Professional Documents
Culture Documents
Industrial Security Management
Industrial Security Management
Security is a state or condition of being secured; there is freedom from fear, harm, danger, loss,
destruction or damages
3 major areas:
1. Physical Security - this concern with the physical measures adopted to prevent unauthorized
access to equipment, facilities, material and document and to safeguard them against
espionage, sabotage, damage, loss and theft.
2. Personnel Security- this is as important as physical security. Personnel security starts even
before the hiring of an employee and remains to be maintained for as long as the person is
employed. Its purpose is to insure that a firm hires those best suited to assist the firm in
achieving its goals and objectives.
3. Document and Information Security- this involves the protection of documents and classified
papers from loss, access by unauthorized persons, damage, theft and compromise through
disclosure.
KINDS OF HAZARDS
1. Man –Made Hazards – an acts or conditions affecting the safe of operation of the facility caused by
human action, accidental or intentional. It includes sabotage, espionage, pilferage and theft.
2. Natural Hazard – cause by natural phenomena which cause damage, disturbance and problems of
normal functioning activities, including security. It includes flood, lighting, storms and volcanic eruptions.
THE EXTENT OF DEGREE OF RISK TO SECURITY WILL BE DEFENDANT ON THE FOLLOWING:
1. RELATIVE CRITICALITY OF OPERATIONS – is the importance of the firm which reference to the
national economy and security.
2. RELATIVE VULNERABILITY – The susceptibility of the plant or establishment to damage, loss,
or disruption of operation due to various hazard.
BARRIER – can be defined as any structure or physical device capable of restricting, deterring,
delaying, illegal access to an installation.
Types of Barriers
1. Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or
other terrain that are difficult to traverse.
2. Structural barriers - these are features constructed by man regardless of their original intent
that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe,
cabinets or containers etc.
3. Human barriers - persons being used in providing a guarding system or by the nature of
their employment and location, fulfill security functions.
4. Animal barriers - animals are used in partially providing a guarding system. Dogs are usually
trained and utilized to serve as guard dogs.
5. Energy barriers - These are protective lighting, alarm system and any electronic devices
used as barriers.
2
WALL – Masonry wall should have the same as the chain linked and surrounded by the barbed wire as
top guard.
2. FULL VIEW FENCE – It is constructed in such a way that visuals access is permitted through the
fence. Its advantage is, that it allows the security personnel to keep the surrounding of the installation
under observation. On the other hand, it allows the intruder to become familiar with the movements of
the security personnel.
2. BARBED WIRE FENCE – is a type of fencing wire constructed with sharp edges or points arranged
at intervals along the strand(s). It is used to construct inexpensive fences.
SPECIFICATIONS OF BARBED WIRE FENCE ( 7-6-6-12)
Barbed wire fencing should not be less than 7 feet high, excluding the top guard;
Barbed wire fencing must be firmly affixed to post not more than 6 feet apart
The distance between strands will not exceed 6 inches and at least one wire will be interlock
and midway between posts.
Standard barbed wire is twisted double strand, 12 gauge wires, with 4 point barb spaced on
equal distant part;
1. Stationary Luminary – most common type consisting of fixed series of luminaries. It is commonly
used on entry gates of employees and vehicles.
a. Glare Protection Type – The intensity is focused to the intruder while the observer or the guard
remain in comparative darkness. Lighting focused on background
b.Controlled lighting – The lighting is focused on certain objects than the background.
2. Standby Lighting – similar to continuous lighting but can be turned on manually or by special
device or other automatic means, when there is a suspicion of entry.
-it is designed for reserve or standby use or to supplement continuous systems
3. Emergency Lighting – stand by lighting which can be utilized in the event of electrical failure or
system is inoperative.
2. Gaseous –Discharge Lamp- The use of these in protective lighting is limited since it require a
period of two to five minutes to light when they are cold and even longer period to light, when hot,
after power interruption.
- It is very economical to use but for industrial security, it is not acceptable due to long time of
lighting.
Mercury Vapor Lamps – It gives a Blue green color light due to the presence of mercury vapor.
Sodium Vapor Lamp – lamps emits yellow light. It is an efficient bulb and due to its color, this light
lamps are used in areas where insect predominate.
3. Quarts Lamp – It is a lamp that emits very bright white light and instant on almost as rapidly as
the incandescent lamp.
4. Metal halide - it has similar physical appearance to mercury vapor but provides a light source of
higher luminous efficiency and better color rendition
5. Fluorescent - this provides good color rendition, high lamp efficiency as well as long life.
However, it cannot project light over long distance and thus are not desirable as flood type lights.
6. High-pressure sodium vapor - this has gained acceptance for exterior lighting of parking areas,
roadways, buildings and commercial interior installations.
Kinds of Alarms
1. Audio Detection Device - it will detect any sound caused by attempted force entry. A
supersonic microphone speaker sensor is installed in walls, ceilings and floors of the
protected area.
2. Vibration Detection Device - it will detect any vibration caused by attempted force entry. A
vibration sensitive sensor is attached to walls, ceilings or floors of the protected area.
3. Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically
charge strips of tinfoil or wire is used in the doors, windows or glass surfaces of the protected
area.
4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when this
beam is disturbed by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and when this is
disturbed or when an intruder breaks contact with the beam, it will activate the alarm.
TYPES OF BANK ALARM
1. Foot rail Activator – They are place on the floor in such a position that tellers may activate the
alarm by placing the front of their foot to foot rail to activate the alarm.
2. Knee or Thigh Buttons – It is installed inside the teller station so that they can be activated by knee
or thigh pressure.
3. Foot Botton – Like the foot rail, it permits alarm activation in relatively safety, while both hands
remain clear in view of the robbers.
4. Double Squeeze Button – It requires pressure on both side of the device , thus the probability of
accidental alarm is reduced.
5. Bill Traps- or Currency Activation Device are usually place on the tellers cash drawer
STAND PIPES
5
5.G.I. steel or plastic pipes located inside the building from the lowest to the top floor with
water under pressure for use in case of fire. Located near the standpipe is a fire hose usually
enclosed in a glass box.
6.FIRE HYDRANT – It is a mechanical device strategically located in an installation or in a
street where a fire hose will be connected so that the water will be available to extinguishe a
fire.
7.FIRE EXTINGUISHER – is a fire fighting equipment which can is a fire fighting
equipment which can be portable or in cart that is used to put out fire depending on the
contents to extinguish certain types of fire.
CLASSES OF FIRE
1. CLASS A –- involving ordinary combustible materials such as wood, cloth, and paper, requires an
extinguishing agent which cools.
2. CLASS B – fires involving flammable and combustible liquids, such as solvents, greases,
gasoline, and lubricating oil, require an extinguisher which removes oxygen or cuts the chain reaction.
3. CLASS C – fires involve energized electrical equipment (live electrical wires, electrical
appliances). A non-conducting extinguishing agent such as carbon dioxide or multi-purpose dry
chemical must be used.
4. CLASS D FIRES – the result of the combustion of certain materials in firely divided forms. These
metals can be magnesium, potassium, powdered aluminum and zinc.
What is a Lock?
A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry
into a building, room, container or hiding place.
PADLOCK – a portable and detachable lock having a pivoted or sliding hasp which possess through a
staple ring, or the like and is made fast or secured.
5. Combination lock - instead of using the key to align the tumblers, the combination mechanism
uses numbers, letters or other symbols as reference point which enables an operator to align them
manually.
6. Code-operated lock - a type of lock that can be opened by pressing a series of numbered button
in the proper sequence.
7. Electrical lock - a type of lock that can be opened and closed remotely by electrical means.
8. Card-operated lock - a type of lock operated by a coded card.
9. Electromagnetic Lock- enclosed by magnetism
6
Restricted Area or Controlled Area – It refers to an area in which personnel or vehicles are controlled
for reasons of security.
Security Clearance – It is a certification by a responsible authority that the person described is cleared
to access to classified matters at appropriate levels.
Interim Clearance – Effectivity is two years
Final Clearance – Effectivity is five years.
MASTER KEYING SYSTEM- a system used in big installation whereby keys can open a group
of locks
Security Education- program given to employee of an installation by lecture and other means of
measure and safeguards to protect the interest of installation from loss.
Kinds of Safecracking
1. Drilling- knocking off combination dial and drillin holes to expose locking device
2. Burrning- using high acytelane torches or burning bars to cut opening
3. Peeling- attacking the seams of metal plates with pry bars.
4. Ripping- similar to peeling, except it is for metal walled container with thin wall
5. X-ray- reveal the position of mechanism
6. Explosives- use of nitroglycerine and plastic explosives
7. Manipulation- using skills for safe cracking
2. Vault - heavily constructed fire and burglar resistance container usually a part of the building
structure used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than
safe but smaller than a file room.
a. The vault door should be made of steel at least 6 inches in thickness.
b. The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
c. The vault must be fire resistive up to 6 hours.
d. Height should not be more then 5,000 cubic feet
e. Floors should be elevated by 4 inches
3. File room - a cubicle in a building constructed a little lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.
a. The file room should at most be 12 feet high.
b. It must have a watertight door and at least fire proof for one hour.
c. Interior cubage should be not more than 10,000 cubic feet
7
2. Explain Hazard Test – test to determine is the sudden rise in temperature will not cause the
safe to rupture. If the safe can withstand 2000 F for 30 minutes without cracking or opening then it has
passed the test.
3. Fire and Impact test – Its objective is to determine the strength of a safe to resist the collapse of a
building during fire.
PERSONNEL SECURITY
Personnel Security includes all the security measures designed to prevent unsuitable individuals
or persons of doubtful loyalty to the government, from gaining access to classified matter or to any
security facility, and to prevent appointment, or retention as employees of such individuals,
The Security “Chain”: Personnel Security is the “weakest link” in the security “chain
1. National Agency Check (NAC). – This is an investigation of an individual made upon the basis of
written information supplied by him in response to official inquiry, and by reference to appropriate
national agencies.
National Intelligence Coordinating Agency (NICA)
National Bureau of Investigation (NBI)
ISAAFP or J2 Division, GHQ AFP
CIDG PNP Camp Crame., etc.
2. Local Agency Check (LAC) – This type of investigation consist of the first type plus written inquiries
sent to appropriate local government agencies, former employees, references and schools listed by
the person under investigation. The local agencies normally check besides the past employment,
schools and references are the following:
Place of the locality where the individual is a resident.
Mayor, Police, Fiscal, Judge of the locality where the individual is a resident.
Background Investigation (BI) This is more comprehensive investigation than the NAC and LAC.
A through and complete investigation of all or some of the circumstances or aspects of a
person’s life is conducted.
This type of personnel Security Investigation may either be a complete (CBI) or a partial Background
Investigation (PBI).
1. Complete Background Investigation – Consist of the investigation of the background of a
person, particularly all the circumstances of his personal life.
2. Partial Background Investigation – Consist of the investigation of the background of an
individual but limited only to some of the circumstances of his personal life which are deemed
pertinent to the investigation. This type of BI is also used to further develop questionable
information contained in another investigation report.
PRIVATE DETECTIVE- ANY PERSON WHO DOES WORK FOR HIRE, COMMISSION OF REWARD
FUNCTIONS OF A PRIVATE DETECTIVE
1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work;
4. Such other detective work as may become the subject matter of contract between the agency and its
clients.
PRIVATE DETECTIVE- ANY PERSON WHO DOES WORK FOR HIRE, COMMISSION OF REWARD
FUNCTIONS OF A PRIVATE DETECTIVE
1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work;
4. Such other detective work as may become the subject matter of contract between the agency and its
clients.
Security guard
Security Guard 1 – Watchman/guard – the one actually posted as watchman and or guard
Security Guard 2 – Shift-in-charge – responsible for the security officers who are scheduled in a
certain shift for a particular period
Security Guard 3 – Post-in-charge – responsible for the entire detailed security office within a
certain establishment.
WHO MAY ORGANIZE AND MAINTAIN PRIVATE SECURITY AGENCY AND PRIVATE DETECTIVE
AGENCY
Any Filipino citizen or corporation, association, partnership, one hundred percent of which is
owned and controlled by Filipino citizen.
BASIC REQUIREMENT OF AN OPERATOR OR MANAGER OF SECURITY AGENCY
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from the AFP or
PNP;
4. Has taken a course/seminar on Industrial Security Management and/or must have adequate training
or experience in security business,
5. Good moral character;
6. Having no previous record of conviction of crime or offense involving moral turpitude
Veterans and retired military/police personnel honorably discharge including graduates of ROTC
advance (or its equivalent in the PNP) are exempted from the required Basic-Licensing Training.
1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
4. Has graduated from a Security Officer Training Course or its equivalent
1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of Masters degree either in Criminology, Public Administration, MNSA, Industrial
Security
Administration, or Law
4. Must have at least ten (10) years experience in the operation and management of security
business.
1.License to Operate- before a Private Security Agency (PSA) can operate; it has to secure a License
to Operate (LTO) categorized as either temporary or regular.
a. A temporary license is issued by the PNP thru Civil Security Croup Directorate after the
applicant /licensee should have complied with all the requirements while it has less than two
hundred guards.
– for one hundred guards, an initial of at least (30) thirty licensed firearms.
b. A Regular license to operate -having two hundred (200) or more license security guard in
its employ duly posted.
-at least 70 pieces of licensed firearms.
10
b. However, upon the expiration of such 6 months extension, no additional extension shall
be granted unless post of at least additional 50 guards thereby making a total of 150 guards or
more.
Failure to comply shall serve as a basis for the issuance of a cease operation order
3. Firearm’s license- all firearms of the security agency should be covered with firearms license issued
by the PNP through its Firearms Explosive Division under the Civil Security Group, renewable every
two years.
POSSESSION OF FIREARMS
1. One (1) firearm for every two (2) security guards;
2. Private security agency/private detective agency/company security force/government security force
shall not be allowed to possess firearms in excess of five hundred (500) units.
3. Shotguns not higher than 12 gauge
4. Weapons with bores not bigger than cal .22 to include pistols and revolvers with bores bigger than
cal .38
5. Ammunitions: 50 Maximum ammo per firearm
Exemptions: in areas where there is an upsurge of lawlessness and criminality as determined by
the Chief PNP, Regional Office or their authorized representative, they may be allowed to acquire,
possess and use high powered firearms.
Duty Detail Order (DDO) – is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning the performance of private
security/detective services duties. DDO for the purpose of post duties not requiring transport of
firearms outside of the physical compound or property of a client or client establishment shall be
issued for not more than a thirty (30) days duration
11
2. Arrest by Security Guard – A security guard or private detective is not a police officer and is not,
therefore, clothed with police authority. However, he may arrest a person under the circumstances
mentioned in Section 5, Rule 113, Revised Rules of Criminal Procedure.
a. Caught in flagrante delicto
b. Probable cause based on personal knowledge
c. escapee/prisoner
3. Search without Warrant – Any security guard may, incident to the arrest, search the person so
arrested in the presence of at least two (2) witnesses. He may search employees of the firm or
establishment with which he or his agency has a contract, when such search is required by the
very nature of the business of the person, firm or establishment.
SECURITY SURVEY – A fact finding probe to determine a plant’s adequacy in all aspects of
security, with the corresponding recommendations.
- Refers to checklist, audits, or inventories of security conditions.
- Security Surveys are often called ‘RISK ANALYSIS SURVEYS’ or ‘RISK ASESSMENT
SURVEYS
SECURITY INSPECTION
It is the process of conducting physical examination to determine compliance with establishment
security policies and procedures as a result of security survey.
SECURITY EDUCATION
It is defined as the exposure and teaching of employees on security and its relevance to their
work. Security education is conducted to develop security awareness among employees of the
company.
PERSONAL SECURITY – Protection of personnel especially ranking official from any harm, kidnap,
and others act. VIP security is type of personnel security;
POLICE SECURITY PROTECTION GROUP (PSPG) - is mandated by law to provide protective
security to government officials, foreign dignitaries, and private individuals authorized to be given
protection and also provide physical security to vital installations, and assist the Presidential Security
Group (PSG) in securing the President and the members of the First Family.
Types of Hazards
1. Natural Hazard- these are hazards which arise from natural phenomena. The following are
types of natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not caused by human action)
d. Storms (typhoons, cyclones, tornado and hurricane)
2. Human-Man made Hazards- These are hazards which are the result of a state of mind,
attitude, weaknesses or character traits of one or more persons. They can be acts of
commission or omission, both overt and covert, which can disrupt operation of a plant or
installation. The following are types of human or man made hazards:
a. Espionage, pilferage and theft
b. Vandalism, etc
GENERAL PRINCIPLES
1. The authority and responsibility for the preparation and classification of classified matter rest
exclusively with the originating office;
2. Classified matter should be classified according to content and not the classification of the file in
which they are held or of another document to which they refer;
3. Classification should be made as soon as possible by placing the appropriate marks on the
matter to be classified;
4. Each individual whose duty allows access to classified matter is responsible for the protection of the
classified matter while it is in his/her possession and shall insure that dissemination of such
classified matter is on the “need to know” basis and to “property cleared personnel only”.
CLASSIFICATION OF DOCUMENTS
Memorandum Circular No. 196, dated 07/19/1968 (Security of Classified Matter in government
offices)
1. TOP SECRET (green)– any information and material, the unauthorized disclosure of which would
cause exceptionally grave damage to the nation, politically, economically or militarily;
Very important political documents regarding negotiation for major alliances.
Major governmental projects such as proposal to adjust the nation’s economy.
Military – Police defense class/plans
Strategies plan documenting overall conduct of war.
2. SECRET(red)- any information and material, the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or any
governmental activity.
New designs of aircraft projections, tanks, radar and other devices.
Troop movement to operational areas.
Hotel plans and estimates
Order of battle info.
3. CONFIDENTIAL(blue) – any information and materials, the unauthorized disclosure of which would
be prejudicial to the interest or prestige of the nation or governmental activity or would cause
administrative embarrassment or unwarranted injury.
Plans of government projects such as roads, bridges, building, etc.
Routine service reports like operations and exercise of foreign power.
Routine intelligence reports.
Certain Personnel records, Staff matters.
4. RESTRICTED (white or no color) – any information and material which requires special protection
other than those determined to be Confidential, Secret, and Top Secret matters.
TYPES OF DOCUMENTS
Class I – Vital Document – This is an irreplaceable records , reproduction of which does not
have the same value as the original;
Class II – Important Document- This is a record, reproduction of which cause considerable
expense and labor, or considerable delay.
Class III – Useful Document – This is a record, the loss of which may cause inconvenience
but could be readily replaced and may not present insurmountable obstacle to the prompt
restoration of the business;
14
Class IV- Non essential Document – This record may include daily files, routine in nature,
lost of which will not affect the organization.
Competitive Intelligence – systematic program for gathering and analyzing information about
competitor’s activities and general business trends to further company’s goals.
OPERATIONAL SECURITY – part of physical security that deals primarily with the protection of
processes, formulas, patents, and other industrial and manufacturing activities from espionage,
infiltration, loss, compromise or photocopying;
Proprietary information is information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership.
15
COMMUNICATION SECURITY – is the protection resulting from the application of various measures
which prevent or delay the enemy or unauthorized persons in gaining information through the
communication system. This includes:
a. Transmission Security – component of communications security which results from all
measures designed to protect transmission from interception.
b. Cryptographic Security – results from the provisions of technically sound crypto-system
and their proper use.
c. Physical Security – providing safeguards to equipment and material from access by
unauthorized persons.
RA No. 4200, Approved June 19, 1965 – An Act to prohibit and penalize wiretapping and other
related violations of privacy of communication, and other purposes.
UNLAWFUL ACTS
Sec. 1 It shall be unlawful for any person, not being authorized by all the parties to any private
communication or spoken word, to tap any wire or cable, or by using any other device or arrangement,
to secretly overhear, intercept, or record such communication or spoken word by using a device
commonly known as a dictaphone or dictagraph or dictaphone or walkie-talkie or tape recorder.
Sec.3
Nothing contained in this Act, however, shall render it unlawful or punishable for any
peace officer, who is authorized by a written order of the Court, to execute any of the acts
declared to be unlawful in the two preceding sections in cases involving the crimes of
treason, espionage, provoking war and disloyalty in case of war, piracy, mutiny in the
high seas, rebellion, conspiracy and proposal to commit rebellion, inciting to rebellion,
sedition, conspiracy to commit sedition, inciting to sedition, kidnapping as defined by
the Revised Penal Code.
AUTHORIZATION
The authorization shall be effective for the period specified in the order which shall not exceed
sixty (60) days from the date of issuance of the order, unless extended or renewed by the court
upon being satisfied that such extension or renewal is in the public interest.
The court referred to in this section shall be understood to mean the Court of First Instance
within whose territorial jurisdiction the acts for which authority is applied for are to be executed.
All recordings made shall be forwarded to the court within 48 hours.
Cipher - a system that manipulate one, two, or three characters at a time like:
Cipher Plaintext
B 1
C 2
J 3
D 4
Categories of Cipher
Concealment – is the simplest, which means to hide/hidden. For instance:
I WILL DO IT. IF NOT TODAY, THEN TRUST ME. SIGNED SMITH.
message: ( copy out every third word )
Decipher: DO NOT TRUST SMITH
16
Transposition System – is another category of cipher by shuffling or rumbling the letters. Below is an
example.
C: NRUTE RAMOH ALKOL ECNAC
(Everything is written backward)
(Put into 5 letters)
Decipher: Return to base – this is the plaintext
P: CANCEL LOKLA HOMAR ETURN
P: CANCEL OKLAHOMA RETURN – which means
P: Return to base.
Substitution Method - original message elements, letters, numbers or other symbols are replaced with
alternate symbols.
DEFINITION OF TERMS:
1. Access List – authenticated list of personnel given to the security allowing entry to a compound
or installation or part thereof;
2. Dry-run – practical test or exercise of plans or any activity to test its validity, an operational
readiness exercise;
3.Duress Code – type of code system so that security personnel or any employee when forced by
armed men intending to enter an installation can five alarm by the use of certain words in casual
conversation with personnel in the installation.
Asset
Any information, facility, material, information, or activity which has a positive value to its owner
whether it is an individual, private or government entity.
What is Probability?
It is the chance or likelihood that a loss will take place. Indicated by a mathematical statement
concerning the possibility of an event occurring
What is Criticality?
It is the impact of a loss as measured in financial terms. How important it is in terms of the survival or
existence of the organization.
17
1. Basic Security Guard Course (Pre-Licensing Course) – 150 hours;
2. Re-Training Course- 48 hours;
3. Security Officers Training Course – 300 hours
4. Basic Security Supervisory Course – 48 hours
18