Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

BASIC SECURITY CONCEPTS

Module No. 1
Total Study Hours: 6hrs
Module Writer: PROF. RIZALINO D. FLORES III
Registered Criminologist
PHD in Criminal Justice w/ Specialization in Criminology

Module and Learning Facilitator Contacts: FB Messanger: Rizalino Flores


rizalinoflores3@gmail.com

Module Learning Outcomes:

● Appreciate, Clarify and explain the fundamental needs for security


● Provide legal basis for operation of Industrial Security business
● Relate and analyze factors that brings insecure conditions
● Identify component of Comprehensive Security program

CONTENT

A. Definition of Security

Security – the state of quality of being secure, freedom from fear or danger, certainly to secure is
to make safe or be protected.

B. Type of Security Measures for an Effective Defense Against Crimes

Active-Measures – these involves the installation of physical barriers, security lighting, use of
vaults, locks and others.

Passive-Measures – those that will deter man from committing such act of fear of being caught,
change in court or dismissed such as: security education, programs, investigations, fire prevention
seminars, personnel security checks etc.

C. Legal Bases of Industrial Security in the Philippines

1. Natural Authority - The highest law is the law of self-preservation. By instinct, man naturally
reacts to protect himself, his family, his honor, freedom, liberty and property from danger,
threat or hazard. He does it personally and/or thru the help of others.

2. Constitutional Authority

a. The prime duty of the Government is to serve and protect people. (Art II, Sec 4 of the
1987 Constitution).

1 | Page
b. No person shall be deprived of life, liberty or property without due process of law,
nor shall any person be denied the equal protection of the laws. (Art III Sec 1 of 1987
Constitution). This means the life, liberty; freedom and property can only be taken
from a person after the observance of due process of law.

c. The right of the people to be secure in their persons, houses, papers, and effects
against unreasonable searches and seizures of whatever nature and for any purpose
shall be inviolable. (Art III Sec 2 of 1987 Constitution)

3. Statutory Authority

a. The RPC (Act No. 3815, as amended) Applicable provisions of the Code on Crimes
Against Persons, Personal Liberty and Security and Property have bearing on the
security and protection of one’s life, liberty and property.

b. Republic Act No. 11917, (July 30, 2022) - An Act Strengthening the Regulation of the
Private Security Services Industry, Repealing for the Purpose, Republic Act No. 5487,
Entitled “Ac Act To Regulate The Organization and Operation of Private Detective
Watchmen or Security Guard Agencies”, As Amended

D. Industrial Security – is physical security as applied to business groups engaged in industries like
manufacturing, assembling, research and development, processing, warehousing, and even
agriculture. It is a form of physical security involving industrial plants and business enterprises
where the personnel, processes, properties and operations are safeguard. Use of protecting
barriers, and security lighting, personnel movement control, looks and key management, guard
forces, communication and electronic hardware are essential, aside from fire prevention and
control programs, emergency plans, industrial safety and security education programs.

Industrial Security Application

1. Bank Security – a specialized type of physical security protecting the assets,


personnel, and operation of a bank, with special emphasis on the precaution and
measures to safeguard the cash and assets while in a storage, in transit, and during
transactions.
2. Air Cargo Security – to minimize, if not prevent, losses of cargo during in transit,
storage, or transfer.
3. Supermarket Security
4. Crises Security – a part of VIP security involve in hostage - taking and kidnapping of
VIP

E. Factors that Bring About Insecure Condition

1. Threat – positive inimical acts


2. Hazards – passive inimical conditions

2 | Page
3. Security Hazards

Security Hazards – an act or condition which results in a situation conducive to a breach


of the protection system and the subsequent loss or compromise secrets, or damage to personnel,
property or facilities.

Kinds of Security Hazards

Man-Made Hazards – an act or conditions affecting the safe operation of the facility,
caused by human action, accidental, or intentional. It includes sabotage, espionage, pilferage, and
theft, disloyalty, disaffection, and subversive activity.

Natural Hazards – those caused by natural phenomena which cause damage, disturbance
and problems of the normal functioning of human activities, including security. It includes flood,
lighting storms, volcanic eruptions, high velocity winds, tidal waves, etc.

4. Vulnerability – measure of how open is establishment to intrusion, attack or injury.


5. Risk – probability of an event to happen that will lead to losses.

a. The Extent and Degree of risk to Security will be Dependent


i. Relative Criticality of operations – is the importance of the firm with
reference to the national economy and security.
ii. Relative Vulnerability – the susceptibility of the plant or establishment
to damage, loss or disruption of operation due to various hazards.

F. Comprehensive Security Program

▪ Policies and Procedures – statements of security goals and the required means
of achieving them.
▪ Personnel – people to monitor, administer and implement the system.
▪ Barriers – access control, devices or structures.
▪ Equipment – detection, alarm, communication and control systems.
▪ Records – past incident reports, access records and transaction logs

ASPECTS OF SECURITY

Module No. 2

3 | Page
Total Study Hours: 6hrs
Module Writer: PROF. RIZALINO D. FLORES III
Registered Criminologist
PHD in Criminal Justice w/ Specialization in Criminology

Module and Learning Facilitator Contacts: FB Messanger: Rizalino Flores


rizalinoflores3@gmail.com

Module Learning Outcomes:

● Explain the principle behind the use of barrier for security application
● Outline security line of defenses and recognize applicable access control system according to
industrial operation
● Identify security standards for installation of locks, lighting, alarms and fire protection system

CONTENT

A. Aspects of Security

a. Physical Security
b. Personnel Security
c. Information Security

B. Type of Security Measures for an Effective Defense Against Crimes

Physical Security is a barrier or system placed between the potential intruder and the
matter to be protected. (Concentric Protection – lesser the intruder’s chance of success)

C. Two General Types of Physical Barriers

a. Natural Barrier – include mountains, cliffs, cannons, rivers, seas, marshes, dessert or
terrain difficult to traverse.
b. Man-Made Barriers – structural constructions like fences, walls, floors, roofs, grills, bars,
road blocks, or other physical means to deter or impede penetration

Note: There is no impenetrable barrier!

D. Physical Security Concepts/Concepts of Barriers

1. Define- Determine what is to be protected


2. Direct- Lead customers to the designated areas/ lead intruders away from the area

4 | Page
3. Deter- Visual evidence of a comprehensive security program will encourage
4. Delay – Thus facilitating apprehension of intruders
5. Assist - in the economical employment of guards

E. Security Line of Defense

1. Perimeter Barrier (1st line of defense) – a medium or structure which defines the
physical limits of an installations or area to restrict or impede access thereto. It is any
physical barrier used to supplement the protection of an inside or outside perimeter:

a. Types of Perimeter Barrier

i. Chain – Link Fences

▪ It must be constructed of 7-foot material excluding top


guard.
▪ It must be 9 gauge or heavier.
▪ Mesh openings are not to be larger than 2 inches per
side.
▪ It should be twisted and barded salvage at top and
bottom
▪ It should be securely fastened to rigid metal or reinforced
concrete.
▪ It must reach within 2 inches of hard ground or paving.
▪ It must reach below surface deep enough on soft
grounds to compensate for shifting sail or sand.

ii. Barbed Wire Fence

▪ Standard barbed wire is twisted, double standard, 12-


gauge wire, with 4-point barbs spaced on equal distance
apart.
▪ Barbed wire or fencing must be firmly affixed to post high
excluding top guards.
▪ Barbed wire fencing should not be less than 7 feet high
excluding top guard
▪ The distance between the strands will not exceed 6
inches and midway between parts.

iii. Building Wall – Masonry wall should have the same as the chain
linked and surrounded by the barbed wire top guard; if the height is
less than the prescribe additional chain linked as “toppings” is placed
to attain the minimum height requirement.

iv. Bodies of Water – a necessary additional security measures.

b. Perimeter Barrier Openings

5 | Page
i. Gates and doors
ii. Sidewalk elevator
iii. Utilities opening

c. Additional Protective Measures

i. Top Guard – an addition overhang or barbed wire place on vertical


perimeter fences facing upward and outward with a 45-degree angle
with three to four strands of barbed wires space six inches apart. This
will increase the protective height and prevent easy access.
ii. Entry Stations – provided at main perimeter entrances to secure
areas located out of doors, and manned by guards on a full-time basis
iii. Towers – a house-like structure above the perimeter barriers. It gives
the psychological effects to violators.
iv. Protection in Depth – in large open areas or ground where fencing or
walling is impractical and expensive, warning signs should be
conspicuously placed. The depth is protection, reduction of access
roads and sufficient notice to warn intruders should be done. Use of
animal guards and intrusion devices can also be done.
v. Clear Zones – unobstructed area maintain on both sides of the
perimeter barrier. A clear zone of 20 feet or more is desirable
between the barrier and extension structures and natural covers
which may provide concealment or assistance to a person seeking
unauthorized entry.

1. Specification on Clear Zones

▪ A clear zone of 20 feet or more should exist between the perimeter


barriers and exterior structures, parking areas and natural or man-
made features.
▪ A clear zone of 50 feet or more should exist between the perimeter
barriers and exterior structures within the protected areas expect
areas when a building wall constitutes parts of the perimeter barrier.

d. Signs and Notices – control signs should be erected where necessary in the
management of unauthorized ingress and preclude accidental entry. It
includes I.D., prohibitions and exclusive area signs.

2. Building Exteriors (2nd Line of Defense)

a. Walls
b. Doors
c. Windows- Windows below 18 feet must be grilled

6 | Page
d. Roof Openings
e. Fire Escapes

3. Interior Controls (3rd Line of defense)

a. ID System
b. Entry/Exit of Employees, Visitor, Suppliers, Customers and their vehicles
c. Restricted Areas
d. Communications System
e. Key Control
f. Emergency Plans
g. Guards

F. Security Lighting - provides sufficient illumination to areas during hours of darkness.

1. Purpose of security Lighting

a. It improves visibility so that intruders can be seen, identified or


apprehend
b. It gives psychological fear, which serves as a deterrent to thieves,
pilferers, trespassers, and sabotage.
c. It makes easier. The routine work of guards in identifying employees,
vehicles etc. during night time.
d. If placed in certain areas, may even reduce the number of stationary
guards, and instead, may require only roving patrols at night.

2. Areas to be Lighted

a. Sensitive areas
b. Parking lot
c. Entrances
d. Bothe sides of the perimeter barrier

3. Security Lightning Techniques

a. Security lightning should be enable the guard to observe clearly the activities
around and inside the premises within his jurisdiction

7 | Page
b. In planning, high contrast between intruder and background should be
provided. When contrast is poor, increase intensity will improve guard’s
ability to see
c. Lighting boundaries and approaches, as well as the areas and structures, is
useful to discourage unauthorized entries and reveal identity of persons.
Good lightning should reveal well boundering areas, glaring to intruders and
adequate for the guard to observe his position.
d. Effective lightning should deter or discourage attempts to enter the premises
and detection was likely if entry is attempted.
e. If lightning at night cannot be provided due to impracticability, other means
of protection have to be made like additional guard post, roving and animal
guards.

4. Types of Security Lightning

a. Stationary Luminary- most common type consisting of series of fixed


luminous flood a given area continuously with overlap. It is
commonly used on entry gates of employees and vehicles.

i. Glare projection type- the intensity is focused to the intruder


while the guard remains in the comparative darkness. The
lightning is toward the approach of an entrance to an
installation.
ii. Controlled lightning- the width of a lighted atop can be
controlled and adjusted to suit the security needs. The
lightning is focused on a pile of items, rather than on a
background.

b. Stand-by-Lightning- similar to continuous lightning but it turned on


manually or by special devise or other automatic means, when there
is a suspicion of entry.

c. Movable Lightning- consist of stationary or portable, manually


operated search lights which may be lighted continuously during
hours of darkness or only as needed, and usually supplementary to
either of the stationary luminary and stand by lightning.

d. Emergency Lightning- a stand-by lightning which can be utilized in


the vent of electrical failure, either due to local equipment or
commercial power failure.

5. Response to Security Lighting Problems

8 | Page
a. Vandalism
i. Reduce effectiveness and tampering
ii. Wires should be mounted very high or protected with wire
mesh (8m/24ft)
iii. Provided with standby power supply
iv. Circuiting should be protected from the source to the lamp
b. Design
i. Shadows should be avoided
ii. Accessible for immediate maintenance
iii. Source are lock
iv. Design in a manner that not all will be put off at the same
time

G. Protective Alarms

Alarm is an aural or visual signal given by the annunciator to security when intruder
actuates device in protected at area. An annunciator is a visual or audible signaling device, which
initiates conditions of associated circuits.

Basically, alarm systems are designed to alert security personnel to consummated or


attempted intrusion into an area, building, or compound. Each type of alarm is activated in the
event that an intruder tampers with the circuitry, a beam, or radiated waves: intrusion alarm can
be electrical, mechanical, or electronic. Alarms are also fire, smoke, or other emergencies and
presence of other hazards.

1. Basic Part of Alarm System

a. Sensor and triggering device


b. Circuit which carries messages to the signaling device
c. Annunciator (signaling device or system)

2. Function of Alarm System

a. Detection of fire
b. Detection of intrusion
c. Emergency notifications

9 | Page
d. Monitoring of equipment/facility condition

3. Alarm notifications

a. Sound (bell)
b. Lighting (fixed, flashing, rotating)
c. Public address system
d. Automatic telephone dialer

4. Types of Protective Alarm

a. Central Station System- Several separate compounds tie their alarm


system to central station so that in case of need, the central station
calls for assistance to the police, fire department, hospitals or with
other government assisting units.
b. Propriety System- Similar to the central station type except that the
propriety console is located inside the subscriber’s installation that
owns or bases the system.
c. Auxiliary System- An installation-owned system which is direct
extension of the local enforcement agency and/or fire department by
special arrangements.
d. Local Alarm System- Consists of rigging up a visual or audible alarm
near the object to be protected. In case of alarm, response will be
made by the local guards and other personnel within sight or hearing.

5. Desirable Characteristics of Intrusion Alarm System

a. The primary considerations on choice of a particular alarm system


include stability, durability, and reliability. Furthermore alarm system
should be:

i. A detection unit should initiate the alarm upon intrusion of a


human being in the area or vicinity of the protected objects.
ii. Transmissions can be by physicals wires or by radios.
iii. An annunciator control console indicating the audible and/or
aural signal and the specific location of incident so that
proper actions can be made by security and other units.
iv. Fail-safe features give alarms in the annunciator when
something is wrong with system,
v. System should be difficult to tamper or reader ineffective by
outsiders, competitors or saboteurs.

10 | Page
b. Operation of Intrusion Alarm System

i. Breaking an electrical circuit ( Metallic foil or wire )- In a


building or compound, all possible points of entry can be
wired by using electrically charged strips of tinfoil wire. Any
actions that will move the foil or wire breaks the circuit and
activate the alarm.

ii. Interruption of a light beam (photoelectric or electric eye)-


This system uses a photoelectric-cell or the “Electric Eye”
which operates on the principal of light of rays. In this system
an invisible light beam is transmitted to a special receiver. An
infra-red filter over the light source makes the beam invisible
to intruders.

iii. Detection of sound and vibration (audio detection device) -


this can be utilized effectively to safeguard enclosed area
such as vaults, safes, storage bins, file rooms, warehouses
and similar enclosures. Supersensitive tiny microphones are
embedded in the walls, ceilings and floors of the enclosure
to be protected by sound vibrations. These microphones
distributed evenly can detect sound or vibrations of sound
caused by attempts to force entry into the protected area.

iv. Space and motion detection (vibration detection device) –


This system derived their operating principle usually from a
physical phenomenon known as “Doppler Effect”. Constant
sound waves in cubicle disturbed by an object will cause
change of frequent and wave motion thereby causing an
alarm to trigger.

v. Electronic/Electromagnetic fence (microwave motion


detection) – An electronic fence consisting of 3 to 5 strands
of wire spaced from 9 to 24 inches above one another which
serves as antenna, a monitor panel, and an electric circuitry.
When power is put on, an electro-magnetic field is set among
the wires from the top to the ground. An intruder about 2
feet from this field will trigger an alarm. This system is
suggested to be located inside the chain-link fencing to
minimize nuisance alarms caused by animals, debris blown
by the wind etc.

6. Most common cause of false alarm

a. User’s negligence
b. Poor installation services
c. Faulty equipment

11 | Page
H. Monitoring System (CCTV)

a. Monitoring System

i. Television camera

1. Features:
a. Pan
b. Tilt
c. Zoom

ii. Monitor/Recorder
iii. Connecting circuit
iv. Power Source

b. Purpose

i. Detection
ii. Deterrence
iii. Document

c. Operation

i. Local
ii. Remote
iii. Combine with other system such as video analytic, motion detector, facial
recognition and memory videos

I. Visitor, Property Movement, and Vehicle Control

A visitor is any person not regularly employed in a plant or concern. Strict precautions are
taken with visitor against pilferage, sabotage and other crimes. Plant visitors may and they can be
suppliers, promoters, collectors, customers, government inspectors, contractors, job-seekers,
group visitors, guided tours etc.

a. A pass or badge is issued by security personnel to be admitted in the installation. This


system precludes those visitors with escorts and personnel in the access list. The pass
system is for general use and not for the restricted areas like exclusive, limited and
controlled areas. The following are recommended:

a. Types

1. Single Pass or Badge System - Pass is issued for permission to enter differing
in specific areas by letters, numerals, or colors e.g. green background of

12 | Page
current passes in the general area, or white pass with overprinted blue
symbols for a certain specific area.
2. Pass of Badge Exchange System- Multiple copies of passes are issued to an
individual with the same photograph. The individual exchange his badge for
another color or marking at the gate. Once inside, if he needs to enter a
restricted area, he exchanges it for one another color acceptable in that area.

b. Pass/Badge requirement

i. Tamper resistant
ii. Clear and recent photo of the bearer
iii. Photo of at least 1 inch square
iv. Vital statistics
v. Laminated
vi. Sturdy
vii. Color coded
viii. Signature

b. Traffic Control

a. Identification of employees and visitors


b. Directing movements of employees and visitors (limited to unrestricted areas)
c. Package control both for entering and leaving, policies should be widely
publicized
d. Control of trucks and private cars. Parking should be separated from all other
areas in the facility. Drivers/occupants should not be allowed to stay in the
vehicle.

J. Protective Locks and Key Control

A lock is defined as mechanical, electrical, Hydraulic, or electronic device designed to


prevent entry to building, room, container, or hiding place.

a. General Groups of Locks

1. Warded Lock –The underlying principle is the incorporation of wards


or obstructions inside the lock to prohibit a key from operating the
bolt unless the key has corresponding notches cut in it that it will pass
the words.
2. Lever Tumbler Lock – Each lever hinges on a fixed point and is held
against a stop by the pressure of flat spring.
3. Disc Tumbler Lock – Also known as the wofer tumbler type, has flat
metal tumblers with open center fitted into a lock case.
4. Pin Tumbler Lock – The pin tumbler mechanism depends for its
security, on a number of round pin or tumblers operating on cylinder.

13 | Page
b. Other Locks:

i. Padlock – A portable and detachable lock having a pivoted or sliding hasp which
possess through a staple ring, or the like and is made fast or secured.
ii. Combination Locks – A lock that requires manipulation of parts according to a
predetermined combination code of numbers or letters.
iii. Coded Lock - A type of lock that can be opened by inserting a coded card in a
slot in the lock, or by pushing the correct buttons on the surface of the lock.
iv. Electronic Lock – Type of lock that can be closed and opened remotely by
electronic means.

c. Key Control

i. Key Control is being defined as the management of keys in a plant or business


organization to prevent unauthorized individual access to the keys.
ii. Master Key – A special key capable of opening a series of locks. This key is capable
of opening less number of locks than the grand master
iii. Maison Keying – The issue of key to open the main entrance and the office
iv. Master Keying System – A system used in a big installation whereby keys can
open a group or groups of locks.

1. Levels of control in the Master Keying Plan

a. One Level (Change Key) – All locks operated by change key only
and keyed different or alike or required. Each key operates its
own lock only, e.g. house, stores, cars, warehouses.
b. Two levels (Master Key) – All levels operated by change keys and
master key. Mater key operates all locks generally of one
building, e.g. small school apartment.
c. Three Levels (Grand Master Key) – All locks operated by change
key, master keys, and grand master keys. Grand master operates
all locks generally used in large buildings or a facility with several
buildings e.g. office buildings and hospitals.
d. Four Levels (Great Grand Master Key) – All locks operated by
change key, Grand master key and great grand master keys. Used
in great or large complex system and similar to three levels.

v. Pointers for Effective Locks and Key Control

1. Record all keys issued and names of holders be meticulously made regardless of the
size of the establishment.

14 | Page
2. Storage key is important. Duplicate or spare keys should be stored in a securely
locked cabinet in a secure area.
3. Master keys should be issued on an absolute minimum number and be kept by an
individual responsible for locks and keys.
4. Regular checks should be made in employees with keys issued.
5. Issuance of keys and locks should be carefully controlled, and issuance should be on
a real-need basis.
6. Periodic rekeying should be considered as essential security safeguard just as
combination of safes are changed from time to time.
7. A key depository should be provided in a big plant. Supervisors taking keys should
be registered in a registry book.

15 | Page

You might also like