Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

COURSE TITLE: Introduction to Industrial Security Concepts

COURSE DESCRIPTION: The study covers the organizational set-up, administration and
operation of security agencies, special police and investigation agencies. The course
covers the study of the concept and principles of industrial security. It includes the role
of security profession in law enforcement administration and public safety, importance
of security personnel in investigation, the concept of criminalistics in the field of
industrial security investigation and crime detection, and the principles applicable to
jurisprudence of criminal law, evidence and criminal procedure in relation to the legal
context of industrial security and related laws.
PRE-REQUISITE: Comparative Models in Policing
CREDIT UNITS/HOUR: 3 units (3 lecture hrs. per week)

Objectives:
Understand the theories related to security and safety;
Identify the different theories, concepts and philosophy related to security and
safety; and
Identify and understand all types of Physical Security
Learning Outcomes:
Able to familiarize the early history of security;
Able to differentiate a the theories and understand the concepts with regards to
security and safety;
Able to understand the categories of security and other private sphere in security;
and
Able to identify and understand the meaning of physical security and other types
of physical security

Security was derived from Latin word Securus w/c means “safe” or “without care” or
from Se cura, wherein se means “free” and cura, means “care”.

HISTORY OF SECURITY
Pre-Historical Time
Code of Hammurabi
the earliest recorded of rulers for protection, persons and properties.
Man recognized the need to keep himself safe from both known and unknown
enemies such as animals, other inhabitants and to environment itself.
Watchman (Israel) Ref: Old Testament of Ezekiel 33:1-6, was entitled Renewal of
Ezekiel’s Call as Watchman.
Praetorian Guards (Rome)
They are the ancient guard of Rome and Elite unit of Imperial Roman Army, and
they are also called as Vigiles who were tasked to be fire fighters under the
authority of Emperor Caesar Augustus.
Under Development
Anglo Saxon Period – Tun Policing System (450 1066) Tun means Town.
All male residents required to guard the tun (town)
10 families in town are called as “TITHING” (Unit)
Each Tithing elected a leader and called as “TITHINGMAN”
10 Tithing equals to 100 families
The leader of 100 families called as “REEVE”
Tithingman and Reeve were elected officials and they possessed judicial and
police power.
Norman Period (1066-1199)
Shire-Reeve System
Shires – this refers to the 55 military divisions
Rieve – “The Head-man” or “Lieutenant of the Army” or the Military Leader (Shire-
Rieve)
The Shire-Rieve had absolute powers that no one can question his actions.
Take note: The word Shire-Rieve is said to be the origin of the word Shireff.
Constabuli or The Keeper of the Horse – appointed to each village to aid the
Rieve in his duties.
Take note: The word Cobstabuli became the source of the word Constable.
Frankpledge System
10 male resident (group/unit) whose ages 12 yr. old were required to guard the
town to secure peace and order and also protect lives and property.
Modern Period
Foot Patrol – Henry Fielding (1748)
He proposed a permanent, professional and adequately paid security force.
Laissez Faire ( 18th Century) – the word Laissez Faire means “allow to do” with
the idea of being “let the people do as they choose”.
The Industrial Revolution
To hire special security force to protect homes and properties
And this time was the beginning of private security.
Allan Pinkerton – He founded the first detective agency in Chicago named
Pinkerton Detective Agency performing law enforcement function.
Federal Bureau of Investigation – Birth year (1908) or July 26, 1908
Protect the secrets of the U.S. Intelligence Community
Protect the nation’s critical assets, like our advanced technologies and sensitive
information in the defense, intelligence, economic, financial, public health, and
science and technology sectors
Counter the activities of foreign spies
Keep weapons of mass destruction from falling into the wrong hands
William J. Burns – He founded the Burns Detective Agency in 1909 and become
the sole investigating agency for American Banking Association.

DEFINITION OF TERMS
Industry – The term denotes “earnest or constant application to work or
business”, or special branch of work, or the capital or workers employed on it.
Industrial – This defined as the pertaining to or engaged in industry.
Relating to, used in, created by industry, and/or of industry’s workforce or relating
to or involving workers in industry.
Security – is a state or condition of being secured; there is a freedom from fear,
harm, danger, loss, destruction or damages.
Necessity of Security – Security measures are inevitable or necessary for the
attainment of goals and objectives when an individual or organization is exposed
to hazard, their productivity is adversely affected.
Safety – State of being safe, the condition of being protected against physical,
social, spiritual, financial, political, emotional, etc.
Management – The skillful use of means in order to attain purpose.
Industrial Security – Security measures applied to business industries; or the
business providing security and protection to private individual’s business
enterprises, or government and non-government industries.
Industrial Security Management – Involves the Skillful handling of the security
and safety measures of business enterprises and industrial establishments
RELATED CONCEPT
Note: Understanding the concept of security requires further definition of other related
concepts such us asset, risk, threat, and vulnerability.
Asset – Is anything tangible or intangible that is capable of being owned and
controlled to produced value.
Risk – is the uncertainly or financial loss, the probability that a loss has occurred
or will occur, or the possible occurrence of an undesirable event.
Ex. Lost of life of your love once.
Threat – is anything that could adversely affect assets; it can be classified into
natural hazard ( such us floods, landslide, etc.), accidents (chemical spills), or
international act (domestic and international terrorism).

THEORIES OF SAFETY AND SECURITY


The Risk Theory
It is a widely used scientific discipline, based on the bye identification of a threat,
the specification of risk and specification of how to overcome the risk. The
essence of risk lies in the objective existence of threats. The risk comes from
consciously controlled acting, or chaotic and uncontrolled acting of each part of
a complex. In the behavior of elements, moments may arise when the elements,
whether intentionally or randomly are getting into direct interaction (collision,
impact).
It is focusing on minimization of damage or impact. That is story could be used
as methodology for specification of possible negative impacts, which could harm
the reference object. Due to this fact, risk management is used in many fields, in
which significant theoretical development and practical applied application were
developed.
The Crisis Theory
Crisis theory is a scientific discipline focused on that theoretic aspects of crisis
research, mainly on nature and causes of crisis. The basics of crisis prevention
and its handling are based on the crisis theory, it is important to determine what
is the reason and nature of safety and security problems. Moreover, we need to
examine what is the relation between the theory of safety and security and the
crisis theory.
Causality Theory
The term causality has evolved from the Latin word Causa means “reason” or
“cause”. The cause is relation, Where cause and effect are mutually connected.
The law of causality determines that anything that happens has at least one
cause, and also any cause has future consequences. The same causes create
the same effects. It is structured by a causal relationship (causal nexus).
Causality is an expression of the relationship between two events, where one of
them raises and the second is called the “cause”
Basically the reason is the term, which causes effect. Causality is key for the
theory of safety and security. It allows establishing a logic chain of causes of
security or safety violation. From this point of view of safety or security, there is
inadequate position of causality. A roll of crystallinity is neglected. It is important
to focus on this problem.

CATEGORIES OF SECURITY
Physical Security - It is the broadest branch of security which is concerned
principally with the physical measures adopted to prevent unauthorized access
to equipment, facilities, materials, and documents, and to safeguard then against
theft, damage, sabotage, or espionage. It also encompasses protection of
personnel from any criminal act.
Communications Security - It is the protection resulting from the application of
various measures which prevent or delay the enemy or unauthorized person in
gaining information through the communication system. This includes
transmission, cryptographic, and physical security.
Hotel Security - This is another specialized physical security. Hotel detectives,
uniformed guards, and security supervisors see to it that the guests and their
personal effects are safeguarded, hotel properties are protected from pilferage,
loss, damage, and the functions in the hotel restaurants, bars and clubs are not
disturbed and troubled by rowdy outsiders, or by the guests themselves.
Bank Security - “Bank security” is another specialized line in physical security.
Due to the peculiar nature of bank operations, the main objective of the bank
security force is the protection of the life of employees and assets of the bank.
The physical size of the banking institution, its location, volume of the cash
handed, number of personnel employed and its clientele are the main
considerations in determining the strength and type of the security unit.
Document Security - “Document security” is physical security involving the
protection of documents and classified information from loss, access by
unauthorized persons, damage, theft, and compromise through disclosure.
Safeguarding vital records is one of the most difficult tasks that can be assigned
to security personnel.
Personal and VIP Security - The protection of top ranking officials of the
government, visiting persons of illustrious standing, and foreign dignitaries is no
easy job. This calls for a real “pro” in security field. VIP security is part of
personal security.
Crises Security - Another new specialized field is “crises security” which is allied
if not a part of VIP security. Crises security is now involved in kidnapping of VIPs
like dignitaries, rich scions, industrial magnates, political leaders. Motives can be
economic, political, emotional, nationalistic, religious, or their combinations.
Industrial Security - Industrial security is physical security as applied to business
groups engaged in industries, like manufacturing, assembling, research and
development, processing, warehousing, and even agriculture. Usually, industrial
enterprises are located in a complex, with separate buildings for work, storage,
administration, and other activities.
Operational Security - Operational security is part of physical security that deals
primarily with the protection of processes, formulas, patents, and other industrial
and manufacturing activities from espionage, infiltration, loss, compromise, or
photocopying.
Other Special Types of Security - Due to peculiarities of different business activities,
specialized types of security appeared. These types are adaptations, variations,
innovations, and/or modifications of physical security, i.e., air cargo security, school
security, supermarket security, and personnel security.
Air Cargo Security – This is applied to minimize, if not prevent, losses or cargo
during in transit storage or transfer.
School Security – This is applied in response to the increase of violent crimes
committed against students and school personnel, and school properties.
Supermarket security – This is applied in response to the mushrooming of
bazaars, marts, super malls, and the like.
Personnel security – This is involved in the background checks of individuals
commensurate with the security requirements of their work. This also includes
measures designed to protect employees of an organization or business
establishments.

SECURITY AND SAFETY MEASURES


The security of any business establishment today is a complex process. Security work
involves active and passive measures so those effective defenses can be established.
Active Measures - are the physical barriers, security lightings, safes and vaults,
locks and other devices and gadgets designed to detect and impede hazards.

Passive Measures – are those that will deter man from committing such acts for
fear of being caught, or charged in court or get dismissed. Security education
programs,
THE (3) MAJOR DIVISION OF INDUSTRIAL SECURITY
Physical Security
Personnel Security
Document and Information Security

I. PHYSICAL SECURITY
Physical security as earlier discussed, is the broadest branch of security which is
actually a system of barriers placed between potential intruders and the matters
to be protected. It is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials, and documents, and to
safeguard them against espionage, sabotage damage and theft. It also
encompasses protection of personnel from any criminal act.
PRINCIPLES OF PHYSICAL SECURITY
In every establishment, physical measures are needed to deny unauthorized
access or intrusion because of the following:
Enemy Agents Must Access – Acquisition of information is the ultimate results,
and the means and form in which the information is obtain.
There is No Impenetrable Barrier – For the unfriendly government or organization,
they are willing to devote enough time, money, personnel, material, and
imagination in passing barriers. So physical security attempts to build defense by
using a certain barrier.
Defense in depth means barrier after barrier. In order that barrier could prevent
unauthorized access and serve its purpose very well, there should be an
integration of all barriers adopted in the installation.
Surreptitious versus Non-surreptitious Entry – The possibility of surreptitious
entry is the greatest hazard from the standpoint of counterintelligence security
because it is usually difficult to determine that the information has been
compromised. No action is taken to neutralize the act of espionage because
surreptitious entry is not usually detected. Surreptitious entry means not
observable while non-surreptitious entry is observable. Observable or not,
intruders usually find the right place and right opportunity to gain access.
Physical security then needed to detect or deny unauthorized entries.
Each Installation is Different – Since each installation is different each will have
different problems to overcome. The security procedures will not be adequate for
all installations.
A. BARRIERS
Barriers refer to any physical structure whether natural or man made capable of
restricting, deterring, delaying, or preventing illegal and unauthorized access to
an installation.

TWO GENERAL TYPES OF PHYSICAL SECURITY BARRIERS


Natural Barriers – These are offered by nature which could obstruct or delay the
passage way of potential intruders. These also refer to natural structures that serve as
deterrents or obstructions to intruders such as high cliff, canyon, desert, or bodies of
water.
Man-made Barriers - Are structural constructions like fences, walls, floors, roofs, grills,
bars, road blocks, or other physical means to deter or impede penetration.

SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS


Natural Barriers includes mountains, cliffs, canyons, ravens, seas, marshes,
deserts, or terrain difficult to traverse.
Structural Barriers are those features constructed by man regardless of their
original intent that tend to delay intruder. Ex. Walls, ceilings, door, and fences.
Human Barriers includes guards, charges of quarters, office and shop workers,
who stand between the intruder and the matter to be protected.
Animal Barriers are usually shepherd dogs trained for and used as guards.
Energy Barriers are usually electrical and electronic devices that could assist
security personnel in detecting intrusions. Ex. Protected lighting, and anti
intrusion devices.

LEVELS OF PHYSICAL SECURITY


It varies depending on the type and location of facility, and other factors needing
security. The levels of physical security could be any of the following:
Minimum Security is a system designed to impede unauthorized external activity
such as simple intrusion to armed attack.
Low Level Security is a system designed to impede and detect some
unauthorized external activity such as on small retail store, storage warehouses.
Medium security is designed to impede, detect and assess most external activity
and some unauthorized internal activity that range from simple shoplifting to
conspiracy to commit sabotage. This includes the:
Use of advance intrusion alarm system.
Establishments of perimeter barriers.
Use of an unarmed guard.
High level Security is designed to impede, detect, and assess most unauthorized
external and internal activities of certain prisons, defense contractors,
pharmaceutical companies and sophisticated electronic manufacturers. This
includes the utilization of the following:
Close Circuit Television (CCTV)
Perimeter alarm system
High security lighting
High trained armed guards
Control designs
Coordination with local law enforcement agencies.
Maximum Security includes the application of the following:
Sophisticated alarm system
On-site response force

PERIMETER BARRIER
Perimeter barrier is a medium of structure which defines the physical limits of an
installations or area to restrict or impede access thereto. It is any physical barrier
used to supplement the protection of an inside or outside perimeter. Perimeter
barrier also includes the utilization of security personnel.

LINE OF PHYSICAL DEFENSE


Security managers and security personnel also consider the various lines of
defense that could help delay or stop intruders. These are:
1st line of defense: perimeter fences
2nd line of defense: doors, floors, windows, walls, roofs and grills
3rd line of defense: storage system

PERIMETER BARRIER OPENINGS


In determining the appropriate perimeter barriers, security managers should not
overlook the necessity of monitoring perimeter openings that could be used by
intruders. These openings are the following:
Gate and doors - should also be guarded or locked as much as possible.
Sidewalk Elevators - provide access to areas within the perimeter barrier, and
should be locked or guarded.
Utilities Openings Sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier, and which have cross sectional area of
ninety-six (96) square inches or more should be protected by bars, grills, water-
filled traps or other structural means providing equivalent protection to that
portion of the perimeter barrier.
Clear Zones An unobstructed area or a “clear zone” should be maintained on
both sides of the perimeter barrier. A clear zone of twenty feet or more is
desirable between the barrier and exterior structure and natural covers which
may provide concealment or assistance to a person seeking unauthorized entry.
Whenever possible a clear zone of at least fifty (50) inches should be maintained
between the barrier and the structure within the perimeter.

TYPE OF PERIMETER BARRIERS


FENCES – are dependent structures designed to control physical and visual
access between outside areas. Types of fences include Solid Fence and Full-
View Fence
SOLID FENCE - is made of opaque material in such a way that visual access
through the fence structure is denied. Solid fences are constructed with heavy
materials such as bricks, stone and concrete, and usually extended down into the
ground to appoint view below the frost line.
Advantages of Solid Fence
Denies visual access of the installation to the intruder.
Denies the intruder the opportunity to become familiar with the personnel,
activities, and the schedule of the movements of the guards.
Disadvantages of Solid Fence
Prevents the guards from observing the area around the installation.
Creates shadow which may be used by the intruder for cover and concealment.

FULL VIEW FENCE - is constructed in such a manner that visual access is


permitted such as wire fence through the fence structure. It is designed purely to
control physical access between-two areas.
Advantages of Full-view Fence
Guards are able to keep the area surrounding the installation under observation.
Does not create any shadow.
Disadvantages of Full-view Fence
Allows visual access to the installation
Allows the intruder to get familiar with the movements and the time

WIRE FENCE - is a type of fence made of chain link bared wire concertina design
with small opening not larger than 2 square inches and made of number 9 gauge
wires of heavier, twisted and barbed salvage at top and bottom.
Specifications for Using Chain-link Fences:
It must be constructed of 7-feet material excluding top guard.
It must be 9 gauge or heavier.
Mesh openings are not to be larger than 2 inches per side.
It should be twisted and barbed salvage at top bottom.
It should be security fastened to rigid metal or reinforced concrete.
It must reach below surface enough on soft grounds to compensate for shifting
soil or sand.
It must reach within 2 inches of hard ground or paving.
Specifications for Using Barbed Wire:
Standard barbed wire is twisted, double-stand 12 gauge wire with 4 point barbs
spaced on equal distance apart.
Barbed wire fencing must be firmly affixed to posts high excluding top guard.
Barbed wire fencing should not be less than 7 ft. high excluding top guard.
The distance between strands will not exceed 6 inches and midway between
parts.
Using concertina wire fence – concertina fences are formed like accordions.
BUILDING WALLS - include walls, floor, roofs or their combination serve also as
barriers and they should be of such constructions to provide uniform protection
just like wire-fencing.
BODIES OF WATER - like river, lake, cataract, sea, pond or any bodies of water
forming part of the wall, building or fencing should not be considered an
adequate perimeter barrier. Additional security measures like wire fence,
concrete walling, security patrolling and flood lighting at night may be necessary
for the portions of the perimeter.

ADDITIONAL PROTECTIVE MEASURES


Top Guard - A top guard is an additional overhang barbed wire placed on vertical
perimeter fences facing upward and outward with a forty-five (45) degree angle
with three to four strands of barbed wire spaced six inches apart. This will
increase the protective height and prevent easy access.
Guard Control Stations - This is normally provided at main perimeter entrance to
secure areas located out of doors and manned by guards on a full-time basis.
Sentry stations should be near a perimeter for surveillance at the entrance.
Towers - Guard towers are house-like structures above the perimeter barriers. As
the height of tower increases, visibility, likewise improves. During inclement
weather, especially at night, even with spotlights, the visibility will be limited.
However, a tower gives a psychological unnerving effect to the violators.
Signs and Notices - Control signs should be erected where necessary in the
management of unauthorized ingress, and preclude accidental entry. Signs
should be plainly visible and legible from any approach and in understandable
language. Such signs should inform the entrants regarding body search,
packages, “ID” tags, and other prohibitions against cameras, lighters, and other
regulations.

B. SECURITY LIGHTINGS OR PROTECTIVE LIGHTINGS


CONCEPT OF SECURITY OR PROTECTIVE LIGHTING
Protective lighting provides a means of continuing illumination during hours of
darkness, a degree of protection that is maintained during daylight hours. This
safeguard also has considerable value as a deterrent to thieves and vandals and
may make the job of the saboteur more difficult. It is an essential element of an
integrated physical security program.
The system must be reliable and designed with overlapping illumination to avoid
creating unprotected area in the event of individual light failure. It must be easy
to maintain and it must secure itself against attack. Poles should be within the
barrier power lines and the switch box must be protected.

BASIC REQUIREMENTS OF SECURITY LIGHTING


Security or protective lighting needs at installations and facilities depend upon
each situation and the areas to be protected. Each situation requires careful
study to provide the best visibility practicable for such security duties as
identification of badges and people at gates, inspection of vehicles, prevention of
illegal entry, detection of intruders outside and inside buildings and other
structures, and inspection of unusual or suspicious circumstances.
When such lighting provisions are impractical, additional security post, patrols,
sentry dog patrols, or other security means will be necessary.
Protective lighting should not be used as a psychological deterrent only. It should
be used on a perimeter fence line only where the fence in under continues or
periodic observation. Protective lighting may be unnecessary where the
perimeter fence is protected by a central alarm system.
Protective lighting maybe desirable for those sensitive areas or structure within
the perimeter, which are under specific observation. Such areas or structures
include pier and lock areas, visual buildings, storage areas, and vulnerable control
points in communications, power, and water distribution systems. In interior
areas where night operations are conducted, adequate lighting of the area
facilitates detection of unauthorized persons approaching or attempting
malicious acts within the area.

CHARACTERISTICS OF PROTECTIVE LIGHTINGS


Using protective lighting is expensive and is an additional cost to the company or
establishment. Therefore, consider the following in planning for protective
lighting systems:
Protective lighting usually requires less intensity than working light, except for
identification and inspection at authorized portals and in emergencies.
Lightings needed may vary because each area of an installation or facility
presents its particular problem based on physical layout, terrain, atmospheric
and climatic conditions, and the protective requirements.
The data available from the manufactures of lighting equipment which will assist
in designing a lighting system. Included in these data are:
Descriptions, characteristics, and specification of various incandescent, arc, and
gaseous discharge lamps.
Lighting patterns of the various luminaries.
Typical layouts showing the most efficient height and spacing of equipment.
Minimum protective lighting intensities required for various applications.

PURPOSE OF SECURITY LIGHTINGS


Security lightings provide sufficient illumination to areas during hours of
darkness. Among its other purpose are:
It improves visibility so that intruders can be seen, identified or apprehended.
It gives psychological fear which serves as a deterrent to thieves, pilferers,
trespassers, and saboteurs.
It makes the routine work of guard easier of identifying employees, vehicles, etc.
during night-time.
If placed in certain areas, may even reduce the number of stationary guards, and
instead, may require roving patrol only at night.

SECURITY LIGHTING TECHNIQUES


Hereunder are some of the techniques in ensuring the effectiveness of security
lightings:
Security lightings should enable a guard to observe clearly the activities around,
and inside the premises within his jurisdictions.
In planning, high contrast between intruder and background should be provided.
Increase intensity will improve guard’s ability to see.
Lightings boundaries and approaches, as well as the area and structure is useful
to discourage unauthorized entries and reveal identity of persons. Good lighting
should reveal well specified areas, glaring to intruders and adequate for the
guard to observe his positions.
Effective lightings should, i.e., discourage attempts to enter the premise, and
detections were likely if entry is attempted.
If lightings at night cannot be provided due to impracticability, other means of
protection have to be made like additional guard posts, roving patrols and animal
guards

TYPES OF PROTECTIVE LIGHTING


Stationary Luminaries - It is otherwise known as continuous lighting. This
consists of a series of fixed luminaries to continuously flood a given area.
Types:
Glare Projection.-The intensity is focused to the intruder while the observer
remained in the comparative darkness. This is often found in correctional
institutions.
Controlled lighting- Lighting is focused on the pile of items rather than the
background. Width of the lighting strip can be controlled and adjusted to suit the
security needs.
Standby lighting-This system is similar to continuous lighting but it is turned on
manually or by a special device or other automatic means.
Movable or Portable Lighting-Manually operated. May be lighted continuously
during hours of darkness or only as needed. Supplementary to other types of
security lighting.
Emergency lighting-This is utilized in the event of electronic failure either due to
local equipment or commercial power failure.

TYPES OF LIGHTING SOURCE


Incandescent lamp- Common light bulbs of the type found in the home. This
provides instant illumination when the switch is on. Limited in its use since they
require a period from two to five minutes to light when they are cold and even
longer to relight when hot or after a power interruption.
Mercury vapor lamp - It is widely used for interior and exterior lighting. It is more
efficient than incandescent lamp and gives more light. It emits a purplish-white
color caused by an electric current passing through a tube of conducting
luminous gas.
Metal Halide - Similar physical appearance to mercury vapor. It provides a light
source of higher luminous efficiency and better color rendition.
Fluorescent lamp - Provides good color rendition has. High lamp efficiency as
well as long life. It cannot project light over long distance and thus, are not
desirable as floodlights.
High sodium vapor lamp - Constructed on the same principle as mercury vapor
lamps. It emits a golden white to light pink color. It provides high lumen
efficiency and relatively good color rendition.
Quartz lamp - It emits a very bright white light and snap on almost as rapidly as
the incandescent lamp. Frequently used at very high voltage. Excellent for use
along the perimeter barrier and in troublesome areas.

TYPES OF LIGHTING EQUIPMENT


Floodlights - Used to accommodate most outdoor security lighting needs.
Street lights - It received widespread notoriety in its value in reducing crime. It
produces diffused rather than directional beam.
Search lights - These are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
Fresnel light - It emits wide horizontal beam and is often used in a light house

LIGHTING APPLICATIONS/LIGHTING SYSTEMS


Fenced Perimeter Lighting – is used to illuminate the fence itself and the area
beyond it.
Area Lighting – is used in a building face perimeters consist of faces of buildings
on or within 20 ft. of the property or area line to be protected. And where the
public may approach the building.
Flood Lighting – is used to cast a strong light on the walls of buildings so that
intruders are visible either in silhouette (outline) or by the shadows which they
cast.
Gate House Lighting – is installed on active entrances for pedestrians and
vehicles to facilitate complete inspection of passengers, cars, trucks and freight
cars as well as their contents and passengers.
Topping Lighting – is used to illuminate dark areas not adequately lighted by area
or flood lighting. Areas and structures within the installation property lines
consist of yards, storage spaces, large open working areas, piers, docks, and
other sensitive areas and structures.

C. PROTECTIVE ALARMS
PROTECTIVE ALARMS DEFINED:
Alarm – a security device fitted to property, especially a house or a car, to make a
warning sound if a break-in or theft is attempted or a warning device the sound
made by a security.
Protective Alarm – It is an aural or visual signal given by the enunciator to
security guard when intruder actuates device in a protected area.
Enunciator – is a visual or audible signaling device, which initiates conditions of
associated circuits.

CONCEPT OF PROTECTIVE ALARM


Basically, alarm systems are designed to alert security personnel to
consummated or attempted intrusion into an area, building or compound. Alarms
are not meant to prevent criminal acts. Each type of alarm is activated in the
event that an intruder tampers the circuitry, a beam or radiated waves. In short
intrusion alarms can be electrical, mechanical or electronic.
PARTS OF AN ALARM SYSTEM
Sensor or triggering device which emits oral or visual signal or both
Transmission line which transmits the message to signaling apparatus
Enunciator or the signaling system that activates the alarm.
TYPES OF INTRUSION ALARM SYSTEMS
Metallic foil or wire - All point of entry can be wired by using electrically charge
strips of tinfoil wire. Any actions that will move the foil or wire break the circuit
and activate an alarm. Used in windows or glass surfaces.
Photoelectric eye device - It emits either visible or invisible beam and when an
intruder crosses the beam he makes contact with the photo electronic coil which
thus activates the alarm.
Audio Detection Device - It has a supersensitive microphone speaker sensor
which detects sound caused by attempted forced entry.
Vibration detection device - It has a vibration detection sensor which detects any
vibration caused by attempted forced entry.
Double Squeeze Button - Pressure is required on both side of the device and
therefore the probability of accidental alarm is reduced.
Other Types
Foot rail activator
Bill traps
Knee or thigh button
Foot button

TYPES OF ARLARM DETECTION SYSTEM


Central Station System- A type of protective alarm system where the central
station is located outside the installation.
Proprietary System - It functions in the same way as the central system except
that it is owned by, operated and located in the facility.
Local Alarm System - In this case, the sensor activates the circuit, which in turn
activates a horn or siren or even flashing light located in the immediate vicinity of
the alarmed area.
Auxiliary Alarm System - Installation circuits are led into local police or fire
department by lease telephone lines.
Local Alarm by Chance System - A bell or siren is sounded with no predictable
response. This system is used in residence or small retail establishment which
cannot afford a respond system.
Dial Alarm System - This system is set to dial a predestined number when the
alarm is activated.
FIRE ALARM SYSTEM
Today many communities are served either with a telegraph-alarm system or
with telephone call boxes. Many large cities have removed all or many of their
street alarm boxes because of problems associated with maintenance and with
false alarm transmissions. Some boxes have been replaced with telephones. All
alarms are then transmitted to the fire stations.
In large cities, alarms are received at central dispatch office and then transmitted
to fire stations, frequently with the use of mobile teleprinters and computers.
Apparatus is dispatched according to the nature of the alarm and location of the
fire. Many modern departments are now equipped with computer-aided dispatch
systems that can track the status of all units and provide vital information about
the buildings where fires occur.
FIRE ALARM – are those devices installed to help detect fires or detect anything that
causes fire such as smoke or unusual rising of temperature.
PRIVATE FIRE PROTECTION SYSTEM
Automatic Sprinkler – is a type of built-in sprinklers which works by the increase
of room temperature and which automatically operates the system to put out the
fire. Attached and distributed is the ceilings of the rooms, these sprinklers will go
into action once a fire starts, and those that will open are those directly above the
fire and water is delivered right where it is needed.
Types of Sprinkle System:
Wet Pipe System – the piping has water with pressure, and the water sprinkler
will operate when head is opened and water will continue to flow until shut-off.
Dry Pipe System – the pipes are filled with air under pressure which holds the
water at a value located in a room. When sprinkler goes, into operation, air is
released, trapping the dry pipe value and allowing water to flow through the
system.
Fire Pumps – are mechanical device of supplying water which can be manual or
motor-driven. These pumps are ideal when natural supplies of water are readily
available like a river, lake or stream.
Standpipes – are galvanized iron steel or plastic pipes located inside a building
from the lowest to the top floor with water under pressure for use in case of fire.
Located near the standpipe is a fir hose usually enclosed in a glass box handy for
use. In case of fire, the hose is screwed into the standpipe outlet and valve is
opened to release the water. The water for the standpipe can come from a
storage tank at the roof or from a series of water pumps.
Fire Hydrant – is a mechanical device strategically located in an installation or
street where fire hose is connected so that water with pressure will be available
to extinguish a fire.
Portable Hand Extinguishers – This is a fire fighting equipment which can be
portable or in a cart that is used to put out fire depending on the contents to
extinguish certain types of fire as class A to D. This is the most important and
useful piece of fire fighting equipment in a plant, building or facility.
larm Systems in buildings may also be equipped with detection systems that will
transmit an alarm. Some detectors are designed to respond to smoke and others
to heat.
Fire Detection System – This system provides sensors in fire-prone areas in a
building whereby smoke or heat will actuate these strategically located sensors
or automatic fire detectors so that alarm is automatically sounded warning the
employees and summoning fire fighting units. Some fire detectors activate
installed automatic fire extinguishers or automatic overhead sprinkling systems.
Smoke Detectors – Smoke detectors offer some advantage over fire detectors
because before fire gets big, there will be smoke. Thus, these detectors trigger
an alarm ahead of the heat-actuated device or detector.
TYPES:
b.1. Ionization Device or Radio-active device – This contains a small
radioactive source for ionizing the air molecules between a pair of
electrodes, permitting a very small current to flow between the pair. If
smoke particles from a fire enter this space, they reduce the flow of
current by adhering to the ionized molecules. The drop in current sets off
a buzzer or other alarm.
This device could also detect the invisible and poisonous gases in a fire
long before visible smoke, flames and elevated temperatures can be
detected.
b.2. Smoke Detector – This uses a photoelectric cell. In some of these
detectors, smoke that enters obscures a steady beam of light; in others,
the smoke scatters a light ray from a diode so that the cell can detect it. In
either case the change sets off an alarm.

D. PROTECTIVE LOCKS AND KEY CONTROL AND PROTECTIVE CABINETS


BASIC CONCEPT:
The best defense against lock picking and making of key impression is the
installation of special pick-resistant, impression-resistant lock cylinders.
Generally speaking, locks are the cheapest security investment that can be made.
Locking device is simply a mechanism that extends the door or window into a
wall that hold them.
TERMINOLOGIES:
LOCK - Locks are a simple type of detachable lock, with a hinged or sliding
shackle designed to pass through a ring or staple on a door, chest, etc. While
some modern locks do not require a key to be closed, others do require it, most
often as a security measure against leaving the key inside the location being
locked.
A mechanical, electrical, hydraulic or electronic device used to prevent entry into
a building, room, container or hiding place and to prevent the removal of items
without the consent of the owner.
KEY - An instrument for locking and unlocking; a metal bar with notches or
grooves that, when inserted into a lock and turned, operates the lock’s
mechanism;
A door or lock opener; a device such as a plastic card with an encoded
magnetic strip that operates a door or lock.
PADLOCK - A portable and detachable lock having a sliding hasp which passes
through a staple ring or the like and is then made fast or secured.
PETERMAN - An English term used to describe a lock picker.

TYPES OF LOCKS
Warded Locks – The underlying principle is the incorporation of wards or
obstructions inside the lock to prohibit a key from operating the bolt unless the
key has corresponding notches cut in it do that it will pass the wards. Warded
locks offer very little security. This type of lock must therefore be used only to
have privacy but not to provide a high degree of security.

Disc Tumbler Locks – These are also known as wafer locks. They have flat metal
tumblers with open center fitted into slots in a plug that it is in turn fitted into a
lock case. When the plug is turned, it activates a cam.

Lever Tumbler Locks – Each lever in the lock hinges on a fixed point and is held
down against a stop by the pressure of a flat spring. Each lever has a cut in it,
and all the gates can be located at different places. When the proper key is
inserted and turned, notches of various depths raise all the lever whatever
distanced is required to line up the entire gate exactly opposite the fence on the
bolt. When the key is turned, a portion of the key catches the bolt and slides it
back. Because there is no resistance to the post entering the gate, the lock is
opened. If the key is not the correct one and if even one gate does not line up to
let the post slide into it, the lock cannot be opened.

Pin Tumbler Lock – The pin tumbler mechanism depends for its security, and a
number of round pin or tumblers operating on a cylinder. Each tumbler pin is
divided into two parts, the upper which is flat on bolt, is called the driver; the
bottom part called the pin is rounded or slightly pointed on the lower end to fit
the grooves or cuts in the key. A coil spring above each driver constantly forces it
downward. When the right key is inserted, the various depths of the cuts and the
key compensate for the different lengths in the pins. The dividing point between
each of the two pin segments is brought into line with. The top of the plug,
allowing it to rotate in the cylinder. When the plug turns, it carries with its cam,
which activates the bolt and other lock mechanism.

OTHER TYPES OF LOCKS


Key-Operated Locks - Key-operated locks are most frequently used and are
simple to operate. A key is inserted into a keyway and turned to insert or
withdraw a bolt from a strike. The keyway contains obstacles that must be
bypassed to withdraw or insert the bolt. It can be housed in doorknob or in the
door itself.
Combination Locks - Combination locks are often used on padlocks as well as on
safe and vault doors. Dial combination locks usually have from two to six
notched tumblers. Turning the dial to pre-specified numbers align the notches to
create a slot, allowing an arm to drop into it so that the locking bar can be
withdrawn from the strike.
Card-Operated Locks - Card operated locks are inserted into a card reader
installed near door or passageway that is restricted. When an authorized card is
inserted into the slot, a minicomputer activates the locking device, thereby
opening the door, traffic control arm, gate, or turnstile.
Electronic Locks - Electronic locks are frequently used in apartment buildings and
in offices where strict physical security is required. For example, in an apartment
building, the doorway between the foyer and hallways to the apartment can be
electronically locked.
Code Operated Lock – are combination-type locks and that no key is used.
Pressing the series of numbered button in the proper sequence opens them.
Some of them are equipped to alarm if wrong sequence is pressed. These are
high security locking device.

KEY CONTROL
Key cabinet – a well-constructed cabinet will have to be produced. The cabinet
will have to be of sufficient size to hold the original key to every lock in the
system. It should be lock at all times.
Key Records – Some administrative means must be set up to record code
numbers of the locks and to whom the keys of a specific locks was issued.
Inventories – Periodic account must be made of all duplicates and original keys
in the hands of the employees whom they have been issued.
Audits – in addition to periodic inventories, an unannounced audit should be
made of all the key control records and procedures by a member of the
management.
Daily report – A regular report must be made to the person responsible for the
key control from the personnel department indicating all persons who have left or
will be leaving the department or the company. In the event that a key was issued,
steps should be made to recover the key.

TYPES OF KEYS
Change Key – is a specific key, which operates the lock and has a particular
combination of cuts, or batting, which match the tumblers in the lock.
Sub-Master Key – is a key that could open all the lock within a particular area or
grouping in a particular facility.
Master Key – is a special key that is capable of opening a series of locks.
Grand Master Key – is a type of a key that will open everything in a system
involving two or more master key groups.

PROTECTIVE CABINETS
The final line of defense of any facility. High security storage area for valuable
asset.
Safe – Small metallic container used for the safekeeping of documents or small
items in an office or installation.
The standard weight is 750 lbs.
It should be anchored to a building structure.
Its body should at least one inch thick steel.
Vault – Heavily constructed fire and burglar resistant container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than Safe but smaller than a security file room.
Vault door – 6 inches thick steel
Walls, ceiling, floor – 12 inches thick reinforce thick
Fire resistant up to 6 hours
File Room
A cubicle in a building constructed a little lighter than a vault but bigger size to
accommodate limited people to work on the records inside.
Standard height – 12 feet
Fire resistant for 1 hour

SOME TESTS FOR VAULT/SAFE’S FIRE RESISTANCE


FIRE ENDURANCE TEST – A safe should not have at any more time a
temperature above 350 degrees Fahrenheit.
EXPLOSION HAZARD TEST – Test to determine if the sudden rise in temperature
will not cause the safe to repute. If the safe can withstand 2000 degrees
Fahrenheit for 30 minutes and will not crack or open, then it has passed the
explosion test.
FIRE AND IMPACT TEST – Aimed at determining the strength of a safe to
withstand the collapse of a building during a fire...

HISTORICAL BACKGROUND OF SECURITY IN THE PHILIPPINES


The private security business began on March 11, 1933, when the first formally
licensed private security agency "Special Watchman Agency" started its
operations: Later it renamed "Jimenez Security Agency", founded by brothers
Juan and Pedro Jimenez.
On 1950 private security guards were under the supervision and control of the
Municipal and City Mayor.
On May 30 1958, the Philippine Association of Detectives and Protective Agency
Operators Inc. PADPAO) were formally organized.
On June 13, 1969, RA 5487 or also known as the private Security Agency Law
was signed by Former President Ferdinand E. Marcos.
The purpose is to assist the police in its mission to safeguard lives and
properties.
On August 4 1969 the creation of Philippine Constabulary Security and
Investigation Agency Supervisory Office (PCSIASO)
After (2) months PCSIASO was renamed as Philippine Constabulary Supervisory
Office for Security and Investigation Agency (PCSOSIA)
On June 29 1970, it was renamed again as Philippine Constabulary Supervisory
Unit for Security and Investigation Agency (PCSUSIA). However, the supervision
was later on transferred to the National Intelligence and Security Agency (NISA)
and now National Intelligence Coordinating Agency (NICA).
On October 3, 1972, PD 11 widening the overage of RA 5487 to include security
guards employed in logging concessions agricultural mining and pasture lands.
On January 17, 1973, PD 100 broadening the coverage of the security industry to
include employees of the National or Local Government or any agency who are
employed to watch or secure government building and properties.
On January 1, 1991 with the creation of Philippine National Police also on
January 1, 1991, pursuant to RA 6975 otherwise known as the DILG act of 1990,
PCSUCIA was renamed as Philippine National Police Supervisory Office for
Security and Investigation Agencies (PNPSOSIA).
PNPSOSIA was renamed again as Philippine National Police Security Agencies
and Guards Supervision Division (PNPSAGSD) becoming one of the two major
division of Philippine National Police Civil Service Group (PNPCSG)
And it was again renamed to PNPSOSIA

UNIVERSAL DECLARATION OF HUMAN RIGHTS


The universal declarations of human rights, which was adopted by the United
Nations on 10th of December 1948, guarantees such interesting to protect in
Article 3 which states that “everyone has the right to life liberty and security of
persons” (United Nations, 1948, emphasis supplied).
The international covenant of civil and political rights, a multilateral treaty also
adopted by the United Nations on 16th of December 1966, further recognize this
rights to security of person in article 9, which states that “everyone has the right
to liberty and security of person. No one shall be subjected to arbitrary arrest of
detention. No one shall deprive of his liberty except on such grounds in
accordance with such procedure as are established by law” (United Nations
Human Rights 1966).

You might also like