Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

FRI | 05/05/2023 with existing security policies of the management if nay, in order

8:00-9:30AM –– SJH-408 to come up with adequate security system. The use of maps,
CINDISECON sketches of the area and even floor plans of the building should
WEEK 13: SECURITY SURVEY AND INSPECTION be availed of to indicate sensitive areas that would necessitate
Security Survey and Inspection the provision of adequate security.
The basic instrument for determining security vulnerability is
the security survey. Most description of security surveys Security Inspection
refers principally to checklists, audits, or inventories of 1. An important activity to ensure the integrity of the
security conditions. overall security programs.

Security System
2. It complements security survey in its attempt to prevent
losses of company properties.
A security system safeguards a home or building from intruders
by securing entry points, like doors and windows (including 3. It is conducted for two reasons: to check on the degree
basement windows), as well as its interior space. In most cases, of compliance with the recommended
outside forces will trip a home security system's alarm and alert countermeasures and to determine the effectiveness
law enforcement or homeowners so that they can interfere. and adequacy of the countermeasures which are in
effect.
Survey
The term applied to the first detailed “look see” conducted by a Types of Security Inspection
team. 1. Continuous Inspection
• It is an on-going and never-ending activity.
Security Survey 2. Formal Inspection
A critical on-site examination and analysis of an industrial plant, • It is usually preceded by an announcement, and
business, a home or public or private institution done to the unit under inspection “prepares” for
ascertain the facility’s current security status, to identify events, including some housekeeping
deficiencies or excess in current practices, to determine what activities that would not otherwise happen at
protection is needed and to make recommendations for that point in time.
improving the overall level of security at that installation.
A security survey is a thorough on-site examination and analysis 3. Informal Inspection
of a facility to determine what assets are present and their value; • It is usually the result of a long and firmly
to evaluate the existing security program; to identify differences entrenched inspection program.
or excesses; to determine the protection needed; and to support • It is seriously and quietly executed in a spirit
recommendations to improve overall security. of understanding and cooperation.
4. Structured Inspection
Two Kinds of Security Survey
1. Entrance Conference • It is one that moves systematically from one
A conference or dialogue between the survey team and area to the next and so on.
management officials of a plan before security is • There is a format or a logical sequence to the
conducted. process.
2. Exit Conference 5. Unstructured Inspection
A conference similar to entrance conference done after • It is conducted in a random manner.
the completion of the security survey. • There is no formal or logical sequencing.
Objectives of Security Survey
Security Investigation
1. To determine existing vulnerabilities to injury, death, It is a planned and organized determination of facts concerning
damage or destruction by natural causes. specific loss or damage of assets due to threats, hazards or
2. To determine existing vulnerabilities of corporate unsecured or unsecured conditions.
assets due to outside criminal activity.
3. To determine existing vulnerabilities of corporate Tools of Investigation
assets due to criminal activity within the organization. 1. Information – Knowledge which the investigation
4. To determine existing conditions of physical security of gathers from other persons
corporate property. 2. Interview – The simplest questioning of a witness who
5. To measure compliance of employees to security. has no personal reason to withhold information.
3. Interrogation – The skillful questioning of a person
Planning a Security Survey who is reluctant to divulge information concerning the
1. Verify the need. offense under investigation.
2. Obtain organizational support. 4. Instrumentation – The application of instruments and
methods of physical sciences to the detection of
3. State the survey’s executive. crimes. In other words, the sum total of the application
4. Determine how data will be gathered. of all sciences in crime detection otherwise known as
5. Develop alternatives. Criminalistics.
6. Prepare a schedule of activities. Security Education
7. Implement the plan. Security Education is conducted to develop security awareness
among employees of the company. It should cover all
The Security Survey Report employees, regardless of rank or position.
A good security survey report must encompass all aspects of It is the ''insight'' stage of an organization's security initiatives.
security risks and its accompanying security plan shall conform The goal is to help employees develop a true understanding of
how a company handles security and why things are the way The analysis of risk includes examinations of the vulnerability,
they are. probability and critical of potential threats and include natural
and manmade risk.
Phases of Security Education Program Risk analysis is the process of identifying and analyzing
1. Initial Interview – it is the first contact of the potential future events that may adversely impact a company.
prospective employee wherein the interviewer
determines the suitability of the applicant for Process of Risk Analysis
employment through his given answers on the different 1. Identification of Risk
type of questions being conducted. It is in this stage The First step comes as identifying the risk. Team members
where the interviewer may start providing the shall gather all the inputs that shall be used in the projects and
necessary information as to the overview of company recognize the outcome of the projects and the number of ways
security and at the same time on the employee such as risk involved in the process, etc.
accountability and corresponding penalties that could 2. Analyzing the Risk
result from violation therefrom. After identifying risk, it’s likely to understand and assess the
extent of risk and nature of risk that most likely to happen and
2. Orientation and Training – it is in this stage where to what extent it may occur to the organization shall be
new employees receive detailed presentation of
analyzed.
personnel security policy. Usually, handouts or
3. Evaluating the Risk
employee’s manual is being distributed for reference.
Analyzing risk helps you to estimate the capacity of risk that may
New employees also requested to sign
happen. Hence, in evaluating the risk, the team shall rank the
acknowledgement that they have been aware of the
calculated risk to decide whether to accept such risk or not.
existing company policies and will abide the same.
4. Treat the Risk In this step, the team shall decide whether to
3. Refresher conference – it is design to remind continue the project or not; if so, the project is accepted, then
employees of the company about their responsibilities, they shall try to treat or resolve the issue by modifying any
review the guidelines and policies, introduction of new changes required in the project.
policies and regulation and a moment of getting 5. Review the Risk
employees feedback about the company policies that As the risk is uncertain at any point in time, reviewing risk is
is being implemented. essential to evaluate risk in the project from time to time to avoid
4. Security reminders – a phase which employs an any future disturbance.
indirect approach of educating the employees such as
posting security posters and distributing fliers. Risk Management
5. Security Promotion – it is the act of emphasizing the It is a process of selecting and implementing security
importance and role of security achieving the company countermeasures to achieve an acceptable of risk at an
goals and objectives. It involves securing employee acceptable cost.
cooperation and support.
Risk Management Alternatives and Strategies
WEEK 14: RISK ANALYSIS AND SECURITY HAZARD A risk management strategy is a key part of the risk
Risk – it is the potential damage or loss of an asset. management lifecycle.
The level of risk is a combination of two factors: the value Risk Management is the ongoing process of identifying these
placed on that asset by its owner and the consequence, impact security risks and implementing plans to address them.
adverse effect of the loss or damage to that asset and the It is determined by considering the likelihood that known threats
likelihood that a specific vulnerability will be exploited by a will exploit vulnerabilities and the impact they have on valuable
particular threat. assets.
Factors considered in Risk Analysis
1. Assets Valuation
1. Adversary – it refers to any individual, group, or It should suffice to group assets according to category except
government that conducts activities or has the intention and where an item is especially attractive (from the point of view of
capability to conduct activities detrimental to the individual, the thief) and valuable.
private or government entity. The following categories should include most assets for most
2. Asset – any information, facility, material information, companies: Land, heavy machinery, office equipment, vehicles,
or activity which has a positive value to its owner whether it goodwill, raw material, buildings, production equipment, office
is an individual, private or government entity. furniture, cash or negotiable instrument, public image, and
3. Vulnerability – any weakness that can be exploited by finished product.
an adversary to gain access to an asset.
2. Identifying Threats related to the Assets
4. Probability – it is the chance or likelihood that a loss Employee theft is the most consistent and damaging threat-
will take place.
facing by any organization today.
5. Criticality – the impact of a loss as measured in ❑ “The need to pay for high personal debt, a
functional terms.
lifestyle that exceeds income or drug or alcohol abuse”
6. Countermeasures – an action taken, or a physical ❑ Robberies by non-employees are becoming a
entity used to reduce or eliminate one or more
serious threat.
vulnerabilities. The cost of possible countermeasures may
be monetary but may also include non-monetary cost such ❑ Fire can be the most devastating disaster to
as reduced operational efficiency, adverse publicity the company’s business.
unfavorable working conditions, and political consequences.
All these threats can cause harm to tourists, company image,
Risk Analysis and money; therefore, the threats can damage or halt the
business operation.
3. Assess the Probability of Threats Occurring Planned assumption and acceptance of the potential risk by
(Vulnerability Test) making a deliberate managerial decision of doing nothing about
❑ This step is considered to be the hardest step the threat or setting aside resources for use in case of a specific
of risk management process. loss incident. A risk is accepted with no action taken to mitigate
it.
❑ “Information must be collected and carefully
analyzed to determine its effect on the probability for
Security Hazards
occurrence”
Any act or condition which may result in the compromise of
Probability ratings used in determining vulnerability of
information, loss of life, loss or destruction of property or
Threats
disruption of the objective of the installation.
Developers should assess and research threats to assets from
This simply means that anything that has the potential to cause
other businesses to help them decide which assets at the most
damage or harm can be considered a hazard.
at risk and design the facility’s security system accordingly.
The most common hazards are usually physical objects, which
include, but are not limited to unguarded machinery, pieces of
4. Countermeasures Identification in Relation to Probability
furniture, or chemicals.
The cost for the countermeasures should be compensated by
the results they produce over time.
Types of Hazards
❑ “The most important thing to remember is that 1. Natural hazards
dollar losses may be either direct or indirect and that they Are those caused by natural phenomena which cause damage,
may be so high as to be crippling”. disturbance, and problems of the normal functioning of human
❑ Levels can be assigned to allow a activities, including security.
correlation to the four ratings of probability: The following are types of natural hazards or disasters:
a. Floods caused by typhoons
very serious, serious, moderately serious, and unimportant
5. Selecting Countermeasures b. Earthquakes
Countermeasures to handle risks that have made a significant c. Fire (not caused by human action)
presence: d. Storms typhoons, cyclones, tornado, and
❑ CCTV Cameras and Security Officers hurricane)
❑ Fire Alarms and Sprinkler Systems e. Lightning storms
Developers must make sure that the countermeasures selected f. Extreme temperature and humanity
are reliable and cost efficient; the countermeasures must also
produce positive results. 2. Human-Man made Hazards
These are acts or conditions which are the result of a state of
6. Evaluation of the Selected Countermeasures mind, attitude, weaknesses, or character traits of one or more
Testing countermeasures’ effectiveness in different conditions: persons.
weather, day, or nighttime, and during heavy traffic of people They can be acts of commission or omission, both overt and
and vehicles in the establishment covert, which can disrupt operation of a plant or installation.
The following are the types of human or man-made
Risk Management Alternatives and Strategies hazards:
After identifying risks and assessing the likelihood of them
happening, as well as the impact they could have, you will need
a. Carelessness- accidents and dissatisfaction
to decide how to treat them. b. Disloyalty- subversion and sabotage
c. Espionage- pilferage and theft
Risk Avoidance d. Vandalism, etc.
Eliminating or removing the risk totally from the business,
government, or industrial environment for which the risk Sabotage as a Security Hazard
manager has responsibility. 1. Sabotage
Is a deliberate action aimed at weakening a polity, effort, or
Risk Reduction organization through subversion, obstruction, disruption, or
Decreasing the risk by minimizing the probability of the potential destruction. One who engages in sabotage is a saboteur.
loss. The reduction or criminal opportunity is often Description of a Saboteur
accomplished by situational crime (prevention strategies to
discourage, deter, or deny criminal incidents. 1. He is the most dangerous foe that security will
A risk becomes less severe through actions taken to prevent or have to deal with while planning and implementing
minimize its impact. security measures and techniques.
2. He is an ordinary looking like the next guy but
Risk Spreading in his mind, he has the training in deception,
Spreading the risk through compartmentation or knowledge in incendiaries, explosives, chemistry,
decentralization to limit the impact (critically) of the potential bacteriology, mechanics, and psychology.
loss. 3. He can work alone, in-groups, or simultaneously in
several places.
Risk Transfer
Moving the financial impact of the potential loss-over to an 2. Espionage
insurance company. A risk is transferred via a contract to an The activity of secretly collecting and reporting information,
external party who will assume the risk on an organization’s especially secret political, military, business, or industrial
behalf. information.
Espionage, spying, or intelligence gathering is the act of
Risk Self-assumption obtaining secret or confidential information.
A person who commits espionage is called an espionage agent 4. Using “front” as commercial concepts, travel agencies,
or spy. associations, business groups and other organizations to
obtain confidential information or data.
Pilferage 5. Using various form or threats to obtain information.
Pilferage or pilfering is the act of stealing items of low value,
especially in small quantities, also called petty theft.
6. Using blackmail techniques by exposing intimate and
personal details concerning an individual or organization.
One of the most annoying and common human hazards which
security has to deal with. This activity it controlled can become 7. Picking or securing information in social and other
a financial drain if not a menace to smooth and orderly gatherings.
operation. 8. Penetration and operational tactics.
Two (2) Types of Pilferers
Subversive Activity as a Security
1. Casual Pilferer Hazard Threats of subversive Activity
Is one who steal due to his inability to reset the unexpected 1. It can be local or national in nature and their mission is
opportunity and has little fear by detection. to undermine the authority, weaken the organization, and
The Casual Pilferer steals primarily because of an inability to eventually take over. This can be in business or any
resist the temptation of an unexpected opportunity and has little activity.
fear of being caught. The thefts are usually not premeditated, 2. This can be in the form of rumor mongering,
and the pilferer usually acts alone. propaganda, undermining morale, and injecting defeatist
2. Systematic Pilferer attitudes, and other emotional approaches.
Is one who steal with preconceived plan and takes away any or 3. It is an activity not easy to detect.
all types of items or supplies for economic gain.
Pilferage as a Business Hazard
The systematic pilferer steals plan for the purpose of selling the
stolen items or bartering them for other valuable commodities. 1. Pilferage in one of the most annoying and common
Pilferer invariably has four requirements to succeed in his human hazards which security has to deal with. This
act, such as: activity if uncontrolled can become financial drain if not a
menace to smooth and orderly operation.
1. Location of Items to be pilfered – The systematic 2. Failure to detect shortage and inaccurate inventories
pilferer surveys shopping and store areas, or through
will cause inventory losses, which may be labeled as
contact from the firm themselves.
pilferage.
2. Access to the item to gain possession – Techniques
can be in the form of fake document, bribing guards, out- Types of Pilferers
smarting security, creating disturbance and other methods 1. Casual Pilferer – one who steals due to his inability to
to divert attention while pilferage goes on. resist the unexpected opportunity and has little fear of
3. Removal of Items – This can be done as wearing the detection has no plan or premeditation and he is usually
stolen short or shoes, concealment in body. a “loner” on the job. The temptation picks up the article is
4. Disposal of Items – There is need for “fence”, broker, basically due to poor security measure. The implication of
or clearing houses for these “hot” items. casual pilferage is the big cumulative cost if it remains
unchecked.
3. Vandalism 2. Systematic Pilferer – one who steals with
Vandalism is the action involving deliberate destruction of or preconceived plans and takes away any or all types of
damage to public or private property. items or supplies for economic gain. Pilferers of this kind
The term includes property damage, such as graffiti and can be employees or outsiders of the establishment.
defacement directed towards any property without permission
of the owner. Anatomy of Pilferage
1. When need or desire exists and opportunity is present,
Espionage as a Security theft is almost sure to result.
Hazard Description of an Espionage Agent 2. Pilferage occurs everywhere. Opportunities for
1. He is very dangerous adversary and his skills in pilferage increase when supplies or goods are transported
deception and his cunning should never be from one place to another.
underestimated.
2. He is usually a person of extensive training and will be Factors considered by a Pilferer to be Successful on his Act
highly effective in gaining the confidence of people and of 1. Location of items to be pilfered
extracting information of value to be relayed to his 2. Access to the items
employer or handler.
3. Removal of item
3. Even how well-trained an espionage agent he might
be, he is human like the saboteur, and he can be defeated 4. Disposal of items
in his own game if proper methods and techniques are
undertaken.
WEEK 15-16: IMPLEMENTING RULES AND REGULATIONS
Some Methods Employed by Espionage Agent OF THE PRIVATE SECURITY AGENCY LAW OF THE
PHILIPPINES
1. Stealing of information from employees. DEFINITIONS OF TERMS
2. Stealing information from records or other sources. Security Guard – sometimes called private security guard or
3. Using various methods of reproducing documents, watchman shall include any person who offers or renders
products, equipment or working models. personal services to watch or secure either a residence or
business establishment or both for hire or compensation, and
with a license to exercise profession. Security Guard Force –
is a group of force selected men, trained or grouped into Agency or Private Detective Agency. He must meet the
functional unit for the purpose of protecting operational following basic requirements:
processes from those disruption which would impede efficiency 1. Filipino Citizen;
or halt operation at a particular plant, facility, installation or 2. should not less than twenty five (25) years of
special activity. age;
Private Security Agency – any person, association,
partnership, firm or private corporation, who contracts, recruits,
3. college graduate and/or commissioned officer
in the inactive service or retired from the Armed Forces
trains, furnishes or post any security guard to do its function or
of the Philippines or the Philippine National Police;
solicit individuals business firms, or private, public or
government-owned or controlled corporations to engage his or 4. has taken a course or seminar on Industrial
its services or those of his or its security guards, or hire, Security Management and/or must have adequate
commission or compensation. training or experience in security business, and
Company Security Force – a security unit maintained and 5. good moral character
operated by any private company or corporation for its own
security requirements only. New applicants for license to operate shall be required to obtain
Government Security Unit – a security unit maintained and a minimum capitalization of one million pesos (Php
operated by any government entity than military and/or a police 1,000,000.00) with a minimum bank deposit of five hundred
which is established and maintained for the purpose of securing thousand (Php 500,000.00) in order to start its business
the office or compound and/or extension such government operation.
entity.
License to Exercise Profession – shall mean any document Limitation, Disqualification and Prohibitions
issued by the Chief, Philippine National Police or his duly 1. No person shall or organize or even have an interest in
authorized representative recognizing a person to be qualified more than one agency
to perform his duties as private security or training personnel. 2. Elective or appointive government employees who
License to Operate(LTO) – is a license certificate document, may be called upon on account of the functions of their
issued by the Chief, Philippine National Police or his duly respective offices in the implementation and enforcement
authorized representative, authorizing a person to engage in of the provisions of RA 5487, and any person related to
employing security guard or detective, or a juridical person to such government employee by affinity or consanguinity in
establish, engage, direct, manage or operate an individual or a the third civil degree, shall not hold an interest directly or
private detective agency or private security agency company indirectly, in any security or watchman agency.
security SAGSD – otherwise refer to the current PNP Civil 3. No agency shall offer, render or accept services in
Security Group Security Agency and Guard Supervision
gambling dens or other illegal business establishments or
Division or any other PNP Office that may be designated later enterprises.
as the primary office for supervision of the implementation of RA
5487. 4. The extent of the security guard services being
PADPAO – refers to Philippine Association of Detective and furnished by the security agency shall not go beyond the
Protective Agency Operators, Inc. which is an association of all compound and/or property of the person or establishment
licensed security agencies and company security forces. contracting the security service except when the security
Duty Detail Order – a written order or schedule issued by a guards is escorting big amount of money or valuables.
superior officer usually the private security agency or branch 5. All agencies shall maintain a main office in their
manager or operations officer assigning the performance of registered addresses. Branch offices may be established
private security; detective services duties. and maintained in other provinces or cities where the
Republic Act Nr. 5487- it is the law that governs the security agency has deployed guard.
organization and operation of private security agency 6. All applicants for license to operate shall be required to
throughout the Philippines. It is otherwise known as the “Private attend a private security agency or company guard force
Security Agency Law of the Philippines”. This act was approved operators and management seminar or workshop.
on October 3, 1972 and it was amended on October 8, 1994.
Prohibition on “Kabit System” Operators
General Prohibitions a. No licensed security agency shall operate, promote
No license certificate shall be granted to any applicant for and enter into an agreement of merger or “kabit system”
license to operate or license to exercise security profession with with any person or group of persons for the purpose of
the following disqualification: organizing a branch unit or subsidiary under separate
1. Having previous record of any conviction of control and ownership. Merger of security and detective
any crime. agencies shall not be recognized without prior approval
2. Having previous record of any conviction of from the Securities and Exchange Commission with respect
any offense involving moral turpitude. to their Articles of Incorporation and the Department of
3. Having been dishonorably discharged or Trade and Industry, with regards their business name.
separated from employment or service. b. Any of the following circumstances or a combination
4. being a mental incompetent. thereof shall be considered prima-facie evidence of the
existence of “Kabit System”.
5. Being a user or addicted to the use of
prohibited drugs or narcotics. 1. Maintaining a separate branch, unit or
subsidiary office aside from the main office of the
6. Being a habitual drunkard
agency situated within the same locality.
7. Dummy of a foreigner. 2. Receiving direct payments from the agency’s
clientele and issuing official receipt of their own distinct
License to Operate
from that issued by the agency concerned.
Any Filipino citizen or corporation, association, partnership, one
hundred percent (100%) of which is owned and controlled by 3. Remitting directly Social Security System
Filipino citizens, may organize and maintain a Private Security premiums, Medicare contributions and other premium
for other policy insurance benefits by the 3. Must have taken a private security course or seminar
aforementioned branch, unit or subsidiary office. and/or must have adequate training or experience in
4. Keeping or maintaining separate payrolls for security business or rendering security/detective services.
the branch employees signed and/approved by the 4. Of good moral character and must not have been
branch manager only. convicted of any crime or violation of these rules and
5. Absence of record of monthly income regulations carrying a penalty of prohibition to be licensed.
remittance to the main office when said branch is 5. Must be physically and mentally fit.
authorized to make collections from the clients of the
licensee. Qualification of a Private Security Guard
6. All other similar acts tending to show separate 1. Filipino Citizen
and distinct relationship or personality or ownership or 2. high school graduate
management.
3. physically and mentally fit
On Membership 4. not less than eighteen years of age nor more than fifty
years of age (for new applicants and SGs in non-
1. No regular license shall be granted to any private
supervisory position)
security agency unless it has a minimum of two hundred
(200) licensed private security personnel under its employ. 5. Has undergone a pre-licensing training course or its
equivalent.
2. No regular license shall be granted to any company
guard force or private detective agency unless it has
Qualification of Security Officer
minimum of thirty (30) licensed private security personnel
under its employ. 1. Filipino citizen
3. The maximum number of private security personnel 2. holder of Baccalaureate Degree
that a PSA/CGF/PDA may employ shall be on thousand 3. physically and mentally fit
(1000) including the branch and the subsidiary. 4. Has graduate from a Security Officer Training Course
or its equivalent.
Status and Validity of License to Operate
1. Regular LTO – issued, after complying with licensing Qualification of Consultant
requirements. 1. Filipino citizen
2. Temporary LTO – initial and conditional issuance to 2. physically and mentally fit
new private security agencies and to PSAs holding regular 3. holder of a master’s degree in either Criminology,
LTO not able to maintain the minimum number of security, Public Administration, MNSA, Industrial Security
personnel or conform to standards, for them to be able to Administration, or Law
attain the 200 minimum number of security personnel or 4. Must have at least ten years’ experience in the
comply with license standards, prior to issuance or re-
operation and management of security business.
issuance of regular LTO. Such issuance shall not be
renewable nor be extendible.
Qualification of a Private Detective
3. Unless sooner cancelled or revoked and provisions 1. Filipino citizen
hereof modified, all license to operate shall have a validity
of two (2) years. Temporary LTOs upon expiration are 2. physically and mentally fit
automatically cancelled. 3. holder of Baccalaureate Degree preferably Bachelor of
Laws or Bachelor of Science in Criminology
Renewal of License to Operate 4. Graduate of Criminal Investigation Course offered by
1. Application for renewal of License to Operate shall be the PPNP or the NBI or any police training school, or a
field at least sixty (60) days before expiry date of LTO. detective training in any authorized or recognized training
2. Renewal applications of holders of regular license not center.
able to maintain the 200 minimum number of security 5. advance ROTC or CMT graduate or its equivalent
personnel under its employ or license renewal
requirements at the time of filing of application shall be The 11 general orders
reverted to temporary status and issued temporary LTO. 1. To take charge of this post and all government property
3. The Licenses to Operate of applications for renewal of in view.
regular License to Operate who fail to file application 60 2. To walk my post in a military manner, keeping always
days after the expiry date of LTO subject of the renewal on the alert and observing everything that takes place
application, SHALL within sight or hearing.
AUTOMATICALLY BE CANCELLED. 3. To report all violations of orders I am instructed to
4. No application shall be approved unless a certification enforce.
is issued by FED-CSG to the effect that all licenses of
firearms of the agency concerned are updated or renewed
4. To repeat all calls from posts more distant from the
guardhouse than my own.
for at least one (1) year forthcoming during validity of the
renewed LTO. 5. To quit my post only when properly relieved.
6. To receive, obey and pass on to the sentry who
License to Exercise Private Security Profession Basic relieves me, all orders from the Commanding Officer,
Requirements of private security personnel Command Duty Officer, Officer of the Deck and Officers
1. Filipino Citizen and Petty Officers (Commanding Officer, Officer of the
2. not be less than eighteen (18) years of age Day, Officers and NonCommissioned Officers) of the
Watch only.
7. To talk to no one except in the line of duty.
8. To give the alarm in case of fire or disorder. • Once the person replies, convey your
9. To call the Officer of the Deck in any case not covered message
by instructions.
Radio Communication Tips
10. To salute all officers and all colors and
standards not cased. • Leave a second or two between "hand-offs"
to give others a chance to break in.
11. To be especially watchful at night and, during
the time for challenging, to challenge all persons on or near • It is always best to speak in short simple
my post and to allow no one to pass without proper phrases on the radio and toss the conversion back and
authority forth with the word "OVER."
• Don't speak immediately when you press the
WEEK 17: Basic Radio Operation and VIP Security PTT (push to talk), especially with digital radios which
Two-way Radios among all their benefits have slightly longer delay. Wait
A two-way radio is a radio that can both transmit and receive 2-3 seconds.
radio waves (a transceiver), unlike a broadcast receiver which • If you speak as soon you press the PTT
only receives content. button, it can chop off the first syllable or word, making
Other two-way radio systems operate in full-duplex mode, in you hard to understand. If that word doesn't make it,
which both parties can talk simultaneously. you will just have to say it again and run down your
batteries faster.
Basic Radio Operation
Are available in stationary (base station), mobile (installed in Radio User’s Language
vehicles), and hand-held portable models. Hand-held two-way
radios are often called walkie-talkies, handy-talkies or hand-
• Go Ahead – Resume transmission
held. • Say Again – Re-transmit your message
Basic Radio Etiquette Rules • Stand-by – Transmission has been acknowledged, but
• The international radio language is English. I am unable to respond now.
• When using a two-way radio, you cannot • Roger – Message received and understood.
speak and listen at the same time, as you can with a • Affirmative – Yes – Avoid yup, nope, etc.
phone. Negative – No
• Do not interrupt if you hear other people • Over – Transmission finished.
talking. • Out – Communication is over, and the channel is
• Do not respond if you aren't sure the call is for available for others.
you. Wait until you hear your call sign to respond.
• Never transmit sensitive, confidential, Standard NATO Alphabet
financial, or military information.
• Perform radio checks to ensure your radio is
in good working condition.
• Memorize call signs and locations of persons
and radio stations you communicate with regularly.

Think Before You Speak


Avoid long and complicated sentences. If your message is long,
divide it into separate shorter messages.
Do not use abbreviations unless they are well understood by
your group.

Four (4) Golden Rules of Radio Communication


1. Clarity: Your voice should be clear. Speak a little
slower than normal. Speak in a normal tone, do not shout.
2. Simplicity: Keep your message simple enough for
intended listeners to understand.
3. Brevity: Be precise and to the point.
4. Security: Do not transmit confidential information on Parts of a Two (2) way Radio
a radio unless you know the proper security technology is in 1. Antenna – Responsible in making the
place. Remember, frequencies are shared, you do not have communication clear.
exclusive use of the frequency. 2. Knob – It is the on/off knob as well as the
adjustment of volume.
Follow these easy steps to make a call.
3. PTT – Push-To-Talk. Press this button before
• First, listen to ensure the channel is clear for talking.
you.
4. Speaker – Hearing the output of the sender.
• Press the PTT (Push-To-Talk) button.
5. LCD, or Liquid Crystal Display – Mini
• After 2 seconds: monitor of the radio.
• Say "recipient's call sign" 6. Speaker and MIC Jack – Use as an
• Followed by "THIS IS" and "your call sign“ extension in using the headset.
VIP Security Teamwork is everything when it comes to the application of
VIP protection means providing high-profile clients and their Close Protection. Any team is only as good as its weakest link
families with personal protection services to insure their peace as the saying goes. The one difference is Close Protection is
of mind, safety and security. that you cannot afford to have ANY weak links
VIP (Very Important Person) Protection is that you cannot afford to have ANY weak links
A well-known dignitary/ famous person who is known to be
wealthy (monetary or information) and who is venerable target Wedge Formation
of execution. The wedge formation as the name suggests in the geometric
configuration of a wedge.
Kidnapped The rule in the wedge formation is to provide the client with 360
A sudden taking of person without his/ her consent for the degrees of protection at all times.
purpose of ransom or execution.
Box Formation (4-man type)
Common Modus Operandi: The box formation as the name suggests in the geometric
1. Use of egg configuration of a box.
The rule in the box formation is to always provide the client with
2. Use of distracting materials
360 degrees of protection.
3. Side sweep
4. Sidewalk/ boxed type Three-man (V-type) Formation

Ambush Diamond Formation (4-man type)


Sudden attack on a potential moving target. The diamond formation as the name suggests in the geometric
configuration of a diamond.
Ambush can be executed in: The rule in the diamond formation is to always provide the client
1. Humps and Sharp curve areas with 360 degrees of protection.
Vehicle commonly slows down in a humps area wherein it is
a stable target for ambush. One-On-One Formation (1-man type)
2. High rise structure The one-on-one formation is normally utilized within a low threat
• Due to the advantage of the area on a low threat client.
attacker, an ambush can be executed. The rule in the one-on-one formation is to always provide the
client with 360 degrees of protection while utilizing low public
• High rise area or elevated area is a profile techniques.
nice spot to have an overview of the attack The lone bodyguard is responsible for the flank, point, tail, and
area. close-in protection of the client.
• Due to the advantage of the
attacker, an ambush can be executed. (SOP on Vehicle)
1. Engine on
VIP Security Techniques (SOP on Foot) • As a VIP driver, you should always have an
While on bodyguard assignments there are four basic advance overview of the area.
formations you will employ in the protection of your client
depending on the environment, threat level, circumstances, and
the number of bodyguards available. • DO NOT off your engine when you have a
VIP.
Responsibilities & Position Categories • In case an ambush was made, you can easily
1. The Point Bodyguard escape with the VIP
The point bodyguard guides the protective team, blocks and
heads-off potential threats from the front of the protective 2. 7 o’ clock
formation. In case of tight space and need a reverse tactics, put your
2. The Rear Bodyguard wheel in 7 o’clock position when making a reverse and speed
The rear bodyguard blocks and heads-off potential threats up forward.
from the back of the protective formation.
3. The Detail Leader 3. Axle target
• The Detail Leader walks immediately to the In case of blockage, speed up and hit the axle of the car
right of the principal. blockage, in this manner you can adjust the blockage for an
escape route.
• The Detail Leader should be no less than an
arm’s length away from the principal. 4. Dummy
• He or she is responsible for immediately • Always set at least 2 dummy cars in convoy.
shielding and removing the principal in the event of
an attack. • Use same color of vehicle to confuse attacker
on which vehicle the VIP is seated.
Shout the word “gun right” or “gun left” while concurrently
nullifying the assault. The other bodyguards upon hearing this
communication will simultaneously encircle and shield the client
with their bodies, withdrawing the client from the area to a
vehicle, a safe haven, or any other location where injury can be
avoided. High-level proficiencies are required.

VIP Security Techniques (SOP on Foot)

You might also like