Professional Documents
Culture Documents
Module - Lea 3
Module - Lea 3
Module - Lea 3
CHRISTIAN
UNIVERSITY
COLLEGE OF CRIMINAL JUSTICE EDUCATION
Roxas Avenue, Roxas City, Capiz, Philippines, 5800
Tel no. (036) 6212 – 318
http://www.filamer.edu.ph
a. Program Outcomes:
✓ Demonstrate Competencies and Broad Understanding in law Enforcement Administration,
Public safety and Criminal Justice.
✓ Utilize Criminalities or Forensic Science in Investigation and Detection of Crime. ✓ Apply
the Principles and Jurisprudence of Criminal Law, Evidence and Criminal Procedure.
b. Performance Indicators:
✓ Discuss the concept and principles of industrial security in relation to Law Enforcement
Administration, Public Safety and Criminal Justice.
✓ Interpret the important role of security profession in law enforcement administration and
public safety.
✓ State the importance of security personnel in crime detection and criminal investigation. ✓
Explain the concept of criminalities in the field of industrial security investigation and crime
detection.
✓ Determine the principles and jurisprudence of criminal law, evidence, and criminal procedure
in relation to the legal context of industrial security and related laws.
✓ Recognize the different types of evidence applicable to Jurisprudence of Criminal Law,
Evidence and Criminal Procedure in relation to industrial security.
A. Course Guide
As your learning facilitator, we recognized that the process of learning in this time and even before does not
solely lies in the hands of your teachers. We need active and meaningful partnership, a partnership that is
guided by the main goal of this module, to bring out the best in you and enable you to become independent
but effective learners. Truly, your academic success lies in your own hands!
This module was designed to provide you with fun and meaningful opportunities for guided and independent
learning at your own pace and time. You will be enabled to process the contents of the learning resource
while being an active learner.
At the end of this module you will also find the references.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult your course
facilitator at given contact information below. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain deep understanding of
the relevant competencies. You can do it!
CHAPTER 1
THE CONCEPT OF
SECURITY
Security is important to everyone. It is important to individuals such as a homeowner who wants to protect
valuable items in his house, a parent who does not want her child to be harmed while in school, an employee
who wants to save for a comfortable retirement, or an online shopper who wants to purchase a gadget via the
internet. It is also important to private companies such as a jewelry store that keeps diamonds in storage, a
law firm that holds incriminating evidence against a drug lord, or an internet company that requires personal
information and passwords from its users. Of course, it is also very important to governments that maintain
military forces, use intelligence services, legislate civil defense policies, and implement emergency
preparedness measures to serve and protect its citizens.
DEFINITION OF SECURITY
The word secure is derived from the Latin securus which means “safe”, or se cura, wherein se means “free
from” and cura means “ care”.
To be secure could mean many different things. It could mean being free from danger, risk, injury, fear,
trouble or anxiety. Being secure could also refer to being dependable, strong, good, impregnable or
inviolable. Or simply, it could mean having peace of mind.
Security can be defined as the degree of protection or resistance against harm, danger, loss, and criminals. As
a form of protection, it includes structures and processes that provide or improve security as a condition.
RELATED CONCEPTS
Understanding the concept of security requires further definition of other related concepts such as asset, risk,
threat and vulnerability.
Asset - is anything tangible or intangible that is capable of being owned or controlled to produce value. If it
has positive economic value, it is considered an asset. Or more simply, if its value can be converted into cash,
it is an asset.
Risk - is the uncertainty of financial loss, the probability that a loss has occurred or will occur, the variations
between actual and expected results, or the possible occurrence of an undesirable event. The end result of risk
is loss or a decrease in value.
Threat - is anything that could adversely affect assets; it can be classified into natural hazards that (such as
floods, accidents chemical spills, or international acts, domestic or international terrorism).
Vulnerability - means weakness, flaw, or virtually anything that may conceivably be exploited by a threat;
examples are holes in a fence an out of date key system or the introduction of a computer virus.
The historical roots of private security agencies can be traced back to thousands of years when the protection
of life and personal property were up to the individual , and later on passed to tribes , and then to cities.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 4
In pre- historic, man recognized the need to keep himself safe from both known and unknown enemies such
as animals, other inhabitants and the environment itself. He used different methods to keep himself safe such
as crafting weapons out of stone and metal, building fire to ward of animals, staying in caves of tree houses,
and even staying in the middle of the lake for protection.
The Greek of the ancient period were the ones who organized the first police force in city states which they
termed polis. The Romans, on the other hand, established the Praetorian Guards known as vigils who were
tasked to be fire fighters.
In the Middle Age during their invasion of England, the French formed a group of carefully selected men
called shires or sheriff to look after the peace and order of the different regions.
The greatest influence in the history of security came from England. In 1655, Oliver Cromwell set up in
England and Wales a police force that operated to capture and punish criminals. In 1748, London magistrate
henry Fielding introduced the concept of crime prevention by organizing citizen patrols or watchmen that not
only chased criminals for felony and misdemeanour but also served Fielding’s purpose of preventing crime
ahead of time with their patrolling function. Fifty years later, English home secretary Sir Robert Peel formed
the first formal police department.
During the colonial period the United States, immigrants from England, Ireland, and social Scotland came to
American shores bringing with them this British approach to policing. At the time, law enforcement officers
had to deal with rampant crime in U.S cities and had little time and resources left to deal with the protection
of private properties had to depend on the armed immigrants who were prepared to deal with criminals. This
watchman practices that endure to this day.
During the pre- colonial period in the Philippines, the sovereign monarchs called datu or lakan had servants
called aliping namamahay who acted as their watchman or protector.
The Spanish Colonial government introduced the Guardia Civil in the Philippines in 1868 to serve as the
police force based on the Civil Guard of Spain. They performed patrol functions in cities and towns,
organized operations for the suppression of bandit groups, and imposed penalties for infringement of laws
and local ordinances.
The constable of the American colonial period in the Philippines became the forebear of the present national
police. During that time, a couple of constable officers were adequate to maintain the peace and order in the
town or sitio.
History shows how public law enforcement and private security evolved from the same roots but eventually
took different directions .the police served the public’s interest while the security force served private interest.
As crime became a bigger problem especially in urban areas, police departments who previously looked
down at private security are now beginning to see the benefits of building a partnership with them. Now the
police functions that did not involve enforcement, arrests or the use of force inside work spaces are turned
over to security. Traffic control around large commercial properties and patrol functions around private
neighbourhoods are also now often provided by security officers.
With the advent of terrorism in countries around the globe, it is becomes more important to build a strong
partnership between the police who respond to terrorist acts and security officers who respond on the private
premises that they protect. This collaboration should also involve leaders and enforcers in other fields such as
fire fighting, disaster management, emergency medical treatment and public health. This, of course entails a
strong support and commitment from the national governments.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 5
Fast –paced technology especially in the field of computer and information technology is another issue
affecting the security industry. Although such technology has become very helpful in the security officer’s
work. It also has the negative effect of replacing people. Just as human labor has been displayed by machines
in other industries. It also affects individual security personnel who might become obsolete in the face of
computer assisted technologies.
With the combination of rising technology and the security industry rapid growth and recognitions comes the
necessary improvement in the professionalism among security officers.
MAJOR ARAEAS OF INDUSTRIAL SECURITY MANAGEMENT
1. Physical Security – is the sum total of all physical protection employed or installed to secure assets.
Example:
o Human Guards
o Perimeter fence/barriers
o Security devices
2. Personnel Security – is the sum total of procedures followed, inquires conducted, and criteria applied
to determine the work suitable of a particular applicant or retention or transfer of a particular
employee.
Example:
o Procedure – complete or partial background investigation is conducted to determine
whether the applicant should hire or not, or the same investigation is conducted to
determine whether the employee should remain in his present position or to be transferred
to less or non –sensitive position.
o Inquiry – it is the process of determining the loyalty, honesty integrity, reputation, and
others of a particular applicant or employee.
o Criteria – enumerated standard like education, experience, age, citizenship, and family
background, potential are being verified if true or not.
3. Document and Information Security – is the sum total of all policies , regulation , practices, enforce
to safeguards the contents and integrity of any classified information or document from compromise
or loss.
Example:
o Policy – security document and information is the responsibility of all concerned.
o Regulation – anybody found guilty of violating document and information security shall deal
with accordingly.
o Doctrine – access to information is based on the “need to know” and not by position.
o Practice – authority to have access to classified information is not permanent but can be
withdrawn by the originating authority.
1. Industrial Security - a type of security applied to business groups engaged in industries like
manufacturing, assembling, research and development, proc3ssing, warehousing and even agriculture.
2. Hotel Security - type of security applied to hotel where its properties are protected from pilferage, loss,
damage and the function in the hotel restaurant are not disturbed and troubled by outsiders on the guest
themselves.
3. Bank Security - this type of security is concern with bank operations. Its main objective is the protection
of bank cash and assets, its personnel and clientele.
4. VIP Security - a type of security applied for the protection of top-ranking officials of the government on
private entity, visiting persons of illustrious standing and foreign dignitaries.
5. School Security - a type of security that is concern with the protection of students, faculty members and
school properties.
6. Supermarket or Mall Security - a type of security which is concern with the protection of the stores,
warehouse, storage, its immediate premises and properties as well as supermarket personnel and customers.
ACTIVITY NO. 1
Name : Score :
1. Among the major areas of Industrial Security which is the most important to you? Why? (10 pts.)
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
CHAPTER 2
PHYSICAL
SECURITY
Physical security measures are being used to defined, protect, and monitor property rights and assets. These
measures consists of barriers and devices that would detect , impede , and prevent unauthorized access to
equipment , facilities , material and document and to safeguard them against espionage , sabotage, damage
and theft.
FACTORS IN SELECTING SECURITY SAFEGUARDS
The following are factors that should be considered in determining the physical security needs of a facility.
1. Site Characteristics
- Selection of safeguards can be influenced by the nature of the site such as the size, layout, utilities,
internal activities and assets in the site. Other factors may include company philosophy and
workforce culture.
2. Environment
- Refers to the area surrounding the facility. A bank inside a large commercial complex in Makati
City will require safeguards different from those required for an exclusive beach resort in an
island in Cebu or a factory of fireworks in an isolated area in Bulacan. For example, the bank
may opt for electronics locks and sensors, the resort may require a specially secured boat access,
and fireworks factory may go with a perimeter fence.
3. Forces of Nature
- Also at play in the selection of safeguards are the environment’s climate, weather, and natural
forces. Certain detection sensor devices may not work well in extreme temperatures and are
vulnerable to floods and earthquakes.
4. Crime
- Crime patterns must be considered in selecting the necessary countermeasures. Decisions should be
preceded by a risk assessment that includes a study on the nature, intensity, and repetitiveness of
criminal acts that have occurred in or near the facility during the recent past.
Terrorism is also an important factor for certain facilities that may be considered targets of
terrorist groups such as airport, tourist destinations, research laboratories and government
buildings.
BARRIERS - refers to any physical structure whether natural or man – made capable of restricting,
deterring, delaying or preventing illegal and unauthorized access to an installation.
PURPOSE OF BARRIER
The purpose of protective barriers in safeguarding the areas, building and the proper utilization of lighting at
night have contributed to modern man’s attempt to discourage intruder ,pilfer and other entrants devious
intent.
4. Steel fence post – the round type should be at least two (2) inches in diameter and the H- beam type
must be measurable no less than two inches at the smallest diameter.
5. Fence posts – fence post should be set in concrete or in firm soil using commercial drive anchors, to
be a depth of three (3) feet; maximum distance between posts is ten (10) feet.
6. Fence top - there should be something on the top of the fence to deter persons attempting to go over
the fence good example would be the use of barbed wire over hang , holding the stands of barbed wire
should be two feet long and should be extended of 45 degree angle in the direction of the expected
approach.
7. Fence area – the area surrounding the fence should be clear of trees and vegetation and debris or other
materials which would offer concealment to the intruder or would aid him in scaling.
8. Fence Gate – gates should be limited to the number necessary for efficient and safe operation of the
installation.
9. Fence opening –all opening in the fence in excess of 96 inches must be lock. Barred, or screened in
such a way that they may only be unlocked and opened from the inside and only be selected
personnel.
10. Multiple fence – if used ,multiple fence should be at least ten feet apart and the overhang on the top
of the inner fence should point inward rather than away from the installation maximum distance any
two parallel fences should not exceed 150 feet.
1. Natural Barrier - it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain
that are difficult to traverse.
2. Man – Made Barrier - is structural construction like fences walls, floors, roofs, grills, bars, road
blocks, or other physical means to deter or impede penetration.
1. Natural Barrier – it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain
that are difficult to traverse.
2. Structural Barrier – these are features constructed by man regardless of their original intent that tends
to delay the intruder. (Ex. Walls, doors windows, locks, fences, safe cabinets )
3. Human Barrier – persons being used in providing a guarding system or by the nature of their
employment and location, fulfil security functions. (Ex. Guards, office personnel, shop workers. Etc.)
4. Animal Barrier – animals are used in partially providing a guarding system. Dogs are usually trained
and utilized to serve as guard dogs. German shepherds are best suited for security functions (Ex.
goose, turkey could also be included).
PERIMETER BARRIER
A medium or structure which defines the physical limits of an installation or area to restrict or impede access
thereto. It is any physical barrier used to supplement the protection of an inside or outside perimeter.
The main purpose of perimeter barrier is to deny or impede access or exit of unauthorized person. Basically,
it is the first line of defense of an installation. This is maybe in the form of fences, building walls or even
bodies of water. The function and location of the facility itself usually determine the perimeter of the
installation.
CLASSIFICATION OF A BARRIER
I. Inside Perimeter
o A line adjacent to protected area, and passing through points of possible entry into the area,
such as doors, windows, skylights, tunnel or other points of access.
A. WIRE FENCE
Wire fencing can be barbed wire, chain link or concertina. Chain link are for permanent structure,
barbed wire is for semi-permanent, and concertina for the least permanent and also can be used as a
temporary road block or impediment during strikes and crowd control. Wire fences are attractive and
low in maintenance cost; they offer less hazard to people because of the absence of barbs, and the
openings are small to prevent passage of pilfered article.
Disadvantage
a. It prevents the installation guards from observing the area around the installation. b. A
solid fence creates shadow which may be used by the intruder for cover and concealment.
2. Full-View Fence – it is constructed in such a way that visual access is permitted through the fence. Its
advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of
the installation under observation. On the other hand, it allows the intruder to become familiar with
the movements and time schedule of the guards patrol thereby allowing him to pick the time that is
advantageous on his part.
Advantage
a. Roving patrols and stationary guards are able to keep the area surrounding the installation
under observation.
b. It does not create shadows which would provide cover and concealment for the intruder.
Disadvantage
a. It’s allowing visual access to the installation, its personnel, its guards; and its activities. b. It
allows the intruder to become familiar with the movements and the time schedule of the
guards patrol; there after allowing him to pick the time for attempting penetration which
would be most advantageous to him.
4. Top Guard • The top guard is an overhead of barbed wire along the
top of the fence, facing outward and upward at
approximately 45- degree angle.
• Top guard supporting arms will be permanently
affixed to the top of the fence posts to increase the overall
height of the fence at least one foot.
• Three strand of barbed wire, spaced 6inches apart
must be installed on the supporting arms.
Masonry walls as perimeter barrier should have the same heights as the chain link and surmounted by
the barbed wire top guards; if the height of the masonry is less than prescribed, additional chain link
as “topping”.
Wall can be made of stone slabs like adobe or hallow bound by concrete with post at regular intervals
to prevent the wall from toppling due to wind , or scouring facilities , security must sit down with
design engineers so that area where special emphasis in protective walls.
C. BODIES OF WATER
Bodies of water like river, lake, marsh, cataract, sea pond or any other bodies of water forming a part
of the wall, building or fencing should never be considered adequate natural perimeter barrier.
Additional security measures like wire fence, concrete walling, security patrolling and floodlighting at
night may be necessary for the portions of the perimeter.
PERIMETER BARRIER OPENING
1. Gates and Doors – when not in use and controlled by guards, gates and doors in the perimeter should
be locked and frequently inspected by guards. Lock should be changed from time to time and should
be covered under protective locks and key control.
2. Side Walk Elevators – these provide access to areas within perimeter barrier and should be locked
and guarded.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings which penetrate the
barrier and which have cross sectional areas of 96 square inches or more should be protected by bars,
grills, water filled traps or other structural means providing equivalent protection to that portion of
the perimeter barriers.
4. Clear Zones – an obstructed area or a “clear zone” should be maintained between on both sides of the
perimeter barrier. A clear zone of 20 feet or more is desirable between the barriers and exterior
structures and natural covers that may provide concealment for assistance to a person seeking
unauthorized entry.
3. Tower Guard
- This is a house like structure above the perimeter barriers. The higher the tower, the more visibility
it provides. It gives a psychological unswerving effect to violators. By and large guard towers,
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 14
whether permanent or temporary, must have a corresponding support force in the event of need.
Towers as well as guard control stations should have telephones, intercoms, and if possible two
way radios connected to security headquarters or office to call for reserves in the event of need.
4. Barrier maintenance
- Fencing barriers and protective walls should always be regularly inspected by security. Any sign or
attempts to break in should be reported for investigation. Destruction of fence or sections thereof
should be repaired immediately and guard vigilance should be increased.
5. Protection in Depth
- In large open areas or ground where fencing or walling is impractical and expensive, warning signs
should be conspicuously placed. The depth itself is protection reduction of access roads, and
sufficient notices to warn intruders should be done. Use of animals as guards and intrusion device
can also be good as barriers.
B. Human Barriers
b. Supervisory Tour – this is where the guard sends signals to guard headquarters from
each station that he checks.
5. Guard Communication
a. Primary Communication – direct line telephone or in some instance radio.
b. Emergency Communication – Ex. Messengers
IN COUNTER INTELLIGENCE SECURITY CONSIDERATION THERE ARE TWO
OUTSTANDING BARRIERS:
1. Protective lighting
2. Protective alarm
PROTECTIVE LIGHTING
- Protective lighting is the single most cost-effective deterrent to crime because it creates a
psychological deterrent to the intruders.
PURPOSE OF PROTECTIVE LIGHTING
1. It provides sufficient illumination to the areas during hours of darkness.
2. Lighting can help improve visibility so that intruder can be seen and identified and, it possible
apprehended.
3. It serves as deterrent to would be thieves.
GENERAL TYPES OF LIGHTING SOURCE
Listed below are the general lighting sources that are mostly used in providing indoor or outdoor lighting.
1. Incandescent Lamp – it is the least expensive in terms of energy consumed and has the advantage of
providing instant illumination when the switch is on.
2. Mercury Vapor Lamp – it is considered more efficient that the incandescent and used widespread in
exterior lighting. This emits purplish –white color, caused by a tube of conducting and luminous gas.
3. Metal Halide – it has similar physical appearance to mercury vapor but provides a light source of
higher luminous efficiency and better color rendition.
4. Fluorescent – this provides good color rendition, high lamp efficiency as well as long life. However,
it cannot project light over long distance and thus are not desirable as flood type lights.
5. High Pressure Sodium Vapor – this has gained acceptance for exterior lighting of parking areas,
roadways, building and commercial interior installations. Constructed on the same principle as
mercury vapor lamps, they emit a golden white to light pink color and this provide high lumen
efficiency and relatively good color rendition.
2. Street Light – this lighting equipment received the most widespread notoriety for its value in reducing
crime.
3. Search Light – these are highly focused incandescent lamp and are designed to pinpoint potential
trouble spots.
4. Fresnel Lights – these are wide beam units, primary used to extend the illumination in long, horizontal
strips to protect the approaches to the perimeter barrier , Fresnel projects a narrow, horizontal beam
that is approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane.
AREAS TO BE LIGHTED
1. Perimeter fence
2. Building face perimeter
3. Pedestrian Gate
4. Vehicular Gate - normally manned by guards inspecting credentials, as well as inspecting for
contraband or stolen property , it is critical that the area to be lighted to at least one foot candle. 5.
Parking Area – this include vital building , storage depots, and vulnerable control points in
communication power, light and were distribution system.
6. Thoroughfare – used for pedestrian, vehicles or forklift should be lighted for security purposes.
7. Storage, large opened working areas, piers, docks, and other sensitive areas.
ALARM
An alarm is an aural or visual signal given by the annunciator to security when intruder actuates device in a
protected area. An annunciator is a visual or audible signaling device which initiates conditions of associated
circuits.
Basically alarm system are designed to alert security personnel to consummated or attempted intrusions into
an area, building or compound. Each type of alarm is activities in an event that an intruder tempers with the
circuitry, a beam or radiated waves. Intrusion alarm can be electrical, mechanical or electronics. Alarms are
also used for fire, smoke or other emergencies and presence of other emergencies and presence of other
hazards.
LOCK – Is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into
a building , room, container or hiding place.
PETERMAN – a term in England for lock picker. Safecracker, and penetrator of restricted area or room.
TYPES OF LOCK
1. Key operated mechanical lock – it uses some sort of arrangement of internal physical barriers which
prevent the lock from operating unless they are properly aligned. The key is the device used to align
these internal barriers so that the lock may be operate.
2. Padlock – a portable and detachable lock having a sliding hasp which passes through a staple ring and
is then made fasten or secured.
3. Combination lock – instead of using the key to align the tumblers, the combination mechanism uses
numbers, letters or other symbols as reference point which enables an operator to align them
manually.
4. Code operated lock – a type of lock that can be opened by pressing a series of numbered button in
proper sequence.
5. Electrical lock – a type of lock that can be opened and closed remotely by electrical means.
TYPES OF KEY
1. Change key – a specific key, which operates the lock and has a particular combination of cuts or biting
which match the arrangement of the tumblers in the lock.
2. Sub master key – a key that will open all the locks within a particular area or grouping in a given
facility.
4. Grand master key – a key that will open everything in a system involving two or more master key
groups.
KEY CONTROL
Once an effective key control has been installed, positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of new locking devices.
The following methods can be used to maintain effective key control:
1. Key control – a well-constructed cabinet will have to be procured. The cabinet will have to be of
sufficient size to hold the original key to every lock in the system. It should be secured at all times.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 18
2. Key record – some administrative means must be set up to record code numbers and indicates to
whom keys to specific locks have been issued.
3. Inventories – periodic inventories will have to be made of all duplicate and original keys in the hands
of the employees whom they have been issued.
4. Audits – in addition to periodic inventory, an unannounced audit should be made of all key control
records and procedures by a member of management.
5. Daily report – a daily report should be made to the person responsible for key control from the
personnel department indicating all persons who have left or will be leaving the company. In the event
that a key has been issued, steps should be initiated to insure that the key is recovered.
❑ The same penalty shall be imposed upon any person who shall make such tool. If the offender is a
locksmith, shall suffer the penalty of prison correctional in its medium and maximum period.
SECURITY CABINET
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, precious metals or other especially valuable assets are protected. These security containers will
be of a size and quantity, which the nature of the business dictates.
In protecting property, it is essential to recognize that protective containers are designed to secure against
burglary or fire. Each type of equipment has a specialized function and it will depend on the owner of the
facility which type that is going to use.
3. File room – a cubicle in a building constructed a little lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.
2. Pass exchange system – an exchange takes place at the entrance of each controlled area. Upon leaving
the personnel surrenders his badge of passes and retrieves back his basic identification.
Note: in this system the second badge never leaves the controlled area, thus the reducing the
possibility of switching, forging or alteration.
3. Multiple pass system – this provides an extra measure of security by requiring that an exchange take
place at the entrance of each restricted area.
1. Controlled Area – are those area where access is restricted as to entrance or movement by all
authorized personnel and vehicles. It should additionally marked by a fence or other barrier, and
access to it should limited to as few guest as possible.
2. Limited Area – are those within the controlled area where a greater degree of security is required.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 20
3. Exclusion Area – are used only for handling and storage of high value cargo and classified documents.
The number of people authorized to enter this area should be strictly limited and the area should be
under surveillance at all times.
Security should established proper methods of establishing the authority for admission of visitors as well as
the limitation thereat. This security measure would depend on the security on the sensibility of the
installation, but could include the following.
1. Visitor’s logbook – all visitors to any facility should be required to identify them and should be given
a visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors, nature
and duration of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution must exercise in
areas where classified information is displayed to preclude unauthorized taking of picture of the
installation. If a visitor has a camera and it is prohibited to take picture, said camera should be left in
the care of security with corresponding receipt.
3. Escort - if possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
4. Visitor’s entrance –separate access for visitors and employees of the establishment should be
provided.
5. Time traveled – if there is a long delay or time lapse between the departure and arrival, the visitors
may be required to show cause for the delay.
Every facility must establish a system for the control of package entering or leaving the premises. However,
desirable it might seem it is simply unrealistic to suppose that a blanket rule forbidding packages either in or
out would be workable. The transporting of packages through the portals is a fact of life, they must be dealt
with in order to prevent theft and misappropriation of company properties.
Thus:
1. No packages shall be authorized to be brought inside the industrial installation, offices and work area
without paper authority. This basic precept help reduce if not eliminate pilferages, industrial
espionage or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles should also
be checked as many pilfered items are hidden in the surface of the vehicles leaving the compound. 3. Any
personnel /visitor entering the installation with a package should deposit the same to the security
and in return receives a numbered tag, which he/she will use in claiming his/her package upon
departing.
Vehicular traffic within the boundaries of any facility must be carefully controlled for safety as well to
control the transporting of pilfered goods from the premises.
Thus:
1. Privately owned vehicle of personnel/visitor should be registered and are subject to the identification
and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of an installation. 3. All visitors with
vehicles should provide the security as to the complete details of their duration of stay, person to be
visited, and other information.
4. All vehicles of visitors should be given a sign /sticker to be placed on the windshield. 5. Traffic
warning sign should be installed in all entrances in order to guide the visitors in their destination as well
to provide them with the necessary safety precautions while they are inside the installation. 6. Security
personnel must constantly supervise parking areas and make frequent spots searches of vehicles found
there.
At any physical barrier, a security system must possess the ability to distinguish among other authorized
persons, unauthorized visitors, and other persons. This is to assist the security personnel protects sensitive are
and informative within the installation.
Appropriate warning signs should be posted at the building perimeter. Special restricted entry facilities to
public access should be provided. This will be dependent on the degrees of security needed for the protection
of property activity and other processes within the building.
The access to the restricted area shall be limited to authorized personnel who have the direct involvement
with the installation, construction and operation and maintenance of the equipment and systems and or use of
the materials contained within the restricted area. A clear cut policy on the access control should be
disseminated to all personnel of the installation.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 22
ACTIVITY NO. 2
Name : Score :
Teacher : Remarks :
1. What is physical security? What are the factors to consider in determining the physical security needs
of a facility? (10pts.)
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
2. What are physical barriers and why are they needed in a facility? Provide examples. (10pts.)
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
CHAPTER 3
PERSONNEL SECURITY
Of the three main categories of security, personnel security is considered as the most important. This is for
the simple reason that security involves people, both an assets to be protected and as source of security
threats. It is an acknowledge fact that losses are attributed mainly to negligence or active participation of
employees, either through theft and sabotage. This emphasizes the need to set up the system of hiring the
people for the company.
1. To insure that a firm hires those employees best suited for the firm
2. Once hired, to assist in providing the necessary security to these employees while they are carrying out
them functions.
Personnel Security Investigation (PSI) – is a process of inquiry into the character, reputation, discretion,
integrity, morals and loyalty of an individual to determine the suitability for appointment or access to
classified matter.
1. Background Investigation (BI) – this technique is very expensive but necessary in personnel security.
It serves to verify information on the application form and to obtain other information pertinent to the
decision to employ.
a. Loyalty
b. Integrity
c. Discretion
d. Morals
e. Character
f. Reputation
a. Applicants Name
b. Date of birth
c. Present residence address
d. Personal history
e. Marital history
f. Residence history
g. Citizenship
h. Physical data
i. Educational history
j. Organizational membership
k. Neighbourhood investigation
l. Character reference
m. Employment history
n. Military history
o. Foreign travel history
p. Criminal record
q. Credit records
r. Applicants signature
s. Date of application
a. Barangay Clearance
b. City of Municipal Clearance
c. Local Police Clearance
d. Court Clearance
2. Positive Vetting –Is the process of inspecting or examining with careful thoroughness, the essence of
vetting is a personal interview conducted under stress. Other information issued during the interview,
such as those discovered in the BI, which confirms or denies which given by the applicants.
3. Prowling - Is the process whereby a subject’s reaction in a future critical situation is predicted by
observing his behavior, or by interviewing him, or analysing his responses to a questionnaire, such as
honesty test.
4. Deception Detection Techniques – this process of using devices in detecting deception during the
interview stage.
5. Financial and lifestyle inquiry – this type of investigation seeks to gather information on income and
mode of living, sometimes referred to as the earning-to-debt ratio.
6. Undercover investigation - this is type placement of an agent in a role in which the agent’s true
identity and role remains unknown ,in order to obtain information for criminal prosecution or for
recovery or limitations of assets losses.
1. Initial Interview - it is the first contact of the prospective employee wherein the interviewer
determines the suitability of the applicant for employment through his given answers on the different
type of questions being conducted. It is in this stage where the interviewer may start providing the
necessary information as to the interview of company security policies and at the same time on the
employee accountability and corresponding penalties that could result from violation there from.
2. Orientation and training- it is in this stage where new employees receive detailed presentation of
personnel security policy. Usually hand-outs or employees manual are being distributed for reference.
New employees also requested to sign acknowledgement that they have been aware of the existing
company policies and will abide the same.
3. Refresher conference - it is a design to remind employees of the company about their responsibilities,
review the guidelines and policies, introduction of new policies and regulation a movement of getting
employees feedback about the company policies that is being implemented.
4. Security reminders - the employed as an indirect approach of educating the employees, such as
posting security posters and distributing fliers.
5. Security promotion - it is the act of emphasizing the importance and role of security achieving the
company goals and objectives. It involves security employee cooperation and support.
Name : Score :
Teacher : Remarks :
1. What are personnel security measures and what are their purpose? (5pts.)
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
2. Download and fill out a Personal Data Sheet (PDS) form (5 pages). Here is the link
file:///C:/Users/Lenovo/Documents/PDS_CS_Form_No_212_Revised2017.pdf (15pts)
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 27
CHAPTER 4
DOCUMENT AND
INFORMATION SECURITY
In every installation, document and information are indispensable for their daily operations and activities, be
it in the form of a paper, film and magnetic media or in the computer system. Once there is a leakage in the
contents of accompanies document and information, the business operational stability is at stake. It may be a
start of bankruptcy that would lead to its total disclosure.
The leakage of the document and information cost government, business and industry alike, billion pesos. A
rival company or an enemy agent might use an illegally obtain document and information from their own
advantage. For this reason, a comprehensive and information security program is very essential to the
installation in order to focus freely on the attainment of its goals and objectives.
Protection of document and information entails a mammoth task on the part of the executives and the staff of
the installation. There should be a clear understanding on all the types of documents and information of the
organization. Security measures in the classification, handling care, and proper disposition of classified
documents and information must be a primarily concern in order to preserve the confidentiality and integrity
of document and information throughout all phases of its existence.
Document
- Is a written, drawn, presented, or memorialized presentation of thought. Originates from the Latin
DOCUMENTUM which denotes a teaching or lesson.
Document Security
- Protection of documents, classified papers and vital records of a company from loss, unauthorized
access, damage, theft copying, compromise or destruction through proper physical protection, storage
and human action.
1. Personal – letters, diary and notebooks. These should be treated usually the same with official
document.
Each document or information has a life cycle in the sense that its usefulness has a beginning and an end. It
passes various stages from the time it is created until it is finally disposed.
1. Creation – during this stage, information is discovered and developed. Information can take the form
of handwritten notes, discussion, dictated script, or electronic data. It is commonly concentrated in
laboratories, offices, word processing units and computer.
2. Classification – Undoubtedly, information is created for use. This stage involves a process wherein
people act on the information for the purpose of making a decision based on the information,
soliciting support or informing others. When information is used, it usually includes duplication as
well as distribution. Duplication can be in the form of photocopying, printing or sending through
electronic mail.
3. Storage and Retrieval – Used information should be put away for future use. Storage and retrieval
methods must ensure the integrity of the information, its timely accessibility to authorized users, and
its protection from criminal intervention and disastrous circumstances.
The security measures that must be taken depend on the type of storage center, the storage means and
the storage technologies used. More importantly, the experience and dependability of the personnel
who will handle the storage and retrieval of information must be considered.
4. Transfer – this involves the transfer of information from active to inactive storage. Inactive records
are usually located in remote areas less accessible to users. Special security precautions should be
taken at the time of the transfer and when records are on the way from the place to another.
5. Disposition – this is the last stage of the cycle of information. During this stage, a decision can be
made to retain the information indefinitely at either an active or inactive storage center or to dispose
of it. The method of disposal should depend on the amount of information and the type of media used.
THREE SECURITY CONCEPTS
1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of document.
3. Training is necessary for the practice of NEED TO KNOW principle.
2. Secret (red color) – is any information and material, the unauthorized disclosure of it would endanger
national security cause serious injury to the interest or prestige or the nation or any government
activity or advantage to a foreign nation.
3. Confidential ( blue color code) –is any information or material , the authorized disclosure of it would
be prejudicial to the interest and prestige of the national or government activity or would cause
administrative embarrassment of unwanted injury to and be of advantage to and be of advantage to a
foreign country.
4. Restricted (white or no color) – is any information and material which requires special protection
other than those determines confidential, secret and top secret.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 29
TYPES OF DOCUMENT
1. Class I – Vital Documents
o In this category these are records that are irreplaceable records of which reproduction does not
have the same value as the original; records needed to recover cash, to replace building ,
equipment’s, raw materials , finished products , and work in process and records needed to
avoid delay in restoration of production , sales and services.
CHARACTERISTICS OF INFORMATION
Information is expansive
It is unlike other business resources because it can easily expand to cover a wider scope. Information may
age, but it tends not to diminish; today’s breaking news, for instance, will be an event in history after a few
years. Information tends to accumulate; a discovery on the healing benefits of a plant can lead to the
formulation of a variety of benefits for numerous diseases. Information is compressible and transportable at
very high speeds, and can impart advantages to the holder as demonstrated by a single memory card that can
save hundreds of photos.
Information is coveted
When something has value, someone will want an opportunity to take it away. For example, a new cellular
phone technology being developed by a big telecommunications company might not be accessible to the
Information is voluminous
Another reality is that companies are dealing in larger volumes of information than ever before. Great
amounts of raw data are needed to make fully developed analysis. From customer information to critical
business strategies, financial operational data and intellectual property, not only is there more information
but it is high impact information. All of these have serious security vulnerabilities.
Sensitive Information
- refers to information that has value and should be protected, including the following:
• Propriety business and technical information.
• Personal data concerning applicants, employees and former employees.
• Propriety information owned by partners and obtained through an agreement.
CLASSIFICATION OF SENSITIVE INFORMATION
1. Secret – this information the unauthorized disclosure of which could cause serious damage to the
organization’s business. Its use and access to it are strictly limited.
Examples:
• Trade secrets
• Plans to merge, divest, acquire , sell, or reorganize
• Information that could affect the price of shares
• Information with high political or legal sensitivity
• Information prejudicial in the interests or reputation of the organization.
2. Restricted – this information of such value or sensitivity that its unauthorized disclosure could have a
substantially detrimental effect on the organization’s business.
Examples:
• Marketing strategies
• Customers file
• Agreements and contracts
• Contentious or litigable matters
Examples:
• Salaries, bonuses, and wages
• Health and medical matters
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 31
• Disciplinary actions
• Job performance
PROPRIETY INFORMATION
Information
- Is considered propriety when it is not readily accessible to others; it was created by the owner
through the expenditure of considerable resources; or the owner actively protects the information
from disclosure. This can include secret formulas, processes, and methods used in production; or
it could be the company’s business and marketing plans, salary structure, customer lists, contracts,
and details of its computer systems.
Propriety information includes intellectual; properties that are recognized and granted varying degrees of
protection by governments, such as the following:
1. Patents – grants issued by a national government conferring the right to exclude others from making ,
using , or selling the invention within that country. Patents may be given for new products or processes.
Violations of patent rights are known as infringement or piracy.
4. Trade Secrets – formulas, patterns, compilations, programs, devices, methods, techniques, and processes
that derive economic value from not being generally known and not ascertainable except by illegal means. A
trade secret violation in the vocabulary of the law is a misappropriation resulting from improper acquisition
or disclosure. The key elements in a trade secret are the owner’s maintenance of confidentiality, limited
distribution and the absence of a patent.
ACTIVITY NO. 4
Name : Score :
Teacher : Remarks :
1. What are the factors to consider in document and information security? (5pts.)
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 33
SECURITY HAZARD
Security hazard
CHAPTER 5
- Any act or condition which may result in the compromise of information, loss of life and loss or
destruction of property or disruption of the activity of the installation.
1. Natural hazard
- These are hazards which arise from natural phenomenon.
Saboteur
- He is the most dangerous for whom security will have to deal with while planning and implementing
security measures and techniques.
- He is an ordinary looking as the next guy but in his mind, he has the training in deception,
knowledgeable in incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.
Espionage Agent
- He is very dangerous adversary and his skills in deception and his cunning should never be
underestimated.
- He is usually a person of extensive training and will be highly effective in gaining the confidence of
people and of extracting information of value to be relayed to his employer or handler.
- Even how well-trained an espionage agent he might be, he is human like saboteur and he can be
defeated in his own game if proper methods and techniques are undertaken.
SOME METHODS EMPLOYED BY ESPIONAGE AGENT
1. Careful and complete pre- employment measures designed to control threats of industrial employee. 2.
Continuing personnel check on employees and particularly personnel on sensitive positions even already
employed.
3. Restricting of movement of personnel in the premises of the plant.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 35
4. Only property cleared personnel should handle classified document.
1. It can be local or national in nature and their mission is to undermine the authority weaken the
organization, and eventually take over. This can be business or any activity.
2. This can be in the form of rumour mongering, propaganda, undermining morale, and injecting defeatist
attitudes, and other emotional approaches.
3. It is an activity not easy to detect.
1. The spreading of rumours, written materials, slogan or any other devices to confuse the work
population and discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and “slowdowns” can be called
disrupt the normal operation of a plant or installation.
3. Security force should be alerted for person trying to result others in organizing movements for peace,
anti- colonials, anti-trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations” should report this
activity to security.
5. Other methods of subversion like untied fronts, mob action, terrorism and sabotage will do to gain the
subversive ends.
1. Pilferage is one of the most annoying and common human hazards which security has to deal with.
This activity if uncontrolled can be a big loss.
2. Become financial drain if not a menace to smooth and orderly operation.
3. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may be labelled
as pilferage.
Pilferage
- This is one of the most annoying and common human hazards which security has to deal with. This
activity is uncontrolled can become a financial drain, if not a menace to smooth and orderly operation.
Due to this, security force has to concentrate large number men to check this nefarious and
disconnecting activity. Petty pilferage is frequent, hard to detect, difficult to prove and win conviction
but definitely dangerous to ignore.
1. Casual Pilferer
- One who steals due to his inability to resist the unexpected opportunity and his little fear of detection is
no plan or premeditation and he is usually a “loner” on the job.
- The temptation to pick up the article is basically due to poor security measure. - The
implication of casual pilfering is the big cumulative cost if it remains unchecked.
2. Systematic Pilferer
- One who steals with preconceived plans and takes away any or all types of items or supplies for
economic gain.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 36
- Pilferer of this kind can be employees or outsiders of the establishments.
ANATOMY OF PILFERAGE
1. Where need or desire exists and opportunity is present, theft is almost sure to result. 2. Pilferage occurs
everywhere. Opportunities for pilferage increase when supplies or goods are transported or transferred
from one place to another.
1. Location of items to be pilfered – the systematic pilferer surveys shopping and store areas or through
contracts from the firms.
2. Access to the items – techniques can be from fake documents, bribing of guards, outsmarting security,
creating disturbance and other methods to divert attention while pilferage goes on.
3. Removal of item – this can be done as wearing the stolen shoes or shorts, concealment in the body or
vehicles, use of false documents, etc. Driver may conceal pilfered items in his vehicle.
4. Disposal of items – there is a need for “fences” “brokers” or “clearing house” for these “hot” items.
ACTIVITY NO. 5
Name : Score :
Teacher : Remarks :
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
2. What are the factors to assess in defining a security problem?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
CHAPTER 6
VIP SECURITY
VIP Security aims to protect people from physical violence, whether from the state or external states, from
violent individuals and sub – state actors, from domestic abuse, or from predatory adults. For many people,
the greatest source of anxiety is crime, particularly violent crime.
2. Escort – one or more persons accompanying another to give guidance or protection or to pay honor.
2. Bodyguard – a person or a grouped of persons usually armed and responsible for the physical safety
of one or more specific person.
1. Area Security
- Covers the surrounding areas of engagement.
- Conducts prophylactic (neutralize the area), operations in the area of engagement.
2. Perimeter Security
- Secures the immediate areas surrounding the place of engagement.
- Usually these are the uniformed men.
3. Advance Security
- This is the advanced security at the place of engagement before the arrival of the VIP. -
Sanitize the engagement area.
5. Reserve Security
- On standby for possible back – up / re-enforcement.
6. Routine Security
- Neutralize the possible route of the VIP party.
PROPHYLACTIC OPERATION
1. Patrolling
2. Putting up of check points, blocks and gates.
1. Victim
2. Assassin
3. Modus Operandi ( Mode of Operation)
4. Opportunity
As a result of the “increased concern about the kidnapping threat” there has been an escalation in the demand
for bodyguards. Thereby, BRAINS is needed and not BRAWN (meaning muscular in power) has been
offered as the basis for body guard selection. The bodyguard should fit the image and the life style of the
individual he is guarding.
1. Individuals in the vicinity of the persons being protected should be observed especially their hands. 2.
If a weapon is displayed, the weapons should be attacks so as to be ready to respond effectively. 3. The
bodyguards should anticipate potential attacks so as to be ready to respond effectively. 4. If a threatening
situation begins to develop the individuals being protected should immediately be removed from the
danger area.
5. If two bodyguards are used and attacks develop, one bodyguard should remove the individual being
protected while the other neutralized the threat. The bodyguards should adequately protect the
individual being guarded without offending the public of those in the area. The primary objective is to
protect the target person, not apprehend the attacker. Escape is certainly more important than winning
the “skirmish” meaning minor primary conflict or dispute.
6. If one bodyguard is utilized he/she will usually walk in front and slightly to the left of the person being
protected.
7. When two bodyguards are utilized, one will take a positioned in front to the left. While the second,
will take a position to the rear and slightly to the right.
PROTECTION IN TRANSIT
An individual is particularly vulnerable while moving from one place to another. Hence a regular route and
time travel should be established. Frequent changes of direction, travel time mode of transport, coordinated
within the overall protection plan, will make it difficult for an abduction to plan of an ambush or to interpret.
The individual should never walk alone in unpopulated areas. If an automobile during an attempted
abduction, the automobile may be used not only as a means of transportation, but as defensive shield or even
as an attack weapon. Therefore, an individual in an automobile should not usually attempt to escape an
attack by leaving the vehicles. The body at the vehicle can be utilized to take evasive action so that it will be
possible to escape from an attack.
VEHICLE SECURITY
The vehicle utilized by a potential kidnap victim should not be placed unattended in a parking stall with the
individual name on it. If possible, when not in use, the vehicle should be parked in a locked garage under
guard and not on the street. The doors of the vehicles should be locked in all window tightly closed, whether
occupied or non-occupied. Consideration of tamper alarms on the vehicles and “panic” or trouble alarms
bottoms in the parking area.
The potential victim, should not use the vehicle at all times, but should changes automobiles daily if possible.
All serving should be done by a commercial organization which has been checked out and cleared, locking
ATTACK TACTICS
1. Moving Attacks
- The approach will usually be made from the left or passing side, and the attacker will attempt to move
over into the path of the victim’s vehicle, forcing it to stop. Approach, would be from the right in the
left side drive countries. The ideal location for abduction is where cross street or turn off is available
to allow the attacker on easy quick way to escape. If two vehicles are used to attack, one wills cut –off
the victim’s vehicles. Forcing it to stop. The second may be then move up on the left side. The
abductor will make the attack, take the victims from the vehicles and escape as quickly as possible.
2. Ambush Attack
- The kidnapper will attempt to stop the victim’s car with in a zone he established by blocking the
roadway or by shooting the driver.
DRIVER RULE
The driver should always be planning ahead and he alert as to what is happening in at least two or three
blocks of normal city driving. Vehicles that are parked in the roadway or in unusual position, obstructions,
constructions, etc. should be viewed with concern. Also Side Street or roads access, Ramps, underpasses,
service roads, etc. Are potential trouble spots, and so particular attention should be given to them. Adequate
manoeuvring distanced should be maintained between the potential victim’s vehicles and those in traffic
ahead. Also the lane nearest the center of the roadway should be used. It allows manoeuvring room. The
driver should maintain near normal traffic speeds while keeping the vehicle under control at all times, be
alert as to what is in front , behind and on the sides of the vehicles which seems to be leading or following
the rear vision mirror should be done constantly , since most attacks originate from the rear.
4. Professional Criminals
- They are motivated for kidnapping usually centers on financial gain, with extensive planning to ensure
his or her escape and the ability to spend illegally obtained funds.
CRISIS MANAGEMENT
Crisis
- Is a decisive point of a condition, improper handling on which immediately places under threat or
danger of one’s life, limbs, freedom and property.
Work Stoppage – is condition of an enterprise whereby normal work operation is stopped as a result of a
strike and lockout.
1. Strike – is a temporary stoppage of work by concerned action or employees as a result of a current labor
industrial dispute.
2. Lockout – is the temporary refusal or any employer to furnish work.
ACTIVITY NO. 6
Name : Score :
Teacher : Remarks :
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
CHAPTER 7
COMMUNICATION SECURITY
The ability of an ancient man centuries ago to communicate by means of sign could be attributed as the key
for surviving the store era. And comes the new generation where the signs have been transformed into higher
forms as man learned the start of gregarious leaving by means of oral or written way of communication. This
ideal way of transferring thoughts and ideas made man supreme and progressive and later developed the
Medium or common language and the channel of which the language could be transferred to a certain
distance.
So today, civilized man communicates with an accepted and sophisticated written or oral language. The
medium has been improved by the introduction of ratio and electronics, but still man could not understand his
neighbor and vive –versa. This is due to the complexity of our lives at present and the introduction of new
languages and sub-dialects.
In security profession, it could not be denied that the field of operation is concentrated on dealing with
different people and it deemed proper for any security personnel to know the most common medium of
communication to make him effective on the performance of his job.
DEFINITION OF TERMS
Communication
- The transfer of thought from the mind of one person to the mind of another though a common medium or
channel.
- Is the process of sending and receiving messages to achieve understanding.
Conference
- The exchange of thoughts or opinions by conversations, or seminar. The exchange could be from oral,
written and other forms.
Medium of Communication
- Refers to the common language known for two or more individuals who want to exchange thoughts or
ideas with each other.
Example:
English is the dominant medium of communication in the world.
Ilocano is the common medium of communication in Baguio City.
Channel of Communication
- Refers to the equipment’s being used to transfer thoughts or ideas.
THE FOLLOWING ARE THE COMMON EQUIPMENT BEING USED FOR COMMUNICATION
1. Hand held radio or Walkie talkie – communication on electromagnetic waves transmitted through
the space.
a. Alertness – give the impression that you are alert and wide awake and interested as the person calling.
b. Pleasantness – build a pleasant office image with voice or smile.
c. Naturalness- use simple language and avoid slang.
d. Distinctness- speak clearly and relax to avoid garbled transmission.
e. Expressiveness – normal tone of voice in moderate manner not too fast and not too slow.
DUTY CYCLE OF PPT (PRESS TO TALK)
3. Telephone – combination of apparatus of converting speech energy to electrical wave then transmit
the same to a certain point then finally re-converted the electrical energy to audible sound.
4. Intercom – wired system of communication being used with in a building or compound for direct
exchange of calls.
5. Audio Hailer – portable transistorized and battery –operated amplifier that magnify the voice of the
user.
ACTIVITY NO. 7
Name : Score :
Teacher : Remarks :
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
CHAPTER 8
SECURITY SURVEY AND
INSPECTION
The basic instrument for determining security vulnerability is the security survey. Most description of
security surveys refers principally to checklists, audits or inventories of security conditions.
Security Survey
- is defined as a critical onsite examination and analysis of an industrial plant, business a home or public
or private institution done to ascertain the facility’s current security status, to identify deficiencies or
excess in current practices to determine what protection is needed and to make recommendations for
improving the overall level of security at that installation. As previously noted, security survey is a
general term that often encompasses other related procedures.
Security Inspection
- Another important activity, which is necessary to insure the integrity of the overall security programs, is
security inspection. This complements security survey in its attempt to prevent losses of company
properties.
1. Continuous Inspection – to keep with the constant changes in the organization, changes in our
security terms of attitudes, life-style and moral values, and rapid advancements of technological
modifications are all around us, the inspection must be an on-going and never ending activity.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 47
2. Formal or Informal
▪ Informal Inspection – is usually the result of a long and firmly entrenched inspection program,
understood by all and accepted as part of the organizational life.
ACTIVITY NO. 8
Name : Score :
Teacher : Remarks :
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
2. What is security inspection and why it is important? What purpose does it serve? (5pts.)
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
CHAPTER 9
EMERGENCY AND DISASTER
MANAGEMENT
Emergency planning is one of the harsh realities that an installation will encounter is the occurrence of a
disaster or emergency. Any of these can be regarded as a potential event. Occurrence or condition outside
the scope of normal business activities with significant potential for death, injury, property damage, assets
diversions or other favorable impact upon the installation. It is for this reason that the owner of the
installation or its executives will decide in advance what to do and how to counter the effects of any
emergency in order to assure continuity of operations.
Emergency
- It is a sudden, generally unexpected occurrence or set of circumstances demanding immediate action.
Disaster
- It is the unscheduled event that causes by emergency. It upsets the performance of valued activities of
the community in two ways: there is a drastic increase in demand for certain services and there is
reduction in the capability to perform services.
Disaster Management
- It is the systematic management of disaster from the initial stage to its termination using various tools
to minimize loss of lives, damage to property and enhance rehabilitation.
Crisis
- It is the turning point of a disaster or emergency, if not contained or controlled.
TYPES OF EMERGENCY
1. Earthquake
2. Typhoon
3. Tsunami
4. Volcanic eruption Fire
5. Fire
6. Explosion (bomb, flammable liquids, gases, etc.)
7. Building collapse
8. Leakage of gas or toxic fumes
9. Bomb threat
10. Strikes
11. Work accidents
12. Enemy attack/action
1. Who will make decisions and have final authority for the team as a whole.
2. Who will be members of the team and what are their responsibilities?
3. What will be the missions of the team?
4. The tasks of the other agencies or individuals.
5. The training needed to prepare team members to operate in stressful situations. 6.
Contingency planning beyond that involved in normal day-to-day operations against threats. 7.
The unexpected –the incident will not take place as planned.
Responding to an emergency situation requires special capabilities and considerations. First the
emergency response team must identify the kind of emergency. Then, the operation plan
(OPLAN) formulated for the said emergency must be put into effect as quickly as possible.
1. Bombing – if the terrorist/adversary plant bombs, then you must assume other bombs have been
planted. Remove everyone from the scene to a safe area. Anyone near the scene at the time of the
explosion must be interviewed. Keep in mind that the people being interviewed may, in fact, be the
terrorist/adversary who planted the bomb. Explosive Ordinances Division (EOD) must further check
suspected devices.
2. Ambush/Attack – always assumes the terrorist/adversary are still in the area. The initial response
force renders aid to the victims.
3. Establishes a defensive perimeter – clearing of the area is conducted before crime scene investigation
begins. All vehicles and exits from the area must be controlled and inspected.
4. Kidnapping – in most cases of kidnapping you will not be aware that a kidnapping has occurred until
the terrorist has the victim safety secured elsewhere. The immediate response is to dispatch teams to
provide protection for other possible targets, including members of the victims, family. Then the
Emergency Response Team is activated. The team can materially aid the commander in dealing with
the kidnapping. They could recommend possible courses of action.
6. Arson – Terrorist/Adversary use incendiary devices to commit arson. This is done during an organized
civil disturbance (throwing a firebomb) or against a specifically targeted building. They also use
incendiary devices to destroy vehicles .As with bombs, they often use time delay mechanisms to
allow themselves time to leave the area before the fire occurs.
ACTIVITY NO. 9
Name : Score :
Year & Section: Schedule :
Teacher : Remarks :
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
CHAPTER 10
SECURITY INVESTIGATION
Security investigation - is a planned and organized determination of facts concerning specific loss or
damage of assets due to threats, hazards or unsecured conditions.
ELEMENTS OF INVESTIGATION
1. Investigator
2. Purpose
3. Subject of Investigator
TOOLS OF INVESTIGATION
1. Information – knowledge which the investigator gathers from other persons.
a. Acquired from regular sources- conscientious and public –spirited citizens, company
files, school files or records file of other agencies.
2. Interrogation – the skillful questioning of a person who is reluctant to divulge information concerning
the offense under investigation.
3. Interview – the simple questioning of a witness who has no personal reason to withhold information.
4. Instrumentation – the application of instruments and methods of physical sciences to the detection of
physical sciences to the detection of crimes. In other words, the sum total of the application of all
sciences in crime detection otherwise known as criminalistics.
1. Objective – all facts are discussed as perceived without any distortion and the manner of presentation
is free from unwarranted.
2. Thorough – full detail, exhaust all available means, factual to arrive in a sound and convincing
conclusion.
3. Relevant – significant and demonstrated its relation to one another.
4. Accurate – free from error.
5. Current – terminology is generally accepted.
GUIDELINES IN INVESTIGATION
1. Preliminary Investigation
P Proceed to the scene promptly and safely
3. Methods of Investigation
a. Information
b. Interrogation
c. Interview
d. Instrumentation
INVESTIGATION REPORT
1. Purpose
a. Record – the report provides a permanent official record of the investigation.
b. Leads – the report provides other investigators with information necessary to further advance the
investigation.
c. Prosecutive action – the report is a statement of facts on which designated may base a criminal,
corrective or disciplinary action.
a. Administrative Data
1. Date
2. File Number
3. Complaint
4. Reporting Investigator
5. Office of Origin
6. Status
b. Synopsis – brief in description of the actions of the perpetrator as established in the body of the
report.
c. Details of the report - Objective of the investigation.
d. Conclusion and Recommendation – includes the investigator opinion.
e. Enclosures – Photographs, sketches, sworn statement, etc.
4. Format of Report
CONFIDENTIAL
(Letterhead)
_____________
Date
SUBJECT:
I. AUTHORITY
This section should contain a brief statement of when, where and why by whom the investigation
was made and should cite the authority for making it.
IV. DISCUSSION
This section set forth when appropriate, the presumption and inference from all the circumstances in
the case to give directing authority the clearest possible picture. It should contain such related
factual matter of argument as may be necessary in addition to the facts presented, to establish the
conclusions and recommendation based thereon.
V. CONCLUSION
This represents concise summary of the result of the investigation directly consequent from and
supported by facts. These logically follow from the facts of case of found and set forth in the report.
They are usually stated in the order naturally suggested by the statement of the allegations or facts.
VI. RECOMMENDATIONS
This should contain the practical suggestions as to appropriate action to be taken to make suitable
position of all phases of the case. They should follow, as for as practicable, the same sequence as
was used in the presentation of conclusion.
______________________
Investigator
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 59
ACTIVITY NO. 10
Name : Score :
Teacher : Remarks :
1. What are the qualities of effective investigation? What are the characteristics of a successful investor?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
CHAPTER 11
MANAGEMENT AND
PLANNING
Security Planning
Planning is the key factor in the successful management of a security program. A management expert defines
planning as pre determining a course of action. Another defines it as deciding in advance what to do, how do
it and who should do it. It is necessary for a security executive to plan, the alternative is obviously to react
events that have already occurred or try to solve problems that could have been avoided in the first place.
The first requirement in planning is to identify the overall objectives and purpose of the organization.
Afterwards, the executive may start his own planning which should be objective and supports the
organization’s goals.
One method of security planning is to create an overall blueprint for security program based on the identified
vulnerabilities or the result of vulnerability assessment. Another method is to write several plans such as a
comprehensive emergency plan covering various anticipated contingencies and various operational plans,
policies, standards and procedures. Still another way is the use of Action Plans showing three column
identifies the action officer involved while the third column shows the time frame.
2. A Company with Union - the company recognizes its obligation as a corporate citizen to the
community and thus, practices an aggressive policy of prosecution regarding theft within the
company.
3. Information Security Policy – the computer center recognizes the propriety interest of the client
entities who utilize the facilities of the center, hence strictly controls dissemination of management
information on strictly need-to-know basis and only to such persons that have been specifically
cleared to receive such information.
Financing
Managing security requires cash to carry out the various responsibilities involved. a security executive should
be able to have an enlightened view of what activities he plans for a specific period the expected operational
conditions and the cost involved. A security executive should have knowledge in for casting and budgeting to
make security management successful. He should be familiar with the organizations stand on return on
investment and spending preferences.
Budgeting
A budget is usually a prepared annual plan stated in financial terms. It is ordinarily finalized a few months
before the start of the budget period. It contains the different items for which costs are involved. No security
organization can operate nor have its program implemented without the budget.
2. Sundry Expense – these are non-salary expense such as supplies, uniforms, travel, transportation,
representation contract services, professional fees, membership fees, publications and subscription.
3. Capital Expenditures – these are onetime expenses for physical improvements or acquisition of
equipment, computers, firearms, vaults, alarm systems and construction of firing range.
Organizational Relationship
The following are the basic forms of organizational relationship:
1. Line Authority – Line authority is based in the relationship between a supervisor and a subordinate
level. It is formal managerial authority with the right and power to issue commands, to exact
accountability, and to discipline for violations.
2. Staff Authority – it is based on relationship between managers of authority and facilitating groups and
the line organization. It is limited by absence of the right to command beyond the staff group itself.
3. Functional Authority – between the above mentioned authorities is the functional authority which is
the formal power of command, limited to a specified area of expertise which may be organization
wide and directed across substructures as sections, departments and divisions.
2. Lines of authority and responsibility should be made as clear as possible. These are reflected in the
pyramid like structure with blocks and lines known as “organization chart” and with the positions of
greater authority and responsibility located in the upper levels.
3. There should be a “unity of command” in the organization. This means that an employee should be
under the direct control of one and only one supervisor at any given time.
4. One supervisor can effectively control only a number of people, and that limit should not exceed. This
is known as the principle of span of control. At the highest level the maximum is 12.
5. Responsibility cannot be given without delegating commensurate authority, and there must be
accountability.
6. All efforts of sub units and personnel must be coordinated into the harmonious achievement of the
organization’s objectives.
Reporting Levels
The security director/manager may report directly to the president or at least one of the senior executives. He
may also report to a middle management executive which tends to limit his stature, authority and scope of his
responsibility.
2. Company Executive – he is accepted by his senior management and peers as part of the management
team. He is discerned as a modern day manager.
3. Executive with High Visibility – he is visibly recognized and participates in various company
activities and is a much sought after speaker in his area of expertise.
4. Innovator – he is expected to be always on the lookout for better and less expensive ways to do the
job. He is not fearful of trying new ways and take risks.
5. Counselor/ Adviser – he is able to provide advice, suggests alternatives, and helps solve problems.
8. Goal Setter – he establishes objectives and defines goals to be achieved. It starts with setting up goals
and objectives for particular period, usually a year. Afterward, budget development follows. This
involves an evaluation of current activities, identification of projected new activities, and
development of alternatives and determination of costs. After these, an evaluation and review.
Staffing Pattern
1. Security Director – responsible for the entire operation and administration /management of the
security agency. He shall be the authorized signatory to all Duty Detail Orders, and all other
documents and communications pertinent to the operation and management of a security agency. He
may delegate certain functions to a subordinate, provided the subordinate is qualified to discharge the
given function in accordance with law.
2. Security Training Officer – responsible for the training of the Agency’s security personnel in
accordance with the requirements of RA 5487.
3. Staff Director for Operations – is the staff assistant of the security manager for the efficient operation
of the agency. This position includes the responsibility to canvas clientele and the implementation of
contract and agreement. He is also responsible for the conduct of investigation and the conduct of
training.
4. Staff Director for administration – is the staff assistant of the agency manager for the effective and
efficient administration and management of the agency. He is responsible for the professionalization
of the personal, procurement/recruitment, confirming of awards, mobility and issuance of FA’s.
5. Detachment Commander – is the field or area commander of the agency. The Detachment shall
consist of several posts.
6. Chief Inspector – shall be responsible for inspecting the entire area covered by the detachment.
7. Security Inspector – is responsible for the assigned by the Chief Inspector of the Detachment
Commander.
8. Post – in –charge – is responsible for the entire detailed security office within a certain establishment.
9. Shift-in- charge – is responsible for the security officers who are scheduled in a certain shift for a
particular period.
10. Security Guard – is the one actually posted as watchman and or guard.
ACTIVITY NO. 11
Name : Score :
Teacher : Remarks :
CHAPTER 12
IMPLEMENTATION, PROBLEM SOLVING AND
AUDIT
/INSPECTION
PROGRAM IMPLEMENTATION
Top Management’s Responsibility
The top management should always be interested in the implementation of any security program. They must
extend in the implementation of any security program. They must extend complete support to the program on
a continuing basis. They must be willing to take actions to ensure that employees at the other levels comply
with the requirements that have been established for the protection of personnel and other assets. The
responsibility and accountability for the implementation are delegated to the security executive. Thus, he
would function as a steward doing the necessary management work for and on behalf of top management.
Involvement of Others
Non – security employees can be of great assistance in the implementation of the security program and their
active participation can contribute to its success. Thus, it is important to keep other employees aware and
involved.
Setting Priorities and Meeting Schedules
The higher the critically rating of the identified vulnerability, the higher is its priority in the implementation
of countermeasures. It is important also that the time frame established be met otherwise it could affect the
entire program.
Drills and Rehearsals
Some areas of the security program would need regular drills or rehearsals which stimulate anticipated
condition, crisis management, fire drill, bomb threat handling, and response to a robbery.
Validation and Updating Plans
During program implementation, opportunities arise to improve countermeasures or reinforce those found
effective. If new conditions present themselves, necessary adjustment sometimes need to be made in the
security program.
Program Evaluation
At the end of the timetable or drills, rehearsals, the security program or part of it need to be evaluated. Issue
such as relevance or adequacy of countermeasures, cost effectiveness, need to be addressed to check the
existence of vulnerability which may trigger the need for a much response security program.
2. Gathering Information – he gathers information through research and interviews. It may require
putting the information gathered in document form, in tapes or indexes.
3. Interpretation – the gathered information are put together to arrive at a clear picture and try to
ascertain the meaning and related implication.
4. Developing Solutions – the security executive may come out with a solution and several alternatives.
In this step he should be guided by the principles and techniques of effective management and
company.
5. Selecting the Best Solution – from several alternatives the security executive selects the best practical
solution considering the short and long term effect of each possible solution.
6. Putting the Solution into Operation – one the most appropriate solution is chosen, implementation is
next. This is critical as it may involve changes be difficult to accept. There might be a need to sell the
solution to others.
7. Evaluating the Effectiveness – The plan or solution should be reviewed periodically for effectiveness.
A comparison between the ideal solution and the actual practice may be made.
2. Self Interest – one’s own interest may not be the best for others. The ideal situation here is to balance
one’s interest with those of the others.
3. Tradition – there are good traditions but there are those that limit the way of doing things and become
the basis for decision because they from the easiest way out.
5. Authority of Expert Opinion – this should be given great consideration. However, the security
executive should make certain that they are really experts rather than products of media type.
6. Logical Thinking - the decision is based on sufficient facts and thorough analysis leading to clear
conclusion and good decision.
7. Emotion and Prejudice – the decision should be free from bias and sentiment. It may lead to
favoritism and irrational decision making.
8. Ease of Execution – all things being equal, security executives confronted with problems would like
an easy way out, but the easy way out is not usually the best way out.
ACTIVITY NO. 12
Name : Score :
Teacher : Remarks :
1. What are the top management’s responsibilities in the implementation of security program?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
2. What are some problem solving techniques? What are the pitfalls in decision making?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
CHAPTER 13
REPUBLIC ACT No. 5487
PNP SOSIA
- Philippine National Police Supervisory Officer for Security and Investigative Agencies.
- This is the unit under the Philippine National Police which is charged with the supervision, direction
and control, of all security agencies in the Philippines.
Person
- Shall include not only natural persons but also juridical persons such as corporation, partnership,
company or association duly registered with the Securities and Exchange Commission and/or the
Department of Trade and Industry.
Security Guard
Private Detective
- Shall mean any person who does detective work for hire, reward or commission, other than member of
the AFP, Guard at the bureau of Jail Management Penology, Municipal or City jail guards, and
members of the PNP or of any other Law Enforcement agency of the government.
PNP
- As used herein mean the Philippine National Police, which was organized pursuant to the provision of
RA 6975 otherwise known as the National Police Act of 1991.
PADPAO
- Refer to the Philippine Association of Detective And Protective Agency Operators, Inc. which is an
association of all licensed security agencies and company security forces.
- The one who are authorized to issue the implementing rules and regulations pertaining to R. A 5487.
Who may organize and maintain a Private Security Agency (PSA) and Private Detective Agency
(PDA)? - Any Filipino citizen or corporation association, partnership, one hundred percent (100%) of
which is owned and controlled by Filipino Citizen.
Membership
- No regular license shall be granted to any private security agency unless it has minimum of two
hundred (200) licensed private security personnel under employ.
- No regular license shall be granted to any company guard’s force or private detective agency unless it
has a minimum of thirty (30) licensed private security personnel under its employ.
- The maximum number of private security personnel that has a PSA/ CGF/ PDA may employ shall be
one thousand (1000).
- FILED: Chief of the Philippine National Police (CPNP) through the PNP Security and Guard
Supervision Division, Civil Security Group (PNPSAGSD –CSG). Using license application form the
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 73
application shall contain the full name of the applicant, his age, civil status, his residence and location
of business.
- New applicant: Applicants from NCR may file their application for license to exercise profession with
the personnel licensing section, SAGSD, Civil Security Group, Camp Crame, Quezon City.
Applicants from the Province may file their application with the Firearms, Explosives, Security,
Agencies and Guards section (FESAGS), Regional Operation and Plan Division (ROPD) of the Police
Regional Office concerned.
- In addition to other renewal requirements under provision of these rules and regulations , no application
shall approved unless a certification is issued by FED –CSG to the effect that all licensed firearms of
the agency concerned are updated / renewed for at least one (1) year forthcoming during the validity
of the renewed LTO.
Payroll
- Payroll shall be filed with the main office within fifteen (15) days after pay day.
Possession of Firearm
- Ratio: 1 firearm for every two (1:2) security guard in its employ.
- The total number of high-powered firearms that an agency or security force/unit is authorized to
possess shall not exceed ten percent (10%) of the total number of security guards of watchmen in its
employ.
Stocking of ammunition
- PSA shall not exceed fifty (50) rounds of ammunition per unit of duty licensed firearms. Individual
issue to each security guard shall be limited to one half of such basic load or twenty five (25) rounds
for every security guards.
• Any person applying for employment as private detective shall in addition to the qualification of
security guard, possess any of the following qualifications.
Permit
- A document issued by the CPNP or his duty authorized representatives authorizing a person to engage
in the occupation calling or employment of watchmen, security guard or private after payment of dues
or fees.
Firearms
- Possession of firearms by agency are entitled to possess firearms after satisfactory complying the
requirements as provided by law.
Mission Order
- Is a written instructions issued by the agency to its guard to perform lawful activity at specific time,
place and date. It shall include the make, model, and serial no. of the firearm issued to the guard and
the name of the operation officer or manager of the agency.
• The security force of any installation must be organized in accordance with the principles of
responsibility and authority. Each personnel must be assigning to a position which correspond to his
experience, skills training and knowledge. This is to carry out different functions efficiently and
effectively and thus insures smooth flow of the organization. The security positions may be classified
into the following.
a. The office of the General Manager/Security Director is vested the authority and responsibility
of running the security force by authority of the President or the Company / Corporation. b. The
General Manger/Security Director is directly responsible to the President of the
Company/Corporation in the operations and administration of the security force.
c. He is principal adviser to the president on matters involving security operations,
administration of the security force.
d. He is the overall head of both various staff departments and field units where he may
delegate corresponding authority commensurate to their assigned responsibility.
a. The security Executive Director is the Assistant Manager of the Security Force and takes
the Operational and Administrative Management of the security force in the absence of the
GM/SD.
b. He is directly responsible to the GM/ SD.
c. He is performs other duties as directed by the GM/SD.
4. Office of the Human Resources and Administrative Manager /Staff Director for personnel and
Administration
• The principal staff assistant to the General Manager/Security Director for planning and
supervising matters or activities pertaining to personnel management and miscellaneous
administrative functions such as:
a. Personnel Strengths
b. Replacement
c. Discipline , Law and order
d. Morale and Personnel Services
e. Personnel Procedures
f. Interior management
g. Personnel Adviser
• The office is the principal staff on Operations, Training, Intelligence and Investigation.
• This office is principally concerned with budgeting, finance, reports control and program review
and analysis. Exercises supervision over the management engineering activities of the
company and the accounting office. Renders advice, assistance and guidance to GM/SD on
financial management. Specific duties and functions of the Finance Office are :
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 76
a. Accounting
b. Credit and collection
c. Bookkeeping
d. Billing
e. Payroll
f. Disturbing
a. Coordinate plan and supervise the implementation of directives and guidance determines
divisional responsibility and evaluates in logistical planning programs.
b. Develops, administer, and coordinates research and development on logistical matters.
c. Collects computers and evaluates statistical data on logistical matters.
d. Recommends logistics budget policy including planning.
e. Prepares estimates and or requirements to endure that logistical plans support for corporate
plans. f. Performs necessary program and fiscal administration.
g. Supervise all matters pertaining to supply.
h. Determine the organization, allocation of service personnel.
i. Plans for maintenance and repair of supplies and equipment.
b. If the SG is manning a fixed post especially entrance or exit points, he must maintain a guard’s
logbook and write in same logbook all events/passages of VIP’s vehicles and inspections or
visits of Security Manager /Director of the client/firm.
c. Guard must observe and apply religiously the provisions of the Code of Ethics, Code of Conduct
and the General Orders of the Security Guard when on post.
d. He may perform special task as may be directed by his shift supervisor, like control of visitors,
inspections of bags of persons coming in and going out of the establishments, vehicle cargoes or
prevents the intrusion of unauthorized person in a particular area etc.
As a Security Guard, my fundamental duty is to protect lives and properties and maintained order within the
vicinity or place of duty, protect the interest of my employer and our clients and the security and stability of
our government and country without compromise and prejudice, honest in my action, words and thought, and
do my best to uphold the principle: MAKADIOS, MAKABAYAN AT MAKATAO.
2. Ethical Standard
As a security guard /detective, his fundamental duty is to serve the interest or mission of his agency in
compliance with the contract entered into with the clients or customers of the agency he is serve, thus: 1. He
shall be honest in thoughts and deeds both in his official actuation, obeying the laws of the land and the
regulations prescribed by his agency and those established by the company he is supposed to serve.
2. He shall not reveal any confidential matter committed to him as a security guard and such
other matters imposed upon him by law.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 78
3. He shall act all times with decorum and shall not permit personal feelings, prejudices and
undue friendship to influence his actuation in the performance of his official functions.
4. He shall not compromise with criminal and other lawless elements to the prejudice of the
customers or clients and shall assist government relentless drive against lawlessness and
other forms of criminality.
5. He shall carry out his assigned duties as required by law to the best of his ability and shall
safeguard life and property of the establishment he is assigned to.
6. He shall wear his uniform, badge, patches and insignia properly as a symbol of public trust
and confidence as an honest and trustworthy security guard, watchman and private
detective.
7. He shall keep his allegiance first to the government he is assigned to serve with loyalty and
utmost dedication.
8. He shall diligently and progressively familiarize himself with the rules and regulations lay
down by his agency and those of a customers or clients.
9. He shall at all times be courteous, respectful and salute his superior officers, government
officials, and officials of the establishment where he is assigned and the company he is
supposed to serve.
10. He shall report for duty always in proper uniform and neat in his appearance.
11. He shall learn at heart and strictly observe the laws and regulations governing the use of a
firearm.
3. Code of Conduct
• He shall carry with him at all times during his tour of duty his license identification card and duty
detail order with an authority to carry firearms.
• He shall not use his license and privileges to the prejudice of the public, the client or customer and
his agency.
• He shall not engage in any unnecessary conversation with anybody except in the discharge of his
work and shall at all times keep himself alert during his tour of duty.
• He shall not read newspapers, magazines, books, etc. while actually performing his duties. •
He shall not drink any intoxicating liquor immediately before and during his tour of duty.
• He shall know the location of an alarm box near his post and sound the alarm in case of fire or
disorder.
• He shall know the location of the telephone and or telephone number of the police precincts as well
as the telephone number of the fire stations in the locality.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 79
• He shall immediately notify the police in case of any sign of disorder, strike, riot or any serious
violations of the law.
• He or his group or guards shall not participate or integrate any disorder, strike, riot or any serious
violations of the law.
• He shall assist the police in the preservation and maintenance of peace and order and in the protection
of life, property / having in mind that the nature of his responsibilities is similar to that of the latter.
• He shall familiarize himself with the Private Security Agency Law (RA 5487) as amended, and the
PNP SAGSD implementing rules and regulations.
• He shall always in proper uniform and shall always carry with him his basic requirements, and
equipment such as writing notebook, ball pen, nightstick (baton) and or radio. He shall endeavor at
all times to merit and be worthy of the trust and confidence of the agency he represents and the client
he serve.
4. General Order ( 11 G.O)
1. To take charge of this post and all companies property in view and protect preserve the
same with utmost diligence.
2. To walk during tour of duty in military manner, keeping always in the alert and observing
everything that takes place within sight or hearing.
SELECTION OF GUARDS
R.A 5487 and its implementing rules and regulations prescribed the minimum requirements for guards to be
able to secure a license to exercise profession as a security guard, private detective, security officers and
security consultant.
BASIC QUALIFICATIONS OF AN AGENCY OPERATOR/MANAGER AGENCY
a. The operator or manager of an agency including , managers of branch offices , must be:
1. Filipino Citizen
2. Not be less than 25 years of age
3. College graduate and or a Commissioned officer, inactive or retired service or retired from AFP or
PNP.
4. Has taken a course/seminar on individual on industrial security management and or must have
adequate training or experience in the security business.
5. Good moral character.
b. New applicant for license to operate shall be required to obtain minimum capitalization of one
million pesos (1,000,000.00) with a minimum bank deposit of five hundred thousand pesos
(500, 000.00) in order to start its business operation.
• No person shall be licensed as security officer unless he has the following qualifications.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 80