A term used in England for lock picker, safecrackers, and penetrators of restricted areas
or rooms
FALSE KEY
Genuine key stolen from the owner
❑ Types of Locks
1. Warded Locks
□ These are
devices
holding a door
closed by
magnetism.
These
are electrical
units
consisting of the
electromagnetic
on
metal holding
plate.
When the power
is
6. Card-operated
Locks
□ Coded- cards,
either notched,
embossed, or
containing an
embedded
pattern
of copper locks,
are
used to operate
such locks.
□ These are
frequently fitted
with
a recording
device
KEY CONTROL
Is the management of keys in a plant or business organization to
prevent unauthorized individuals access to the keys.
The following can be utilized to maintain effectively key control.
A. key cabinet
B. key records
C. Inventories
D. Audits
E. Daily reports
Types of Keys
Note:
MASON KEYING – is the use of a key to open the main entrance
and the office.
PROTECTIVE CABINETS
This is done by placing documents in a secured and usually fire
proof containers.
Types of Security Cabinets
1. Safe
□ A metallic container used
for safekeeping of documents or
small items in an office or
installation.
□ Its weight must be at least 750 lbs.
□ Walls should be at least 1 inch
thick.
□ Doors should be made of steel and
at least 1 ½ thick.
Safe Cracking Methods
1. Drilling or punching – accomplished by knocking off
combination dial and drilling hole to expose locking device.
2. Burning – process of using oxyacetylene torches or
burning bars.
3. Peeling – process of attacking the seams of metal plates
with pry bars to peel back layers of metal and thus exposing
either lock mechanism or interior.
4. X-ray – it is utilized to reveal position of the combination
and mechanism necessary to open safe.
5. Use of Explosives – a nitro-glycerine and
plastic explosives.
6. Use of Power tools – examples are use of rotary devices,
hydraulic tools and power drills.
7. Manipulation – a very few safe crackers have skill
to use this technique.
2. Vault
□ It is a
heavily-construct
ed fire and
burglar resistant
container, usually
a part of the
building structure,
used to keep and
protect cash,
documents, and
negotiable
instrument.
□ Door should be made of steel at least 6 inches in thickness.
□ Walls, ceiling and floor should made out of reinforced
concrete at least 12 inches in thickness. Vault floor should be
higher by 4 inches which the surrounding floors.
□ Electrical conduits into the vaults should exceed 1
½ in diameter.
□ Vaults should not be more than 5,000 cubic feet.
□ Fire- resistive up to 6 hours.
3. File Room
□ It is a cubicle in a
building constructed
little lighter than a vault
but of bigger size to
accommodate limited
people to work on the
records inside.
□ File room should at
most be 12 feet high.
□ Must have a watertight
doors and at least one
(1) hour fire proof.
PERSONNEL SECURITY
PERSONNEL SECURITY
SECURITY EDUCATION
PERSONNEL SECURITY
includes all the security measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to the government, from
gaining access to classified matter or to any security facility, and to
prevent appointment, or retention as employees of such individuals
It is the “weakest link” in the security chain. This weakness can best
be minimized or eliminated by making the personnel security conscious
through good training program.
OBJECTIVES OF PERSONNEL
SECURITY
1.To provide the standards and procedures necessary to insure the
appointment, employment or retention of suitable and loyal individual
2.To develop the necessary and proper security discipline among the
applicants and employee as well as to protect and preserve the security
interest of the organization.
3.Inculcate the desirable security attitudes and habits among the
applicants and employees.
CONTROL OF PERSONNEL IN THE
PHYSICAL FACILITY
A control point must be established for positive personnel
identification and check system. This is to insure that only those person
who have the right and authority will be given the necessary access to
the area.
The most practical and generally accepted system of personnel
identification is the use of IDENTIFICATION CARDS, BADGES OR
PASSES.
2 TYPES OF PERSONNEL IDENTIFICATION
A. PERSONAL RECOGNITION – if the person’s
familiarity characteristics
B. ARTIFICIAL RECOGNITION – identification cards, passes,
passwords, etc.
USE OF PASS SYSTEM
A.SINGLE PASS SYSTEM – the badge or pass coded for authorization
to enter specific areas is issued to an employee who keeps it in his
possession until his authorization terminates.
TYPES OF PSI
A. NATIONAL AGENCY CHECK (NAC) – this is an investigation of
individual made upon the basis of written information supplied by him in
response to official inquiry, and by reference to appropriate NATIONAL
AGENCIES. The following national agencies checked under this type of
investigation are the following:
1. NATIONAL INTELLIGENCE COORDINATING AGENCY (NICA)
2. NATIONAL BUREAU IF INVESTIGATION (NBI)
3.INTELLIGENCE SERVICE OF THE ARMED FORCES OF
THE PHILIPPINES (ISAFP)
4. CRIMINAL INVESTIGATION DETECTION GROUP (CIDG)
B. LOCAL AGENCY CHECK (LAC)
This type of investigation consist of the first type plus written inquiries
sent to appropriate local government agencies, former employees,
references, schools.
Reference are the following:
1. Mayor, police, fiscal, judge of the locality
BACKGROUND INVESTIGATION
It is an inquiry which aims to verify applicant’s information written at the
applicants form, to ascertain his/her past employment experiences and to
obtain other information pertinent to the decision to employ.
This is more comprehensive investigation than the NAC and LAC.
TYPES
A. COMPLETE BI – all circumstances of personal life
B.PARTIAL BI – limited only to some of the circumstances of persons life
FACTORS TO BE CONSIDERED IN THE
CONDUCT OF BI
1.Loyalty – faithful allegiance to the Philippine government and its
duly constitutional authorities;
2.Integrity – uprightness in character, soundness of moral principle,
freedom from moral delinquencies.
3.Discretion – the ability or tendency to act or to decide with
prudence, the habit of wise judgment;
4.Morals – distinctive identifying qualities which serve as an index to
the essential or intrinsic nature of a person;
5.Character – the sum of traits that have been impresses by nature,
education and habit upon the individual;
6.Reputation – opinion or estimation in which one is generally held.
It is what a person is reported to be whereas character is what a person
is.
SECURITY EDUCATION
It is defined as the exposure and teaching of employees on security
and its relevance to their work. Security education is conducted to
develop security awareness among employees of the company. It should
cover all employees, regardless of rank or position.
SECURITY EDUCATION PROGRAM
A program given to employees of an installation by lecture and other
means pertaining to measure and safeguard to be taken to protect the
interest of the installation for, damage, sabotage, pilferage and other
criminal acts.
SEVEN PHASES OF SECURITY
EDUCATION PROGRAM
1. Initial Interview – the individual’s first contact should be formal
and professional.
It must leave an impression on theindividual of the
seriousness of security.
It should stress the importance of security of the company and
individual.
To explain the penalties that could result from violations.
2. Training Conference
CERTIFICATE OF DESTRUCTION
This is the certification by a witnessing officer that the classified
matters describe therein has been disposed of in his presence in an
approved destruction methods.
OTHER TERMINOLOGIES
1. CLASSIFIED – refers to assign information by one of the 4
classifications categories.
INFORMATION CYCLE
1. The Creation – Information is discovered and develop;
2. Used – Some action is take with the information;
3. Storage and Retrieval – Stored for future use;
4. Transfer – transferring of information from active to inactive use;
5.Disposition – decision may be made to retain the information
indefinitely.
KINDS OF SENSITIVE INFORMATION
PROPRIETARY INFORMATION
Information which some special way is related to the status,
operations or activities of the possessor over which the possessor
asserts ownership.
TRADE SECRETS
It may consist of any formula, pattern, device or compilation of
information which is used in one’s business and which gives one
opportunity to gain an advantage over competitors who do not know or
use it.
PATENT
A grant given by the government to an inventor, conveying and
securing to him the exclusive rights to make, use and sell his invention
for term of twenty (20) years.
THREAT TO PROTECTION OF SENSITIVE
INFORMATION
Competitive Intelligence – systematic program for gathering and
analyzing information about competitor’s activities and general
business trends to further company’s goals.
Systematic Pilferer
One who steals with preconceivedplans and takes
away any or all types of items or supplies for economic gain.
SECURITY SURVEY,
SECURITY INSPECTION
AND SECURITY
INVESTIGATION
SECURITY SURVEY
This is also known as security audit which is actually a fact-finding
probe to determine a plant’s adequacy and deficiency in all aspects of
security, with the corresponding recommendations.
Refers to checklist, audits, or inventories of security conditions.
1. Continuous Inspection
2. Formal Inspection
3. Informal Inspection
4. Structured Inspection
5. Unstructured Inspection
1. Continuous Inspection
To keep pace with the constant changes in the organization, changes
in our security terms of attitudes, life-style and moral values, and the
rapid advancement of technological modifications are all around us, the
inspection must be an on-going and never ending activity.
2. Formal Inspection
□ Preceded by an announcement and the unit under
inspection prepares for events.
3. Informal Inspection
□ Executed in a spirit of understanding and cooperation.
4. Structured Inspection
□ There is a format or logical sequence.
5. Unstructured Inspection
□ Conducted in random manner. There is no format and logical
sequence.
DRY-RUN
Practical test or exercise of plans or any activity to test
its validity, an operational readiness exercise;
SECURITY INVESTIGATION
This is a planned and organized determination of facts concerning
specific loss or damage of assets due to threats, hazards or unsecured
conditions.
SECURITY GUARD FORCE
It is a group of force selected men, trained or group into functional unit for
the purpose of protecting operational processes from those disruption which
would impede efficiency or halt operation at a particular plant, facility,
installation or special activity.
Private Detective (PD) – shall mean any person who does detective work for hire,
reward or commission, other than members of the Armed Forces of the Philippines,
guards of the Bureau of Jail Management and Penology, municipal or city jail
guards, and members of the Philippine National Police or of any other law
enforcement agency of the government.
Private Security Personnel – shall be natural persons which include private security
guards, private detectives, security consultants, security officers and others that may
be classified later, rendering/performing security and/or detective services as
employed by private security agencies and/or private firms.
License to Exercise Profession – shall mean any document issued by the
Chief, Philippine National Police or his duly authorized representative
recognizing a person to be qualified to perform his duties as private security
or training personnel. (License To Exercise Security Profession – RA 11917)
PSAs with temporary LTO having posted 100 guards but less
than 200 shall upon expiration of such LTO shall be issued an
extension period of 6 months. However, upon expiration of the
extension period, no extension shall be granted unless the PSA shall
submit a certification for additional 50 guards posted for a 150 guards
total.
a. PSAs with temporary LTOs, upon expiration still fail to comply
with the 200 guards requirement, shall be granted another 6 mos.
period. However, failure to comply shall serve a basis for the
issuance of cease to operate order.
b. LTO of PSAs with less than 100 guards after one year shall
not be renewed.