Module - Lea 3

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 85

FILAMER

CHRISTIAN

UNIVERSITY
COLLEGE OF CRIMINAL JUSTICE EDUCATION
Roxas Avenue, Roxas City, Capiz, Philippines, 5800
Tel no. (036) 6212 – 318
http://www.filamer.edu.ph

SELF – LEARNING MODULE Course No.: LEA 3


Course Title: Introduction to Industrial Security Concepts
Course Overview

a. Program Outcomes:
✓ Demonstrate Competencies and Broad Understanding in law Enforcement Administration,
Public safety and Criminal Justice.
✓ Utilize Criminalities or Forensic Science in Investigation and Detection of Crime. ✓ Apply
the Principles and Jurisprudence of Criminal Law, Evidence and Criminal Procedure.

b. Performance Indicators:

✓ Discuss the concept and principles of industrial security in relation to Law Enforcement
Administration, Public Safety and Criminal Justice.
✓ Interpret the important role of security profession in law enforcement administration and
public safety.
✓ State the importance of security personnel in crime detection and criminal investigation. ✓
Explain the concept of criminalities in the field of industrial security investigation and crime
detection.
✓ Determine the principles and jurisprudence of criminal law, evidence, and criminal procedure
in relation to the legal context of industrial security and related laws.
✓ Recognize the different types of evidence applicable to Jurisprudence of Criminal Law,
Evidence and Criminal Procedure in relation to industrial security.

A. Course Guide

Welcome to the INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS Self – Learning Module


(SLM)
This pandemic had brought a lot of challenges to us, from the sector of health, economic institutions,
governance, and even in the academe. Generally, CoViD-19 pandemic had struck and disrupted our day-to
day dealings. Schools were obliged to shift gears moving away from the traditional face to face teaching and
now entering the realm of virtual and distant learning. With this bold move in the school system, we are all
guided by the principle that no one should be left behind and education should not stop even in this time of
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 1
pandemic. Thus, as a response to the challenge of this “new normal” way of teaching, this “self-learning
module” was conceived.

As your learning facilitator, we recognized that the process of learning in this time and even before does not
solely lies in the hands of your teachers. We need active and meaningful partnership, a partnership that is
guided by the main goal of this module, to bring out the best in you and enable you to become independent
but effective learners. Truly, your academic success lies in your own hands!

This module was designed to provide you with fun and meaningful opportunities for guided and independent
learning at your own pace and time. You will be enabled to process the contents of the learning resource
while being an active learner.

At the end of this module you will also find the references.

The following are some reminders in using this module:

1. Use the module with care.


2. Don’t forget to answer everything before moving on to the other activities included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
7. Please be reminded that you are responsible for your own learning. At the end, examinations and
another evaluative activity will be given based on the covered content from the module.

If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult your course
facilitator at given contact information below. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and gain deep understanding of
the relevant competencies. You can do it!

ASSESSMENT GUIDES AND MATERIALS


You will be assessed and evaluated using the following methods and guided by the grading system indicated
below.
a. Assessment Methods:
Paper and Pencil Test, Activity Sheets, and Evaluative Examinations
b. Grading system:
a. LECTURE GRADE
ARP (Attendance, Recitation, Project/Participation) 30%
Quizzes 20%
Major Exam 50%
TOTAL: 100%
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 2
COURSE FACILITATOR
Name of the Facilitator:
JANE O. BOBIS., RCRIM, MSCJ
Contact Details:

Mobile Number: 09998825677


Email Address:jane.opanto22@gmail.com
Facebook Account: Jane Bobis
Office Address: Roxas Avenue Roxas City
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 3

CHAPTER 1
THE CONCEPT OF
SECURITY

Security is important to everyone. It is important to individuals such as a homeowner who wants to protect
valuable items in his house, a parent who does not want her child to be harmed while in school, an employee
who wants to save for a comfortable retirement, or an online shopper who wants to purchase a gadget via the
internet. It is also important to private companies such as a jewelry store that keeps diamonds in storage, a
law firm that holds incriminating evidence against a drug lord, or an internet company that requires personal
information and passwords from its users. Of course, it is also very important to governments that maintain
military forces, use intelligence services, legislate civil defense policies, and implement emergency
preparedness measures to serve and protect its citizens.

DEFINITION OF SECURITY
The word secure is derived from the Latin securus which means “safe”, or se cura, wherein se means “free
from” and cura means “ care”.
To be secure could mean many different things. It could mean being free from danger, risk, injury, fear,
trouble or anxiety. Being secure could also refer to being dependable, strong, good, impregnable or
inviolable. Or simply, it could mean having peace of mind.

Security can be defined as the degree of protection or resistance against harm, danger, loss, and criminals. As
a form of protection, it includes structures and processes that provide or improve security as a condition.

RELATED CONCEPTS

Understanding the concept of security requires further definition of other related concepts such as asset, risk,
threat and vulnerability.

Asset - is anything tangible or intangible that is capable of being owned or controlled to produce value. If it
has positive economic value, it is considered an asset. Or more simply, if its value can be converted into cash,
it is an asset.

Risk - is the uncertainty of financial loss, the probability that a loss has occurred or will occur, the variations
between actual and expected results, or the possible occurrence of an undesirable event. The end result of risk
is loss or a decrease in value.

Threat and vulnerability are sometimes interchangeably used with risk.

Threat - is anything that could adversely affect assets; it can be classified into natural hazards that (such as
floods, accidents chemical spills, or international acts, domestic or international terrorism).

Vulnerability - means weakness, flaw, or virtually anything that may conceivably be exploited by a threat;
examples are holes in a fence an out of date key system or the introduction of a computer virus.

Historical Roots of Security

The historical roots of private security agencies can be traced back to thousands of years when the protection
of life and personal property were up to the individual , and later on passed to tribes , and then to cities.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 4
In pre- historic, man recognized the need to keep himself safe from both known and unknown enemies such
as animals, other inhabitants and the environment itself. He used different methods to keep himself safe such
as crafting weapons out of stone and metal, building fire to ward of animals, staying in caves of tree houses,
and even staying in the middle of the lake for protection.

The Greek of the ancient period were the ones who organized the first police force in city states which they
termed polis. The Romans, on the other hand, established the Praetorian Guards known as vigils who were
tasked to be fire fighters.

In the Middle Age during their invasion of England, the French formed a group of carefully selected men
called shires or sheriff to look after the peace and order of the different regions.
The greatest influence in the history of security came from England. In 1655, Oliver Cromwell set up in
England and Wales a police force that operated to capture and punish criminals. In 1748, London magistrate
henry Fielding introduced the concept of crime prevention by organizing citizen patrols or watchmen that not
only chased criminals for felony and misdemeanour but also served Fielding’s purpose of preventing crime
ahead of time with their patrolling function. Fifty years later, English home secretary Sir Robert Peel formed
the first formal police department.

During the colonial period the United States, immigrants from England, Ireland, and social Scotland came to
American shores bringing with them this British approach to policing. At the time, law enforcement officers
had to deal with rampant crime in U.S cities and had little time and resources left to deal with the protection
of private properties had to depend on the armed immigrants who were prepared to deal with criminals. This
watchman practices that endure to this day.

Security in Philippine History

During the pre- colonial period in the Philippines, the sovereign monarchs called datu or lakan had servants
called aliping namamahay who acted as their watchman or protector.

The Spanish Colonial government introduced the Guardia Civil in the Philippines in 1868 to serve as the
police force based on the Civil Guard of Spain. They performed patrol functions in cities and towns,
organized operations for the suppression of bandit groups, and imposed penalties for infringement of laws
and local ordinances.

The constable of the American colonial period in the Philippines became the forebear of the present national
police. During that time, a couple of constable officers were adequate to maintain the peace and order in the
town or sitio.

Security in the Present Time

History shows how public law enforcement and private security evolved from the same roots but eventually
took different directions .the police served the public’s interest while the security force served private interest.
As crime became a bigger problem especially in urban areas, police departments who previously looked
down at private security are now beginning to see the benefits of building a partnership with them. Now the
police functions that did not involve enforcement, arrests or the use of force inside work spaces are turned
over to security. Traffic control around large commercial properties and patrol functions around private
neighbourhoods are also now often provided by security officers.

With the advent of terrorism in countries around the globe, it is becomes more important to build a strong
partnership between the police who respond to terrorist acts and security officers who respond on the private
premises that they protect. This collaboration should also involve leaders and enforcers in other fields such as
fire fighting, disaster management, emergency medical treatment and public health. This, of course entails a
strong support and commitment from the national governments.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 5
Fast –paced technology especially in the field of computer and information technology is another issue
affecting the security industry. Although such technology has become very helpful in the security officer’s
work. It also has the negative effect of replacing people. Just as human labor has been displayed by machines
in other industries. It also affects individual security personnel who might become obsolete in the face of
computer assisted technologies.

With the combination of rising technology and the security industry rapid growth and recognitions comes the
necessary improvement in the professionalism among security officers.
MAJOR ARAEAS OF INDUSTRIAL SECURITY MANAGEMENT
1. Physical Security – is the sum total of all physical protection employed or installed to secure assets.
Example:
o Human Guards
o Perimeter fence/barriers
o Security devices
2. Personnel Security – is the sum total of procedures followed, inquires conducted, and criteria applied
to determine the work suitable of a particular applicant or retention or transfer of a particular
employee.

Example:
o Procedure – complete or partial background investigation is conducted to determine
whether the applicant should hire or not, or the same investigation is conducted to
determine whether the employee should remain in his present position or to be transferred
to less or non –sensitive position.

o Inquiry – it is the process of determining the loyalty, honesty integrity, reputation, and
others of a particular applicant or employee.

o Criteria – enumerated standard like education, experience, age, citizenship, and family
background, potential are being verified if true or not.

3. Document and Information Security – is the sum total of all policies , regulation , practices, enforce
to safeguards the contents and integrity of any classified information or document from compromise
or loss.

Example:
o Policy – security document and information is the responsibility of all concerned.

o Regulation – anybody found guilty of violating document and information security shall deal
with accordingly.

o Doctrine – access to information is based on the “need to know” and not by position.

o Practice – authority to have access to classified information is not permanent but can be
withdrawn by the originating authority.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 6


TYPES OF SECURITY

1. Industrial Security - a type of security applied to business groups engaged in industries like
manufacturing, assembling, research and development, proc3ssing, warehousing and even agriculture.

2. Hotel Security - type of security applied to hotel where its properties are protected from pilferage, loss,
damage and the function in the hotel restaurant are not disturbed and troubled by outsiders on the guest
themselves.

3. Bank Security - this type of security is concern with bank operations. Its main objective is the protection
of bank cash and assets, its personnel and clientele.

4. VIP Security - a type of security applied for the protection of top-ranking officials of the government on
private entity, visiting persons of illustrious standing and foreign dignitaries.

5. School Security - a type of security that is concern with the protection of students, faculty members and
school properties.

6. Supermarket or Mall Security - a type of security which is concern with the protection of the stores,
warehouse, storage, its immediate premises and properties as well as supermarket personnel and customers.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 7

ACTIVITY NO. 1

Name : Score :

Year & Section: Schedule :


Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN

1. Among the major areas of Industrial Security which is the most important to you? Why? (10 pts.)

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

2. Define security in your own dialect. (10pts.)

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 8

CHAPTER 2
PHYSICAL
SECURITY
Physical security measures are being used to defined, protect, and monitor property rights and assets. These
measures consists of barriers and devices that would detect , impede , and prevent unauthorized access to
equipment , facilities , material and document and to safeguard them against espionage , sabotage, damage
and theft.
FACTORS IN SELECTING SECURITY SAFEGUARDS

The following are factors that should be considered in determining the physical security needs of a facility.

1. Site Characteristics
- Selection of safeguards can be influenced by the nature of the site such as the size, layout, utilities,
internal activities and assets in the site. Other factors may include company philosophy and
workforce culture.

2. Environment
- Refers to the area surrounding the facility. A bank inside a large commercial complex in Makati
City will require safeguards different from those required for an exclusive beach resort in an
island in Cebu or a factory of fireworks in an isolated area in Bulacan. For example, the bank
may opt for electronics locks and sensors, the resort may require a specially secured boat access,
and fireworks factory may go with a perimeter fence.

3. Forces of Nature
- Also at play in the selection of safeguards are the environment’s climate, weather, and natural
forces. Certain detection sensor devices may not work well in extreme temperatures and are
vulnerable to floods and earthquakes.

4. Crime
- Crime patterns must be considered in selecting the necessary countermeasures. Decisions should be
preceded by a risk assessment that includes a study on the nature, intensity, and repetitiveness of
criminal acts that have occurred in or near the facility during the recent past.

Terrorism is also an important factor for certain facilities that may be considered targets of
terrorist groups such as airport, tourist destinations, research laboratories and government
buildings.

BARRIERS - refers to any physical structure whether natural or man – made capable of restricting,
deterring, delaying or preventing illegal and unauthorized access to an installation.

PURPOSE OF BARRIER

The purpose of protective barriers in safeguarding the areas, building and the proper utilization of lighting at
night have contributed to modern man’s attempt to discourage intruder ,pilfer and other entrants devious
intent.

MINIMUM ACCEPTABLE REQUIREMENTS FOR FENCE USED IN SECURITY BARRIER

1. Height – Eight (8) feet minimum.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 9


2. Slack of the bottom – not to exceed two (2) inches, if the fence is not taut then it should extend even
closer to the ground.

3. Wooden fence post – minimum horizontal dimension of four (4) inches.

4. Steel fence post – the round type should be at least two (2) inches in diameter and the H- beam type
must be measurable no less than two inches at the smallest diameter.

5. Fence posts – fence post should be set in concrete or in firm soil using commercial drive anchors, to
be a depth of three (3) feet; maximum distance between posts is ten (10) feet.

6. Fence top - there should be something on the top of the fence to deter persons attempting to go over
the fence good example would be the use of barbed wire over hang , holding the stands of barbed wire
should be two feet long and should be extended of 45 degree angle in the direction of the expected
approach.

7. Fence area – the area surrounding the fence should be clear of trees and vegetation and debris or other
materials which would offer concealment to the intruder or would aid him in scaling.

8. Fence Gate – gates should be limited to the number necessary for efficient and safe operation of the
installation.

9. Fence opening –all opening in the fence in excess of 96 inches must be lock. Barred, or screened in
such a way that they may only be unlocked and opened from the inside and only be selected
personnel.

10. Multiple fence – if used ,multiple fence should be at least ten feet apart and the overhang on the top
of the inner fence should point inward rather than away from the installation maximum distance any
two parallel fences should not exceed 150 feet.

TWO GENERAL TYPES OF PHYSICAL BARRIER

1. Natural Barrier - it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain
that are difficult to traverse.

2. Man – Made Barrier - is structural construction like fences walls, floors, roofs, grills, bars, road
blocks, or other physical means to deter or impede penetration.

FIVE KINDS OF BARRIER

1. Natural Barrier – it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain
that are difficult to traverse.

2. Structural Barrier – these are features constructed by man regardless of their original intent that tends
to delay the intruder. (Ex. Walls, doors windows, locks, fences, safe cabinets )

3. Human Barrier – persons being used in providing a guarding system or by the nature of their
employment and location, fulfil security functions. (Ex. Guards, office personnel, shop workers. Etc.)

4. Animal Barrier – animals are used in partially providing a guarding system. Dogs are usually trained
and utilized to serve as guard dogs. German shepherds are best suited for security functions (Ex.
goose, turkey could also be included).

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 10


5. Energy Barrier - it is the employment of mechanical, electrical, electronic energy imposes a deterrent
to entry by the potential intruder or to provide warning to guard personnel. These are protective
lighting, alarm system and any electronics devices used as barriers.

A BARRIER IS USE FOR THE FOLLOWING PURPOSES


1. Outline the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards.
5. Facilitate and improve the control and vehicular traffic.

THREE LINE OF PHYSICAL DEFENSE


1. First line of defense – perimeter fences/ barriers.
2. Second line of defense – doors, floors, windows, walls, roofs, and grills and other entries to the
building.
3. Third line of defense – storage system like steel cabinets, safes, vaults and interior files.

PERIMETER BARRIER
A medium or structure which defines the physical limits of an installation or area to restrict or impede access
thereto. It is any physical barrier used to supplement the protection of an inside or outside perimeter.
The main purpose of perimeter barrier is to deny or impede access or exit of unauthorized person. Basically,
it is the first line of defense of an installation. This is maybe in the form of fences, building walls or even
bodies of water. The function and location of the facility itself usually determine the perimeter of the
installation.
CLASSIFICATION OF A BARRIER
I. Inside Perimeter
o A line adjacent to protected area, and passing through points of possible entry into the area,
such as doors, windows, skylights, tunnel or other points of access.

II. Outside Perimeter


o A line of protection surroundings but somewhat removed from a protected area, such as a
fence.
TYPES OF PERIMETER BARRIER
1. Wire Fences
2. Walls
3. Bodies of water

A. WIRE FENCE
Wire fencing can be barbed wire, chain link or concertina. Chain link are for permanent structure,
barbed wire is for semi-permanent, and concertina for the least permanent and also can be used as a
temporary road block or impediment during strikes and crowd control. Wire fences are attractive and
low in maintenance cost; they offer less hazard to people because of the absence of barbs, and the
openings are small to prevent passage of pilfered article.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 11


TWO TYPES OF FENCE
1. Solid Fence – constructed in such a way that visual access through the fence is denied. Its advantage
is that it denies the opportunity for the intruder to become familiar with the personnel, activities and
the time scheduled of the movement of the guards in the installation. On the other hand, it prevents
the guards from observing the area around the installation and it creates shadow that may be used by
the intruder for cover and concealment.
Advantage
a. Denies visual access of the installation to the intruders.
b. Denies the intruder the opportunity to become familiar with the personnel, activities,
and time scheduled of the movement of the guards on the installation.

Disadvantage
a. It prevents the installation guards from observing the area around the installation. b. A
solid fence creates shadow which may be used by the intruder for cover and concealment.

2. Full-View Fence – it is constructed in such a way that visual access is permitted through the fence. Its
advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of
the installation under observation. On the other hand, it allows the intruder to become familiar with
the movements and time schedule of the guards patrol thereby allowing him to pick the time that is
advantageous on his part.

Advantage
a. Roving patrols and stationary guards are able to keep the area surrounding the installation
under observation.
b. It does not create shadows which would provide cover and concealment for the intruder.

Disadvantage
a. It’s allowing visual access to the installation, its personnel, its guards; and its activities. b. It
allows the intruder to become familiar with the movements and the time schedule of the
guards patrol; there after allowing him to pick the time for attempting penetration which
would be most advantageous to him.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 12


TYPES OF PERIMETER BARRIER
1. Chain Link Fence • It must be constructed of 7 feet material excluding top
guard.
• It must be or 9 gauges or heavier.
• The mesh openings are not be larger than 2 inches per
side.
• It should be twisted and barbed salvage at top and
bottom.
• It must be surely fastened to rigid metal or reinforced
concrete.
• It must be within 2 inches of hard ground or paving.
• On soft ground. It must reach below surface deep
enough to compensate for shifting soil or sand.

2. Barbed Wire Fence • Standard barbed wire is twisted, doubled –strand, 12


gauge wire with 4 point barbs spaces on equal distance
apart.
• Barbed wire fencing should not be less than 7 feet
high excluding top guard.
• Barbed wire fencing must be firmly affixed to post
high excluding top guard.
• The distance between strands will not exceed 6 inches
and midway between parts.

3. Concertina Wire • Standard concertina barbed wire is commercially


Fence manufactured wire coil of high strength steel barbed
wire clipped together at intervals to from a cylinder.
• Opened concertina wire is 50 feet long and 3 feet in
diameter.

4. Top Guard • The top guard is an overhead of barbed wire along the
top of the fence, facing outward and upward at
approximately 45- degree angle.
• Top guard supporting arms will be permanently
affixed to the top of the fence posts to increase the overall
height of the fence at least one foot.
• Three strand of barbed wire, spaced 6inches apart
must be installed on the supporting arms.

5. Clear Zone • A clear zone of 20 feet or more should exist between


the perimeter barrier and exterior structure, parking
areas and natural or man –made features

• A clear zone of 50 feet or more should exist between


the perimeter barrier and structures within the protected
areas except when a building wall constitutes part of the
perimeter barrier.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 13


B. BIUILDING WALL
Walls, floor roofs or their combination serve also as barriers and must be of such be of such
construction to provide uniform protection just like the wire fencing.

Masonry walls as perimeter barrier should have the same heights as the chain link and surmounted by
the barbed wire top guards; if the height of the masonry is less than prescribed, additional chain link
as “topping”.
Wall can be made of stone slabs like adobe or hallow bound by concrete with post at regular intervals
to prevent the wall from toppling due to wind , or scouring facilities , security must sit down with
design engineers so that area where special emphasis in protective walls.
C. BODIES OF WATER
Bodies of water like river, lake, marsh, cataract, sea pond or any other bodies of water forming a part
of the wall, building or fencing should never be considered adequate natural perimeter barrier.
Additional security measures like wire fence, concrete walling, security patrolling and floodlighting at
night may be necessary for the portions of the perimeter.
PERIMETER BARRIER OPENING
1. Gates and Doors – when not in use and controlled by guards, gates and doors in the perimeter should
be locked and frequently inspected by guards. Lock should be changed from time to time and should
be covered under protective locks and key control.

2. Side Walk Elevators – these provide access to areas within perimeter barrier and should be locked
and guarded.

3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings which penetrate the
barrier and which have cross sectional areas of 96 square inches or more should be protected by bars,
grills, water filled traps or other structural means providing equivalent protection to that portion of
the perimeter barriers.

4. Clear Zones – an obstructed area or a “clear zone” should be maintained between on both sides of the
perimeter barrier. A clear zone of 20 feet or more is desirable between the barriers and exterior
structures and natural covers that may provide concealment for assistance to a person seeking
unauthorized entry.

ADDITIONAL PROTECTIVE MEASURES


1. Top Guard
- Additional overhang or barbed wire placed on vertical perimeter fences upward and outward with a
45 degree angle with 3 to 4 strands or barbed wires spaced 6 inches apart. This increases the
protective height and prevents easy access.

2. Guard Control Station


- This is normally provided at main perimeter entrances to secure areas located out of doors, and
manned by guards on full time basis. Sentry station should be near a perimeter for surveillance at
the entrance.

3. Tower Guard
- This is a house like structure above the perimeter barriers. The higher the tower, the more visibility
it provides. It gives a psychological unswerving effect to violators. By and large guard towers,
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 14
whether permanent or temporary, must have a corresponding support force in the event of need.
Towers as well as guard control stations should have telephones, intercoms, and if possible two
way radios connected to security headquarters or office to call for reserves in the event of need.

4. Barrier maintenance
- Fencing barriers and protective walls should always be regularly inspected by security. Any sign or
attempts to break in should be reported for investigation. Destruction of fence or sections thereof
should be repaired immediately and guard vigilance should be increased.

5. Protection in Depth
- In large open areas or ground where fencing or walling is impractical and expensive, warning signs
should be conspicuously placed. The depth itself is protection reduction of access roads, and
sufficient notices to warn intruders should be done. Use of animals as guards and intrusion device
can also be good as barriers.

6. Sign and Notices


- “Control Signs” should be erected where necessary in the management of unauthorized ingress to
preclude accidental entry . Signs should be plainly visible and legible from any approach and in
an understood language or dialect.

GUARD AND CONTROL SYSTEM


A. Function that must be accomplished by this guard System:
1. Detect intruders
2. Sound alarm
3. Apprehend unauthorized personnel
4. Identify authorized personnel

B. Human Barriers

1. Guard procurement :Selection criteria:


o Must eligible for security clearance.
o Vigorous and physically able to serve in the capacity of a guard.
o Intelligence necessary to accomplished the guard function.
o The ability to make rapid decision and react in a calm way to emergencies.
o Loyalty and discretion are required attributes.
o Experience is highly desirable although not usually mandatory.

2. Guard Training : Program of training should include:


o General orientation
o Instruction in security procedures of the installation, first aid, and communication.
o Instruction in traffic control, riot control, self-defense.
o Weapons qualifications to include maintenance and safety.
o Refresher course and advantage training in specific subjects.

3. Guard employment : Two basic techniques of guard employment:


a. Fixed post
b. Patrols

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 15


4. Guard Supervision
a. Personal Supervision – personal inspection of all guards prior to their starting tour of
duty. Periodic checks of guards during their tour by the senior member of each station.

b. Supervisory Tour – this is where the guard sends signals to guard headquarters from
each station that he checks.

5. Guard Communication
a. Primary Communication – direct line telephone or in some instance radio.
b. Emergency Communication – Ex. Messengers
IN COUNTER INTELLIGENCE SECURITY CONSIDERATION THERE ARE TWO
OUTSTANDING BARRIERS:
1. Protective lighting
2. Protective alarm

PROTECTIVE LIGHTING
- Protective lighting is the single most cost-effective deterrent to crime because it creates a
psychological deterrent to the intruders.
PURPOSE OF PROTECTIVE LIGHTING
1. It provides sufficient illumination to the areas during hours of darkness.
2. Lighting can help improve visibility so that intruder can be seen and identified and, it possible
apprehended.
3. It serves as deterrent to would be thieves.
GENERAL TYPES OF LIGHTING SOURCE
Listed below are the general lighting sources that are mostly used in providing indoor or outdoor lighting.
1. Incandescent Lamp – it is the least expensive in terms of energy consumed and has the advantage of
providing instant illumination when the switch is on.

2. Mercury Vapor Lamp – it is considered more efficient that the incandescent and used widespread in
exterior lighting. This emits purplish –white color, caused by a tube of conducting and luminous gas.

3. Metal Halide – it has similar physical appearance to mercury vapor but provides a light source of
higher luminous efficiency and better color rendition.

4. Fluorescent – this provides good color rendition, high lamp efficiency as well as long life. However,
it cannot project light over long distance and thus are not desirable as flood type lights.

5. High Pressure Sodium Vapor – this has gained acceptance for exterior lighting of parking areas,
roadways, building and commercial interior installations. Constructed on the same principle as
mercury vapor lamps, they emit a golden white to light pink color and this provide high lumen
efficiency and relatively good color rendition.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 16


TYPES OF LIGHTING EQUIPMENT
There types or lighting equipment are generally used or associated with security lighting.
1. Floodlights – these can be used to accommodate most outdoor security lighting needs, including the
illumination of boundaries, fences and buildings and for the emphasis of vital areas or particular
buildings.

2. Street Light – this lighting equipment received the most widespread notoriety for its value in reducing
crime.

3. Search Light – these are highly focused incandescent lamp and are designed to pinpoint potential
trouble spots.

4. Fresnel Lights – these are wide beam units, primary used to extend the illumination in long, horizontal
strips to protect the approaches to the perimeter barrier , Fresnel projects a narrow, horizontal beam
that is approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane.

AREAS TO BE LIGHTED
1. Perimeter fence
2. Building face perimeter
3. Pedestrian Gate
4. Vehicular Gate - normally manned by guards inspecting credentials, as well as inspecting for
contraband or stolen property , it is critical that the area to be lighted to at least one foot candle. 5.
Parking Area – this include vital building , storage depots, and vulnerable control points in
communication power, light and were distribution system.
6. Thoroughfare – used for pedestrian, vehicles or forklift should be lighted for security purposes.
7. Storage, large opened working areas, piers, docks, and other sensitive areas.

ALARM
An alarm is an aural or visual signal given by the annunciator to security when intruder actuates device in a
protected area. An annunciator is a visual or audible signaling device which initiates conditions of associated
circuits.
Basically alarm system are designed to alert security personnel to consummated or attempted intrusions into
an area, building or compound. Each type of alarm is activities in an event that an intruder tempers with the
circuitry, a beam or radiated waves. Intrusion alarm can be electrical, mechanical or electronics. Alarms are
also used for fire, smoke or other emergencies and presence of other emergencies and presence of other
hazards.

PROTECTIVE LOCKS AND KEY CONTROL


Locks is one of the most widely used physical security devices in the asset protection program of an
installation. It complements other physical safeguards of the installation against any possible surreptitious
entry. However, the owner of the installation or his security officer needs to understand the weaknesses and
strength of each type of lock including the door, window or walls to be used to achieve maximum benefit
from it application. This is because highly skilled burglars more often concentrate on the lock and its
surrounding

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 17


mechanism in order to make a forcible entry. It is for this obvious reasons that locks are considered as
delaying devices which cannot really top a determine intruder from destroying the lock just to launch an
attack. Hence, knowledge of the basic principles of locking systems will enable the installation owner or the
security officer to evaluate any lock and determine its quality and effectiveness in a particular application.

LOCK – Is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into
a building , room, container or hiding place.
PETERMAN – a term in England for lock picker. Safecracker, and penetrator of restricted area or room.

TYPES OF LOCK
1. Key operated mechanical lock – it uses some sort of arrangement of internal physical barriers which
prevent the lock from operating unless they are properly aligned. The key is the device used to align
these internal barriers so that the lock may be operate.

2. Padlock – a portable and detachable lock having a sliding hasp which passes through a staple ring and
is then made fasten or secured.

3. Combination lock – instead of using the key to align the tumblers, the combination mechanism uses
numbers, letters or other symbols as reference point which enables an operator to align them
manually.

4. Code operated lock – a type of lock that can be opened by pressing a series of numbered button in
proper sequence.

5. Electrical lock – a type of lock that can be opened and closed remotely by electrical means.

6. Card operated lock – a type of lock operated by coded card.

TYPES OF KEY
1. Change key – a specific key, which operates the lock and has a particular combination of cuts or biting
which match the arrangement of the tumblers in the lock.

2. Sub master key – a key that will open all the locks within a particular area or grouping in a given
facility.

3. Master key – a special key capable of opening a series of lock.

4. Grand master key – a key that will open everything in a system involving two or more master key
groups.

KEY CONTROL
Once an effective key control has been installed, positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of new locking devices.
The following methods can be used to maintain effective key control:
1. Key control – a well-constructed cabinet will have to be procured. The cabinet will have to be of
sufficient size to hold the original key to every lock in the system. It should be secured at all times.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 18
2. Key record – some administrative means must be set up to record code numbers and indicates to
whom keys to specific locks have been issued.

3. Inventories – periodic inventories will have to be made of all duplicate and original keys in the hands
of the employees whom they have been issued.

4. Audits – in addition to periodic inventory, an unannounced audit should be made of all key control
records and procedures by a member of management.

5. Daily report – a daily report should be made to the person responsible for key control from the
personnel department indicating all persons who have left or will be leaving the company. In the event
that a key has been issued, steps should be initiated to insure that the key is recovered.

STATUTORY PROHIBITION OF KEY:


ART. 304 (Revised Penal Code) POSSESSION OF PICKLOCKS OR SIMILAR TOOLS
❑ Any person who shall without lawful cause have in possession of picklocks or similar tools especially
to the commission of the crime or robbery , shall be punished by arresto mayor in its maximum period
to prison correctional in its minimum period.

❑ The same penalty shall be imposed upon any person who shall make such tool. If the offender is a
locksmith, shall suffer the penalty of prison correctional in its medium and maximum period.

ART. 305 (Revised Penal Code) FALSE KEY


❑ The term “False Key” shall be deemed to include:
a. The tool mentioned in the next proceeding articles.
b. Genuine keys stolen from the owner.
c. Any key other than those intended by the owner for use in the lock forcibly opened by the offender.

SECURITY CABINET
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, precious metals or other especially valuable assets are protected. These security containers will
be of a size and quantity, which the nature of the business dictates.
In protecting property, it is essential to recognize that protective containers are designed to secure against
burglary or fire. Each type of equipment has a specialized function and it will depend on the owner of the
facility which type that is going to use.

THREE TYPES OF SECURITY CABINET


1. Safe – a metallic container used for the safekeeping of documents or small items in an office or
installation. Safe can be classified as either robbery or burglary resistance depending upon the use and
need.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 19
2. Vault – heavily constructed fire and burglar resistance container usually a part of the building structure
used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but
smaller than file room.

3. File room – a cubicle in a building constructed a little lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.

o The file room should at most be 12 feet high.


o The interior cubage should not more than 10, 00 cubic feet.
o The ventilation should be through the door.
o It must have a watertight door and at least fire proof for one hour.
o The supporting structure, the walls, floor and roof should be made fire proof.

PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL


In every installation, the use of protective barriers, security lighting, communication and electronic hardware
provides physical safeguards but these are insufficient to maximize the effort of the guard force. A control
point must be established for positive personnel identification and check system. This is to insure that only
those persons who have the right and authority will be given the necessary access to the area.
The most practical and generally accepted system of personnel identification cards badges or passes. This
system designates when and where and how identification cards should be displayed, and to whom. This
helps security personnel eliminate the risk of allowing the access of unauthorized personnel within the
establishments.

TYPES OF PERSONNEL IDENTIFICATION


1. Personal recognition
2. Artificial recognition – identification cards, passes, passwords, etc.

USE OF PASS SYSTEM


1. Single pass system – the badge or pass coded for authorization to enter specific areas is issued to an
employees until his authorization is terminates.

2. Pass exchange system – an exchange takes place at the entrance of each controlled area. Upon leaving
the personnel surrenders his badge of passes and retrieves back his basic identification.
Note: in this system the second badge never leaves the controlled area, thus the reducing the
possibility of switching, forging or alteration.

3. Multiple pass system – this provides an extra measure of security by requiring that an exchange take
place at the entrance of each restricted area.

TYPES OF CONTROLLED AREA

1. Controlled Area – are those area where access is restricted as to entrance or movement by all
authorized personnel and vehicles. It should additionally marked by a fence or other barrier, and
access to it should limited to as few guest as possible.

2. Limited Area – are those within the controlled area where a greater degree of security is required.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 20
3. Exclusion Area – are used only for handling and storage of high value cargo and classified documents.
The number of people authorized to enter this area should be strictly limited and the area should be
under surveillance at all times.

VISITORS MOVEMENT CONTROL

Security should established proper methods of establishing the authority for admission of visitors as well as
the limitation thereat. This security measure would depend on the security on the sensibility of the
installation, but could include the following.

1. Visitor’s logbook – all visitors to any facility should be required to identify them and should be given
a visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors, nature
and duration of visit.

2. Photograph – taking of photographs should also be considered. Extreme caution must exercise in
areas where classified information is displayed to preclude unauthorized taking of picture of the
installation. If a visitor has a camera and it is prohibited to take picture, said camera should be left in
the care of security with corresponding receipt.

3. Escort - if possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.

4. Visitor’s entrance –separate access for visitors and employees of the establishment should be
provided.

5. Time traveled – if there is a long delay or time lapse between the departure and arrival, the visitors
may be required to show cause for the delay.

PACKAGE MOVEMENT CONTROL

Every facility must establish a system for the control of package entering or leaving the premises. However,
desirable it might seem it is simply unrealistic to suppose that a blanket rule forbidding packages either in or
out would be workable. The transporting of packages through the portals is a fact of life, they must be dealt
with in order to prevent theft and misappropriation of company properties.

Thus:

1. No packages shall be authorized to be brought inside the industrial installation, offices and work area
without paper authority. This basic precept help reduce if not eliminate pilferages, industrial
espionage or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles should also
be checked as many pilfered items are hidden in the surface of the vehicles leaving the compound. 3. Any
personnel /visitor entering the installation with a package should deposit the same to the security
and in return receives a numbered tag, which he/she will use in claiming his/her package upon
departing.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 21


VEHICLES MOVEMENT CONTROL AND IDENTIFICATION

Vehicular traffic within the boundaries of any facility must be carefully controlled for safety as well to
control the transporting of pilfered goods from the premises.

Thus:
1. Privately owned vehicle of personnel/visitor should be registered and are subject to the identification
and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of an installation. 3. All visitors with
vehicles should provide the security as to the complete details of their duration of stay, person to be
visited, and other information.
4. All vehicles of visitors should be given a sign /sticker to be placed on the windshield. 5. Traffic
warning sign should be installed in all entrances in order to guide the visitors in their destination as well
to provide them with the necessary safety precautions while they are inside the installation. 6. Security
personnel must constantly supervise parking areas and make frequent spots searches of vehicles found
there.

BUILDING ACCESS CONTROL

At any physical barrier, a security system must possess the ability to distinguish among other authorized
persons, unauthorized visitors, and other persons. This is to assist the security personnel protects sensitive are
and informative within the installation.

Appropriate warning signs should be posted at the building perimeter. Special restricted entry facilities to
public access should be provided. This will be dependent on the degrees of security needed for the protection
of property activity and other processes within the building.

The access to the restricted area shall be limited to authorized personnel who have the direct involvement
with the installation, construction and operation and maintenance of the equipment and systems and or use of
the materials contained within the restricted area. A clear cut policy on the access control should be
disseminated to all personnel of the installation.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 22

ACTIVITY NO. 2

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN

1. What is physical security? What are the factors to consider in determining the physical security needs
of a facility? (10pts.)
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_

2. What are physical barriers and why are they needed in a facility? Provide examples. (10pts.)
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 23

CHAPTER 3
PERSONNEL SECURITY
Of the three main categories of security, personnel security is considered as the most important. This is for
the simple reason that security involves people, both an assets to be protected and as source of security
threats. It is an acknowledge fact that losses are attributed mainly to negligence or active participation of
employees, either through theft and sabotage. This emphasizes the need to set up the system of hiring the
people for the company.

PURPOSE OF PERSONNEL SECURITY

1. To insure that a firm hires those employees best suited for the firm
2. Once hired, to assist in providing the necessary security to these employees while they are carrying out
them functions.

SCOPE OF PERSONNEL SECURITY

1. Personnel Security Investigation (PSI)


2. Security Education

KEY FUNCTIONS OF PERSONNEL SECURITY

1. It serves as a screening device in hiring suitable employees.


2. It provides background investigation services of both potential and present employees, for possible
assignment to sensitive position.
3. It handles investigation of employees suspected of wrong doing.
4. It develops security awareness among employees.
5. It attempts to ensure the protection of employees from discriminating hiring or terminating procedures
as well as unfounded allegations of illegal or unethical activities and conduct.

Personnel Security Investigation (PSI) – is a process of inquiry into the character, reputation, discretion,
integrity, morals and loyalty of an individual to determine the suitability for appointment or access to
classified matter.

GENERAL TECHNIQUES OF PERSONNEL SECURITY INVESTIGATION

1. Background Investigation (BI) – this technique is very expensive but necessary in personnel security.
It serves to verify information on the application form and to obtain other information pertinent to the
decision to employ.

Factors to consider in the conduct of BI

a. Loyalty
b. Integrity
c. Discretion
d. Morals
e. Character
f. Reputation

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 24


COMPONENTS OF COMPLETE BI

a. Applicants Name
b. Date of birth
c. Present residence address
d. Personal history
e. Marital history
f. Residence history
g. Citizenship
h. Physical data
i. Educational history
j. Organizational membership
k. Neighbourhood investigation
l. Character reference
m. Employment history
n. Military history
o. Foreign travel history
p. Criminal record
q. Credit records
r. Applicants signature
s. Date of application

TYPES OF LOCAL AGENCY CHECK (LAC )

a. Barangay Clearance
b. City of Municipal Clearance
c. Local Police Clearance
d. Court Clearance

TYPES OF NATIONAL AGENCY CHECK (NAC)

a. National Bureau of investigation (NBI ) Clearance


b. PNP Directorate for Intelligence (DI)
c. Intelligence Services , AFP (ISAFP) Clearance

2. Positive Vetting –Is the process of inspecting or examining with careful thoroughness, the essence of
vetting is a personal interview conducted under stress. Other information issued during the interview,
such as those discovered in the BI, which confirms or denies which given by the applicants.

3. Prowling - Is the process whereby a subject’s reaction in a future critical situation is predicted by
observing his behavior, or by interviewing him, or analysing his responses to a questionnaire, such as
honesty test.

4. Deception Detection Techniques – this process of using devices in detecting deception during the
interview stage.

5. Financial and lifestyle inquiry – this type of investigation seeks to gather information on income and
mode of living, sometimes referred to as the earning-to-debt ratio.

6. Undercover investigation - this is type placement of an agent in a role in which the agent’s true
identity and role remains unknown ,in order to obtain information for criminal prosecution or for
recovery or limitations of assets losses.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 25


7. Exit interview - this is valuable tool because it gives departing employees an opportunity to list
grievances. It offers to security managers an opportunity to learn of problems not previously known.
SECURITY EDUCATION - is conducted to develop security awareness among employees in the company.
It should cover all employees, regardless of rank or position.

PHASES OF SECURITY EDUCATION PROGRAM

1. Initial Interview - it is the first contact of the prospective employee wherein the interviewer
determines the suitability of the applicant for employment through his given answers on the different
type of questions being conducted. It is in this stage where the interviewer may start providing the
necessary information as to the interview of company security policies and at the same time on the
employee accountability and corresponding penalties that could result from violation there from.

2. Orientation and training- it is in this stage where new employees receive detailed presentation of
personnel security policy. Usually hand-outs or employees manual are being distributed for reference.
New employees also requested to sign acknowledgement that they have been aware of the existing
company policies and will abide the same.

3. Refresher conference - it is a design to remind employees of the company about their responsibilities,
review the guidelines and policies, introduction of new policies and regulation a movement of getting
employees feedback about the company policies that is being implemented.

4. Security reminders - the employed as an indirect approach of educating the employees, such as
posting security posters and distributing fliers.

5. Security promotion - it is the act of emphasizing the importance and role of security achieving the
company goals and objectives. It involves security employee cooperation and support.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 26


ACTIVITY NO. 3

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN.

1. What are personnel security measures and what are their purpose? (5pts.)

_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_

2. Download and fill out a Personal Data Sheet (PDS) form (5 pages). Here is the link
file:///C:/Users/Lenovo/Documents/PDS_CS_Form_No_212_Revised2017.pdf (15pts)
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 27

CHAPTER 4
DOCUMENT AND
INFORMATION SECURITY

In every installation, document and information are indispensable for their daily operations and activities, be
it in the form of a paper, film and magnetic media or in the computer system. Once there is a leakage in the
contents of accompanies document and information, the business operational stability is at stake. It may be a
start of bankruptcy that would lead to its total disclosure.

The leakage of the document and information cost government, business and industry alike, billion pesos. A
rival company or an enemy agent might use an illegally obtain document and information from their own
advantage. For this reason, a comprehensive and information security program is very essential to the
installation in order to focus freely on the attainment of its goals and objectives.

Protection of document and information entails a mammoth task on the part of the executives and the staff of
the installation. There should be a clear understanding on all the types of documents and information of the
organization. Security measures in the classification, handling care, and proper disposition of classified
documents and information must be a primarily concern in order to preserve the confidentiality and integrity
of document and information throughout all phases of its existence.

Document
- Is a written, drawn, presented, or memorialized presentation of thought. Originates from the Latin
DOCUMENTUM which denotes a teaching or lesson.

Document Security
- Protection of documents, classified papers and vital records of a company from loss, unauthorized
access, damage, theft copying, compromise or destruction through proper physical protection, storage
and human action.

PURPOSE OF PROTECTING CLASSIFIED MATERIALS

1. Deter and impede potential spy


2. Assist in security investigations by keeping accurate records of the moments of classified materials.
3. Enforce the use of “Need to Know” principle.

TWO KINDS OF DOCUMENT

1. Personal – letters, diary and notebooks. These should be treated usually the same with official
document.

2. Official – orders, manuals, letters, overlays, maps and magazine.

DOCUMENT / INFORMATION CYCLE

Each document or information has a life cycle in the sense that its usefulness has a beginning and an end. It
passes various stages from the time it is created until it is finally disposed.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 28


The cycle consist of the following:

1. Creation – during this stage, information is discovered and developed. Information can take the form
of handwritten notes, discussion, dictated script, or electronic data. It is commonly concentrated in
laboratories, offices, word processing units and computer.

2. Classification – Undoubtedly, information is created for use. This stage involves a process wherein
people act on the information for the purpose of making a decision based on the information,
soliciting support or informing others. When information is used, it usually includes duplication as
well as distribution. Duplication can be in the form of photocopying, printing or sending through
electronic mail.

3. Storage and Retrieval – Used information should be put away for future use. Storage and retrieval
methods must ensure the integrity of the information, its timely accessibility to authorized users, and
its protection from criminal intervention and disastrous circumstances.

The security measures that must be taken depend on the type of storage center, the storage means and
the storage technologies used. More importantly, the experience and dependability of the personnel
who will handle the storage and retrieval of information must be considered.

4. Transfer – this involves the transfer of information from active to inactive storage. Inactive records
are usually located in remote areas less accessible to users. Special security precautions should be
taken at the time of the transfer and when records are on the way from the place to another.

5. Disposition – this is the last stage of the cycle of information. During this stage, a decision can be
made to retain the information indefinitely at either an active or inactive storage center or to dispose
of it. The method of disposal should depend on the amount of information and the type of media used.
THREE SECURITY CONCEPTS
1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of document.
3. Training is necessary for the practice of NEED TO KNOW principle.

FOUR TYPES OF CLASSIFIED MATTER


1. Top Secret (green color) – is any information and materials the unauthorized disclosure of it would
cause exceptionally grave damage to the nation, politically, economically and military operation.

2. Secret (red color) – is any information and material, the unauthorized disclosure of it would endanger
national security cause serious injury to the interest or prestige or the nation or any government
activity or advantage to a foreign nation.

3. Confidential ( blue color code) –is any information or material , the authorized disclosure of it would
be prejudicial to the interest and prestige of the national or government activity or would cause
administrative embarrassment of unwanted injury to and be of advantage to and be of advantage to a
foreign country.

4. Restricted (white or no color) – is any information and material which requires special protection
other than those determines confidential, secret and top secret.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 29
TYPES OF DOCUMENT
1. Class I – Vital Documents
o In this category these are records that are irreplaceable records of which reproduction does not
have the same value as the original; records needed to recover cash, to replace building ,
equipment’s, raw materials , finished products , and work in process and records needed to
avoid delay in restoration of production , sales and services.

2. Class II – Important Documents


o This includes records the production of which will close considerable expense and labor, or
considerable.

3. Class III – useful Documents


o This includes records whose loss might cause inconvenience but could be readily replaced and
which would not in the meantime present an insurmountable obstacle to the prompt restoration
of the business.

4. Class IV – Non-essential Documents


o This records are daily files, routine in nature even if lost or destroyed, will not affect operation
or administration. This class represent the bulk of records which should not be even attempted
to be protected in the event of disasters. They should, however, be kept in ordinary files ready
for reference, if needed, and usually discarded after some period of time.

CHARACTERISTICS OF INFORMATION
Information is expansive
It is unlike other business resources because it can easily expand to cover a wider scope. Information may
age, but it tends not to diminish; today’s breaking news, for instance, will be an event in history after a few
years. Information tends to accumulate; a discovery on the healing benefits of a plant can lead to the
formulation of a variety of benefits for numerous diseases. Information is compressible and transportable at
very high speeds, and can impart advantages to the holder as demonstrated by a single memory card that can
save hundreds of photos.

Information requires barriers


Just a decade ago, information assets were stored in computer systems with electronic barriers inside
centrally controlled equipment and located within the protected confines of a computer room. Nowadays,
computers have become widely dispersed through computer networks protected through firewalls. The future
trend seems to rely on cloud based information and data exchange (called internet area networks) protected
by hosts through passwords and other computer security measures.

Information is costly and important


Organizations should protect information assets because it is costly to acquire and maintain, and it is
important to the success of the business enterprise. In industries like research and development, education
and publishing, information fuels their business. It has significant value in much the same sense that people,
physical property and financial assets have value.

Information is coveted
When something has value, someone will want an opportunity to take it away. For example, a new cellular
phone technology being developed by a big telecommunications company might not be accessible to the

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 30


pickpocket who preys to public places, but it can be valuable to an intelligent, clever and professional spy
who can steal the information and sell it to the company’s competition.

Information has a limited life


At some point in time, certain information can lose all or most of its value. If a business owner is in
possession of valuable information, he will want to extract from it the maximum worth possible by making it
available only to those whose talents can exploit it. When news of this information spreads to more and more
people. Its value can diminish.

Information is difficult to protect


In a world of advanced information technology, several employees may hold and share sensitive corporate
information on their laptops, memory drives and emails. Oftentimes confidential information such as prices,
designs and production schedules need to be shared with suppliers, customers and shippers. Protecting
information is difficult but it should be a significant concern for every organization.

Information is voluminous
Another reality is that companies are dealing in larger volumes of information than ever before. Great
amounts of raw data are needed to make fully developed analysis. From customer information to critical
business strategies, financial operational data and intellectual property, not only is there more information
but it is high impact information. All of these have serious security vulnerabilities.

Sensitive Information
- refers to information that has value and should be protected, including the following:
• Propriety business and technical information.
• Personal data concerning applicants, employees and former employees.
• Propriety information owned by partners and obtained through an agreement.
CLASSIFICATION OF SENSITIVE INFORMATION

1. Secret – this information the unauthorized disclosure of which could cause serious damage to the
organization’s business. Its use and access to it are strictly limited.

Examples:
• Trade secrets
• Plans to merge, divest, acquire , sell, or reorganize
• Information that could affect the price of shares
• Information with high political or legal sensitivity
• Information prejudicial in the interests or reputation of the organization.

2. Restricted – this information of such value or sensitivity that its unauthorized disclosure could have a
substantially detrimental effect on the organization’s business.

Examples:
• Marketing strategies
• Customers file
• Agreements and contracts
• Contentious or litigable matters

3. Private – this information relating to employees.

Examples:
• Salaries, bonuses, and wages
• Health and medical matters
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 31
• Disciplinary actions
• Job performance

PROPRIETY INFORMATION

Information
- Is considered propriety when it is not readily accessible to others; it was created by the owner
through the expenditure of considerable resources; or the owner actively protects the information
from disclosure. This can include secret formulas, processes, and methods used in production; or
it could be the company’s business and marketing plans, salary structure, customer lists, contracts,
and details of its computer systems.

Propriety information includes intellectual; properties that are recognized and granted varying degrees of
protection by governments, such as the following:

1. Patents – grants issued by a national government conferring the right to exclude others from making ,
using , or selling the invention within that country. Patents may be given for new products or processes.
Violations of patent rights are known as infringement or piracy.

2. Trademarks – words, names, symbols, devices, or combinations thereof used by manufactures or


merchandise to differentiate their goods and distinguish them from products that are manufactured or sold by
others. Counterfeiting and infringement constitute violations of trademark rights.
3. Copyrights – protections given by a national government to creators of original literary, dramatic,
musical, and certain other intellectual works. The owner of a copyright has the exclusive right to reproduce
the copyrighted work, prepare derivative works based on it, distribute copies and perform or display it
publicly. Copyright violations are also known as infringement and piracy.

4. Trade Secrets – formulas, patterns, compilations, programs, devices, methods, techniques, and processes
that derive economic value from not being generally known and not ascertainable except by illegal means. A
trade secret violation in the vocabulary of the law is a misappropriation resulting from improper acquisition
or disclosure. The key elements in a trade secret are the owner’s maintenance of confidentiality, limited
distribution and the absence of a patent.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 32

ACTIVITY NO. 4

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN

1. What are the factors to consider in document and information security? (5pts.)

_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_

2. What are the stages of the information cycle? Explain. (5pts.)

_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
_________________________________________________________________________________________________________________________
_
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 33

SECURITY HAZARD

Security hazard

CHAPTER 5

- Any act or condition which may result in the compromise of information, loss of life and loss or
destruction of property or disruption of the activity of the installation.

TWO TYPES OF HAZARD

1. Natural hazard
- These are hazards which arise from natural phenomenon.

The following are types of natural hazard or disasters:

o Floods caused by typhoons


o Earthquakes
o Storm ( typhoons , cyclones, tornado and hurricane)
o Lighting storms
o Extreme temperature and humidity

2. Human –man made hazard


- These are hazards which are the result of a state of mind, attitude, weaknesses or character traits of
one or more persons. They can be acts of commission or omission, both overt and covert, which can
disrupt operation of a plant or installation.

The following are types of human or man- made hazards:

o Carelessness – accidents and dissatisfaction


o Disloyalty – subversion and sabotage
o Espionage, pilferage and sabotage
o Vandalism

SABOTAGE AS A SECURITY HAZARD

Saboteur
- He is the most dangerous for whom security will have to deal with while planning and implementing
security measures and techniques.

- He is an ordinary looking as the next guy but in his mind, he has the training in deception,
knowledgeable in incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.

- He can work alone, in groups or simultaneously in several places.

POSSIBLE TARGET OF SABOTEUR

- Armed forces installation


- Natural resources – mines, forests , farms and farm products
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 34
- Industries – buildings, power sources, machinery , fuel and etc.
- Warehouses depots, communications, public utilities, etc.

COUNTER MEASURES AGAINST SABOTAGE

1. Use of an efficient, alert and trained guard force.


2. Use of Physical security aids like barriers, personnel and vehicular control, intrusion devices,
communication system, and electric aids.
3. Proper screening of personnel
4. Identification and movement control system
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of braches of security.
9. Security education and indoctrination.
10. Good housekeeping methods.
11. Effective and compatible emergency planning.
12. Regular audit.
13. Continuing background checks.

ESPIONAGE AS A SECURITY HAZARD

Espionage Agent
- He is very dangerous adversary and his skills in deception and his cunning should never be
underestimated.

- He is usually a person of extensive training and will be highly effective in gaining the confidence of
people and of extracting information of value to be relayed to his employer or handler.

- Even how well-trained an espionage agent he might be, he is human like saboteur and he can be
defeated in his own game if proper methods and techniques are undertaken.
SOME METHODS EMPLOYED BY ESPIONAGE AGENT

1. Stealing of information from employees.


2. Stealing information from records or others sources.
3. Using various methods of reproducing documents products, equipment or working models. 4. Using “
front “ as commercial concerns , travel agencies , associations , business groups and other organizations
to obtain confidential information or data.
5. Using various form of threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning an individual or
organization.
7. Picking or securing information in social and other gatherings.
8. Penetration and operation tactics.

COUNTERMEASURES AGAINST INDUSTRIAL ESPIONAGE

1. Careful and complete pre- employment measures designed to control threats of industrial employee. 2.
Continuing personnel check on employees and particularly personnel on sensitive positions even already
employed.
3. Restricting of movement of personnel in the premises of the plant.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 35
4. Only property cleared personnel should handle classified document.

SUBVERSIVE ACTIVITY AS A SECURITY HAZARD

THREATS OF SUBVERSIVE ACTIVITY

1. It can be local or national in nature and their mission is to undermine the authority weaken the
organization, and eventually take over. This can be business or any activity.
2. This can be in the form of rumour mongering, propaganda, undermining morale, and injecting defeatist
attitudes, and other emotional approaches.
3. It is an activity not easy to detect.

COUNTERMEASURES TO SUBVERSIVE ACTIVITY

1. The spreading of rumours, written materials, slogan or any other devices to confuse the work
population and discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and “slowdowns” can be called
disrupt the normal operation of a plant or installation.
3. Security force should be alerted for person trying to result others in organizing movements for peace,
anti- colonials, anti-trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations” should report this
activity to security.
5. Other methods of subversion like untied fronts, mob action, terrorism and sabotage will do to gain the
subversive ends.

PILFERAGE AS A BUSINESS HAZARD

1. Pilferage is one of the most annoying and common human hazards which security has to deal with.
This activity if uncontrolled can be a big loss.
2. Become financial drain if not a menace to smooth and orderly operation.
3. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may be labelled
as pilferage.

Pilferage
- This is one of the most annoying and common human hazards which security has to deal with. This
activity is uncontrolled can become a financial drain, if not a menace to smooth and orderly operation.
Due to this, security force has to concentrate large number men to check this nefarious and
disconnecting activity. Petty pilferage is frequent, hard to detect, difficult to prove and win conviction
but definitely dangerous to ignore.

TWO TYPES OF PILFERER

1. Casual Pilferer
- One who steals due to his inability to resist the unexpected opportunity and his little fear of detection is
no plan or premeditation and he is usually a “loner” on the job.
- The temptation to pick up the article is basically due to poor security measure. - The
implication of casual pilfering is the big cumulative cost if it remains unchecked.

2. Systematic Pilferer
- One who steals with preconceived plans and takes away any or all types of items or supplies for
economic gain.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 36
- Pilferer of this kind can be employees or outsiders of the establishments.

ANATOMY OF PILFERAGE

1. Where need or desire exists and opportunity is present, theft is almost sure to result. 2. Pilferage occurs
everywhere. Opportunities for pilferage increase when supplies or goods are transported or transferred
from one place to another.

FACTORS CONSIDERED BY A PILFERER TO BE SUCCESSFUL ON HIS ACT

1. Location of items to be pilfered – the systematic pilferer surveys shopping and store areas or through
contracts from the firms.

2. Access to the items – techniques can be from fake documents, bribing of guards, outsmarting security,
creating disturbance and other methods to divert attention while pilferage goes on.

3. Removal of item – this can be done as wearing the stolen shoes or shorts, concealment in the body or
vehicles, use of false documents, etc. Driver may conceal pilfered items in his vehicle.

4. Disposal of items – there is a need for “fences” “brokers” or “clearing house” for these “hot” items.

COUNTERMEASURES FOR CASUAL PILFERAGE


1. “Spot” check on outgoing vehicles and persons.
2. An aggressive security education and indoctrination program with emphasis that “crime does not pay”.
3. Superiors should set example of integrity and desirable moral climate for employees in the
establishment.
4. All employees must be enjoined to report or nay loss to security.
5. Inventory and control methods should be done especially to pilferable items.
6. Control of tools equipment and sets.

COUNTERMEASURES FOR SYSTEMATIC PILFERAGE

1. Guards and electric surveillance on all exits.


2. Package and material control system.
3. Parking area outside perimeter fence of establishments.
4. Careful screening and background checks on applicants to weed out potential thieves. 5.
Investigation of all losses quickly and efficiently to determine “modus operandi” or obtain clues. 6.
Alert all patrols to check areas and buildings for possible concealment of stolen properties. 7. Install
mechanical, electrical, electronic detection and alarm devices where needed and applicable. 8.
Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking facilities and areas for vehicles and
persons.
10. Store bulk quantities of pilferable items in enclosed security areas and distribute them to using section
in limited quantities.
11. Establish accurate inventory and accounting methods for procurement, use and
disposal. 12. Establish close liaison with governmental law enforcement and intelligence
agencies.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 37

ACTIVITY NO. 5

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN

1. What are examples of security hazards?

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
2. What are the factors to assess in defining a security problem?

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 38

CHAPTER 6
VIP SECURITY

VIP Security aims to protect people from physical violence, whether from the state or external states, from
violent individuals and sub – state actors, from domestic abuse, or from predatory adults. For many people,
the greatest source of anxiety is crime, particularly violent crime.

1. VIP - Very Important Person


Example: State President, High Ranking Public and Private Officials, etc.

2. Escort – one or more persons accompanying another to give guidance or protection or to pay honor.

2. Bodyguard – a person or a grouped of persons usually armed and responsible for the physical safety
of one or more specific person.

ORGANIZATION OF VIP SECURITY

1. Area Security
- Covers the surrounding areas of engagement.
- Conducts prophylactic (neutralize the area), operations in the area of engagement.

2. Perimeter Security
- Secures the immediate areas surrounding the place of engagement.
- Usually these are the uniformed men.

3. Advance Security
- This is the advanced security at the place of engagement before the arrival of the VIP. -
Sanitize the engagement area.

4. Close –in Security


- Accompanies the VIP where ever he goes.
- Maximum of four (4) persons.

5. Reserve Security
- On standby for possible back – up / re-enforcement.

6. Routine Security
- Neutralize the possible route of the VIP party.

PROPHYLACTIC OPERATION

1. Patrolling
2. Putting up of check points, blocks and gates.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 39


FOUR COMMON ELEMENTS IN ALL ASSASSINATION

1. Victim
2. Assassin
3. Modus Operandi ( Mode of Operation)
4. Opportunity

REASONS WHY DO THEY NEED BODYGUARD

As a result of the “increased concern about the kidnapping threat” there has been an escalation in the demand
for bodyguards. Thereby, BRAINS is needed and not BRAWN (meaning muscular in power) has been
offered as the basis for body guard selection. The bodyguard should fit the image and the life style of the
individual he is guarding.

SOME PROTECTION TECHNIQUES WHILE MOVING IN FOOT

1. Individuals in the vicinity of the persons being protected should be observed especially their hands. 2.
If a weapon is displayed, the weapons should be attacks so as to be ready to respond effectively. 3. The
bodyguards should anticipate potential attacks so as to be ready to respond effectively. 4. If a threatening
situation begins to develop the individuals being protected should immediately be removed from the
danger area.
5. If two bodyguards are used and attacks develop, one bodyguard should remove the individual being
protected while the other neutralized the threat. The bodyguards should adequately protect the
individual being guarded without offending the public of those in the area. The primary objective is to
protect the target person, not apprehend the attacker. Escape is certainly more important than winning
the “skirmish” meaning minor primary conflict or dispute.
6. If one bodyguard is utilized he/she will usually walk in front and slightly to the left of the person being
protected.
7. When two bodyguards are utilized, one will take a positioned in front to the left. While the second,
will take a position to the rear and slightly to the right.

PROTECTION IN TRANSIT

An individual is particularly vulnerable while moving from one place to another. Hence a regular route and
time travel should be established. Frequent changes of direction, travel time mode of transport, coordinated
within the overall protection plan, will make it difficult for an abduction to plan of an ambush or to interpret.
The individual should never walk alone in unpopulated areas. If an automobile during an attempted
abduction, the automobile may be used not only as a means of transportation, but as defensive shield or even
as an attack weapon. Therefore, an individual in an automobile should not usually attempt to escape an
attack by leaving the vehicles. The body at the vehicle can be utilized to take evasive action so that it will be
possible to escape from an attack.

VEHICLE SECURITY

The vehicle utilized by a potential kidnap victim should not be placed unattended in a parking stall with the
individual name on it. If possible, when not in use, the vehicle should be parked in a locked garage under
guard and not on the street. The doors of the vehicles should be locked in all window tightly closed, whether
occupied or non-occupied. Consideration of tamper alarms on the vehicles and “panic” or trouble alarms
bottoms in the parking area.

The potential victim, should not use the vehicle at all times, but should changes automobiles daily if possible.
All serving should be done by a commercial organization which has been checked out and cleared, locking

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 40


gasoline caps and locks for the hoods are suggested. Gas tanks should never contain less than half a tank to
avoid running out of fuel.

ATTACK TACTICS

Two types of attack tactics against vehicles maybe expected.

1. Moving Attacks
- The approach will usually be made from the left or passing side, and the attacker will attempt to move
over into the path of the victim’s vehicle, forcing it to stop. Approach, would be from the right in the
left side drive countries. The ideal location for abduction is where cross street or turn off is available
to allow the attacker on easy quick way to escape. If two vehicles are used to attack, one wills cut –off
the victim’s vehicles. Forcing it to stop. The second may be then move up on the left side. The
abductor will make the attack, take the victims from the vehicles and escape as quickly as possible.

2. Ambush Attack
- The kidnapper will attempt to stop the victim’s car with in a zone he established by blocking the
roadway or by shooting the driver.

DRIVER RULE

The driver should always be planning ahead and he alert as to what is happening in at least two or three
blocks of normal city driving. Vehicles that are parked in the roadway or in unusual position, obstructions,
constructions, etc. should be viewed with concern. Also Side Street or roads access, Ramps, underpasses,
service roads, etc. Are potential trouble spots, and so particular attention should be given to them. Adequate
manoeuvring distanced should be maintained between the potential victim’s vehicles and those in traffic
ahead. Also the lane nearest the center of the roadway should be used. It allows manoeuvring room. The
driver should maintain near normal traffic speeds while keeping the vehicle under control at all times, be
alert as to what is in front , behind and on the sides of the vehicles which seems to be leading or following
the rear vision mirror should be done constantly , since most attacks originate from the rear.

KIDNAPPERS FALLS INTO FOUR CATEGORIES

1. Neither opportunities nor Novice Criminal


- This constrained of poor planning and lack of true criminal’s expertise.

2. Religious or politically Motivated Individuals


- This arte the Do or Die who are willing to sacrifice their lives and or willing to kill their victims to
publicize a cause.

3. Mentally derange Individual


- They may kidnap or kill for the limit thrill, from confusion, or due to psychosis.

4. Professional Criminals
- They are motivated for kidnapping usually centers on financial gain, with extensive planning to ensure
his or her escape and the ability to spend illegally obtained funds.

CRISIS MANAGEMENT

Crisis
- Is a decisive point of a condition, improper handling on which immediately places under threat or
danger of one’s life, limbs, freedom and property.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 41


Crises Management
- Is the totality of action of handling or responding to a given crisis situation.

Crisis Management Plan


- Is a complete and comprehensive plan of actions designed to protect life, limbs, freedom and property,
before, during, and after any given crisis situation.

TWO KINDS OF CRISIS ACCORDING TO ORIGIN

1. Natural Crisis – events caused by force of nature.


2. Man –made Crisis – events caused through instrumentality of men.

Work Stoppage – is condition of an enterprise whereby normal work operation is stopped as a result of a
strike and lockout.

TWO MAJOR CAUSES OF WORK STOPPAGE

1. Strike – is a temporary stoppage of work by concerned action or employees as a result of a current labor
industrial dispute.
2. Lockout – is the temporary refusal or any employer to furnish work.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 42

ACTIVITY NO. 6

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN

1. Why people need bodyguard?

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

2. How to prevent man made crisis?

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 43

CHAPTER 7
COMMUNICATION SECURITY

The ability of an ancient man centuries ago to communicate by means of sign could be attributed as the key
for surviving the store era. And comes the new generation where the signs have been transformed into higher
forms as man learned the start of gregarious leaving by means of oral or written way of communication. This
ideal way of transferring thoughts and ideas made man supreme and progressive and later developed the
Medium or common language and the channel of which the language could be transferred to a certain
distance.
So today, civilized man communicates with an accepted and sophisticated written or oral language. The
medium has been improved by the introduction of ratio and electronics, but still man could not understand his
neighbor and vive –versa. This is due to the complexity of our lives at present and the introduction of new
languages and sub-dialects.
In security profession, it could not be denied that the field of operation is concentrated on dealing with
different people and it deemed proper for any security personnel to know the most common medium of
communication to make him effective on the performance of his job.

DEFINITION OF TERMS
Communication
- The transfer of thought from the mind of one person to the mind of another though a common medium or
channel.
- Is the process of sending and receiving messages to achieve understanding.

Conference
- The exchange of thoughts or opinions by conversations, or seminar. The exchange could be from oral,
written and other forms.

Medium of Communication
- Refers to the common language known for two or more individuals who want to exchange thoughts or
ideas with each other.

Example:
English is the dominant medium of communication in the world.
Ilocano is the common medium of communication in Baguio City.
Channel of Communication
- Refers to the equipment’s being used to transfer thoughts or ideas.

THE FOLLOWING ARE THE COMMON EQUIPMENT BEING USED FOR COMMUNICATION

1. Hand held radio or Walkie talkie – communication on electromagnetic waves transmitted through
the space.

2. Basic types of radio’s:

a. Amateur radio –for hobby and emergency purposes


LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 44
b. Commercial radio- for business purposes

CARDINAL PRINCIPLES IN USING RADIO

1. Speak clearly and distinctly at all times.


2. Think and act promptly on emergency situation.
3. Thorough understanding of the capacity of the communication system.
4. Knowledge of the rules and regulation and the use of codes if deemed necessary.

REQUISITES FOR MODULATION /VOICE TRANSMISSION

a. Alertness – give the impression that you are alert and wide awake and interested as the person calling.
b. Pleasantness – build a pleasant office image with voice or smile.
c. Naturalness- use simple language and avoid slang.
d. Distinctness- speak clearly and relax to avoid garbled transmission.
e. Expressiveness – normal tone of voice in moderate manner not too fast and not too slow.
DUTY CYCLE OF PPT (PRESS TO TALK)

- As a rule transmitting message in short duration carries 3 to 5 words at a time.

APPROACHES TO ADHERE THE DUTY CYCLE

1. Use of phonetics alphabet and numerals


Ex. From ALPHA to ZEBRA

2. Use of 2400 –hours system and Zulu time


3. Police ten APCO ( Association Public Safety Communication Officers INC) signals
Ex. 10 -1 = received
10 -2 = loud and clear
10 -4 = copied message
4. Use more codes : PPT and APCO

3. Telephone – combination of apparatus of converting speech energy to electrical wave then transmit
the same to a certain point then finally re-converted the electrical energy to audible sound.

4. Intercom – wired system of communication being used with in a building or compound for direct
exchange of calls.

5. Audio Hailer – portable transistorized and battery –operated amplifier that magnify the voice of the
user.

6. Computer facsimile – modern type of communication equipment.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 45

ACTIVITY NO. 7

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN

1. What are the main principles of a radio talk?


_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

2. What are the qualities of good voice transmission?

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 46

CHAPTER 8
SECURITY SURVEY AND
INSPECTION

The basic instrument for determining security vulnerability is the security survey. Most description of
security surveys refers principally to checklists, audits or inventories of security conditions.

Security Survey
- is defined as a critical onsite examination and analysis of an industrial plant, business a home or public
or private institution done to ascertain the facility’s current security status, to identify deficiencies or
excess in current practices to determine what protection is needed and to make recommendations for
improving the overall level of security at that installation. As previously noted, security survey is a
general term that often encompasses other related procedures.

OBJECTIVES OF SECURITY SURVEY

1. To determine existing vulnerabilities to injury, death, damage, or destruction by natural causes. 2. To


determine existing vulnerabilities or corporate assets due to outside criminal activity. 3. To determine
existing vulnerabilities of corporate assets due to criminal activity within the organization.
4. To determine existing conditions of physical security of corporate property.
5. To measure compliance of employees to security.

PLANNING A SECURITY SURVEY

1. Verify the need


2. Obtain organization support
3. State the survey’s executives
4. Determine how data will be gathered
5. Develop alternatives
6. Prepare a schedule of activities

Security Inspection

- Another important activity, which is necessary to insure the integrity of the overall security programs, is
security inspection. This complements security survey in its attempt to prevent losses of company
properties.

Conducted for two reasons:


1. To check on the degree of compliance with the recommended countermeasures 2. To
determine the effectiveness and adequacy of the countermeasures which are in effect

TYPES OF SECURITY INSPECTION

1. Continuous Inspection – to keep with the constant changes in the organization, changes in our
security terms of attitudes, life-style and moral values, and rapid advancements of technological
modifications are all around us, the inspection must be an on-going and never ending activity.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 47
2. Formal or Informal

▪ Formal Inspection – is one which some fanfare is attached. It usually precede by an


announcement , and the unit under inspection “prepares” for events, including some extra
housekeeping activities that would not otherwise happen at that point in time.

▪ Informal Inspection – is usually the result of a long and firmly entrenched inspection program,
understood by all and accepted as part of the organizational life.

3. Structured or Unstructured Inspection


Structured Inspection – is one that moves systematically from one area to the next and so on. There is
a formal or logical sequence to the process. For instance, the audit may start with the first line of
defense, then the second line, then the third line, etc.

Unstructured Inspection – is conducted in a random manner. There is no formal or logical


sequencing. For example, the inspection may start with the countermeasures for propriety
information, then emergency plan, followed by investigation and so forth.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 48

ACTIVITY NO. 8

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN


1. What is security survey and why is it important? (5pts.)

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

2. What is security inspection and why it is important? What purpose does it serve? (5pts.)

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 49

CHAPTER 9
EMERGENCY AND DISASTER
MANAGEMENT

Emergency planning is one of the harsh realities that an installation will encounter is the occurrence of a
disaster or emergency. Any of these can be regarded as a potential event. Occurrence or condition outside
the scope of normal business activities with significant potential for death, injury, property damage, assets
diversions or other favorable impact upon the installation. It is for this reason that the owner of the
installation or its executives will decide in advance what to do and how to counter the effects of any
emergency in order to assure continuity of operations.
Emergency
- It is a sudden, generally unexpected occurrence or set of circumstances demanding immediate action.

Disaster
- It is the unscheduled event that causes by emergency. It upsets the performance of valued activities of
the community in two ways: there is a drastic increase in demand for certain services and there is
reduction in the capability to perform services.

Disaster Management
- It is the systematic management of disaster from the initial stage to its termination using various tools
to minimize loss of lives, damage to property and enhance rehabilitation.

Crisis
- It is the turning point of a disaster or emergency, if not contained or controlled.

TYPES OF EMERGENCY
1. Earthquake
2. Typhoon
3. Tsunami
4. Volcanic eruption Fire
5. Fire
6. Explosion (bomb, flammable liquids, gases, etc.)
7. Building collapse
8. Leakage of gas or toxic fumes
9. Bomb threat
10. Strikes
11. Work accidents
12. Enemy attack/action

KEY STEPS IN EMERGENCY PLANNING

1. Get in touch with local civil authorities.


2. Visit neighboring plant/installation.
3. Survey the installation for possible hazard and take immediate action to lessen or eliminate them. 4.
Call an organization meeting of heads of services employee representatives and key personnel. 5.
Establish an organization with specific task to function immediately before, during and following a
disaster.
6. Define the disaster programs.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 50


7. Establish a method for utilizing resources on hand and for obtaining additional resources at the time of
disaster or emergency.
8. Provide a recognizable means for moving from normal operation to the emergency made of operation.

BASIC CONSIDERATIONS IN EMERGENCY PLANNING

1. Goals of the emergency plan.


2. Emergency plan should be in writing.
3. The plan should be precise and specific.
4. A separate plant should be prepared for each type of disaster, which has a probability of occurring.
5. Key elements of plan: (what to do, who will do it).
6. General and individual awareness.
7. Checklist before formulating a detailed emergency plan.

Emergency Response Team


- An Emergency Response Team must be established to become active during increased threat levels or
when an emergency situation occurs. Your special threat plan must describe the organization, training
and function of the team.

THE EMERGENCY RESPONSE TEAM MUST CONSIDER THE FOLLOWING:

1. Who will make decisions and have final authority for the team as a whole.
2. Who will be members of the team and what are their responsibilities?
3. What will be the missions of the team?
4. The tasks of the other agencies or individuals.
5. The training needed to prepare team members to operate in stressful situations. 6.
Contingency planning beyond that involved in normal day-to-day operations against threats. 7.
The unexpected –the incident will not take place as planned.

Responding to an emergency situation requires special capabilities and considerations. First the
emergency response team must identify the kind of emergency. Then, the operation plan
(OPLAN) formulated for the said emergency must be put into effect as quickly as possible.

RESPONDING TO TACTICAL SITUATION

1. Bombing – if the terrorist/adversary plant bombs, then you must assume other bombs have been
planted. Remove everyone from the scene to a safe area. Anyone near the scene at the time of the
explosion must be interviewed. Keep in mind that the people being interviewed may, in fact, be the
terrorist/adversary who planted the bomb. Explosive Ordinances Division (EOD) must further check
suspected devices.

2. Ambush/Attack – always assumes the terrorist/adversary are still in the area. The initial response
force renders aid to the victims.

3. Establishes a defensive perimeter – clearing of the area is conducted before crime scene investigation
begins. All vehicles and exits from the area must be controlled and inspected.

4. Kidnapping – in most cases of kidnapping you will not be aware that a kidnapping has occurred until
the terrorist has the victim safety secured elsewhere. The immediate response is to dispatch teams to
provide protection for other possible targets, including members of the victims, family. Then the
Emergency Response Team is activated. The team can materially aid the commander in dealing with
the kidnapping. They could recommend possible courses of action.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 51


5. Hostage/Barricade situation - the worst possible scenario you could be confronted with is a
prolonged hostage/barricade situation. The initial response force secures and isolates the incident
scene. No one must be allowed to enter or leave. Witnesses names are recorder, and the witnesses are
directed to a safe location to wait for further debriefing. The Emergency Response Team is activated.

6. Arson – Terrorist/Adversary use incendiary devices to commit arson. This is done during an organized
civil disturbance (throwing a firebomb) or against a specifically targeted building. They also use
incendiary devices to destroy vehicles .As with bombs, they often use time delay mechanisms to
allow themselves time to leave the area before the fire occurs.

SECURITY MEASURES AGAINST BOMBS AND BOMBS THREATS


Although it is very hard to detect the attack of a terrorist or adversary, an establishment can possibly
minimize if not totally eliminate the occurrence of bombing incident within its premises.

THE FOLLOWING MEASURES ARE SUGGESTED


1. Strictly implement the inspection procedures of all bags, knapsacks, boxes, merchandise etc. that will
enter the premises.
2. Suspicious locking packages, paper bags, etc. left alone should be cautiously scrutinized as possible
bomb.
3. When suspected bombs are noted, security personnel/employees to immediately contact the
authorities.
4. Be observant of people roaming around your area doing nothing. Vendors, tricycles, knapsacks/bags
should be driven out. They may be used as couriers of bombs.
5. Security personnel must always observe people leaving behind bags/packages/boxes in the garbage
cans/bins in the premises.
6. Be observant of cars/motorcycles riding individually who are suspiciously observing constantly the
establishment.
7. Be cautious in opening envelopes and packages sent by unknown individual and return address. 8. The
greatest safeguard against the effect of bomb threats is to prevent entry of unauthorized persons into
certain area, whenever possible.
9. Restricted entry and positive identification of staff and visitors can be significant in assessing the
seriousness of any given threat.

DON’TS IN HANDLING SUSPECTED BOMB PACKAGES


1. Don’t attempt to open packages.
2. Do not submerge in water due to conductivity of electrical circuit and or possible violent reaction of
chemical agent.
3. Do not in discriminatory shake or jar suspected package due to the possibility of disturbing the
trigger mechanism.
4. Do not cut the string or unwrapped package due to the possibility of pressure release type device. 5.
Do not puncture or cut the box with metallic object as the possibility of electric power maybe
employed.
6. Do not accept identifications markings on any suspected packages as legitimate.
7. Do not allow radio transmission within the vicinity.
8. Do not switch on the lights or any electrical switches just to light up dark room/areas.
9. Do not use sirens, megaphone or any loud noise -emitting devices.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 52
RESPONDING TO BOMB THREAT
Each threat received through any means of communications should be treated as real and must be forwarded
immediately to the proper authorities. Training is essential to deal properly with a bomb threat incident,
instruct all personnel especially those at the telephone switch board on what to do if a bomb threat is
received. The receiving party must remain calm and courteous. Try to obtain as much information as
possible from the caller.
TAKE NOTE OF THE FOLLOWING PROCEDURES:
1. Get the identity of the caller.
2. Take note of the following characteristics:
o Male or female
o Voice: young , middle age or old sounding voice
o Accent of voice
o Speech impediments or peculiar voice characteristics
o Any background noise
o Does the voice sound familiar
3. The exact words of the person placing the call.
4. Show no emotion on the phone.
5. Know the exact location of the bomb.
6. Ask for the description of the bomb/composition of the explosive.
7. Repeat the message to the caller whenever possible and risk for confirmation.
8. The receiving party should remain calm and courteous. He should listen carefully and write down
accurately the information the caller provides.
9. If possible, refer the caller to a supervisor in authority to exact more information.
10. Apply delaying tactics and engage the caller in prolonged conversation.
11. Take note of the exact time the caller hung up.
12. The person receiving the bomb threat should attempt to ask the caller certain questions:
o When is the bomb going to explode?
o Where is the bomb right now?
o What type of bombs it is?
o What does the bomb look like?
o What will cause the bomb to explode?
o Why did you place the bomb?
13. Remember that the caller may not answer your question, but any additional information that he may
relate will be helpful.
14. It may be advisable to inform the caller that the building is occupied and the detonation of a bomb
could result in death or serious injury to many innocent people.
15. Once the telephone threat is received, notify your local police station.

HANDWRITTEN OR TYPED NOTES


Documents and other materials received should be carefully handled to preserve marks, fingerprints, etc. for
examination by competence authorities. These should be forwarded immediately to proper authorities for
analysis and evaluation. Written messages should never be ignored.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 53


PERSON TO PERSON OR DIRECT THREAT
1. Notify security supervisor immediately.
2. Keep the person making the threat or indicating knowledge of a threat under surveillance until relieved
by the superior.
3. Take note of the age, height, weight, sex, color of eyes/hair/skin, clothing, unusual characteristics such
as lameness or any peculiarities of the person under surveillance. Observe other personal behavior, if
any.
4. If the person leave the scene, take note of the make, model, color, plate number and marking of the
vehicle used.
5. Do not underestimate the size of the package like just a pack of cigarette or lighter, it could be a
powerful explosive.
6. Above all, DON’T PANIC.

WHAT TO DO IF A SUSPECTED BOMB IS LOCATED

1. Evacuate personnel at least 300 feet away from the bomb.


2. Turn off the electrical and gas units.
3. Do not touch or move unknown objects.
4. Secure the area.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 54

ACTIVITY NO. 9

Name : Score :
Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN

1. What to do if you receive a bomb threat via telephone?

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

2. What is the difference between disaster and emergency?

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 55

CHAPTER 10
SECURITY INVESTIGATION

Security investigation - is a planned and organized determination of facts concerning specific loss or
damage of assets due to threats, hazards or unsecured conditions.

ELEMENTS OF INVESTIGATION
1. Investigator
2. Purpose
3. Subject of Investigator

TOOLS OF INVESTIGATION
1. Information – knowledge which the investigator gathers from other persons.

a. Acquired from regular sources- conscientious and public –spirited citizens, company
files, school files or records file of other agencies.

b. Acquired from cultivated sources – paid informants, bartenders, cab drivers,


acquaintances.

2. Interrogation – the skillful questioning of a person who is reluctant to divulge information concerning
the offense under investigation.

3. Interview – the simple questioning of a witness who has no personal reason to withhold information.

4. Instrumentation – the application of instruments and methods of physical sciences to the detection of
physical sciences to the detection of crimes. In other words, the sum total of the application of all
sciences in crime detection otherwise known as criminalistics.

THREE PURPOSE OF INVESTIGATION


1. To identify the offender.
2. To locate the offender.
3. To provide evidence for his guilt.

METHODS IDENTIFYING THE OFFENDED


1. Confession – acknowledged, disclosed or admitted.
2. Eyewitness/testimony – solemn declaration.
3. Circumstantial evidence – evidence which gives ground or belief as to fact or guilt.
4. Associative evidence

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 56


STANDARD METHODS OF RECORDING INVESTIGATIVE DATA
1. Photography
2. Sketching the crime scene
3. Written notes
4. Developing and lifting fingerprints
5. Gathering physical evidence
6. Plaster cast
7. Tape recording of sound
8. Video tape recording of objects and sound
9. Written statement of subjects and witnesses

DIFFICULTIES IN THE INVESTIGATION


1. Absence of eyewitness/witnesses
2. Motive Unknown
3. Lack of physical clause ( evidence)

QUALITIES OF AN EFFECTIVE INVESTIGATION

1. Objective – all facts are discussed as perceived without any distortion and the manner of presentation
is free from unwarranted.
2. Thorough – full detail, exhaust all available means, factual to arrive in a sound and convincing
conclusion.
3. Relevant – significant and demonstrated its relation to one another.
4. Accurate – free from error.
5. Current – terminology is generally accepted.

GUIDELINES IN INVESTIGATION
1. Preliminary Investigation
P Proceed to the scene promptly and safely

R Render assistance to the victim, if any

E Effect the arrest of the offender

L Locates and identifies the witnesses

I Interview the complainant and witnesses

M Maintains the crime scene and protects the evidence

I Interrogate the suspect/offender

N Note all conditions, events and remarks

A Arrange for the collection of evidence

R Reports the incident

Y Yields the responsibility to the follow –up investigation


2. Investigation Proper
a. Photograph the crime scene
b. Search the crime scene
c. Crime scene sketch
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 57
d. Care of evidence

3. Methods of Investigation
a. Information
b. Interrogation
c. Interview
d. Instrumentation

INVESTIGATION REPORT
1. Purpose
a. Record – the report provides a permanent official record of the investigation.
b. Leads – the report provides other investigators with information necessary to further advance the
investigation.
c. Prosecutive action – the report is a statement of facts on which designated may base a criminal,
corrective or disciplinary action.

2. Nature and Qualities

a. The report must be objective statement of the investigation findings.


b. The report must be an official record of the information relevant to the investigation that the
investigator submits to his superior.
c. The report must be clear, brief accurate, impartial but complete.
d. The report must not be a place of the investigator opinion or other irrelevant facts foreign to the
case.
e. The report is complete when it answers the questions of when, where, who what, why and how. (
5W , 1H)
f. The report is accurate when it is a true representation of facts of the case.
g. The report is clear when it is developed logically and chronologically.

3. Parts of the Report

a. Administrative Data
1. Date
2. File Number
3. Complaint
4. Reporting Investigator
5. Office of Origin
6. Status

b. Synopsis – brief in description of the actions of the perpetrator as established in the body of the
report.
c. Details of the report - Objective of the investigation.
d. Conclusion and Recommendation – includes the investigator opinion.
e. Enclosures – Photographs, sketches, sworn statement, etc.
4. Format of Report

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 58


INVESTIGATION REPORT FORMAT

CONFIDENTIAL
(Letterhead)

_____________
Date

FOR: (The Chief or Commander who assigned the case)

SUBJECT:

I. AUTHORITY
This section should contain a brief statement of when, where and why by whom the investigation
was made and should cite the authority for making it.

II. MATTERS INVESTIGATED


This section of the report represents the mission of the investigator, in essence, it answers the
question: what is the investigation about?

III. FACTS OF THE CASE


This presents the real truth respecting the matters investigated. The description “completeness”,
clarify are particular applicable to this section. It should be coherent presentation of all pertinent
facts that shall be free from argument of bias and fully supported by evidence.

IV. DISCUSSION
This section set forth when appropriate, the presumption and inference from all the circumstances in
the case to give directing authority the clearest possible picture. It should contain such related
factual matter of argument as may be necessary in addition to the facts presented, to establish the
conclusions and recommendation based thereon.

V. CONCLUSION
This represents concise summary of the result of the investigation directly consequent from and
supported by facts. These logically follow from the facts of case of found and set forth in the report.
They are usually stated in the order naturally suggested by the statement of the allegations or facts.

VI. RECOMMENDATIONS
This should contain the practical suggestions as to appropriate action to be taken to make suitable
position of all phases of the case. They should follow, as for as practicable, the same sequence as
was used in the presentation of conclusion.

______________________
Investigator
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 59

ACTIVITY NO. 10

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN

1. What are the qualities of effective investigation? What are the characteristics of a successful investor?

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

2. What are the three I’s of Investigation? Explain.

_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 60

CHAPTER 11
MANAGEMENT AND
PLANNING

MANAGEMENT IN GENERAL AND PLANNING FUNCTION


The security executive is no longer a private practitioner who impresses people with his courageous deeds,
skill in apprehending criminals or expertise in handling weapons. Rather, he is a modern manager entrusted
with the twin tasks of promoting corporate assets and ensuring that business interruptions, if at all, are kept to
the minimum. In fact, his most challenging role is to predict the opportunities to manageable proportions. In
this role, he is backed by his years and years of technical expertise as well as the seasoning and sensitivity
that come with long years of exposure in the field.
In security as in other fields, the manager’s major concern is getting things done. The manager uses
management techniques is getting things done and is familiar with the following elements of management ;
planning , financing , organizing , staffing , training and professional development and communication.

Security Management and Cost Effectiveness


Cost effectiveness means spending the least possible amount consistent with required results and, at the same
time, assuring that each item of expense is fully justified as the best available way to commit the funds. Akin
to profit center orientation with which it is closely aligned, cost effectiveness in security management
definitely enhances the profitability of a business enterprise.

Security Planning
Planning is the key factor in the successful management of a security program. A management expert defines
planning as pre determining a course of action. Another defines it as deciding in advance what to do, how do
it and who should do it. It is necessary for a security executive to plan, the alternative is obviously to react
events that have already occurred or try to solve problems that could have been avoided in the first place.
The first requirement in planning is to identify the overall objectives and purpose of the organization.
Afterwards, the executive may start his own planning which should be objective and supports the
organization’s goals.
One method of security planning is to create an overall blueprint for security program based on the identified
vulnerabilities or the result of vulnerability assessment. Another method is to write several plans such as a
comprehensive emergency plan covering various anticipated contingencies and various operational plans,
policies, standards and procedures. Still another way is the use of Action Plans showing three column
identifies the action officer involved while the third column shows the time frame.

Development of security Policies


A policy is a broad guide to management decision making in situations of a repetitive nature. Its purpose is to
orient decision making towards the organization ultimate objectives. Hence, a policy should reflect the
objectives and be flexible and sufficiently broad enough to be applicable to changing conditions.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 61


Nevertheless, security policies vary from organization to organization. Beyond moral standards there seems
to be little commonality among organization among organizations as to suggest standard policies applicable
to all.

Illustrations of Security Policies


1. In a Non-Uniformed Company - the company recognizes the loyalty of its employees and its
obligations a corporate citizen to the community and thus fosters a cooperative attitude in the
protection of personnel and property.

2. A Company with Union - the company recognizes its obligation as a corporate citizen to the
community and thus, practices an aggressive policy of prosecution regarding theft within the
company.

3. Information Security Policy – the computer center recognizes the propriety interest of the client
entities who utilize the facilities of the center, hence strictly controls dissemination of management
information on strictly need-to-know basis and only to such persons that have been specifically
cleared to receive such information.

Operating Level Policies


Major policies and procedures covering various areas of security will have to be developed. The need to
draw up specific policies such as “Access Control’, “Key Control”, “How to Handle a Bomb Threat”. Etc.,
may be written as short as possible as a basis for common interpretation or may include specific procedures
in implementation of a particular mandate from management.

Financing
Managing security requires cash to carry out the various responsibilities involved. a security executive should
be able to have an enlightened view of what activities he plans for a specific period the expected operational
conditions and the cost involved. A security executive should have knowledge in for casting and budgeting to
make security management successful. He should be familiar with the organizations stand on return on
investment and spending preferences.

Budgeting
A budget is usually a prepared annual plan stated in financial terms. It is ordinarily finalized a few months
before the start of the budget period. It contains the different items for which costs are involved. No security
organization can operate nor have its program implemented without the budget.

The Process of Budgeting


1. Setting up of goals and objectives for a particular period, usually a year.
2. Budget development involving an evaluation of current activities, identification of projected new
activities, development of alternatives and determination of costs.
3. An evaluation and review of the recommendations.
4. Budget established or allocation of funds.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 62


The process is set off by appropriate guidelines from senior management. The security executive then
prepares his program and values activities and costs. He develops and recommends alternatives courses of
action. The senior management then reviews the recommendations and makes decision on the funds
allocation.

Budget Costs and Justification


1. Salary Expense – refers to total personnel costs. It is computed by adding up the total monthly
compensation of each employee and multiplying the total to 13 considering the provision for the 13th
month pay. Provision for expected salary increases should also be made.

2. Sundry Expense – these are non-salary expense such as supplies, uniforms, travel, transportation,
representation contract services, professional fees, membership fees, publications and subscription.

3. Capital Expenditures – these are onetime expenses for physical improvements or acquisition of
equipment, computers, firearms, vaults, alarm systems and construction of firing range.

To justify the budget, the following questions must be resolved:


• What must be done?
• How are we going to do it?
• When must it be done?
• How much will it cost?
Organizing
An organization is the orderly arrangement of manpower and material resources to effectively carry out their
intended purposes. It molds the activities of many people into a smooth working team and could mean the
difference between the success and failure of a security department or company.
A security organization must be planned in such a way that it meets the needs of the enterprise it is
responsible to secure. It must be designed with the aim of helping a company fulfill its mission. Each sub
unit must be able to carry out its assigned tasks at an acceptable level of efficiency.
A security organization must also be flexible in such a way that the structure must be able to adapt to
necessary changes without interfering with the major objectives of the organization. In other words, the
structure should enhance instead of impede the work of the department or agency.

Organizational Relationship
The following are the basic forms of organizational relationship:
1. Line Authority – Line authority is based in the relationship between a supervisor and a subordinate
level. It is formal managerial authority with the right and power to issue commands, to exact
accountability, and to discipline for violations.

2. Staff Authority – it is based on relationship between managers of authority and facilitating groups and
the line organization. It is limited by absence of the right to command beyond the staff group itself.

3. Functional Authority – between the above mentioned authorities is the functional authority which is
the formal power of command, limited to a specified area of expertise which may be organization
wide and directed across substructures as sections, departments and divisions.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 63


Organizational Principle
To come out with an effective security organization, the executive should be aware of the following:
1. The work should be divided according to some logical plan. The five primary ways are: purpose,
process or method, clientele, time and geography.

2. Lines of authority and responsibility should be made as clear as possible. These are reflected in the
pyramid like structure with blocks and lines known as “organization chart” and with the positions of
greater authority and responsibility located in the upper levels.

3. There should be a “unity of command” in the organization. This means that an employee should be
under the direct control of one and only one supervisor at any given time.

4. One supervisor can effectively control only a number of people, and that limit should not exceed. This
is known as the principle of span of control. At the highest level the maximum is 12.

5. Responsibility cannot be given without delegating commensurate authority, and there must be
accountability.

6. All efforts of sub units and personnel must be coordinated into the harmonious achievement of the
organization’s objectives.

Reporting Levels
The security director/manager may report directly to the president or at least one of the senior executives. He
may also report to a middle management executive which tends to limit his stature, authority and scope of his
responsibility.

Typical Security Organization


The security executive wear two hats. First, the perception that he is an expert in security; and second is the
awareness that he is the highest management guy in the hierarchy. Thus, he should be backed by a track
record of success in handling people, problem solving and professional competence.
1. Leader – his most basic role is to provide leadership, set the right climate, establish the directions to
take, motivate his people and try to bring out the best in them.

2. Company Executive – he is accepted by his senior management and peers as part of the management
team. He is discerned as a modern day manager.
3. Executive with High Visibility – he is visibly recognized and participates in various company
activities and is a much sought after speaker in his area of expertise.

4. Innovator – he is expected to be always on the lookout for better and less expensive ways to do the
job. He is not fearful of trying new ways and take risks.

5. Counselor/ Adviser – he is able to provide advice, suggests alternatives, and helps solve problems.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 64


6. Trainer – he established professional development and keeps his people attuned with times and
various requirements.

7. Contemporary Professional – he keeps abreast with current developments in the profession by


participating in meetings, conferences, and seminars, and subscribers to security magazine and
periodicals.

8. Goal Setter – he establishes objectives and defines goals to be achieved. It starts with setting up goals
and objectives for particular period, usually a year. Afterward, budget development follows. This
involves an evaluation of current activities, identification of projected new activities, and
development of alternatives and determination of costs. After these, an evaluation and review.

Staffing Pattern
1. Security Director – responsible for the entire operation and administration /management of the
security agency. He shall be the authorized signatory to all Duty Detail Orders, and all other
documents and communications pertinent to the operation and management of a security agency. He
may delegate certain functions to a subordinate, provided the subordinate is qualified to discharge the
given function in accordance with law.

2. Security Training Officer – responsible for the training of the Agency’s security personnel in
accordance with the requirements of RA 5487.

3. Staff Director for Operations – is the staff assistant of the security manager for the efficient operation
of the agency. This position includes the responsibility to canvas clientele and the implementation of
contract and agreement. He is also responsible for the conduct of investigation and the conduct of
training.

4. Staff Director for administration – is the staff assistant of the agency manager for the effective and
efficient administration and management of the agency. He is responsible for the professionalization
of the personal, procurement/recruitment, confirming of awards, mobility and issuance of FA’s.

5. Detachment Commander – is the field or area commander of the agency. The Detachment shall
consist of several posts.

6. Chief Inspector – shall be responsible for inspecting the entire area covered by the detachment.

7. Security Inspector – is responsible for the assigned by the Chief Inspector of the Detachment
Commander.
8. Post – in –charge – is responsible for the entire detailed security office within a certain establishment.

9. Shift-in- charge – is responsible for the security officers who are scheduled in a certain shift for a
particular period.

10. Security Guard – is the one actually posted as watchman and or guard.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 65

ACTIVITY NO. 11

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN.

1. What does cost effectiveness mean in security management?


_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

2. What does financing and budgeting mean in security management?


_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 66

CHAPTER 12
IMPLEMENTATION, PROBLEM SOLVING AND
AUDIT
/INSPECTION

PROGRAM IMPLEMENTATION
Top Management’s Responsibility
The top management should always be interested in the implementation of any security program. They must
extend in the implementation of any security program. They must extend complete support to the program on
a continuing basis. They must be willing to take actions to ensure that employees at the other levels comply
with the requirements that have been established for the protection of personnel and other assets. The
responsibility and accountability for the implementation are delegated to the security executive. Thus, he
would function as a steward doing the necessary management work for and on behalf of top management.
Involvement of Others
Non – security employees can be of great assistance in the implementation of the security program and their
active participation can contribute to its success. Thus, it is important to keep other employees aware and
involved.
Setting Priorities and Meeting Schedules
The higher the critically rating of the identified vulnerability, the higher is its priority in the implementation
of countermeasures. It is important also that the time frame established be met otherwise it could affect the
entire program.
Drills and Rehearsals
Some areas of the security program would need regular drills or rehearsals which stimulate anticipated
condition, crisis management, fire drill, bomb threat handling, and response to a robbery.
Validation and Updating Plans
During program implementation, opportunities arise to improve countermeasures or reinforce those found
effective. If new conditions present themselves, necessary adjustment sometimes need to be made in the
security program.
Program Evaluation
At the end of the timetable or drills, rehearsals, the security program or part of it need to be evaluated. Issue
such as relevance or adequacy of countermeasures, cost effectiveness, need to be addressed to check the
existence of vulnerability which may trigger the need for a much response security program.

PROBLEM SOLVING AND DECISION –MAKING


Problem solving Techniques
The successful security executive is a problem solver. He is able to solve most of the problems through quick
evaluations of the situations against experience and logic employing the following seven steps of problem
solving:

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 67


1. Clearly Defining Problem – he ensures he has the complete grasp of the problem at hand. He is able
to define and clarify issues involve.

2. Gathering Information – he gathers information through research and interviews. It may require
putting the information gathered in document form, in tapes or indexes.

3. Interpretation – the gathered information are put together to arrive at a clear picture and try to
ascertain the meaning and related implication.

4. Developing Solutions – the security executive may come out with a solution and several alternatives.
In this step he should be guided by the principles and techniques of effective management and
company.

5. Selecting the Best Solution – from several alternatives the security executive selects the best practical
solution considering the short and long term effect of each possible solution.

6. Putting the Solution into Operation – one the most appropriate solution is chosen, implementation is
next. This is critical as it may involve changes be difficult to accept. There might be a need to sell the
solution to others.

7. Evaluating the Effectiveness – The plan or solution should be reviewed periodically for effectiveness.
A comparison between the ideal solution and the actual practice may be made.

Some Pitfalls in Decision Making


The appropriate decision and taking responsibility for it is a critical functions of any executive, much more a
security professional.
The security executive should avoid the following:
1. Jumping into conclusion
2. Accepting the first choice
3. Accepting the easiest way out
4. Procrastinating
5. Letting prejudices or emotions influence
6. Failing to get the facts
7. Failing to weigh the alternatives
8. Failing to consider consequences
9. Fearing to take risks and assume responsibility

Factors Affecting a Decision


1. Prior Experience – a tried and reliable course of action that worked before may very much work
again in similar situation.

2. Self Interest – one’s own interest may not be the best for others. The ideal situation here is to balance
one’s interest with those of the others.

3. Tradition – there are good traditions but there are those that limit the way of doing things and become
the basis for decision because they from the easiest way out.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 68


4. Creativity – this is the opposite of tradition. It has resulted in a lot of good in some areas, but for the
sake of change is not healthy way to arrive at a decision.

5. Authority of Expert Opinion – this should be given great consideration. However, the security
executive should make certain that they are really experts rather than products of media type.

6. Logical Thinking - the decision is based on sufficient facts and thorough analysis leading to clear
conclusion and good decision.

7. Emotion and Prejudice – the decision should be free from bias and sentiment. It may lead to
favoritism and irrational decision making.

8. Ease of Execution – all things being equal, security executives confronted with problems would like
an easy way out, but the easy way out is not usually the best way out.

Security Audit /Inspection


Rationale for Security Audit
There usually is a need for a formal audit or inspection to: check the degree of compliance with the
recommended countermeasures and to determine the effectiveness and adequacy of the countermeasures in
effect.
Conduct of the Audit
A security audit has for its basis the security survey and the vulnerability assessment reports prepared during
the previous period. A checklist for the purpose ensures that all areas are covered. The following questions
should also be used.
1. Why are we doing it?
2. Must we do it all?
3. If we must, is there a better way?
4. Is there a less expensive or more cost effective way?
Formal and Informal Security Audit
A formal security inspection is announced and is communicated to the organization or unit in advance. All
documents needed are prepared beforehand. An Informal audit are the result of an entrenched and
institutionalized system understood and accepted as part of the organizational life conducted in the spirit of
cooperation and understanding.
Structured and unstructured Audit
A Structured audit has a formal or logical sequence to the process. The unstructured audit is conducted in a
random manner without any formal or logical sequencing.
Ascertaining Compliance
The inspector should establish that the countermeasures are as they ought to be. It is possible that the unit or
people being audit do not do what is expected of them. Deficiencies not should be highlighted and follow
through scheduled and implemented, otherwise, vulnerabilities will persist.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 69

ACTIVITY NO. 12

Name : Score :

Year & Section: Schedule :

Teacher : Remarks :

ESSAY: Answer the following briefly. It must be in HANDWRITTEN

1. What are the top management’s responsibilities in the implementation of security program?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

2. What are some problem solving techniques? What are the pitfalls in decision making?
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 70

CHAPTER 13
REPUBLIC ACT No. 5487

AN ACT TO REGULATE THE ORGANIZATION AND OPERATION OF PRIVATE DETECTIVE,


WATCHMEN OR SECURITY GUARDS AGENCIES.

REPUBLIC ACT No. 5487


- This Act shall be known as "The Private Security Agency Law."
DEFINITION OF TERMS
PNPSAGSD
- Philippines National Police Security Agency, Guard and Supervision Division

PNP SOSIA
- Philippine National Police Supervisory Officer for Security and Investigative Agencies.

- This is the unit under the Philippine National Police which is charged with the supervision, direction
and control, of all security agencies in the Philippines.

Person
- Shall include not only natural persons but also juridical persons such as corporation, partnership,
company or association duly registered with the Securities and Exchange Commission and/or the
Department of Trade and Industry.

Private Security Service


- Shall include the act of providing or rendering service to watch an establishment whether public or
private , building , compound/ area or property , to conduct access control/denial in any form whether
physical , manually or scientifically by electronic monitoring system , for the purpose of securing
safety and protection of person within such areas. To conduct private security training and or to
conduct investigation. It shall include the act of contracting recruiting, training, furnishing or posting
any security guard, to do its function or solicit individuals, business, firms, or private, public or
government –owned or controlled corporation to engages his/ its service or those of his/its security
guard, for hire, commission or compensation thru subscription or as a consultant/trainer to any
private or public corporation.

Private Detective Service


- Shall include among others the act of providing personal security protection, inquiry and information
gathering, pre- employment verification and individual background profiling, providing assistance in
civil liability and personal injury cases, insurance claims, and fraud, child custody and protection
cases, for the purpose of assisting in gathering information leading to determination and or
prevention of criminal acts and or resolution of legal, financial and personal problems.

Private Security Industry


- Shall cover those in the legitimate business of providing private security and detective services.

Security Guard

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 71


- Sometimes called “ PRIVATE SECURITY GUARD or WATCHMAN” shall include any person who
offers or renders personal services to watch or secure either a residence or business establishment or
both for hire or compensation , and with a license to exercise profession.

Private Detective
- Shall mean any person who does detective work for hire, reward or commission, other than member of
the AFP, Guard at the bureau of Jail Management Penology, Municipal or City jail guards, and
members of the PNP or of any other Law Enforcement agency of the government.

Private Security Personnel


- Shall be natural persons which include private security guards, private detectives, security consultant,
security officers and others that may be classified later, rendering performing security and or detective
services as employed by private security agencies and or private firm.

Government Security Personnel


- Shall be natural persons which include government security guards, detective, security consultant,
security officers and others that may be classified later except those of the AFP, PNP, BJMP,
Municipal or City Jail guards rendering /performing security and or detective services as employed
by government entities.

Private Security Agency (PSA)


- Shall mean any person association , partnership , firm or private corporation , who contracts , recruits ,
trains , furnishes or post any security guard , to perform its functions or solicits individual , businesses
, firms , or private , public or government –owned or controlled corporation to engage his/its service
or those of his/its security guards, for hire , commission or compensation thru subscription or as
consultant/ trainer to any private or public corporation whose business or transaction involve national
security or interest like the operation and or management of domestic or ocean , vessels , airplanes ,
helicopters, seaports , airports landing strips etc. or as consultant an any security related matter. Or to
provide highly specialized security, detective and investigation services like gangway security,
catering security, passenger profiling, baggage examination providing security on board vessels or
aircraft, or other security needs that PNPSAGSD may approved.
Private Detective Agency (PDA)
- Shall mean any person association , partnership , firm or private corporation , who contracts , recruits ,
trains furnishes or post private detective , to perform its functions or solicits individuals , business ,
firms or private , public or government owned or controlled corporation to engage his/its service or
those of his/its detectives. For hire, commission or compensation thru subscription or as
consultant/trainer to any private or public corporation or as consultant on any detective related and
investigation services, or other detective needs that PNPSAGSD - CSG may approved.

License to Exercise Profession


- Shall mean any document issued by the chief PNP or his duty authorized representative recognizing a
person to be qualified to perform his duties as private security or training personnel.

License to Operate (LTO)


- Is license Certificate document issued by the Chief PNP or his duty authorized representative ,
authorizing a person to engage in employing security guard or detective , or a juridical person to
establish , engage , direct , manage or operate an individual or a private detective agency or private
security agency / company security force after payment of the prescribed dues or fees as provided.

Company Guard Force (CGF)


- A security force maintained and operated by any private company/corporation utilizing any of its
employees to watch, secure or guard its business establishment premises, compound or properties.

Government Guard Unit (GGU)


LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 72
- A security unit maintained and operated by any government entity other than military and police, which
is established and maintained for the purpose of securing the office or compound and or extension of
such government entity.

PNP
- As used herein mean the Philippine National Police, which was organized pursuant to the provision of
RA 6975 otherwise known as the National Police Act of 1991.

PADPAO
- Refer to the Philippine Association of Detective And Protective Agency Operators, Inc. which is an
association of all licensed security agencies and company security forces.
- The one who are authorized to issue the implementing rules and regulations pertaining to R. A 5487.

Duty Detail Order (DDO)


- Is a written order /schedule issued by a superior officer usually the private security agency /branch
manager or operation officers assigning the performance of private security detective.

Security Guard Force


- Is a group of force selected men, trained or grouped into functional unit for the purpose of protecting
operational processes from those disruptions which would impede efficiency or halt operation at a
particular plant, facility, installation or special activity.

TYPES OF SECURITY GUARD FORCE


1. Company guard force
2. Private security guard force
3. Government guard force

Who may organize and maintain a Private Security Agency (PSA) and Private Detective Agency
(PDA)? - Any Filipino citizen or corporation association, partnership, one hundred percent (100%) of
which is owned and controlled by Filipino Citizen.

Basic age requirements of operator or manager of Agency.


- Not less than twenty five (25) years old of age.

New applicant for license to operate


- Minimum capitalization of one million (1,000,000.00) with minimum bank deposit of five hundred
thousand (P500, 000.00) pesos in order to start its business.

Membership
- No regular license shall be granted to any private security agency unless it has minimum of two
hundred (200) licensed private security personnel under employ.

- No regular license shall be granted to any company guard’s force or private detective agency unless it
has a minimum of thirty (30) licensed private security personnel under its employ.

- The maximum number of private security personnel that has a PSA/ CGF/ PDA may employ shall be
one thousand (1000).

- The validity of all License to Operate (LTO) is two (2) years.

APPLICATION OF LICENSE TO OPERATE (LTO)

- FILED: Chief of the Philippine National Police (CPNP) through the PNP Security and Guard
Supervision Division, Civil Security Group (PNPSAGSD –CSG). Using license application form the
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 73
application shall contain the full name of the applicant, his age, civil status, his residence and location
of business.

- New applicant: Applicants from NCR may file their application for license to exercise profession with
the personnel licensing section, SAGSD, Civil Security Group, Camp Crame, Quezon City.
Applicants from the Province may file their application with the Firearms, Explosives, Security,
Agencies and Guards section (FESAGS), Regional Operation and Plan Division (ROPD) of the Police
Regional Office concerned.

Renewal of license to operate


- All applications for renewal of license to operate shall filed at least sixty (60) days before expiry date of
LTO subject of the renewal application filed/ accepted thereafter shall penalized for late filing.

- In addition to other renewal requirements under provision of these rules and regulations , no application
shall approved unless a certification is issued by FED –CSG to the effect that all licensed firearms of
the agency concerned are updated / renewed for at least one (1) year forthcoming during the validity
of the renewed LTO.

Payroll
- Payroll shall be filed with the main office within fifteen (15) days after pay day.

Possession of Firearm
- Ratio: 1 firearm for every two (1:2) security guard in its employ.

- No PSA/CSD/GSU shall be allowed to possess firearms in excess of 500 units.

Restriction to possess high powered firearms


- The firearm first be registered with the FED before issuance and shall not be used or transferred in
places other than those specially authorized by the Director of CSG.

- The total number of high-powered firearms that an agency or security force/unit is authorized to
possess shall not exceed ten percent (10%) of the total number of security guards of watchmen in its
employ.

Stocking of ammunition
- PSA shall not exceed fifty (50) rounds of ammunition per unit of duty licensed firearms. Individual
issue to each security guard shall be limited to one half of such basic load or twenty five (25) rounds
for every security guards.

SECURITY GUARD FUNCTIONS/GUARDING PROCEDURES

• Primary functions- protecting of life and Property


a. Fixed Post
b. Patrol
c. Reserve
d. Administration
e. General Functions
f. Others

QUALIFICATIONS OF PRIVATE DETECTIVES

• Any person applying for employment as private detective shall in addition to the qualification of
security guard, possess any of the following qualifications.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 74


a. Bachelor of Laws Degree
b. Graduate of B.S Criminology
c. Graduate of Criminal Investigation Course offered by the PNP, NBI, Police Training
Center, and Private Detective agency Training School recognized and authorized by the
Government.
d. Officers. Enlisted men and policemen honorably discharged from service not otherwise
disqualified by the R.A no. 5487.

Permit
- A document issued by the CPNP or his duty authorized representatives authorizing a person to engage
in the occupation calling or employment of watchmen, security guard or private after payment of dues
or fees.

Firearms
- Possession of firearms by agency are entitled to possess firearms after satisfactory complying the
requirements as provided by law.

FIREARMS /WEAPONS AUTHORIZED FOR USED BY THE SECURITY GUARD WHILE ON


DUTY
1. Handguns
2. Shotguns
3. Riot guns or prescribed caliber

JUSTIFICATION FOR A GUARD’S FIREARMS TO BE CONSIDERED


1. When firearm is to be used or being used in the commission of crime.
2. If carried while guard is not on tour of duty.
3. There is written court order.
4. Firearms is carried outside the property, compound or establishment serviced by the agency without
proper authority.

Mission Order
- Is a written instructions issued by the agency to its guard to perform lawful activity at specific time,
place and date. It shall include the make, model, and serial no. of the firearm issued to the guard and
the name of the operation officer or manager of the agency.

INDUSTRIAL GUARD FORCE AND GUARD SYSTEM TYPICAL STRUCTURE OF SECURITY


ORGANIZATION

• The security force of any installation must be organized in accordance with the principles of
responsibility and authority. Each personnel must be assigning to a position which correspond to his
experience, skills training and knowledge. This is to carry out different functions efficiently and
effectively and thus insures smooth flow of the organization. The security positions may be classified
into the following.

1. Office of the General manager /security Director

a. The office of the General Manager/Security Director is vested the authority and responsibility
of running the security force by authority of the President or the Company / Corporation. b. The
General Manger/Security Director is directly responsible to the President of the
Company/Corporation in the operations and administration of the security force.
c. He is principal adviser to the president on matters involving security operations,
administration of the security force.
d. He is the overall head of both various staff departments and field units where he may
delegate corresponding authority commensurate to their assigned responsibility.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 75


e. He implements policies promulgated by the policy making body and executed by the
President.
f. He directs controls and supervises all offices and field units of the force in their respective
assigned tasks.
g. He performs other functions as directed by the President of the Company/Corporation.

2. Office of the Executive secretary of the General Manager

a. He is the principal Administrative assistant to the General Manager /Security Director. b. He


prepares communications initiated by the General Manager/Security Director. c. He maintains
records of scheduled conferences, appointments and other engagements and advices the GM/SD
of such activities.
d. He records and checks outgoing communications signed by the GM/SD as to its completeness
(attachment to be considered) as well as to ensure the timely dispatch to the addressee through
the administrative section.
e. To perform other duties as directed by the GM/SD.

3. Office of the Assistant General Manager/ Security Executive Director

a. The security Executive Director is the Assistant Manager of the Security Force and takes
the Operational and Administrative Management of the security force in the absence of the
GM/SD.
b. He is directly responsible to the GM/ SD.
c. He is performs other duties as directed by the GM/SD.

4. Office of the Human Resources and Administrative Manager /Staff Director for personnel and
Administration

• The principal staff assistant to the General Manager/Security Director for planning and
supervising matters or activities pertaining to personnel management and miscellaneous
administrative functions such as:

a. Personnel Strengths
b. Replacement
c. Discipline , Law and order
d. Morale and Personnel Services
e. Personnel Procedures
f. Interior management
g. Personnel Adviser

5. Office of the Operations manager / Staff Director for Operations

• The office is the principal staff on Operations, Training, Intelligence and Investigation.

6. Office of the Finance

• This office is principally concerned with budgeting, finance, reports control and program review
and analysis. Exercises supervision over the management engineering activities of the
company and the accounting office. Renders advice, assistance and guidance to GM/SD on
financial management. Specific duties and functions of the Finance Office are :
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 76
a. Accounting
b. Credit and collection
c. Bookkeeping
d. Billing
e. Payroll
f. Disturbing

7. Office of the Logistic Manager

This office is in charged with the following:

a. Coordinate plan and supervise the implementation of directives and guidance determines
divisional responsibility and evaluates in logistical planning programs.
b. Develops, administer, and coordinates research and development on logistical matters.
c. Collects computers and evaluates statistical data on logistical matters.
d. Recommends logistics budget policy including planning.
e. Prepares estimates and or requirements to endure that logistical plans support for corporate
plans. f. Performs necessary program and fiscal administration.
g. Supervise all matters pertaining to supply.
h. Determine the organization, allocation of service personnel.
i. Plans for maintenance and repair of supplies and equipment.

8. Office of the Inspectorate and Special Projects.


• This office assists the General Manager in inquiring into and reports upon matters pertaining to
the performance of the different staff, units, towards the attainment of corporate objectives. It
also inquires on the state of discipline, efficiency and economy of the company. The
inspectorate Staff conducts inspections, investigations and submits reports to the General
Manager. In the performance of its duties and functions, the General Manager is provided
relevant information pertaining to meritorious conduct and performance of a unit or
individual. This office is also take to conduct overt and covert inspections and investigations
and other related services.

9. Office of the Communications Officer


• The communication Officer who is a licensed radio operator is the principal adviser of the
General Manager on communication matters particularly radio communication. He is
responsible directly to the General Manager.

10. The Detachment Commander /Officer –in-Charge


• A Detachment Commander shall command and responsible for a certain detachment with
fifteen (15) or more security personnel under him. He is directly responsible to the Security
manager of the installation.
a. He prepares and executes the security plan of his Detachment in relation to the security
requirements of the establishment being guarded.
b. He is responsible for the enforcement and implementation of rules and regulation /policies.
c. He receives instructions from the Security Manager and implements the same as required. d.
He has full operational and administrative control of all his units to include his assistant and
shift in charge /supervisor.
e. He conducts inspection of his units and institutes corrective measures on the spot on those
problems he may detect or brought to his attention, if not possible, he brings the problem
to the Security manager of the establishment.

LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 77


11. Assistant Detachment Commander
• Detachment with more than twenty (20) security personnel assigned may be provided with an
Assistant Detachment Commander who will be the principal Assistant of the Detachment
Commander.

12. Shift in Charge


a. The shift in charge shall be responsible to the Detachment Commander as for as his shift is
concerned.
b. He forms his men at least (30) minutes before posting time seeing to it that all are in proper
uniform and presentable.
c. He disseminates instructions coming from his Detachment Commander/OIC or those relayed to
him by his counterpart, outgoing SIC.
d. He inspects the post as often as he can to ensure that his men are on the alert and performing
their duties effectively.
e. He performs other duties as may be directed by the Detachment Commander or by the Assistant
Director Commander.

13. Security Guard on Duty /Post


a. The SG on Duty/Post must always carry his license to practice his profession, Xerox copy of the
firearm’s license assigned to him, and his duty detail order, authorizing him to carry his issued
firearm within his area of jurisdiction.

b. If the SG is manning a fixed post especially entrance or exit points, he must maintain a guard’s
logbook and write in same logbook all events/passages of VIP’s vehicles and inspections or
visits of Security Manager /Director of the client/firm.

c. Guard must observe and apply religiously the provisions of the Code of Ethics, Code of Conduct
and the General Orders of the Security Guard when on post.

d. He may perform special task as may be directed by his shift supervisor, like control of visitors,
inspections of bags of persons coming in and going out of the establishments, vehicle cargoes or
prevents the intrusion of unauthorized person in a particular area etc.

SECURITY GUARD’S PROFESSIONAL CONDUCT AND ETHICS


1. Security Guard’s Creed

As a Security Guard, my fundamental duty is to protect lives and properties and maintained order within the
vicinity or place of duty, protect the interest of my employer and our clients and the security and stability of
our government and country without compromise and prejudice, honest in my action, words and thought, and
do my best to uphold the principle: MAKADIOS, MAKABAYAN AT MAKATAO.

2. Ethical Standard
As a security guard /detective, his fundamental duty is to serve the interest or mission of his agency in
compliance with the contract entered into with the clients or customers of the agency he is serve, thus: 1. He
shall be honest in thoughts and deeds both in his official actuation, obeying the laws of the land and the
regulations prescribed by his agency and those established by the company he is supposed to serve.

2. He shall not reveal any confidential matter committed to him as a security guard and such
other matters imposed upon him by law.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 78
3. He shall act all times with decorum and shall not permit personal feelings, prejudices and
undue friendship to influence his actuation in the performance of his official functions.

4. He shall not compromise with criminal and other lawless elements to the prejudice of the
customers or clients and shall assist government relentless drive against lawlessness and
other forms of criminality.

5. He shall carry out his assigned duties as required by law to the best of his ability and shall
safeguard life and property of the establishment he is assigned to.

6. He shall wear his uniform, badge, patches and insignia properly as a symbol of public trust
and confidence as an honest and trustworthy security guard, watchman and private
detective.

7. He shall keep his allegiance first to the government he is assigned to serve with loyalty and
utmost dedication.

8. He shall diligently and progressively familiarize himself with the rules and regulations lay
down by his agency and those of a customers or clients.
9. He shall at all times be courteous, respectful and salute his superior officers, government
officials, and officials of the establishment where he is assigned and the company he is
supposed to serve.

10. He shall report for duty always in proper uniform and neat in his appearance.

11. He shall learn at heart and strictly observe the laws and regulations governing the use of a
firearm.

3. Code of Conduct

• He shall carry with him at all times during his tour of duty his license identification card and duty
detail order with an authority to carry firearms.

• He shall not use his license and privileges to the prejudice of the public, the client or customer and
his agency.

• He shall not engage in any unnecessary conversation with anybody except in the discharge of his
work and shall at all times keep himself alert during his tour of duty.

• He shall not read newspapers, magazines, books, etc. while actually performing his duties. •

He shall not drink any intoxicating liquor immediately before and during his tour of duty.

• He shall know the location of an alarm box near his post and sound the alarm in case of fire or
disorder.

• He shall know how to operate any fire extinguishers at his post.

• He shall know the location of the telephone and or telephone number of the police precincts as well
as the telephone number of the fire stations in the locality.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 79
• He shall immediately notify the police in case of any sign of disorder, strike, riot or any serious
violations of the law.

• He or his group or guards shall not participate or integrate any disorder, strike, riot or any serious
violations of the law.

• He shall assist the police in the preservation and maintenance of peace and order and in the protection
of life, property / having in mind that the nature of his responsibilities is similar to that of the latter.

• He shall familiarize himself with the Private Security Agency Law (RA 5487) as amended, and the
PNP SAGSD implementing rules and regulations.

• When issued a pass he should not lend his pass to anybody.

• He shall always in proper uniform and shall always carry with him his basic requirements, and
equipment such as writing notebook, ball pen, nightstick (baton) and or radio. He shall endeavor at
all times to merit and be worthy of the trust and confidence of the agency he represents and the client
he serve.
4. General Order ( 11 G.O)
1. To take charge of this post and all companies property in view and protect preserve the
same with utmost diligence.

2. To walk during tour of duty in military manner, keeping always in the alert and observing
everything that takes place within sight or hearing.

3. To report all violations of orders I am instructed to enforce.

SELECTION OF GUARDS
R.A 5487 and its implementing rules and regulations prescribed the minimum requirements for guards to be
able to secure a license to exercise profession as a security guard, private detective, security officers and
security consultant.
BASIC QUALIFICATIONS OF AN AGENCY OPERATOR/MANAGER AGENCY
a. The operator or manager of an agency including , managers of branch offices , must be:
1. Filipino Citizen
2. Not be less than 25 years of age
3. College graduate and or a Commissioned officer, inactive or retired service or retired from AFP or
PNP.
4. Has taken a course/seminar on individual on industrial security management and or must have
adequate training or experience in the security business.
5. Good moral character.

b. New applicant for license to operate shall be required to obtain minimum capitalization of one
million pesos (1,000,000.00) with a minimum bank deposit of five hundred thousand pesos
(500, 000.00) in order to start its business operation.

BASIC QUALIFICATIONS OF A SECURITY OFFICER

• No person shall be licensed as security officer unless he has the following qualifications.
LEA 3 - INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 80

You might also like