Industrial Security Management (LEA3)

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 33

Industrial Security Management

RA no. 5487 - (as amended by PD no. 11) - Private security agency law.

Private Detective Agency - is any person who for hire or reward or on commission conducts or carries
on or holds himself out as conducting or carrying on a detective agency or detective service.

Private Detective - any person who is not a member of a regular police agency or armed forces who
does detective work for hire,reward or commission.

PADPAO - Philippine Association of Detective and Protective Agency Operators.

Watchmen/Security Guard - person who offers or renders personal service to watch or secure either
residential or business establishment or both or any building,compound or area for hire or
compensation or as an employee thereof.

Security Agency - any person, association, partnership or corporation who recruits, trains, muster
,furnishes, solicit individuals or business firms, private or government owned or controlled corporation
to engage his services or those of its watchmen.

Who May Organize Security Agency

1. Any Filipino Citizen or a corporation, partnership or association.

2. With a minimum capital required by law.

• In case of corporation, association, or partnership - must be 100 % owned and controlled by Filipino
citizen.

•No person shall organize or have interest in more than one agency.

Qualification of an Operator or Manager of a Security Agency:

1. At least 25 years of age

2. College graduate and/or commissioned officer in the inactive service of the AFP

3. Good moral character

4. No previous record of any conviction of any crime/offense involving moral turpitude.

5. Not suffering from any of the following disqualifications:

a. dishonorably discharged or separate from the AFP. b. mentally incompetent.

c. addicted to the use of narcotic drugs. d. habitual drunkard.


•An elective or appointive government employees who may be called upon on account of the function
of their respective offices in the implementation and enforcement of the provision of RA 5487 and
person related to such government employees by affinity or consanguinity in the third civil degree shall
not hold any interest, directly or indirectly in any security guard agency.

Basic Qualification of a security Guard

1. Filipino citizen

2. High school graduate

3. Physically and mentally fit

4. Not less than 21 nor more than 50 years old

5. At least 5'4" in height

6. Not suffering from any disqualification under RA. 5487

• Veterans shall be given priority in employment as security guard or private detective.

• Person convicted of any crime involving moral turpitude shall not be employed as security guard or
private detective.

• Private detective, detective agency, security guard, security agency must first obtain license from the
PNP.

• Employees employed solely for clerical or manual work need not be licensed.

• The license shall be displayed at all times in a conspicuous and suitable place in the agency office.

• The PNP shall exercise general supervision over the operation of all private detective and security
guard agencies.

• The City/Municipal Mayors has the power as director of the City/Municipal civil defense to deputize
private detective and security guards to help maintain peace and order or prevent or arrest law violators
in case of emergency or in times of disaster or calamity. They shall take orders from the Chief of Police
for the duration of the fire, inundation, earthquakes, riots or other emergency.

• A security guard or security agency is entitled to possess firearms.

• Firearm must not be higher than .45 caliber.

• Agency is entitled to possess firearm not exceeding one firearm for every security guard in its employ.

• Security guard is entitled to possess not more than one riot gun or shotgun.
• Firearms shall be carried by the security guard only during his tour of duty in proper uniform within
the compound of the establishment except when he escorts big amount of cash or valuables in or out of
said compound.

• The Chief PNP shall prescribe the uniform, ornaments, equipment and paraphernalia to be worn by
the security guards.

• Uniforms must be different from the PNP/AFP.

• Salary of security guard - not lower than the minimum wage prescribe by law.

Limitations and Prohibitions on a Security Agency

1. No agency operating in the City of manila and suburbs may employ more than 1000 watchmen or
security guards.

2. No agency operating in other cities and first class municipalities may employ more than 500
watchmen or security guards.

3. No agency operating in municipalities other than first class may employ more than 200 watchmen or
security guards.

4. No person, corporation, partnership or association may organize more than one agency in any one
city or municipality.

5. No agency shall offer, render or accept services to gambling dens or other illegal enterprises.

6. The extent of the security service being provided by any security agency shall not go beyond the
whole compound or property of the person or establishment requesting the security service except
when they escort big amount of cash.

Who can Issue rules and regulations to carry out the purpose of RA 5487?

ans.

the chief PNP, in consultation with the Philippines Association of Detective and Protective Agency
Operators.

What are the penal provisions for violation of RA5487 or its implementing rules?

ans.

1. Suspension, fine or cancellation of license to operate with the forfeiture f bond filed with the Chief
PNP.

2. Imprisonment ranging from 1 to 4 years and fine, in the discretion of the courts.
Physical security - describes the measures that are designed to deny access to unauthorized personnel
from physically accessing a building, facility, stored information and guidance on how to design
structures to resist potentially hostile acts.

- a system of barriers placed between a potential intruder and the material or


installation to be protected.

Security - the predictable state or condition which is free from harm, injury, destruction, intimidation or
fear. Freedom from fear or danger or defense against crime.

Physical Security System - a barrier or system of barriers placed between the potential intruder and the
matter to be protected. Protective device against hazards, threats, vulnerability and risks.

Purpose/Goals of Physical security

1. deter potential intruders - ex. warning signs, perimeter markings

2. distinguish authorized from unauthorized people - ex. using pass card

3. delay or prevent intrusion attempt - ex. wall, door lock, safe

4. detect intrusion and monitor/record intruders - e. CCTV, intrusion alarm

5. trigger appropriate incident responses - ex. security guards

How to deter potential intruders

1. install warning signs -

2. build fences

3. put vehicle barriers

4. install vehicle height restriction

5. implement restricted access point

6. install sight lighting and trenches

How to distinguish authorized from unauthorized people - access control at the

1. gates

2. doors

3. locks
How to detect intrusion

1. install alarms

2. install intrusion detection monitor

3. install video monitoring system - ex. cctv

Vigiles (in Rome) - origin of the watchmen although their principal duty was as a fire brigade.

Notable security guards:

Frank Wills - detected the Watergate burglars ultimately leading to the resignation of US president
Richard Nixon.

Target hardening - the reduction in criminal opportunity, generally through the use of physical barriers,
architectural design and enhanced security measures of a particular location.

Defensible Space - the range of mechanisms that combine to bring an environment under the control of
its residents.

Demography - the study of the characteristics of population groups.

Principles of Physical Security

1. An intruder must be able to acquire access to the property in order to benefit.

2. The type of access necessary will depend upon a number of variable factors and therefore may be
achieved in a number of ways.

3. There is no impenetrable barrier.

4. Security is built upon a system of defense in depth resulting to accumulated delay time which may
lead to the apprehension of the intruder.

5. Each installation is different from the others.

2 Kinds of Barriers

1. Natural

2. Artificial

5 Types of Barriers

1. Human

2. Animal
3. Natural

4. Energy/Electrical/Electronic

5. Structural

3 Line of Defense

1. Perimeter Barrier - 1st line of defense.

2. Building Exterior - 2nd line of defense.

3. Interior Controls - 3rd line of defense.

Perimeter Barrier - main purpose is to deny or impede access or exit of unauthorized persons.

Other Purposes

1. It defines the boundary of the property to be secured.

2. It creates a physical and psychological deterrent to unauthorized entry.

3. It delays intrusion, thus facilitating apprehension of intruders.

4. It assists in a more efficient and economical employment of guards.

5. It facilitates and improves the control of pedestrian and vehicular traffic.

Components:

1. Types of Fencing (solid/full view)

2. The top guard

3. Types of Protective Alarms Systems

4. Types of Protective and Emergency Lighting's

5. CCTV Cameras and other Electronic Security Systems/Energy Barriers

Building Exterior - Components:

1. walls

2. Doors

3. Windows

4. Roof Openings
5. Fire Escapes

6. Protective Alarm Systems

7. Protective and Emergency lightnings

8. CCTV Cameras and other Electronic Security Systems/Energy Barriers

Interior Controls - Components:

1. ID Systems

2. Protective Alarm Systems

3. Protective Emergency Lighting's

4. Communication Systems

5. CCTV Cameras and other Electronic Security

Systems/Energy Barriers

6. Restricted Areas (storage areas/utilities)

7. Access Control

8. Key Control

9. Emergency Plans

10.Guards

Natural barriers or features - such as cliffs,ravines,and rivers which delay or make more difficult to entry
of intruders.

Barriers - any line of boundary and separation,natural or artificial,places,or serving as limitation or


obstruction.Anything that bars,keep out,obstruct progress,or prevents encroachment or intrusion.

Structural barriers - features constructed by man regardless of their original intent that tends to delay
the intruder.ex.walls,ceilings,locks,safe,windows.

Human barriers - guards,charges of quarters,office personnel,shop workers etc. who stand between the
intruder and the matter to be protected.

Animal barriers - usually guard dog.ex. trained German shepherds used as guards,goose,and turkeys can
also be included.
Energy barriers - usually electrical or electronics devices used to provide assistance to guard
personnel.ex. protective lightnings,anti intrusion devices.

Full view fence - it is designed primarily to prevent physical access between two areas.Constructed in
such a way that visual access is permitted through the fence.

Physical Security Features:

1.Natural barriers - natural terrains features must be considered from the stand point of their values to
intruder as cover and concealment.Normally the first type considered very often we have to accept and
work around them.

2.Fences

a. solid fence - one is constructed in such a way that visual access through the fenced structure is
denied.

b. full view fence - constructed in such a way that usual access is permitted through the fence.

Advantages of a full view fence

1. removing patrols and stationary guards are able to keep area surrounding of the installation under
observation.

2. it does not create shadows which would provide cover and concealment for the intruder.

Disadvantages of a full view fence

1. It allows visual access to the installation, its personnel, its guard and its activities.

2. It allows the intruders to become familiar with the movements and the time schedule of the guard
patrols thereafter allowing him to pick the time for attempting penetration which would most
advantageous to the intruder.

Advantages of solid fence

1. Denies visual access of the installation of the intruder.

2. Denies the opportunity for the intruder to become familiar with the personnel, activities and the time
schedule of the movements of guards in the installations.

Disadvantages of solid fence

1. It prevents the guards from observing the area around the installation.

2. It creates shadows which may be used by the intruder for cover and concealment.
Minimum acceptable requirements for fence used security barriers

1. Height - 8 feet at a minimum.

2. Slack at the bottom - not to exceed 2 inches. If the ences are not tight then it should extend even
closer to the ground.

3. Wooden fence post - minimum horizontal dimension of 4X4 inches.

4.Steel fence post - the round type should at least be 2 inches at the smallest diameter.

5. Fence post - should be set in concrete or in firm soil using commercial drive anchors to a depth of 3
feet and the maximum distance post is 10 feet.

6. Fence top (Top Guard) - there should be something on the top of the fence to deter persons
attempting to go over fence. ex.use of barb wire overhang.The arms holding the barbwire should be
extended at 45 degree angle in the direction of the expected approach.

7. Fence area - it should be declared trees and vegetation and debris of other materials which would
offer concealment of the intruder or would aid him in scaling the fence.

8. Fence Gates - gates should be limited to the no. necessary for efficient and sage operation of the
installation.

9. Fence Opening - all opening in the fence in excess of 96 inches must be locked barbed or screen in
such a way that they may be interlocked and opened from the inside and only by selected personnel.

10.Multiple fence - is used should at least be 10 feet apart and the overhang on the top of the inner
fence should point inward.

4 Basic functions that must be accomplished by the guard system

1. Detect intruders

2. Sound alarms

3. Apprehend unauthorized personnel

4. Identify authorized personnel

Personnel Control Identification

2 Types of identification

1. Personal Recognition - is the most effective

2. Artificial Identification - badges,passes etc.


System of Employment of Personnel Control Identification

1. Pass system - a method used by security to screen visitors or person admitted into building premises.

2. Single pass or Badge system - the least expensive and the least secure.

3. Group pass and Badge system - one ID for one group.

4. Multiple pass system - separate pass is required for access to various areas in need ex.color coding

5. Spot magnetized identification passes - a code may be placed in the device and when passes through
a machine, the code on the device is read, if it contains wrong code or no code at all, it will alarm.

6. Access list - it contains the names of authorized persons or personnel and is checked against
identification cards such as drivers licenses, draft registration etc.

Visitor control - the measures used would depend on the sensibility of the installation but could include
the following:

1. Escort - expensive but most secure

2. Time traveled - if there is a long delay or time lapse between the departure and arrival, the visitor
may be required to show cause for the delay.

3. Visitors logs - should contain identifying data, reasons of visit,time in and hour etc.

4. Visitors entrances - separate access for visitors and separate for employees .

Utility and maintenance personnel - escort system could be used.If these people visit the installations
on a regular basis some of the systems previously could be used.

Package control - there should be provisions made to check packages being taken in and taken out.

Photography - extreme caution must be exercised in areas where classified information is displayed to
preclude unauthorized taking of pictures of the installation.

Vehicular control and identification

* Most common identification is for registering at the headquarters or gates and putting of sticker on
the windows of the vehicles.

* For visitors,the following systems are used:

1. Escort
2. Driver pool - the most secure but the most expensive. In this system, car is driven by qualified driver
employed by the installation from the entrance to its destination and after the conclusion of the
business of the visitor. car is driven back to the installations entrance.

3. Time travel - used in less sensitive installations.

4. Grid system - a very complicated system.The installation is divided into grid ad squares like a map.
Each square is given a no. or letter designation. The visitor is then given a map and shown the route to
take to his destination and should not deviate from the prescribed route, otherwise he could be stopped
and questioned by the guards.

5. Search of vehicles - sign should be put at the entrance to the installation that any vehicle entering is
subject to search anytime.

Types of Protective Alarm Systems

1. Central station system - the control station is located outside the installations.When the alarm is
sounded by a subscriber, the central station notifies the police or protection agency.

2. Property system - the control system is located inside the installations with its own firefighter, law
enforcer, ambulance, or bomb disposal unit.

3. Local alarm - the signalling is near the alarm itself. When the intruder enters the installation, the
alarm goes off scaring the intruder.Purpose is just to scare not to apprehend intruder.

4. Auxiliary alarm - the installation owned the protective alarm with a unit in the nearest police station
so that in case of need, direct call is possible.

Kinds of Alarms

1. Intrusion alarm - any detecting devices using electric and their combinations to signal an alarm when
actuated.

2. Laser beam alarm - a laser emitter floods the wall or fence with a beam so that when this beam is
disturbed by a physical object,an alarm is activated

3. Photocell alarm - an invisible or visible beam is emitted and when disturbed, it activates an alarm or
mechanical device that opens a door or lift movable barriers, activated by light.

Basic component of an alarm system

1. Annunciation - the heart of the system of the detecting device and is the component that activates
the triggering unit.

2. Transmission - it transmit what is detected.

3. Triggering device - the one which emits those aural or visual signals or both.
Security Survey - The detailed check and audit of what an installation or plant does not have in relation
to its protection from hazards.

Security Inspection - a precess where physical examination is conducted to determine compliance with
established security policies and procedures as a result of security survey.

Purpose of security survey

1. To determine existing state or condition of security

2. To locate weaknesses and possible defense

3. To determine degree of protection required

Security hazards - an act or condition which result in a situation conductive to a breach of the protection
system and the subsequent loss or compromise of defense,information,company secrets,or damage to
property,personnel,or facilities.

Hazards - exposure to loss or injury.

Two General Categories of Security Hazards

1. Human hazard - caused by human action. Ex.sabotage,pilferage,theft

2. Natural Hazard - caused by natural phenomena.

Types of Human Hazards

1. Human carelessness

2. Accident

3. Disaffection

4. Disloyalty

5. Subversion

6. Sabotage

7. Espionage

8. Pilferage

9. Theft and; 10.Vandalism

Protective Security - measures taken by an installation or unit to protect against sabotage,espionage or


subversion and at the same time provide freedom of action in order to provide the installation or unit
with the necessary flexibility to accomplish its mission.
3 Aspects of Security

1. Physical Security - measures taken to prevent physical access or entry to an installation.

2. Personnel Security - measures taken to insure that only authorized personnel have access to
classified documents or information.

3. Document and Information Security

Types of Security

1. Physical Security - the most broad.

2. Industrial Security - security of business installations and industrial plants.

3. VIP Security - protection of high level officers and important personnel.

4. Bank Security - security of money and assets stored or in transit.

5. Hotel Security - security for hotel guest and their personal belongings and property as well as
properties of the hotel.

6. Document security - protection of vital records from loss or unauthorized access.

7. Communication Security - measures to prevent or delay the unauthorized person in gaining


information through communication.

Physical Security

* Protective barrier - is the physical type of security.

* Barrier - any structure or physical device capable of restricting,deterring,delaying illegal access into
installations.

* Perimeter barrier - a medium or structures which define the physical limits of an installation or area
to restrict or impede access thereto.Any physical barrier used to supplement the protection of the inside
perimeter.

* Inside Perimeter - a line of protection adjacent to the protected area and passing through points of
possible entry into the area.ex. doors and windows

* Outside perimeter - a line of protection but some what removed from the protected area.ex.fence

Types of Perimeter Barrier Opening

1. Gates and Doors

2. Elevators
3. Air intakes, Exhaust tunnels

4. Clear Zone

5. Top Guard

6. Guard Control Stations

7. Tower

8. Barrier maintenance

9. Sign and Notices

Protective Alarms - supplemental physical barriers in a form of sound that cause alarm installed indoors
or outdoors in an installation.

Types of Alarm Systems

1. Metallic foil wire

2. Ultrasonic Detection Device

3. Vibration Detection Device

4. Microwave Motion Detection Device

5. Audio Detection Device

6. Photo Electric or Electric Eye

Kinds of Alarms

1. Bill Traps

2. Foot Rail Activator

3. Knee or thigh button

4. Foot button

5. Double squeeze button

Protective Lighting - provide illumination on areas to be secured that adds psychological deterrence.

Types of protective Lighting


1. Stationary luminary - consist of series of fixed luminaries to flood given area continuously Example:
glare protection type

2. Standby Lighting - provides continuous lighting through manual operations.

3. Movable Lighting - stationary or portable manually operated search lights.

4. Emergency Lighting - duplication of existing lighting system that is utilized in the event of electric
failure.

Types of Lighting Equipment

1. Street lights - used in parking areas

2. Search Lights - highly focused incandescent lamps used to pinpoint potential trouble spot.

3. Flood Lights - project light in a concentrated beam used in boundaries and fences.

4. Fresnel Lights - wide beam units primarily used to extend illumination in long horizontal strips to
protect approaches to perimeter barrier.

Protective Locks and Keys

1. Lock - a mechanical,hydraulic,electrical or electronic device designed to prevent entry into a


building,room,container or hiding place and to prevent the removal of items without the consent of the
owner.

2. Padlock - portable and detachable lock having or sliding hasp that passes through a staple ring.

3. Peterman - A term used in England for lock picker, safe cracker and penetrators of restricted areas or
rooms.

Types of Locks

1. Lever locks - used in cabinets,drawers,safe deposit box.

2. Disc-Tumble Locks - used in car doors.

3. Warded Locks - offer little security,used only to provide privacy.

4. Combination Locks

5. Card Operated Locks

6. Electromagnetic Locks

7. Code operated Locks

Types of Keys
1. Master Key - a special key of opening a series locks.

2. Grand Master Key - a key that will open everything in a system involving two or more master key
groups.

3. Change Key - a key to a single lock within a master keyed system.

4. Sub Master Key - a key will open all lock with a particular area or grouping in a given facility.

Types of Security Cabinets

1. Safe

2. vault

3. File Room

Protective Cabinets - considered as the third line of defense against unauthorized persons.

Key Control - a system of controlling keys devised and regulated for disposal,storage and withdrawals.

Close-in Security Formations

1. One Man Security - 360 degrees coverage.

2. Two Man Security - Each guard has 180 degrees coverage.

3. Three Man Security - has equal areas of coverage

4. Four Man Security

5. Five Man Security - modified diamond.

6. Six Man Security - (defensive circle) too much crowd requires arm lock formation.

Note: Six Man Security is the most effective.

Defensive In Depth Barriers


1. Outer Ring - securing sidewalks,in front of quarters or offices,covering all entrances,front, center,side and rear.

2. Middle Ring - security covering inside quarters, office, residence ,all stairways and elevators.

3. Inner Ring - immediately outside the high risk personnel door or the one closest to the VIP.

Historical Background of Industrial Security in the Philippines


PADPAO – stands for the Philippine Association of Detective and Protective Agency Operators. It is a
non-stock private organization, and it was formed in May 1958.

R.A. 5487 – is an act that regulates the organization and operation of the private detective, watchmen
or security guard agencies.
- it is known as Private Security agency Law.

Before R.A. 5487 there is no law, what they need is only a permit from the city or municipal mayor to
hire a security guard.

PCSUSIA – Philippine Constabulary Supervisory Unit for Security and Investigation Agencies – was
formed as a result of the approval of R.A. 5487, which directs the Chief PC to issue rules and regulations
concerning the implementation of R.A. 5487

- later was change to PNPSOSIA- when the Philippine Constabulary was dissolved and the personnel was
merged to the PNP.

PNPSOSIA – PNP Supervisory Office for Security and Investigation Agencies – before it is responsible for
the issuance of implementing orders regarding the rules and regulations affecting security agencies
operation.

At present:

PNPSAG/SD – PNP Security Agency Guards/ Supervision Division – for national and

PNP FE/SAGS – PNP Firearm and Explosives/ Security Agency Guard Services – for local

- it directs the Chief of PNP to issue rules and regulations concerning the implementing rules of R.A.
5487.

Effectivity date – Oct. 3, 1972 and Jan. 17, 1975 and amended by P. D. # 11 and 11A

- and again amended in 2003 with Title 2003 Revised Rules and Regulations Implementing R.A. 5487 as
amended.

Security

Purpose of Security – is to protect the establishment from any form of losses as a result of theft,
robbery, pilferage, sabotage, espionage, accident, fire and subversive activities.

What is Security? Security – means the defense against crime. - or a state of being free

What is a Victim? - is the crime target - the forgotten one.

What is Victimology? - is the study of victim.

Different Types of Security:

1. Physical Security – is a system of barriers placed between the potential intruder and the matter to
be protected. It is considered as the broadest type of security.
- is concerned with the physical measures adopted to prevent unauthorized access to equipment,
facilities, material, and documents, and to safeguard them against espionage, sabotage, damage and
theft.

Types of Physical security;

1. Active - by using different types of barriers.

Methods used; a. Overt method b. Covert method

2. Passive - by using psychological approach

2. Communication Security – is the protection resulting from the application of various measures
which prevents or delay the enemy or unauthorized person in giving information through the
communication system.

3. Hotel Security – is the protection resulting from the application of various measures which safeguards
hotel guests and personnel, hotel property, and functions in hotel restaurants, bars and clubs.

4. Bank Security – is the protection resulting from the application of various measures which safeguards
cash and assets which are in storage in transit and during transactions.

5. Document Security – is physical security that involves the protection of documents and classified
papers from loss, access to unauthorized person, damage, theft and compromised through disclosure.

6. Personal and VIP Security – involve in the protection of top ranking official the government, visiting
persons of illustrious standing and foreign dignitaries.

7. Crisis Security - is the protection of the rich person, industrial magnates, political leaders against
kidnapping for economic, political, emotional or nationalistic purposes.

8. Industrial Security - various measures to safeguard factories, manufacturing establishment, etc.

9. Operational Security - is physical which deals with the protection of processes, formulas, patents and
other activities.

10. Other special type of security- these type of security are adaptations, variations, innovations and
modifications of physical security which are follows, to wit: a. Air cargo security b. Supermarket c.
School Security d. Personnel security

Security Hazard - is any act or condition, which may result in the compromise of information, loss of life,
loss or destruction of property, or disruption of the objectives of the installations.

Types of Security Hazards:

1. Natural Hazards - types of hazard, which the mere cause is the natural phenomenon. Ex. Storm,
earthquake, typhoons, floods, fire, lighting etc.
2. Human/Manmade Hazard - which is actually the act of omission or commission both overt/convert
by an individual or group of an individual.

Ex. Espionage and sabotage - because of the state of mind of an individual.

Different types of barriers/Obstacles

1. Natural - mountain, forest, water or in nature.

2. Human

3. Animals

4. Structural - manmade obstacles

5. Energy - alarm system

Factors to be considered in providing the kind and degree of security.

1. Relative Critically - the importance of the product or services that the company is giving or producing.

2. Relative Vulnerability – how susceptible the establishment for the particular sabotage, espionage,
etc.

Factors to be considered in providing security for the establishment.

1. Size, shape and location

2. Number and character of people

3. Kind of product

Espionage - an act of gathering information

Espion – French word- which means spy

- This is used to estimate or determine the best possible means of sabotage.

Spy – is the agent of Espionage. They are very dangerous because of their skill in deception and
undercover works.

Methods used by the Agents of Espionage.

1. Stealing or buying information from the employees.

2. By using various form of threats or extorting information’s.

3. By means of blackmail.

4. Obtaining or gaining information from social gathering.


5. By the use of fake organization as a front.

6. Stealing records or documents.

7. By means of subversive activities.

Sabotage – is an act of destroying, damaging or any evil motives that will lead to stoppage of the
normal operation of the company, factory, plant and or establishment.

Sabot - French word – that means Wooden Slipper.

Saboteur – is the agent of sabotage.

3 types of Saboteur

1. Enemy agent

2. Traitorous person

3. Irresponsible person

Types of Sabotage

1. Mechanical Sabotage

2. Psychological Sabotage

Mechanical Sabotage – is an act wherein they used the object or substance within the area of an
establishment.

Types of Mechanical Sabotage

1. Contamination – is a type where they used foreign materials to apply in the establishment.

2. Breakage – destroying the vital parts of a machine.

3. Substitution – Substitution or changing of formula to another, which will cause damage or


destructions.

4. Omission – this is committed by means of a doing by an individual, which can cause destruction inside
of the company or establishment.

5. Abrasive – a special type of contamination, by using a type of material that will grind metals.

Explosives – substances that are easily exploded by means of heat, friction, jarring or sparks. They are
highly dangerous because of its damaging effect.

Reasons Why Explosives becomes popular to the Saboteurs;


1. Because of devastating or damaging effect.

2. Because of the availability of delaying devices/detonator.

3. Evidence will disappear and very hard to find.

Types of Explosives: According to their sensitivity.

1. Low Intensity Explosives – It is very sensitive to heat. It can be exploded by means of fire, friction or
spark.

2. High Intensity Explosives – is detonated by means of shock, jarring or shake. These are from liquid.

Types of High Intensity Explosives;

1. Dynamite – from liquid it is manufactured and usually homemade and popularly used by illegal
fisherman and miners.

2. TNT (Trinitrotoluene) – popular in the military.

3. Plastic Explosives

4. Molotov Bomb

5. Stench Bomb – Chemical that is carried out by the racketeers and with disagreeable odor.

Nitro-glycerin – contains of nitro-acid, sulfuric acid and glycerin.

Types of Stench Bomb

1. Zinc Valerate – mix with alcohol, ether or warm water and place it in a vial or bottle. (White Powder)

2. Valeriana Acid – white crystal – Valeriana Officinales

3. Butyric Acid - double fermentation of sugar and milk.

4. Hydrogen Sulfide – it has a rotten eggs, or rotten fish smell or odor.

Arson – is the malicious burning of one’s property.


Objectives:

1. Fraud- losing- by burning the property they can recover from losing.

2. Revenge/Spite

3. Pyromaniac- a person who is fond of looking fire

4. Combustion- a chemical process by which the heat and flame will comes out.
Causes of fire

1. Flame

2. Gas or Electricity

3. Chemicals

4. Heat of the sun

5. Bacteria

6. Spark

Fire is classified according to their classes.

1. Class A Fire - are those disposed by ordinary combustible material – Fire extinguisher used is water.

2. Class B Fire - is disposed or composed of petroleum product- it serves as blanket to burning material.

3. Class C Fire - is disposed or composed of electrical energy or from electricity related fire- Fire
extinguisher used are dry chemicals and carbon dioxide

4. Class D Fire - composed or disposed by combustible metal-Fire Extinguisher used are powder talc and
dry seal.

What is the reason in classifying fire? The reason is that in order to determine the types of fire
extinguisher to be used.

Fire Fighting- to reduce the burning material.

Subversive activities - dealing with the weakness of a person.

Economic sabotage - activities of the business establishment against the government.

Objectives of Subversive activities: Is to determine the authority, to under weaken the organization in
order that they can manage or take over the organization.

Parts of Subversive activities:

1. Rumor mongering

2. Propaganda

3. Legal Action

4. Arm threats – used of force

5. Murder, Kidnapping, corruption of a certain employee or employees


Riot - refers to the unlawful assembly that resulted to violent disturbance of peace.

Causes of riot:

1. Panic

2. Strike

3. Mob- a promiscuous multitude of people, rude and disorderly.

Types of mob:

1. Aggressive mob

2. Escape mob

3. Acquisitive mob

4. Expressive mob

4. Crowd – Temporary congregation of people.

Types of crowd:

1. Physical crowd – temporary congregation of people without interest

2. Psychological crowd- temporary congregation of people with common interest in a certain thing.

Types:

a. Casual psychological – common interest only for short duration

b. International Psychological- common interest in a long duration

Pilferage - Petty theft

- one of the most annoying and common human hazard

- These activity must be immediately put in control

Types of pilferage:

1. Casual pilferage- one who steal due to inability to resist the unexpected opportunity or has little fear
that there is detection

- for souvenir

2. Systematic pilferage – one who steal with preconceived plan and take away things for all types of
goods, supplies or merchandise.
- for economic gain

Methods used:

1. Classic method

2. Uses fake documents

3. Removal of items

4. Disposal of the same

Limiting factors of pilferage:

a. Value of the item- very expensive

b. Ease of concealment – easy to cover

c. Transportation

KLEPTOMANIAC – The person who is fond of getting the property of other people.

- there is satisfaction on the part of the person committing a crime.

Theft - is committed by any person who with intent to gain but without violence against or intimidation
of persons nor force upon things shall take personal property of another without the latter’s consent.

Simple theft - without violation of trust and confidence

Qualified Theft – taking the property of another with violation of trust and confidence;

Example: maid, houseboy, salesgirl, or employees or any person that the victim has trusted.

Shoplifter - is those people or somebody who gets the things or property displayed in the store without
payment.

PROTECTIVE BARRIERS AND SECURITY LIGHTNING:

PERIMETER SECURITY - is the first line of security or defense.

- by establishing structural barriers fence, to protect the entire establishment.

Different enclosures used in the perimeter security.

1. Solid – they cannot see what is in the inside and those who are in the inside they cannot see also what
is in the outside.

2. Full View- you can see through the fences, or what’s going on inside and out.
Safety measures to be used.

1. 7 feet minimum height of the fence, on top is a barbwire.

2. Security Guard- to check the in and out of building and the people.

3. Protective lighting for safety protection.

Poor lighting – indirect action- lack of protection

Well lighted - psychological barriers- it gives more protection.

- so that they can notice and familiarize, they can immediately detect the particular intruder.

Factors to be considered in protective lighting.

1. Size, shape and location

2. Kind of product-variable, critical or plenty of loses

3. Protective advantage

4. Management policy-for security consciousness

Types of lighting system:

1. Continuous- non-stop

2. Stand by- operated manual by security guard or operated by an alarm system

3. Movable- search light

4. Emergency- use in case of emergency

Position of the protective lighting

1. Always focus on the approach

2. Must focus on the people not on the guard

Preventive measures - is the best approach.

1. Perimeter security

2. Carefully select the workers and employees;

a. Initial security

b. Background investigation
c. Analysis of previous employment or employment history

d. Personal investigation

e. Establishing rules and regulation

f. Regularly check the pulse of your workers

Preventive measures to help in the establishment free of hazards

1. Intelligence

2. Solved Grievance

3. Prevent the organization of opposition

4. Develop working relation with other local authorities.

Different entries that are need to be controlled by the security guards.

a. Restricted area- is an area access to which is subject to special restriction to the flow of pedestrian or
vehicular traffic to safeguard property or material.

b. Limited area- a restricted area containing a security interest or other matter in which uncontrolled
movement will permit access to such security interest or matter; but within which and controlled.

c. Exclusive area- a restricted area containing a security interest or matter, which is of such nature or of
such vital importance that access to the area of proximity resulting from access to the area, constitutes
access to the security interest or matter.

Clear zones- the exterior and interior parallel area near perimeter barriers of an industrial compound to
afford better observation and patrol movements.

Perimeter barriers - is a system of protection designed to restricted areas by unauthorized person.

Purposes of perimeter barrier:

1. Outline the perimeter of the area to be protected.

2. Create a physical and psychological deterrent to unauthorized entry.

3. Delay intrusion, thus facilitating apprehension of intruders

4. Assist in a more efficient and economical employment of guards

5. Facilitate and improve the control of pedestrian and vehicular traffic.

Opening in perimeter barrier.


1. The number necessary to handle peak loads of pedestrian and vehicular traffic

2. Gates- locks (seals) and seals

- Frequent inspection by guards

- Key control

3. Windows

4. Other openings

1. Sewer

2. Air and water intake

3. Exhaust tunnels

4. Electrical and common tunnels

5. Clear zones- exterior – 20 feet

- Interior- 50 feet

- If minimum clear zones is not possible

a. raise height of fence

b. add more lights

c. increase patrol

Types of physical barriers

a. Natural barriers- mountain, rivers, seas and terrain

b. Manmade barriers- structural construction, like fences, walls, floors, muffs and grills

Common types of physical barriers are;

a. Wire fences

b. Building walls

c. Bodies of water

Types of fencing

1. solid
2. full view- chain-link, barbwire

Security Planning - is a corporate and executive responsibility. It involves knowing the objectives of
security and the means and methods to reach those objectives or goals must then be evolved. In short,
security planning is a decision-making process.

Contents of Security planning:

1. The situation- this part of security planning explains the historical background of the organization of
its security picture

2. The mission- this part of security will cover what the plan is all about and what it intends to do, This
mission is further subdivided into:

a. Purpose

b. Goals

c. Objectives

3. Execution- this part of security plan will explains and outline the concept of the security project

4. Administrative and Logistics- This part of the security plan involves listing of security equipment

5. Command and signal- this last portion of the security plan pertains to the channel of communication
needed, when implementing to the project until in full view.

SECURITY SURVEY - is the process of conducting an exhaustive physical examination and thorough
inspection of all operational systems and procedures of a facility.

Purposes of Security Survey

a. To determine existing state of security

b. To locate weaknesses in defenses

c. To determine degree of protection required.

d. To produce recommendations, establishing a total security program

Persons responsible to conduct security survey

a. Staff security personnel

b. Qualified security specialist

A Security Survey is known by a number of different terms such as;

1. Risk analysis
2. Risk assessment

Key step in a risk assessment process;

- to determine value, impact and cost of any asset should it be lost due to natural or man-made forces.

- To determine the degree of probability that natural or man-made forces will strike at any given facility.

Information necessary in conducting a survey:

1. A plot plan of the area to be surveyed

2. A map of the city or locality in which the facility is located, this becomes very important if the facility
consist of more than one location.

3. The number of employees working on each shift by category

4. The operational flow plans of the facility if they are available in writing

5. Maps and description of guard tours and stations if available

6. Guard orders and the facility’s security manuals if there are such

7. Locations of the nearest fire department and police headquarters

Security Inspection - is a process of conducting physical examination to determine

compliance with established security policies and procedures as a result of a security survey.

Comparisons Security Survey and Security Inspection.

Security Survey.

- Defensive type process/service

- Detailed study of the existing security measures

- Conducted to determine the level of security required consistent with the mission

- Broader in scope

- Non-recurring type of service

Security Inspection.

- Defensive type service

- Limited check of the security measures already adopted

- Conducted to determine the degree of compliance with directed security measures


- Limited in scope

- Recurring type of service

Types of Guard Forces

a. Company guard- proprietary or in house security, and they are directly under the payroll of the
company.

b. Agency guard- they are hired by an agency, and they are paid by contract

c. Government Guard Forces- they are considered as government employees and paid by the
government

Security Guard Forces- maybe define as a group of forces of men selected, trained and organized into a
functional group for the purpose of protecting operational processes from those disruption which
impede efficiency or halt operations at a particular plant, facility, institution or special activity.

The Essential Qualities of Security Guards:

1. Alertness

2. Judgment

3. Confidence

4. Physical Fitness

5. Self-control

SECURITY COMMUNICATION SYSTEM – facilities provided for signaling, alerting or alarming workers at
any location through out the installation as occasion demands. These includes telephone and radio.

PROTECTIVE ALARM SYSTEM - provide an electrical and mechanical means of detecting and announcing
proximity of instruction which endanger the security of a restricted area, a facility, or its components.

Kinds of Lock:

1. Warded lock- old type where the key is open and be seen through

2. Disc tumbler lock- used in car doors, desk, drawers, etc.

3. Pin tumbler lock –widely used I doors of offices and houses

- irregular in shape and the key


4. Lever lock- used in locker

5. Combination lock- has 3 deals which must be aligned in proper order before the lock will be open

6. Code-operated lock- this opens by pressing a series of numbers buttons in proper sequence

7. Card-operated lock- coded cards whether notched, embossed or embedded with magnetic-fuels are
inserted to open

8. Padlock- a pad and a lock combination

Terminologies:

Private Detective – is refers to any person who is not a member of a regular police agency or the Armed
Forces of the Philippines who does detective work for hire, reward, or commission.

Persons – as used in this act, shall include not only natural persons but also judicial persons such as
corporation, partnership, company or association duly registered with the Securities and Exchange
Commission (SEC) and Bureau of Commerce.

Private Detective Agency – refers to any organization or corporation who is not a member as regular
police agency or of the AFP.

Watchmen/Security Agency – Any persons, associations, partnership or corporation who recruits


training, masters, furnishes, and solicits individuals or business firms, private or government owned
corporation, engaging his services those of its watchmen either residential or business premises, or both
for hire or compensation thru subscription shall be known as watchmen or security agency.

License or License Certificate – a document issued to a person by competent authority allowing such
person to established direct, manage, or operate detective or intelligence and private
watchmen/security agency.

Advantages of an Agency Guard Services;

1. More economical

2. Security administrative problems are reduced

3. Problems related to recruiting, pre-employment investigation and training are eliminated

4. Absenteeism and vacation leaves are eliminated

5. Security personnel are separated from co-employees

6. Incase of emergencies, extra guards are easily available


7. Incase of company strike, the agency guards will be on duty to carry out their assigned duties.

Disadvantages of Agency Guard Services;

1. Lack of training

2. Low caliber employees

3. No company loyalty

4. Project poor image

5. Large turn-over

6. Not familiar with plans

Advantages of a company Guard Forces:

1. Generally higher caliber as they can receive higher wage

2. Generally they provide better services

3. Can be trained to handle of the more complex security duties

4. Less turn-over

5. Are more familiar with facilities they protect

6. Tend to be more loyal to the company

Disadvantages of Company Guard Forces:

1. Cost more

2. Maybe required to join guard force

3. Problem of ensuring availability of back-up personnel Control of authorized entry:

1. Screening of personnel

2. Identification of personnel

3. Identification of visitors

4. Control of truck/vehicle

5. Control of packages
6. Container control

What is the purpose of Key Control?

1. To control the issue, use and storage of keys and reserve key locks

2. To control reproduction of duplicate keys

3. to control lock rotation and or replacement

4. To maintain record on all of the above

5. To ensures proper supervisions of key control measures by responsible persons.

The following areas needs to be inspected, to determine the degree of protection to be applied in the
establishment

1. Perimeter

2. Building Security

3. Key Control

4. Protective lighting

5. Communication and alarm system

6. Personnel identification and control

7. Vehicular identification and control

8. Safety for personnel

9. Adequacy of existing guard forces

SURVEY REPORTS – itemizes the condition which are conducive to breaches of security, records the
preventive measures currently in effect, and when required--- makes specific practical and reasonable
recommendations to bring the physical security to the desired standard.

The Legal Basis on Security:

1. RA 5487 and its Implementing Rules and Regulations

You might also like