Preliminary Notes 2021-2022

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23

INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS

INTRODUCTION
HISTORICAL BACKGROUND
Man in the course of history has always showed that he values property next to his life and
loved ones. Centuries before the modern concept of security and crime prevention came into practice,
cave dwellers fought among themselves and to protect life and property. Eventually, families and clans
banded together as tribes and later on formed communities for mutual protection, recognizing that
there is strength in numbers.
The Great Wall of China, stretching a length of 2, 414 kilometers and a height varying from 20
ft. as its lowest high to 50 feet high, serves as a living barrier for man to protect himself. Watch towers
are placed in strategic areas at regular intervals and troops are summoned by beacons of fire passing
through the top of the wall. Ancient Greece, before the birth of Christ, put up primitive but effective
alarm system consisting of placing a goose at strategic location so that when an approaching column of
men or army is spotted, the fowl, gifted with keen vision and hearing, starts squawking, signaling an
attack, announcing the presence of predators or enemies.
As early as 27BC-14AD, during the time of Emperor Augustus of the Roman Empire, the
Praetorian Guards was organized to protect the life of the emperor, at the same time, keep peace and
order in the streets of Rome. The bible likewise shows passages about witnesses, investigations and
terrorism. For instance, Leviticus 5:1 states that, “If a person bears a solemn adjuration to give
evidence as a witness to something that he has not seen or heard and does not disclose what he
knows, he commits a sin.” Exodus XXI: 16 reads: “He that stealth a man and selleth him or be found in
his hand, he shall surely be put to death.”, describes kidnapping as an act of terrorism. The code of
Hammurabi in 1750, contains statements regarding prohibited activities and their corresponding
punishments.
The Middle Ages (dark ages), after the fall of the Greek and Roman Empires, feudalism grew
and consequently, the overloads supplied food to their subjects, who in turn farmed and provided
protection and security to the castles. In 1100 AD, security forces were already required to be
registered and licensed. In the Philippines, when the Spaniards came in 1521, earliest known records of
historians, found villages already organized as barangays, with native guards posted on top of coconut
trees or on top of structures made of bamboo serving as watch towers, usually situated on sea shores
with warning devices such as gongs or bamboo kong-kong to announce approaching foes or friends.
The seeds for the development of modern security were planted during the social revolution of
the 16th century, wherein increased urbanization of the population has created a rise in poverty and
crime. No public law enforcement agencies existed that could restrain or alleviate mounting waves of
crime, violence and disorder. In 1748, different security outfits were privately formed. Individual
merchants hired men to guard their shops, warehouses and properties. Agents were also engaged to
recover stolen property. Henry Feilding, magistrate and author, was credited for conceiving the idea of

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 1
preventing crime instead of seeking to control it. He proposed a permanent, professional and
adequately paid security force.
The systems, techniques and devices to protect life and properties involved since then, to more
specialized methods that fulfilled the challenges during the Industrial Revolution of the 18 th century.
Communities as well as commercial and industrial establishment continue to hire competent private
security personnel, realizing the persistent inadequacy of the state for their protection.
The early 19th century brought about the dawn of modem concept of public security and
protection when municipal governments of the western world established police departments: London
in 1829, Philadelphia 1832, Boston 1838.New York 1844, San Francisco 1846. Los Angeles 1850 and
Dallas 1856. In the Philippines as early as 1850, peace keeping and crime prevention were
implemented by the “Guardia Civil”. The formation of these government paid security forces stymied
the growth of the private security industry. However, during World War I, with the production of war
materials, the increasing danger of sabotage and the necessity to safeguard trade secrets in
manufacturing and stocking, the rebirth of the private security industry was the inevitable
consequence.
World War II brought further growth in the security industry, ushering more sophisticated
trends in crime prevention and security. Most historians share the belief that industrialization, increase
of urban population, war times sabotage and espionage, the Korean War. the Cold War. Global anxiety
due to competitions between democratic and communist regions, elements that disturb public order,
the social and political climate, labor unrest, worldwide nationalism, all of which are serious threat to
the peace of mind and tranquility of people, have contributed greatly in the enhancement and
expansion of the security industry.
In the Philippines, after World War II, several factors immensely contributed to the rapid
growth of the local security industry: When surplus amis found their way into the hands of the
populace, tension was created due to the proliferation of loose unlicensed firearms and aggravated by
the uncontrolled ingenious backyard gunsmithry of gifted Filipino technicians; the complacency and /or
inability of the state to control urban migration, thus creating squatter areas—breeding places of crime,
where poverty, filth and squalor abound; the government’s inability to adapt a long term economic and
political solution to alleviate existing and inadequate living conditions of the common Tao or for him to
cam a decent wage; the unabated corruption in the public service resulting in the ostentatious display
of ill-gotten wealth, crippling the common Tao’s sense of values and distorting his sense of decency;
the lack of political will in eradicating or stopping the formation of quasi-politico-religious lawless
groups; protest, crime, terrorism, kidnap for ransom, car napping with the perpetrators in cahoots with
elements of law enforcement agencies and countless valid reasons that eroded the moral values of the
people.
As of 1999, there are more than 400,000 security personnel. Outnumbering the total AFP and
PNP personnel combined. This is the aftermath of the growth of local security industry.
Furthermore, the paradigm shifts to globalization and the recent advancement in computer
technology pose a greater challenge to the security industry.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 2
CRIMES OF THE THIRD WAVE
When the Soviets successfully launched the first earth satellite (Sputnik.1957) and were the first
to reach the moon with unnamed rocket, the technological race became more intense and information
protection was a priority. Many unforgettable events have transpired in history that led to numerous
social and political upheavals consequently leading to the development of high technology in the field
of information. The advanced nations, spearheaded by the United States of America, (in John Naissvitt
s Megs Trends, Third Wave) developed Third Wave Societies –societies based on Information and high
Technology. For thousands of years, the world was dominated by “First Wave” societies whose base
was agriculture. Crimes against property such as stealing cattle, grains, etc. were committed. Occurring
during the Industrial Revolution, the “Second Wave” societies were based on irreplaceably energy
sources such as coal and oil. Criminals focused their attention on money and the blooming academic
conditions. The depletion of the resources and the global dependency on technology and information,
gave birth to “Third Wave” crimes, wherein the offender uses only his imagination along with
technological innovation. “TODAY, A THIEF CAN STEAL WITHOUT PHYSICALLY TRESSPASSING BY
USING A COMPUTER AND MODEM OR A CELLPHONE FROM THE COMFORT OF HIS OR HER OWN
HOME.” (From Security and Loss Prevention, by Philip P. Purpura, Third Edition)
These high-tech “Third Wave” crimes need concerted attention from security practitioners. New
methods, techniques and measures to combat or solve security problems of this nature should be
tapped and developed and corollanly the creation of and speedy implementation of new rules, policies
and legislation.

CYBER CRIME
The fame in the Filipino was exemplified not too long ago. When an illegal act was committed
by an unknown cyber freak, a student with a failed thesis. This “hacker” unleashed the deadly “Love
Vims” which wrought havoc and destruction on computers worldwide, costing billions of dollars in lost
man-hours and repairs. The speed and virulence of the virus was unprecedented, spreading in just a
few hours and penetrating even the impervious Pentagon. This hastened the passage of R.S. No. 8792
known as the Electronic Commerce Act of 2002. Ushering new policies, rules and statutes in Philippine
jurisprudence, keeping the Philippines, a third world country, at par with developed countries for the
needed legislation to control and prevent crimes of the third wave. Software piracies, hacking of bank
accounts, theft of access codes, industrial espionage, to name a few, are examples of cybercrimes.

SOFTWARE PIRACY
High-tech, Global Information Infrastructure Development, with the collateral advance of
electronic and digital technology shifted the development of cyberspace security into high gear. The
noble practice of e-commerce will usher a new phase in asset protection. The numerous application of
a simple hand –held cellphone with the use of portable wireless devices (WAP, wireless application
protocol), anyone can link –up with tens of thousands of cyberspace explorers without the need for PCs
and or telephone lines, or the newer 3G cellphones with microchips that could accommodate 1,500

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 3
books, can be uploaded in less than 2 seconds via than 240 innocent civilians , the bombing of a
French UTA DC-10 plane by 6 Libyan terrorists, killing 170 passengers and crew including a brother –in
–law of Mumuar Khadaffy ,the bombing of US Embassy in Africa killing more than 100 people, ansd
score of other savage and barbaric terrorist attacts by some fanatical bandits who profess fundamental
religious of political rhetoric of sorts, numbering a total of 1105 cases for only 2 years preceding 1995.
These bizarre irrational acts of terrorism caused international furor and condemnation.
The late 60’s brought about the beginning of kidnapping for ransom in the Latin Americas. In
the beginning, no ransoms were demanded by terrorist groups but only concessions in kind, such as
deliveries of food for the poor, re-instatement od dismissed employees, demand for shorter working
hours and other non-financial packages. A precedent setting case, however, that happened in May
1971, involving the kidnapping pf an executive of Swifts, a meat packaging company, and the eventual
payment of $50,000.00 (fifty thousand dollars) in ransom, has emboldened terrorist groups to stage
further of victims. March 1972, an executive of Fiat was kidnapped and was released after payment of
$ 1,000,000.00 (one million dollars), in addition to the re-instatement of 250 dismissed employees.
December 1972, a British executive was kidnapped and the terrorists were able to negotiate for 10
million dollars in ransom. September of the same year, the Bom brothers was kidnapped and released
after payment of a staggering amount of 60 million dollars.
In the Philippines, Abu Sayaff, a self-styled Muslim fundamentalist terrorist group, made
international headlines when they snatched 19 foreigners (from Germany, France, South Africa,
Finland, Lebanon and Malaysia) and 2 Filipinos on Easter Sunday, April 23, 2000 from a Malaysian
diving resort in Salipandan Island off Sabah and brought them to Jolo, Sulu, Philippines. Negotiations
for their released lagged for more than 5 months, until Libyan strongman Mumuar Khadaffy, a known
terrorist coddler, played a role in a payment and release of the victims in consideration for at least
fifteen million dollars ($15,000,000.00) in ransom. After their release, the victims were flown to Tripoli
to thank him, before heading for their respective homes, thus redeeming Libya from economic
sanctions imposed by the United Nations. This unfortunate incident brought ignominy, shame and
disgrace to the country. Eventually, to neutralize this bandits, the government deployed more than
5,000 elite troops of the Armed Forces of the Philippines to Jolo and Basilan islands, known liars of the
dreaded Abu Sayaff.
The aftermath resulted in lost prestige in the international community, more extensive
economic meltdown, capital flight, lost revenues from the tourism industry, partly causing the decline
of the peso against the dollar. Furthermore, the government will have to bear the mounting cost and
expenditures of putting down civil disturbances due to the resurgence of the seditious movements in 3
fronts namely: New People’s Army; Moro Islamic Liberation Front, the splinter Muslim secessionist
group; and the Abu Sayaff terrorist group.
Last September 11, 2001, the world’s populace was focused in New York City. The World Trade
Center’s security was finally penetrated by Arab terrorists. This time it was exactly on the ground that
they were able to break security. They took advantage of the security lapses prevailing in US airports,
allowing them to gain access into the facilities and as a result, were able to hijack and commander
passenger aircrafts to their targets and consummate their ultimate plans. Too much familiarization

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 4
really contributed to the perpetrators to come up with an almost prevailing situation in the field. New
technology equipment and devices in this fast changing field must be tested, implemented, evaluated
and modified. The practitioner must manage both people and circumstances, which require up-to-date
knowledge of the field and the tools necessary to reduce, if not totally eradicate criminal opportunity.
The ability to assess potential risk accurately is also a necessity for success, corollary to
communication skills and facility. Action will not be successful unless they are effectively communicated
or sold to those who must directly implement them.
In considering cost as a factor in determining the protection of assets, it is cheaper to eliminate
a criminal desire as it is to eliminate opportunity. Take for instance, the capabilities of a system should
be known/announced to the criminal such as the presence of dogs, locks, access control, and/or a sign
indicating that the premises is protected by the sophisticated system of hidden alarms, surveillance
devices, creating a mystifying aura that perplex the mind, establishing a psychological deterrent. The
would be offender inside or outside would perceive danger and risk from an attempted attack and
thereby becomes discouraged, considering failure to ensue. This concept is not shared by some
practitioners, who maintain the idea of keeping a low profile, thinking it would contribute to the
effectiveness of the system. A practitioner who plans that, will fool the criminal, will be risking the
assets he is trying to protect.
When crimes or attacks against assets are foreseeable, adequate security measures must be
provided. The issue of foreseeability poses a number of questions the practitioner should address.
What is the proper standard or prior history crimes that makes them foreseeable? Which one of the
following standards should apply? Should a high crime area be defined by geographic scope, or by the
rate of the crime per 100,000 inhabitants? How many crimes should be in record and how recently
should they have occurred in order to make another crime foreseeable? With the possession of some
information, can a particular crime be reasonably foreseeable?
Now a tougher question arises. What adequate measures should be taken reasonably to protect
the asset? A lot of practitioners have strong opinions on what protective measures should be applied to
the asset, but what is “adequate” maybe is a matter of preparation, experience, motivation and skills of
the practitioner.

TERRORISM
For centuries, political violence has existed in one form or another. At the beginning of 20 th
century, notably 1920’s and 1930’s, early terrorism’s wave emerged, eclipsed only by the world wars
and continued up to the present. Modern theories of guerilla warfare, developed, during the world
wars, represented the techniques used in terrorism. International terrorism though began its roots in
the Arab world, born out of the frustrations of Palestinian guerillas after their defeat by the Israeli s
armies in 1967. Likewise, the failure of Latin American guerillas to Cuba. The recent events, however,
that has struck the world with awesome magnitude and ferocity that wrought havoc to crime
prevention efforts and caused destruction and extinguished hundreds of human lives, are those that
were perpetrated by the Arabs, notably by terrorist billionaire Osama Bin Laden and his minions.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 5
The senseless bombing of the World Trade Center in the U.S.A., causing death of more than
240 innocent civilians, the bombing of the French UTA DC-10 plane by 6 Libyan terrorists, killing 170
passengers and crew including a brother-in-law of Mumuar Khadaffy . the bombing of US embassy in
Africa killing more than 100 people, and score of other savage and barbaric terrorist attacks by some
fanatical bandits who profess fundamental religious or political rhetoric of sorts, numbering a total of
1105 cases for only 2 years preceding 1995. These bizarre irrational acts of terrorism caused
international furor and condemnation.
The late 60’s brought about the beginning of kidnapping for ransom in the Latin Americas. In
the beginning, no ransoms were demanded by terrorist groups but only concessions in kind, such as
deliveries of food for the poor, re-instatement of dismissed employees, demand for shorter working
hours and other non-financial packages. A precedent setting case, however, that happened in May
1971, involving the kidnapping of an executive of Swifts, a meat packaging company, and eventual
payment of $ 50,000.00 (fifty thousand dollars) in ransom, has emboldened terrorist groups to stage
further kidnapping demanding an ever increasing amount in cash as ransoms for the release of victims.
March 1972, an executive of Fiat was kidnapped dismissed employees. December 1972, a British
executive was kidnapped and the terrorists were able to negotiate for 10 million dollars in ransom.
March 1974, an Esso executive was released after the terrorist group was paid 14.2 million dollars in
ransom. September of the same year, the Bom brothers were kidnapped and released after payment of
a staggering amount of 60 million dollars.
In the Philippines, Abu Sayaff, a self-styled Muslim fundamentalist terrorist group, made
international headlines when they snatched 19 foreigners (from Germany, France, South Africa,
Finland, Lebanon and Malaysia) and 2 Filipinos on Easter Sunday, April 23, 2000 from a Malaysian
diving resort in Salipandan Island off Sabah and brought them to Jolo, Sulu, Philippines. Negotiations
for their released lagged for more than 5 months, until Libyan strongman Mumuar Khadaffy, a known
terrorist coddler, played a role in a payment and release of the victims in consideration for at least
fifteen million dollars ($15,000,000.00) in ransom. After their release, the victims were flown to Tripoli
to thank him, before heading for their respective homes, thus redeeming Libya from economic
sanctions imposed by the United Nations. This unfortunate incident brought ignominy, shame and
disgrace to the country. Eventually, to neutralize this bandits, the government deployed more than
5,000 elite troops of the Armed Forces of the Philippines to Jolo and Basilan islands, known liars of the
dreaded Abu Sayaff.
The aftermath resulted in lost prestige in the international community, more extensive
economic meltdown, capital flight, lost revenues from the tourism industry, partly causing the decline
of the peso against the dollar. Furthermore, the government will have to bear the mounting cost and
expenditures of putting down civil disturbances due to the resurgence of the seditious movements in 3
fronts namely: New People’s Army; Moro Islamic Liberation Front, the splinter Muslim secessionist
group; and the Abu Sayaff terrorist group.
Last September 11, 2001, the world’s populace was focused in New York City. The World Trade
Center’s security was finally penetrated by Arab terrorists. This time it was exactly on the ground that
they were able to break security. They took advantage of the security lapses prevailing in US airports,

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 6
allowing them to gain access into the facilities and as a result, were able to hijack and commander
passenger aircrafts to their targets and consummate their ultimate plans. Too much familiarization
really contributed to the perpetrators to come up with an almost perfect plan to execute one of the
most dreaded terrorist activities in the world. One record, there were 6,000 people either dead or
missing during the terrorist onslaught not to mention its global impact on the world’s economy.

PART 1
SECURITY OPERATION
LEGAL BASIS OF INDUSTRIAL SECURITY

1. NATURAL AUTHORITY
A. The highest law is the law of preservation
By instinct, man naturally react to protect himself, his honor, freedom, liberty and
property from danger, threat of hazard, He does it personally and/or thru the help of others.
Even before the coming of early Chinese traders were already organized into tribes.
Each tribe has his own chieftain but also of the members. The inherent mechanism of self
preservation became the unwritten law of the early Filipinos to protect themselves and their
property against the natural and man made hazards.

2. CONSTITUTIONAL AUTHORITY
A. The prime duty of the government is to serve and protect people. The Government may call
upon the people to defend the state and in the fulfillment thereof; all citizens may be required,
under conditions provided by law, or to render personal military civil service. (Art.II Sec.4 of the
1987 Philippine Constitution).
Although the defense of the state is the one contemplated here people being one of the
elements of the state is directly affected in whatever protection the state will receive
from the government and the people, take note also that all citizens who are qualified,
including the security guards, may be required by law to render personal military of civil
service. The service required or the citizens personal.
B. No person shall be deprive of live, liberty or property without due process of
law, nor shall any person be denied the equal protection or the laws. (Art.III
Sec. 1 of the 1987 Philippine Constitution).
This means the life, liberty; freedom and property can only be taken from a person after
the observance of due process of law. Due process of law are of two aspects: substantive and
procedural. Daniel Webster in brief defines procedural due process as “one which hears before it
condemns, which proceeds upon inquiry, and render judgments only after trial”. But if the taking of
life, liberty, freedom or property does not fall within the framework of due process of law, available
remedies under the law should be resorted to..
C. Private property shall not be taken for public use without just compensation. (Art.III Sec.9 of
the 1987 Philippine Constitution).

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 7
The constitution protects not only ownership but also possession, enjoyment use and
disposition of private property by their rightful owners subject to such limitations
imposed by law. In this regards, private property to be taken by the government in its
exercise of the power of the eminent domain must satisfy two important conditions,
namely: public use and just compensation.
D. The right of the people to be secure in their persons, houses papers, and
effects against unreasonable search and seizures of whatever nature and for any purpose shall
be individual, and no search warrant or warrant of arrest shall be issue expert upon
examination under oath or affirmation of the complainant and the witnesses he may produce,
and particularly describing the place to be searched and the persons or things to be seized.
(Art.III Sec.2 of the Philippine Constitution).

3. STATUTORY AUTHORITY:
A. The Revised Penal Code. (Act No.3815, as amended.)
The applicable provision of the Code on Crime Against Person, Personal
Liberty and security and property have bearing on the security and protection of one’s life,
liberty and property.
B. Private Security Agency Law (RA 5487 as amended)
This law governs the operation, administration of security agency, and
activities, qualifications, duties and licensing of security guards, watchman and private
detectives. In short, it is the intention of this law to professionalize the security service in order
to upgrade the level of security protection.

C. Presidential Decree No. 11 (Amending RA5487)


Presidential Decree 11 amended the Sec.3 (d) which defines
Watchman or Security Guard Agency, Sec.4 who may organize a security or
watchman agency and the Sec.18 of the penal provision of Republic Act No. 5487.
D. Presidential Decree N0.100 (Amending RA5487 & PD 11)
The following are amended by PD No.100:
Further amended the Sec.3 (d) which further define the watchman or Security
guard or Watchman or Security Guard Agency;
Further amended Sec.4 by adding as the last paragraph thereof.
Amended the Sec.5 and 8 of Private Security Agency Law inserting before the
final provision thereto:
Amended the Sec.9 that provides employees need not be licensed;
Amended the Sec.11 by adding as the second paragraph thereof.
DEFINITION OF TERMS
ACCESS LIST – an authenticated list personnel given to security guard allowing entry to compound or
installation or part thereof.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 8
ANNUNCIATOR – is a visual or audible signing device which initiates conditions of associated circuits.
The primarily purpose of alarms is to alert security guard.
AUDIT - an official verification and examination of accounts and records.
BADGE SYSTEM – a system for personnel movement and control whereby badges or identification
are issued to personnel upon entering and an installation. Visitors are also issued temporary
badges when entering the installation.
COMBINATION LOCK – is a lock that requires manipulation of parts according to predetermined
combination code of numbers or letters.
CONTROLLING - the regulation of many different aspects of business activity, controls are needed to
standardized equality and performance, protect assets, measures performance, balance plans
and programs and motivate individuals.
CONTROLLED AREA – an area near the adjacent to limited or exclusive areas where entry is
restricted.
COVERAGE FACTOR – The minimum number of directions from which each point in the area should
be lighted depending upon the use of the area.
DOPPLER EFFECT – a physical phenomenon that causes frequency shift if an objects move in the
area permeated by radio frequency signals. This change in a certain type of alarms activates a
signaling unit.
DRY RUN – practical test or exercise of a plan of any activity to test its validity, an operational
readiness exercise.
DURESS CODE – a type of code system so that security personnel when forced by armed men enter
an installation can give alarm by the use of certain words in casual conversational with other
personnel in the installation.
ELECTRICAL LOCK – type of lock that can be opened and closed remotely by electronic means.
ENTRANCE CONFERENCE – a conference or dialogue between the survey team and management
officials of a plant before security survey is conducted.
EXIT CONFERENCE – a conference similar to entrance conference done after the completion of the
security survey.
EXCLUSION AREA – a restricted area containing materials or operation of security interest.
FALL SAFE – a term applied to a device or system that in the event of failure of a components the
incapacity will be signaled.
INSPECTION – term use for succeeding surveys.
KEY CONTROL – the management of key is a plant of business organization to prevent unauthorized
individuals access to the keys.
LOCK – is defined as a mechanical, electrical, hydraulic, or electronic device to prevent entry to a
building, room, container or hiding place.
MASTER KEY – a special key capable of opening a series of locks.
MASTER KEYING SYSTEM – the system used in big installation whereby keys can open a group or
group of locks.
MAISON KEYING – the issue of key to open main entrance gate and office.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 9
PADLOCK - is a portable and detachable look having a pivoted of sliding hasp which passes through a
staple ring which is made fast or secured.
PASS SYSTEM – a method used by security to screen visitors of person admitted into building
premises.
PETERMAN – a term used in England for lock pickers, safecracker and penetrators of restricted rooms
or areas.
PROTECTIVE ALARMS – is an aural signal given by the annunciator to security guard when intruder
actuates device in a protected area.
RESTRICTED AREA – any area access to which is subject to special restriction control.
SECURITY SURVEY – a fact finding probe and determine plans adequacy and deficiency in all aspects
of security, with the corresponding recommendations.
SEP – the exposure and teaching of employees on security and its relevance to their work.
SURVEY – term to the first detailed “look see” conducted by a term.

INDUSTRIAL SECURITY CONCEPTS


Security, safety from harm, a term that has different dimensions in psychology, public safety,
defense and military matters, and information access. In finance, a security is a document representing
an investment.
Security, in its semantic and philosophical sense, implies a stable, relatively predictable
environment in which an individual or group may pursue it s ends without disruption or harm, and
without fear of such disturbance or injury. The concept of security is an organizational sense as a
means by which safety and stability can civilization, shaped by wide variety of institutional and cultural
patterns.
Through out the ages men started practicing the utilization of workers and equipment in order
to protect his well being and property. Thus, the civilized man adopts security measures to have
adequate protection against unsecured and unsafe conditions. This probably led to the establishment
of the “police” an institution today responsible for law and order as well as public safety.
The incredible growth of the security industry in the Philippines nowadays is evident. Most
companies are using guard forces, protective barriers, communication and electronic hardware and
other state-of-the art protection methods and techniques in their asset protection. However, every
company or installation cannot yet escape the emerging complicated security problems like the
deteriorating peace and tranquility, the threat of terrorism and the social conditions of the community.
A determine intruder can sneak in the properties of another while the owner is asleep out on a trip or
anytime of the day and divest all valuable items which he can find. The incidents of fire and other
disaster should also be considered in the asset protection.
Hence, a basic understanding on the concept and methods of security is a primordial concern of
everybody.
Security Defined

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 10
Security is a state or quality, condition of being secured, freedom from fear, harm, danger, loss,
destruction or damages, to secure is to make safe or be protected.
The security of any business establishment today is a complex process. Security work involves
active and passive measures so that effective defense can be established against crimes.
Active measures are the physical barriers, security lighting use of vaults, locks and others.
Passive measures are those that will dates man from committing such acts for fear of being caught,
charged in court, or get dismissed; Security education programs, investigation, fire prevention
seminars; personal security checks are examples of passive security.

Basically, it was the action of man against man that led to many unsecured and unsafe
conditions. Reason could be economic, revenge, or just plain greed and avarice. Whatever the motives,
the civilized man needs adequate protection.
Since security in general is very hard to comprehend, it can be divided into three major areas:
1. Physical Security – this is the broadest branch of security which concerned with the physical
measures adopted to prevent unauthorized access to equipment, facilities, material and
document and to safeguard them against espionage, sabotage, damage, loss and theft.
2. Personnel Security – this is as important as physical security. Personnel security state even
before the hiring of an employee and remains to be maintained for as long as the person is
employed.
Its purpose is to insure that a firm hires those best suited to assist the firm in achieving its goals
and objectives and once hired assist in providing necessary security to the work force while carrying
out their functions.
3. Document and Information Security – this involves the protection of documents and
classified paper from loss, access by unauthorized persons, damage, theft and compromise
through disclosure.
Classified documents need special handling. Lack of indoctrination and orientation among the
personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the
documents.

Types of Security
1. Industrial Security – a type of security applied to business groups engaged in industries like
manufacturing, assembling, research and development, processing, warehousing and even agriculture.
2. Hotel Security – a type of security applied to hotels where its properties are protected from
pilferage, loss, damage and the function in the hotel restaurants are not disturbed and troubled by
outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and
supervisor and insures that hotel guests and their personal effects safeguarded.
3. Bank Security – this type of security is concern with bank operations. Its main objective is the
protection of bank cash and assets, its personnel and clientele. Security personnel are trained to
safeguard bank and assets while in storage, in transit and during transactions.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 11
4. VIP Security – a type of security applied for the protection of top-ranking officials of the
government or private entity, visiting persons of illustrious standing and foreign dignitaries.
5. School Security – a type of security that is concern with the protection of students, faculty,
members, and school properties. Security personnel are trained to protect the school property from
theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the
students.
6. Supermarket or Mall Security - a type of security which is concern with the protection of the
stores, warehouses, storage, its immediate premises and properties as well as the supermarket
personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb
detection and customer relation.

PART II
PHYSICAL SECURITY

Physical security measures are being used to defined, protect, and monitor property rights and
assets. These measures consist of barriers and devices that would detect, impede, and prevent
unauthorized access to equipment, facilities, material and document and to safeguard them against
espionage, sabotage, damage and theft.
Definition of Terms:
a. Physical Security – is a system of barrier placed between the potential intruder and
the material to be protected.
b. Natural Barriers or Features – Such as rivers, cliffs, and ravines, etc. which delay or
make more difficult the entry of the intruder.
c. Structural Barriers – These barriers are features constructed by man, regardless of
their original intent, which tend to delay the intruder. Examples are walls, ceilings,
doors, window, locks, fences, safe cabinets or containers.
d. Human Barriers – guards, charges of quarters, office and shop workers, etc. who
stand between the intruder and the matter to be protected.
e. Animal Barriers – Usually German Shepherd, dog trained for and used as guards.
f. Energy Barrier – Usually electrical or electronics devices used to provide assistance to
the guard personnel. Examples are protected lighting and anti-intrusion devices.
Concept:
a) Enemy Agents must have access – In most cases espionage, acquisition of information
is the ultimate result, and means and form in which information is obtained is merely and
operational detail. Normally, information on tapes and film is as usable as the original
documents. Therefore in considering access, one should think not only of current physical
access, but also access to the discussion of the matter by the use of clandestine listening
device.
b) There is no impenetrable barrier –Unfriendly government or organization is willing to
devote enough time, money, personnel, materials and imagination to passing a barrier, it
can do so. So we attempt to build defense in depth by using then one barrier.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 12
c) Surreptitious VS non-surreptitious entry – The possibility of surreptitious entry is the
greatest hazard from the standpoint of counterintelligence security because it is usually
difficult to neutralize the act o espionage because surreptitious entry is not usually detected.
d) Each installation is different – Since each installation is different each will have different
problems to overcome. The security procedures will not be adequate for all installations.
Barrier Defined
A barrier can be defined as any structure as any structure or physical device capable of
restriction, deterring, and delaying illegal access to an installation.
Two general types of Physical Barriers:
1) Natural Barriers – GOD created barrier such as, river, mountains and others.
2) Man-made Barriers – are structural construction like fences walls, floors, roofs, grills,
bars, road, blocks, or other physical means to deter or impede penetration.
Generally, a barrier is use for the following purposes:
1. Outline the physical limits of an area.
2. Creative a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards.
5. Facilitate and improve the control and vehicular traffic.
Types of Barriers
1. Natural Barriers – it includes bodies of waters, mountains, marshes, ravines, deserts or
other terrain that are difficult to traverse.
2. Structural Barriers – these are features constructed by man regardless of their original
intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences,
safe, cabinets or containers etc.
3. Human Barriers - Persons being used in providing a guarding system or by the nature of
their employment and location, fulfill security functions. Examples are guards, office
personnel, shop workers, etc.
4. Animal Barriers – animals are used in partially providing a guarding system. Dogs are
usually trained and utilized to serve as guard dogs. German shepherds are best suited for
security functions. Goose and turkeys could also be included.
5. Energy Barriers – it is the employment of mechanical, electrical, electronic energy
imposes a deterrent to entry by the potential intruder or to provide warning to guard
personnel. These are protective lighting, alarm system and any electronic devices used as
barriers.
Three Line of Physical Defense
1. First line of defense – perimeter fences/barriers.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 13
2. Second line of defense – doors, floors, windows, walls roofs and grills and other entries
to the buildings.

3. Third line of defense – storage system like steel cabinets, safes, vaults and interior files.

PERIMETER BARRIER
A medium or structure which defines the physical limits of an installation or area to restrict or
impede access thereto. It is any physical barrier used to supplement the protection of an inside or
outside perimeter.
The main purpose of perimeter barrier is to deny or impede access or exit o unauthorized
person. Basically, it is the first line of defense of an installation. This is maybe in the form of fences,
building walls or even bodies of water. The function and location of the facility usually determine the
perimeter of the installation.
Types of Perimeter Barrier
1. Fences
2. Walls
3. Bodies of Water
Types of Fences
1. Solid Fence – Constructed in such away that visual access through the fence is denied. Its
advantage is that it denies the opportunity for the intruder to become familiar with the
personnel, activities and the time scheduled of the movements of the guards in the
College of Criminal Justice Education
Introduction to Industrial Security Concepts
Page | 14
installation. On the other hand, it prevents the guards from observing the area around the
installation and it created shadow that may be used by the intruder for cover and
concealment.

Advantage of Solid Fence:


a. Denies visual access of the installation to the intruders
b. Denies the intruder the opportunity to become familiar with the personnel, activities, and
time scheduled of the movement of the guards on the installation.
Disadvantage of solid fence:
a. It prevents the installation guards from observing the area around the installation.
b. A solid fence creates shadows which may be used by the intruder for cover and
concealment.

2. Full-View fence – It is constructed in such away that visual access is permitted through
the fence. Its advantages are that it allows the roving patrols and stationary guard to keep
the surrounding area of the installation under observation. On the other hand, it allows the
intruder to become familiar with the movements and time schedule of the guard patrols
thereby allowing him to pick the time that is advantageous on his part.

Advantage of Full-view fence:


a. Roving patrols and stationary guards are able to keep the area surrounding the installation
under observation.
b. It does not create shadows which would provide cover and concealment for the intruder.
Disadvantage of full-view fence:
a. It’s allowing visual access to the installation, its personnel, its guards; and its activities.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 15
b. It allows the intruder to become familiar with the movements and the time schedule of the
guards patrol; there after allowing him to pick the time for attempting penetration which would
be most advantageous to him.
Types of Full-view fence
A. Chain link fence
1. It must be constructed of 7 feet material excluding top guard.
2. It must be of 9 gauges or heavier.
3. The mesh openings are not to be larger than 2 inches per side.
4. It should be twisted and barbed salvage at top and bottom.
5. It must be securely fastened to rigid metal or reinforced concrete.
6. It must reach within 2 inches of hard ground or paying.
7. On soft ground, it must reach below surface deep enough to compensate for shifting soil
or sand.

B. Barbed wire fence


1. Standard barbed wire is twisted, double-strand, 12-gauge wire with 4 point barbs spaces
on equal distance apart.
2. Barbed wire fencing should not be less than 7 feet high excluding top guard.
3. Barbed wire fencing must be firmly affixed to post high excluding top guard.
4. The distance between strands will not exceed 6 inches and midway between parts.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 16
C. Concertina wire fence
1. Standard concertina barbed wire is commercially manufactured wire coil of high strength
steel barbed wire clipped together at intervals to form a cylinder.
2. Opened concertina wire is 50 feet long and 3 feet in diameter.

Perimeter Barrier Opening


1. Gates and Doors – When not in use and controlled by guards, gates and doors in the
perimeter should be locked and frequently inspected by guards.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 17
Lock should be changed from time to time and should be covered under protective locks
and key control.
2. Side-walk-elevators – These provide access to areas within the perimeter barrier and
should be locked and guarded.

3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings which
penetrate the barrier and which have cross sectional areas of 96 square inches or more
should be protected by bars, grills, water filled traps or other structural means providing
equivalent protection to that portion of the perimeter barriers.

4. Clear Zones – An obstructed area or a “clear zone” should be maintained on both sides of
the perimeter barrier. A clear zone of 20 feet or more is desirable between the barriers and
exterior structures and natural covers that may provide concealment for assistance to a
person seeking unauthorized entry.

Specification on clear zones:

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 18
a. Clear zones of 20 feet or more should exist between the perimeter barriers and exterior
structures, parking areas and natural or man-made features.
b. A clear zone of 50 feet or more should exist between the perimeter barrier and structure
within the protected areas except when a building wall constitutes part of the perimeter
barrier.
Security Specification for windows or opening:
Windows or opening less than 18 feet above ground, roof, ledges, etc. or less than 14 feet
directly or diagonally, opposite uncontrolled windows in other walls, fire, escapes or other opening of
96 square inches or larger should be grilled or have steel bar protections.
Additional Protective Measures
1. Top Guard – additional overhang of barbed wire place on vertical perimeter fences upward
and outward wit a 45 degree angle with 3 to 4 strands of barbed wires spaced 6 inches apart.
This increases the protective height and prevents easy access.

2. Guard Control stations – This is normally provided at main perimeter entrances to secure
areas located out-of-doors, and manned by guards on full-time basis. Entry station should be
near a perimeter for surveillance at the entrance.

3. Tower Guard – This is a house-like structure above the perimeter barriers. The higher the
tower, the more visibility it provides. It gives a psychological unswerving effect to violators. By
and large guard towers, whether permanent or temporary, must have a corresponding support
force in the event of need. Towers as well as guard control stations should have telephones,
intercoms and if possible two-way radios connected to security headquarters or office to call for
reserves in the event of need.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 19
4. Barrier Maintenance –Fencing barriers and protective walls should always be regularly
inspected by security. Any sign or attempts to break in should be reported for investigation.
Destruction of fence or sections thereof should be repaired immediately and guard vigilance
should be increased.
5. Protection in Depth –In large open areas or ground where fencing or walling is impractical
and expensive, warning signs should be conspicuously placed. The depth itself is protection
reduction of access roads, and sufficient notices to warn intruders should be done. Use of
animals as guards and intrusion device can also be good as barriers.
6. Signs and notices – “Control signs” should be erected where necessary in the management of
unauthorized ingress to preclude accidental entry. Signs should be plainly visible and legible
from any approach an in an understood language or dialect.

Guard and Guard System:


1. Four basic function that must be accomplished by this guard system:
1. Detect intruders;
2. Sound Alarm;
3. Apprehend unauthorized personnel; and
4. Identify authorized personnel.
2. Human Barriers:
5. Guard Procurement: Selection criteria:
a. Must eligible for security clearance;
b. Vigorous and physically able to serve in the capacity of a guard;
c. Intelligence necessary to accomplished the guard function;
d. The ability to make rapid decisions and react in a calm way to emergencies:
e. Loyalty and discretion are required attributes; and
f. Experience is highly desirable although not usually mandatory.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 20
6. Guard training: Programs of training should include:
a. General orientation
b. Instruction in security procedures of the installation, first aid, and communication
c. Instruction in traffic control, riot control, self defense.
d. Weapons qualifications to include maintenance and safety.
e. Refresher course and advance training in specific subjects.
7. Guard employment: Two basic techniques of guard employment :
a. Fixed post
b. Patrols
8. Guard supervision:
a. Personal supervision: Personal inspection of all guards prior to their starting
tour of duty. Periodic checks of guards during their tour by the senior member
of each relief or his representative.

b. Artificial Supervision:
1. Recorded tour – guard takes with him on his tour of duty a form which
must have the time punched on it at each station.
2. Supervisory Tour – This is where the guard sends signals to guard
headquarters from each station that he checks.
9. Guard equipments:
a. distinctive uniform
b. credentials
c. weapons- 38 revolvers, 45 pistols
d. whistle
e. notebook
f. flashlights
g. nightsticks
h. other uniform or equipments as may be directed by the unit SOP
10. Guard communication:

a. Primary Communication – direct line telephone or in some instance radio.


b. Emergency Communication- ex. Messengers
B. Animal Barriers –This is where an animal is used to provide or partially provide a guard
system. The animals is used are limited to dogs which known as guard or sentry dogs.
D. Energy Barriers – This is where employment of a mechanical, electrical or electronics energy
to impose a deterrent to entry by the potential or to provide advertisement of his presence.
In counter intelligence security consideration there are two outstanding energy barriers:
 Protective lighting

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 21
Protective lighting, or security lighting systems, generally go by the same name. Certain types,
like emergency lighting and moveable lighting, may be used in very specific cases. However, they all
have a common goal of keeping your facility secure.
 Protective alarm
A security alarm is a system designed to detect intrusion – unauthorized entry – into a building
or other area such as a home or school. Security alarms are used in residential, commercial, industrial,
and military properties for protection against burglary (theft) or property damage, as well as personal
protection against intruders. Security alarms in residential areas show a correlation with decreased
theft. Car alarms likewise help protect vehicles and their contents. Prisons also use security systems for
control of inmates.

College of Criminal Justice Education


Introduction to Industrial Security Concepts
Page | 22
College of Criminal Justice Education
Introduction to Industrial Security Concepts
Page | 23

You might also like