Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23

Security Hazards

A.Hazards in General

 As earlier defined, hazard could mean exposure to the chance of loss or injury; or
the term is synonymous to risk and or peril. In the field of industrial security, any
hazardous situation or conditions are called security hazards.

B.Types of Hazards

1.Natural hazards
-These are hazards which arise from Natural phenomena.

Types of Natural hazards

a.Floods caused by typhoons

b. Earthquakes
c. Fire (not caused by human action) such as those cause by lightning

d. Storms (typhoons cyclones, tornado and huricane)

e. Lightning Storms
f. Extreme temperature and humidity

2. Human- Man made hazards


- These are hazards which are result of state of mind, attitude, weaknesses or character
traits of one or more person.

a. Sabotage

- it can be described as the deliberate destruction or the deliberate damaging or


destroying of property or equipment.

b. Espionage

- it is describes as the activity of spying or the use of spying or spies to gather secret
information.

c. Pilferage

- the act of stealing small things or items of little value, especially habitually.

d. Theft and Robbery

- Both acts involved the taking of another property with intent to gain without the
owner’s consent. Theft is committed without violence against or intimidation of person
nor force upon things while robbery involves intimidation of persons or force upon things.
e. Disloyalty

- this is the act of unfaithfulness to one’s organization

f. Disaffections

- this is manifested by losing satisfaction thereby causing the dissatisfied person to


commit act that may cause peril to his own organization.

g. Subversive Activities

-these are activities design to overthrow government or intended or likely to


undermine or overthrow government or other institution.

C. Person’s Internal hazard

1. Faith- In the sphere of security operation, faith can be a questionable virtue. Those
person in which trust of their fellowmen is an abiding instinct.

2. Conceit – it is the desire to satisfy the ego or empress someone, provides the enemy
agents with his best source of information.

3. . Enthusiasm and pride – these are common causes of indiscretion. Anyone who is
truly interested in his job find it difficult not to talk and write about it.

4. Ignorance – many people compromise vital information simply because they do not
realize its value and do not know the methods by which intelligence agencies operate.
Security education

What is security education?

Security Education can be described as a learning initiative that is aimed at reducing the total
number of security loopholes that are likely to occur due to a lack of employee awareness.

Concept

A. Security education

Oftentimes, employees of companies or business establishments rely on the assigned security


personnel for their security and protection. This attitude normally results to vulnerability and
susceptibility of the concerned company to security hazards.

When a loss or damage of property occurs, company management puts the blame on the
security personnel. One thing is always forgotten, “security is everybody’s business.”

It has been stated previously that human barriers includes shop workers, utility workers, rank-
and-file employees, and management staff of companies and business establishments.

With these, company employees should be educated and made aware of their roles in the
security of their own company. The ultimate purpose is to make everybody “ security
conscious.”

b. Objectives of security education

1. Guidance for all supervisory indoctrination and executive levels of the organization.

2. A mandatory indoctrination on security for all new personnel before their assignment to their
respective jobs.

3. Development of high degree of security consciousness among the selected supervisors and
other key personnel in the program that should be containing and supported by the top of the
management.

4. A down-the-line security programmed at installing consciousness and dedication through


demonstration, lectures, motivation and suggestions.
5. To let all the employees force know that they all belong to the organization and that non-
awareness and non-concern to the security program is tantamount to disloyalty.

6. To develop discipline, loyalty and belongingness. These attribute fully imbued will result in
the effectiveness and efficiency.

Security education program to be effective must have the support and personnel on the
reasons, the main thrust being to acquaint all personnel on the reasons for the security
measures.

This program should be given to all personnel from the work group that has no access to
classified endeavours to the super and executives handling sensitive plans and policies of the
industrial firm. The program is given a “ follow-through” which will be continuing and tailored
to the specific group levels depending on their access to restricted work and activity.

C. Types of security education programs

Security managers or company security coordinators design program that will enhance the
security consciousness of the employees, in addition, identification of hazards and handling of
crises should also be taught. The security education programs includes:

a. Company’s roles in the prevention and/or reduction of loss;

b. Integration of security education during company employees’ orientation;

c. Fire prevention programs and drills;

d. Natural disasters/calamities drills;

e. Coordination with the security department;

f. f. Creation of safety or security committee;

g. g. Proper waste disposal- this prevent chances of pilferage; espionage by the proper
disposal of documents (shredding of the waste documents); and destructive fire by
segregating flammable waste substances;

h. h. Regular in- services retraining where provisions of company security is integrated;


and

i. i. Posting of security awareness posters/ notices, issuance of pamphlets and brochures.


UNIFORM, EQUIPMENT AND PHARAPHERNALIA

1. Uniform for Males

Uniform shall made of fast navy thick fabric “the trouser for daily security officer wear”
“Service shirt of field of perimeter guards

It is consist of:

Head gear – any covering for the head, especially a hat, a cap, bonnet , ETC.

It is also choice of:

 light blue-while service shirts for internal guards for PSA.

 Company Security- light gray

 Government Security-white

Further the following shall be observed as part of the uniform of security unit

A. Head Gear for Daily Wear

Pershing cup which is fast navy blue with gold strap, black visor octagonal nylon net top
and prescribe SGSD metal cap device. For ceremonial purposes, use it with the black strap.

B. Service Bush Jacket

it shall be worn only by the directorial and staff officer agency

C. Service Shirt for Security Officer

1. Service Uniform

a) Private security guard- fast navy blue

b) Company security force-light gray

c) Government security unit-white

2. Field Uniform(optional for cold weather areas only)

a) PSA- long sleeves and detachable hoods

b) CSF- same for PSA but color is white


c) GSU- same with PSA except the color is white

3. Gala Uniform

For ceremonial purpose only and the expense of the establishments conducting the
ceremonies .

1. Pershing cap

2. Blouse

3. Buttons

4. Shirt

5. Necktie

6. Trousers

7. A. Service Trouser

A. Service Trouser

Fast navy blue, straight cut, slanted pockets and two back pockets without flaps.

B. Service Belt

Leather measuring 4 ½ centimeters in width.

C. Footwear

1. Service Shoes –black leather shoes and with rubber hills and sole.

2. Rubber rain boots – optional as the nature of post requires.

2. Uniform for Females

It shall be made of thick fabric and it shall consist of a modified overseas cap two (2) ply
similar to the women police service, service skirts or (palda) on blouse, service belt, and black
leather shoes.

A. Head gear

 FAST NAVY BLUE (2ply) cup with piping but with regulation cap device.
B. Service shirt

 PSA - fast navy blue and etc. two breast pocket with cover flaps and navy blue front
buttons, tucked in.

 CSF- similar manner with PSA light gray in color shall fabric.

 GSU –similarly sewn shall be white fabric.

C. Service trouser

 Be worn during night duty inclement weather.

 Fast navy blue, thick fabric, straight cut with slanted side pocket, two back pocket
without cover flaps.

D. Service skirt

 Optional worn indoors.

E. Service belt

 Leather, used as pistol, measure centimeter 4 ½ with.

F. Footwear

 Service Shoes – maximum of 5 centimeters

Rubber Rain Boots Black – optional nature of post requires

3. Ornament and patches

A. National Badge

B. Cap Device (brass)

Shall be attached on the pershing cap of officers

C. Regulation Buckle – an agency name

D. Collar Device
The collar device is four golden attached bars.

E. Name Cloth

F. Agency / Unit name cloth – Sewn as name cloth.

G. Equipment and Paraphernalia

The proposed special set of uniform for security shall be prescribed or


authorized to be issued only on a case to case basis at the areas as herein authorized upon prior
request of the clients concerned.

Security Director / Inspector

a. Leather pistol belt with regulation bucket.

B. Holster Black Leather

A holder for carrying a hand gun or other fire arm, typically made of leather and worn
on a belt under a arm.

Security Guard (Male and Female)

Lanyard

Same style use by AFP or PNP personnel, shall be worn security agency officer and
security guard.

Footwear

Black leather shoes with rubber hills and soles, Plain top, low cat black shoes, worn with
plain black sacks.

Ball cap

Prescribe embraided cloth cap device.

B. Uniform ( female)

It shall consist of an over see cup two (2) ply, service bush jacket, service blouse,
service belt, lanyard and black leather shoes.

Bush Cap
Past navy blue (2 ply) without piping but with regulation cup device.

Service bush jacket

White in color and shall be sewn in same style as that of security agency officer.

Service Shirt

White ramie polyester fabric and shall be sewn short sleeves or long sleeves as the
case maybe, shoulder straps, two breast pockets with cover flaps and navy blue front buttons.

Service belt

These adhesives cannot be used to bond tire cords to rubber, as the service
temperature of the belt is very high.

Lanyard

Lanyard is a cord or strap worn around the neck, shoulder, or wrist to carry such
item as keys or identification cards.

Service Skirts

Aline skirts with two front slide pockets. It shall be worn when posted indoors.

Footwear

Plain black leather shoes, low-cut rubber shoes sales and heel ( maximum of five cm)
and black shoe laces.

C. Paraphernalia

The proposed special set of uniform for security shall be prescribed or authorized to be
issued only on a case to case basis at the areas as herein authorized upon prior request of the
clients concerned

Provision for Uniform

All employers owners operators of PSA/CSF shall provide at least one (1)
set of the prescribed uniform free of charge to their respective security guard for every year of
service with them. Likewise, all licensed security guard shall provide themselves with one (1)
set of uniform once a year unless their employers provide it for free.
PROTECTIVE ALARMS

 ALARM- (SIGNAL) is synonymous to warning of imminent danger.

 PROTECTIVE ALARM- It is an aural or visual signal given by the enunciator to security


guard when intruder actuates device in a protected area.

 ENUNCIATOR- Is a visual or audible- signalling device which initiates condition of


associated circuits.

Basic Concept of Protective Alarms

 Another safeguard used to assist security to complement if not to supplement


physical security is an array of alarms. These alarms of various types and cost can be
installed indoors or outdoors.

Operation and types of Intrusion Alarm Systems

1.Breaking an Electrical Circuit through a Metallic Foil or Wire.

2. Interruption of Light Beam of Photo-Cell through a Photoelectric or Electric Eye Device.

3. The disadvantage of Photo-Cell include the beam can be bypassed by crawling underneath
or climbing over it.

4. Detecting sound and Vibration through an Audio Device.

5. Vibration Detection Device.

6. Space and Motion Detectors.

7. Penetration of an Electron or Electromagnetic Fence.

8.Foot Rail Activator

9. Bill Traps

10. Knee or Thigh Button

11. Foot Button

12. Double Squeeze Button

Types of Alarm Detection System


1.Central Station System- Is located outside the installation.

A. Direct wire systems.

B. Circuit party systems.

C. Multiplex system

D. Digital communicator

E. Telephone dialler

F. Radio signal transmission

G. Video verification

2. Proprietary System-This functions in the same way as the central system except that it is
owned and leased by the subscriber, operated and located in the facility.

3. Local alarm system –Consists of rigging up a visual or audible alarm near the object to be
protected, a bell or light indicates an attempted or successful intrusion.

4. Auxiliary system-In this system installation circuits are led into local police or fire dept. by
leased telephone lines usually by special arrangements.

5. Local alarm –By-Chance System- A local alarm system in w/c a bell or siren is sounded w/
no predictable response.

6. Dial Alarm System- This system is set to dial a predestined number when the alarm is
activated.

Three Parts of an alarm System

1.Sensor or Trigger Device.

2.Circuits w/c carries messages to the signalling apparatus.

3. Signalling System or called Enunciator.

Desirable characteristics of Intrusion Alarm Systems


1.The detection unit should initiate the alarm.

2. An enunciator console indicating the audible or aural signal for specific location of incident.

3. Fail- A safe features gives alarm when something is wrong.

4. System should difficult to tamper

5. Transmission can be by physical wires or by radio.

PERIMETER PROTECTION

 The first line of defence to detect the intruders.

1. Door Switches
2. 2. Metallic Foil (window tape
3. 3.Glass break detectors
4. Wooden Screens
5. . Window Screens
6. 6.Lace and Panelling

Area/ Space Protection

 This involves detection of intrusions inside the building or w/in an area w/ the use of
Indoor Detection Devices.

Types and Operation of Motion Detectors

Infrared Rays

Passive infrared motion detectors

Ultrasonic

Active infrared motion detectors

Video

REDUCING FALSE ALARMS


 A burglar can initiate a considerable response by police or private security
personnel, who may leave important duties to race to the scene of the alarm.

INTRUDERS DETECTION SYSTEMS (IDS)

 These are electronic devices for detecting entry , or in some cases , attempted
entry of an intruder and signalling an alarm.

PERIMETER INTRUDER DETECTION SYSTEM (PIDS)

 It used for detecting entry or attempted entry across the external perimeter of
a key point and signalling an alarm.

PROTECTION OF SENSITIVE
MATERIALS AND INFORMATION

 CONCEPT

A. RATIONAL

In every organization, there are materials or information that is considered sensitive.


Sensitive is anonymous to secret or confidential. Thus maximum security is also needed
because unauthorized disclosure of this kind of materials certainly causes adverse effects to the
concerned organization or business establishment.

B. PROPRIETARY INFORMATION

This information that in some special war relates to the status or activities of the
possessors and over which the possessor asserts ownership. In the business community,
proprietary information relates to the structure, produce or business methods of the
organization. It is usually protected in some way against casual or general disclosure.

Proprietary pertains to anything used with exclusive legal right or anything used,
manufactured or sold by a person or company with an exclusive property right, for example a
patent or trademark.

All proprietary information is confidential, but not all confidential information is


proprietary. For example, confidential personnel data in employee file is not considered as
proprietary although the company treats it as confidential.

C. TYPES OF PROPRIETARY INFORMATION

In the business world, proprietary matters are classified into:

1. Trade Secrets- This consist formula, pattern, device or compilation of information which is
used in one’s business and which gives him an opportunity to gain an advantage over
competitions who do not know or use it. It may be a formula for a chemical compound a
process of manufacturing, treating or preserving materials a pattern for machine or device, or a
list of costumers.

It differs from other secrets information as to single or ephemeral events. A trade secret is
a process or device for continuous use in the protection of the business.
2.Patents- This a grant made by the government to an inventor, conveying or securing or
securing to him the exclusive right to make, use, or sell his invention for terms of years.

D. DISTINCTION BETWEEN PATENTS AND TRADE SECRETS

Under the law, patents and trade secrets are distinguished by the following
characteristics:

1. Requirements for obtaining a patent are specific. To qualify for a patent the invention
must be more than novel and useful. It must represent a positive contribution beyond the skill
of the average person.

2. A much lower of novelty is required of a trade secrets.

3. A trade secrets remains secret as long as it continues to meet trade secret tests while the
exclusive right to patent protection expires after 17 years.

E. PROPERTIES INFORMATION PROTECTION PROGRAM

Realizing that the most serious threats to trade secrets is the employee , a measure of
protection is often realized through the use of employee agreements which restrict the
employee’s ability to disclose information without specific authorization to the company. The
following countermeasures may be adopted:

1. Policy and procedure statements regarding all sensitive information- this involves the setting
of a clear-cut policy concerning the secrecy and proper handling of all sensitive information.

2. Pre and post employment screening and review – this is done to prevent the hiring of
unwanted personnel.

3. Non-disclosure agreements from employees, vendors, contractors and visitors- this is done
to emphasize to all concerned individual that the patent or trade secrets is the heart of the
business establishment or organization.

4. Non-competitive agreements with selected employee- this is to avoid employees from


getting into a business or extra job that is in conflict with the interested of the company.

5. Awareness programs – this involves the education of all concerned company personnel which
emphasized that disclosure of company secrets is detrimental to the cause of company.

6. Physical security measures- this is the use of protective containers (as discussed earlier).
7. Informed monitoring of routine activities.

PHYSICAL SECURITY

OVERVIEW

The various types of physical security will be discussed in this lesson alongside with barriers that
are placed between the potential intruder and the matter to be protected

PHYSICAL SECURITY as earlier discussed, is the broadest branch of security which is actually a
system of barriers placed between potential intruders and the matters to be protected. It is
concerned with the physical measures adopted to prevent unauthorized access to equipment,
facilities, materials, and documents, and to safeguard them against espionage, sabotage
damage and theft.

Physical security covers other types of security to protect equipment, documents, facilities and
materials against theft damage, sabotage or espionage. It also encompasses protection of
personnel from any criminal act.

A. PRINCIPLES OF PHYSICAL SECURITY


B. In every establishment, physical measures are needed to deny unauthorized access or
intrusion because of the following:

1.Enemy Agents Must Access

Acquisition of information is the ultimate results, and the means and form in which the
information is obtained.

2. There is No Impenetrable Barrier


For the unfriendly government or organization, they are willing to devote enough time,
money, personnel, material, and imagination in passing barriers. So physical security
attempts to build defense by using a certain barrier.
3. Defense in depth means barrier after barrier
In order that barrier could prevent unauthorized access and serve its purpose very well,
there should be an integration of all barriers adopted in the installation.
4. Surreptitious versus Non-Surreptitious Entry
The possibility of surreptitious entry is the greatest hazard from the standpoint of
counterintelligence security because it is usually difficult to determine that the
information has been compromised. No action is taken to neutralize the act of
espionage because surreptitious entry is not usually detected.
Surreptitious entry means not observable while non- surreptitious entry is observable.
Observable or not, intruders usually find the right place and right opportunity to gain
access. Physical security then is needed to detect or deny unauthorized entries.
5. Each Installation is Different
Since each installation is different, each will have different problems to overcome. The
security procedures will not be adequate for all installations.
C. BARRIERS DEFINED
1. NATURAL BARRIERS
These are offered by nature which could obstruct or delay the passage way of potential
intruders. These also refer to natural structures that serve as deterrents or obstructions
to intruders such as high cliff, canyon, desert, or bodies of water.
2. MAN-MADE BARRIERS
These are structural constructions like fences, walls, floors, roofs, grills, bars, roadblocks,
or other physical means to deter or impede penetration.
D. SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS
1. Natural Barriers include mountains, cliffs, canyons, ravens, seas, marshes, deserts, or
terrain difficult to traverse.
2. Structural barriers are those features constructed by man regardless of their original
intent that tend to delay the intruder. Examples of these are: walls; ceilings; door; and
fences.
3. Human Barriers include guards, charges of quarters, office and shop workers, who
stand between the intruder and the matter to be protected.
4. Animal Barriers are usually shepherd dogs trained for and used as guards.
5. Energy Barriers are usually electrical and electronic devices that could assist
security personnel in detecting intrusions. Examples are: protected lighting; and anti-
intrusion devices.

E. LEVELS OF PHYSICAL SECURITY

It also varies depending on the type and location of facility, and other factors needing security.
The levels of physical security could be any of the following:

1. Minimum Security

Is a system designed to impede unauthorized external activity such as simple


intrusion to armed attack.

 
2. Low Level Security

Is a system designed to impede and detect some unauthorized external activity


such as on small retail store, storage warehouses.

3. Medium Security

Is designed to impede, detect and assess most external activity and some
unauthorized internal activity that range from simple shoplifting to conspiracy to commit
sabotage. This includes the:

a. Use of advance intrusion alarm system;

b. Establishment of perimeter and perimeter barriers; and

c. Use of an unarmed guard.

4. High Level Security

Is designed to impede, detect and assess most unauthorized external and


internal activities of certain prisons, defense contractors, pharmaceutical companies
and sophisticated electronic manufacturers. This includes the utilization of the
following:

a. Perimeter alarm system;

b. Close Circuit Television (CCTV);

c. High security lighting;

d. Highly trained armed guards;

e. Control designs; and

f. Coordination with local law enforcement agencies.

5. Maximum Security

Includes the application of the following:

a. Sophisticated alarm system; and

b. On-site response force.


Risk Management Alternatives and Strategies

Definition of Terminologies

Security is all about reducing or eliminating the impact or effect of potential risk or
hazard. Security managers normally conduct security surveys and security inspections to
determine the needed security measures. The following terms are defined to guide
security managers in determining the appropriate security measures in response to
potential risks or hazard.

1.HAZARDS- exposure to the chance of loss or injury synonymous to risk or peril.

2.SECURITY HAZARDS- any act or condition which may result in the compromise of
information. Loss of life, loss or destruction of property or desruption of the objective of
the installation. It can also be defined as an act or condition affecting the safe operation
of the facility caused by human action accidental or intentional.

3.RISK- It is the potential damage or loss of an asset. The level of risk is a combination of
two factors. The value placed on that asset by its owner and the consequence impact
adverse effect of the loss or damage to that asset and; the likelihood that aspecific
vulnerability will be exploited by a particular treat.

4.RISK MANAGEMENT- Is the process of selecting and implementing security


countermeasures to achieve an acceptable leve of risk at an acceptable cost.

5.RISK ANALYSIS- it is the analysis of risk which includes examination of the vulnerability,
probability and criticality of potential threats and include natural and man made risk.

6.ADVERSARY- An individual, group, organization or the government that conduct


activities detrimental to the individual private or government entity.

7.ASSET- any information, facility, material, information or activity which has a positive
value to its owner.

8.COUNTERMEASURES- An action taken or physical security used to reduce or eliminate


one or more vulnerabilities. The cost of possible countermeasures may be monetary,
operational efficiency, adverse publicity unfavorable working condition, and political
consequences.
9.PROBABILITY- It is the chance or likelihood that a loss will concerning of the possibility
of an event occurring.

10.CRITICALITY- It is the impact of the loss as an measured in the finacial terms. How
important it is in terms of the survival or existence of the organization.

RELATIVELY OF RISK AND SECURITY

The extent and degree of risks to security is dependent on the following;

1. RELATIVE CRITICALITY OF OPERATION-this pertains to the importance of the firm


with reference to the of natural economy and security. Example is gasoline depots,
communication transmission lines, and power plants.

2. RELATIVE VULNERABILITY- this is the susceptibility of the plant or establishment


to damage, loss or disruption of operation due to various hazards. A good example is the
location of the building; the machines; or presence of possible poisons. Security
managers and planners normally consider the above relativity in the determining the
degree of security measures needed to reduce or eliminate the potential risks or
hazards.

RISK MANAGEMENT ALTERNATIVES AND STRATEGIES

To lessen or eliminate the effect of risks or hazards, the following are the alternatives
and strategies that are commonly applied by industrial security managers:

1. RISK AVOIDANCE- this is the eliminating removing the risk totally from the
business, government, or industrial environment for which the risk manager has
responsibility. A good example of this is the proper disposal of inflammable substances.

2. RISK REDUCTION- this is the decreasing the risk by minimizing the probability of
the potential loss. The reduction of criminal opportunity is often accomplished by
situational crime prevention strategies to discourage ,deter, or denied criminal
incidents. A good example is the construction of fences and similar physical barriers.

3. RISK SPREADING- this is the spreading the risk through compartmentation or


decentralization to limit the impact (criticality) of the potential loss. This could be done
by using numerous vaults or safe for the safe keeping of valuables such as documents
and paper bills
4. RISK TRANSFER-this is the moving the financial impact of the potential lose-over
to an insurance company. This is done by availing of property and life insurances. Hiring
security agencies is also a good example of this.

5. RISK SELF –ASSUMPTION- this is planned assumptions and acceptance of the


potential risk by making a deliberate managerial decision of doing nothing about the
threat ,or setting aside resources for use in case of a specific lose of incident

You might also like