Professional Documents
Culture Documents
Preliminary Notes 2021-2022
Preliminary Notes 2021-2022
Preliminary Notes 2021-2022
INTRODUCTION
HISTORICAL BACKGROUND
Man in the course of history has always showed that he values property next to his life and
loved ones. Centuries before the modern concept of security and crime prevention came into practice,
cave dwellers fought among themselves and to protect life and property. Eventually, families and clans
banded together as tribes and later on formed communities for mutual protection, recognizing that
there is strength in numbers.
The Great Wall of China, stretching a length of 2, 414 kilometers and a height varying from 20
ft. as its lowest high to 50 feet high, serves as a living barrier for man to protect himself. Watch towers
are placed in strategic areas at regular intervals and troops are summoned by beacons of fire passing
through the top of the wall. Ancient Greece, before the birth of Christ, put up primitive but effective
alarm system consisting of placing a goose at strategic location so that when an approaching column of
men or army is spotted, the fowl, gifted with keen vision and hearing, starts squawking, signaling an
attack, announcing the presence of predators or enemies.
As early as 27BC-14AD, during the time of Emperor Augustus of the Roman Empire, the
Praetorian Guards was organized to protect the life of the emperor, at the same time, keep peace and
order in the streets of Rome. The bible likewise shows passages about witnesses, investigations and
terrorism. For instance, Leviticus 5:1 states that, “If a person bears a solemn adjuration to give
evidence as a witness to something that he has not seen or heard and does not disclose what he
knows, he commits a sin.” Exodus XXI: 16 reads: “He that stealth a man and selleth him or be found in
his hand, he shall surely be put to death.”, describes kidnapping as an act of terrorism. The code of
Hammurabi in 1750, contains statements regarding prohibited activities and their corresponding
punishments.
The Middle Ages (dark ages), after the fall of the Greek and Roman Empires, feudalism grew
and consequently, the overloads supplied food to their subjects, who in turn farmed and provided
protection and security to the castles. In 1100 AD, security forces were already required to be
registered and licensed. In the Philippines, when the Spaniards came in 1521, earliest known records of
historians, found villages already organized as barangays, with native guards posted on top of coconut
trees or on top of structures made of bamboo serving as watch towers, usually situated on sea shores
with warning devices such as gongs or bamboo kong-kong to announce approaching foes or friends.
The seeds for the development of modern security were planted during the social revolution of
the 16th century, wherein increased urbanization of the population has created a rise in poverty and
crime. No public law enforcement agencies existed that could restrain or alleviate mounting waves of
crime, violence and disorder. In 1748, different security outfits were privately formed. Individual
merchants hired men to guard their shops, warehouses and properties. Agents were also engaged to
recover stolen property. Henry Feilding, magistrate and author, was credited for conceiving the idea of
CYBER CRIME
The fame in the Filipino was exemplified not too long ago. When an illegal act was committed
by an unknown cyber freak, a student with a failed thesis. This “hacker” unleashed the deadly “Love
Vims” which wrought havoc and destruction on computers worldwide, costing billions of dollars in lost
man-hours and repairs. The speed and virulence of the virus was unprecedented, spreading in just a
few hours and penetrating even the impervious Pentagon. This hastened the passage of R.S. No. 8792
known as the Electronic Commerce Act of 2002. Ushering new policies, rules and statutes in Philippine
jurisprudence, keeping the Philippines, a third world country, at par with developed countries for the
needed legislation to control and prevent crimes of the third wave. Software piracies, hacking of bank
accounts, theft of access codes, industrial espionage, to name a few, are examples of cybercrimes.
SOFTWARE PIRACY
High-tech, Global Information Infrastructure Development, with the collateral advance of
electronic and digital technology shifted the development of cyberspace security into high gear. The
noble practice of e-commerce will usher a new phase in asset protection. The numerous application of
a simple hand –held cellphone with the use of portable wireless devices (WAP, wireless application
protocol), anyone can link –up with tens of thousands of cyberspace explorers without the need for PCs
and or telephone lines, or the newer 3G cellphones with microchips that could accommodate 1,500
TERRORISM
For centuries, political violence has existed in one form or another. At the beginning of 20 th
century, notably 1920’s and 1930’s, early terrorism’s wave emerged, eclipsed only by the world wars
and continued up to the present. Modern theories of guerilla warfare, developed, during the world
wars, represented the techniques used in terrorism. International terrorism though began its roots in
the Arab world, born out of the frustrations of Palestinian guerillas after their defeat by the Israeli s
armies in 1967. Likewise, the failure of Latin American guerillas to Cuba. The recent events, however,
that has struck the world with awesome magnitude and ferocity that wrought havoc to crime
prevention efforts and caused destruction and extinguished hundreds of human lives, are those that
were perpetrated by the Arabs, notably by terrorist billionaire Osama Bin Laden and his minions.
PART 1
SECURITY OPERATION
LEGAL BASIS OF INDUSTRIAL SECURITY
1. NATURAL AUTHORITY
A. The highest law is the law of preservation
By instinct, man naturally react to protect himself, his honor, freedom, liberty and
property from danger, threat of hazard, He does it personally and/or thru the help of others.
Even before the coming of early Chinese traders were already organized into tribes.
Each tribe has his own chieftain but also of the members. The inherent mechanism of self
preservation became the unwritten law of the early Filipinos to protect themselves and their
property against the natural and man made hazards.
2. CONSTITUTIONAL AUTHORITY
A. The prime duty of the government is to serve and protect people. The Government may call
upon the people to defend the state and in the fulfillment thereof; all citizens may be required,
under conditions provided by law, or to render personal military civil service. (Art.II Sec.4 of the
1987 Philippine Constitution).
Although the defense of the state is the one contemplated here people being one of the
elements of the state is directly affected in whatever protection the state will receive
from the government and the people, take note also that all citizens who are qualified,
including the security guards, may be required by law to render personal military of civil
service. The service required or the citizens personal.
B. No person shall be deprive of live, liberty or property without due process of
law, nor shall any person be denied the equal protection or the laws. (Art.III
Sec. 1 of the 1987 Philippine Constitution).
This means the life, liberty; freedom and property can only be taken from a person after
the observance of due process of law. Due process of law are of two aspects: substantive and
procedural. Daniel Webster in brief defines procedural due process as “one which hears before it
condemns, which proceeds upon inquiry, and render judgments only after trial”. But if the taking of
life, liberty, freedom or property does not fall within the framework of due process of law, available
remedies under the law should be resorted to..
C. Private property shall not be taken for public use without just compensation. (Art.III Sec.9 of
the 1987 Philippine Constitution).
3. STATUTORY AUTHORITY:
A. The Revised Penal Code. (Act No.3815, as amended.)
The applicable provision of the Code on Crime Against Person, Personal
Liberty and security and property have bearing on the security and protection of one’s life,
liberty and property.
B. Private Security Agency Law (RA 5487 as amended)
This law governs the operation, administration of security agency, and
activities, qualifications, duties and licensing of security guards, watchman and private
detectives. In short, it is the intention of this law to professionalize the security service in order
to upgrade the level of security protection.
Basically, it was the action of man against man that led to many unsecured and unsafe
conditions. Reason could be economic, revenge, or just plain greed and avarice. Whatever the motives,
the civilized man needs adequate protection.
Since security in general is very hard to comprehend, it can be divided into three major areas:
1. Physical Security – this is the broadest branch of security which concerned with the physical
measures adopted to prevent unauthorized access to equipment, facilities, material and
document and to safeguard them against espionage, sabotage, damage, loss and theft.
2. Personnel Security – this is as important as physical security. Personnel security state even
before the hiring of an employee and remains to be maintained for as long as the person is
employed.
Its purpose is to insure that a firm hires those best suited to assist the firm in achieving its goals
and objectives and once hired assist in providing necessary security to the work force while carrying
out their functions.
3. Document and Information Security – this involves the protection of documents and
classified paper from loss, access by unauthorized persons, damage, theft and compromise
through disclosure.
Classified documents need special handling. Lack of indoctrination and orientation among the
personal handling them can result in the leakage, loss, theft and unauthorized disclosure of the
documents.
Types of Security
1. Industrial Security – a type of security applied to business groups engaged in industries like
manufacturing, assembling, research and development, processing, warehousing and even agriculture.
2. Hotel Security – a type of security applied to hotels where its properties are protected from
pilferage, loss, damage and the function in the hotel restaurants are not disturbed and troubled by
outsiders or the guest themselves. This type of security employs house detectives, uniforms guard and
supervisor and insures that hotel guests and their personal effects safeguarded.
3. Bank Security – this type of security is concern with bank operations. Its main objective is the
protection of bank cash and assets, its personnel and clientele. Security personnel are trained to
safeguard bank and assets while in storage, in transit and during transactions.
PART II
PHYSICAL SECURITY
Physical security measures are being used to defined, protect, and monitor property rights and
assets. These measures consist of barriers and devices that would detect, impede, and prevent
unauthorized access to equipment, facilities, material and document and to safeguard them against
espionage, sabotage, damage and theft.
Definition of Terms:
a. Physical Security – is a system of barrier placed between the potential intruder and
the material to be protected.
b. Natural Barriers or Features – Such as rivers, cliffs, and ravines, etc. which delay or
make more difficult the entry of the intruder.
c. Structural Barriers – These barriers are features constructed by man, regardless of
their original intent, which tend to delay the intruder. Examples are walls, ceilings,
doors, window, locks, fences, safe cabinets or containers.
d. Human Barriers – guards, charges of quarters, office and shop workers, etc. who
stand between the intruder and the matter to be protected.
e. Animal Barriers – Usually German Shepherd, dog trained for and used as guards.
f. Energy Barrier – Usually electrical or electronics devices used to provide assistance to
the guard personnel. Examples are protected lighting and anti-intrusion devices.
Concept:
a) Enemy Agents must have access – In most cases espionage, acquisition of information
is the ultimate result, and means and form in which information is obtained is merely and
operational detail. Normally, information on tapes and film is as usable as the original
documents. Therefore in considering access, one should think not only of current physical
access, but also access to the discussion of the matter by the use of clandestine listening
device.
b) There is no impenetrable barrier –Unfriendly government or organization is willing to
devote enough time, money, personnel, materials and imagination to passing a barrier, it
can do so. So we attempt to build defense in depth by using then one barrier.
3. Third line of defense – storage system like steel cabinets, safes, vaults and interior files.
PERIMETER BARRIER
A medium or structure which defines the physical limits of an installation or area to restrict or
impede access thereto. It is any physical barrier used to supplement the protection of an inside or
outside perimeter.
The main purpose of perimeter barrier is to deny or impede access or exit o unauthorized
person. Basically, it is the first line of defense of an installation. This is maybe in the form of fences,
building walls or even bodies of water. The function and location of the facility usually determine the
perimeter of the installation.
Types of Perimeter Barrier
1. Fences
2. Walls
3. Bodies of Water
Types of Fences
1. Solid Fence – Constructed in such away that visual access through the fence is denied. Its
advantage is that it denies the opportunity for the intruder to become familiar with the
personnel, activities and the time scheduled of the movements of the guards in the
College of Criminal Justice Education
Introduction to Industrial Security Concepts
Page | 14
installation. On the other hand, it prevents the guards from observing the area around the
installation and it created shadow that may be used by the intruder for cover and
concealment.
2. Full-View fence – It is constructed in such away that visual access is permitted through
the fence. Its advantages are that it allows the roving patrols and stationary guard to keep
the surrounding area of the installation under observation. On the other hand, it allows the
intruder to become familiar with the movements and time schedule of the guard patrols
thereby allowing him to pick the time that is advantageous on his part.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings which
penetrate the barrier and which have cross sectional areas of 96 square inches or more
should be protected by bars, grills, water filled traps or other structural means providing
equivalent protection to that portion of the perimeter barriers.
4. Clear Zones – An obstructed area or a “clear zone” should be maintained on both sides of
the perimeter barrier. A clear zone of 20 feet or more is desirable between the barriers and
exterior structures and natural covers that may provide concealment for assistance to a
person seeking unauthorized entry.
2. Guard Control stations – This is normally provided at main perimeter entrances to secure
areas located out-of-doors, and manned by guards on full-time basis. Entry station should be
near a perimeter for surveillance at the entrance.
3. Tower Guard – This is a house-like structure above the perimeter barriers. The higher the
tower, the more visibility it provides. It gives a psychological unswerving effect to violators. By
and large guard towers, whether permanent or temporary, must have a corresponding support
force in the event of need. Towers as well as guard control stations should have telephones,
intercoms and if possible two-way radios connected to security headquarters or office to call for
reserves in the event of need.
b. Artificial Supervision:
1. Recorded tour – guard takes with him on his tour of duty a form which
must have the time punched on it at each station.
2. Supervisory Tour – This is where the guard sends signals to guard
headquarters from each station that he checks.
9. Guard equipments:
a. distinctive uniform
b. credentials
c. weapons- 38 revolvers, 45 pistols
d. whistle
e. notebook
f. flashlights
g. nightsticks
h. other uniform or equipments as may be directed by the unit SOP
10. Guard communication: