Professional Documents
Culture Documents
Midterm Notes Isc
Midterm Notes Isc
COURSE DESCRIPTION: The study covers the organizational set-up, administration and
operation of security agencies, special police and investigation agencies. The course
covers the study of the concept and principles of industrial security. It includes the role
of security profession in law enforcement administration and public safety, importance
of security personnel in investigation, the concept of criminalistics in the field of
industrial security investigation and crime detection, and the principles applicable to
jurisprudence of criminal law, evidence and criminal procedure in relation to the legal
context of industrial security and related laws.
PRE-REQUISITE: Comparative Models in Policing
CREDIT UNITS/HOUR: 3 units (3 lecture hrs. per week)
Objectives:
Understand the theories related to security and safety;
Identify the different theories, concepts and philosophy related to security and
safety; and
Identify and understand all types of Physical Security
Learning Outcomes:
Able to familiarize the early history of security;
Able to differentiate a the theories and understand the concepts with regards to
security and safety;
Able to understand the categories of security and other private sphere in security;
and
Able to identify and understand the meaning of physical security and other types
of physical security
Security was derived from Latin word Securus w/c means “safe” or “without care” or
from Se cura, wherein se means “free” and cura, means “care”.
HISTORY OF SECURITY
Pre-Historical Time
Code of Hammurabi
the earliest recorded of rulers for protection, persons and properties.
Man recognized the need to keep himself safe from both known and unknown
enemies such as animals, other inhabitants and to environment itself.
Watchman (Israel) Ref: Old Testament of Ezekiel 33:1-6, was entitled Renewal of
Ezekiel’s Call as Watchman.
Praetorian Guards (Rome)
They are the ancient guard of Rome and Elite unit of Imperial Roman Army, and
they are also called as Vigiles who were tasked to be fire fighters under the
authority of Emperor Caesar Augustus.
Under Development
Anglo Saxon Period – Tun Policing System (450 1066) Tun means Town.
All male residents required to guard the tun (town)
10 families in town are called as “TITHING” (Unit)
Each Tithing elected a leader and called as “TITHINGMAN”
10 Tithing equals to 100 families
The leader of 100 families called as “REEVE”
Tithingman and Reeve were elected officials and they possessed judicial and
police power.
Norman Period (1066-1199)
Shire-Reeve System
Shires – this refers to the 55 military divisions
Rieve – “The Head-man” or “Lieutenant of the Army” or the Military Leader (Shire-
Rieve)
The Shire-Rieve had absolute powers that no one can question his actions.
Take note: The word Shire-Rieve is said to be the origin of the word Shireff.
Constabuli or The Keeper of the Horse – appointed to each village to aid the
Rieve in his duties.
Take note: The word Cobstabuli became the source of the word Constable.
Frankpledge System
10 male resident (group/unit) whose ages 12 yr. old were required to guard the
town to secure peace and order and also protect lives and property.
Modern Period
Foot Patrol – Henry Fielding (1748)
He proposed a permanent, professional and adequately paid security force.
Laissez Faire ( 18th Century) – the word Laissez Faire means “allow to do” with
the idea of being “let the people do as they choose”.
The Industrial Revolution
To hire special security force to protect homes and properties
And this time was the beginning of private security.
Allan Pinkerton – He founded the first detective agency in Chicago named
Pinkerton Detective Agency performing law enforcement function.
Federal Bureau of Investigation – Birth year (1908) or July 26, 1908
Protect the secrets of the U.S. Intelligence Community
Protect the nation’s critical assets, like our advanced technologies and sensitive
information in the defense, intelligence, economic, financial, public health, and
science and technology sectors
Counter the activities of foreign spies
Keep weapons of mass destruction from falling into the wrong hands
William J. Burns – He founded the Burns Detective Agency in 1909 and become
the sole investigating agency for American Banking Association.
DEFINITION OF TERMS
Industry – The term denotes “earnest or constant application to work or
business”, or special branch of work, or the capital or workers employed on it.
Industrial – This defined as the pertaining to or engaged in industry.
Relating to, used in, created by industry, and/or of industry’s workforce or relating
to or involving workers in industry.
Security – is a state or condition of being secured; there is a freedom from fear,
harm, danger, loss, destruction or damages.
Necessity of Security – Security measures are inevitable or necessary for the
attainment of goals and objectives when an individual or organization is exposed
to hazard, their productivity is adversely affected.
Safety – State of being safe, the condition of being protected against physical,
social, spiritual, financial, political, emotional, etc.
Management – The skillful use of means in order to attain purpose.
Industrial Security – Security measures applied to business industries; or the
business providing security and protection to private individual’s business
enterprises, or government and non-government industries.
Industrial Security Management – Involves the Skillful handling of the security
and safety measures of business enterprises and industrial establishments
RELATED CONCEPT
Note: Understanding the concept of security requires further definition of other related
concepts such us asset, risk, threat, and vulnerability.
Asset – Is anything tangible or intangible that is capable of being owned and
controlled to produced value.
Risk – is the uncertainly or financial loss, the probability that a loss has occurred
or will occur, or the possible occurrence of an undesirable event.
Ex. Lost of life of your love once.
Threat – is anything that could adversely affect assets; it can be classified into
natural hazard ( such us floods, landslide, etc.), accidents (chemical spills), or
international act (domestic and international terrorism).
CATEGORIES OF SECURITY
Physical Security - It is the broadest branch of security which is concerned
principally with the physical measures adopted to prevent unauthorized access
to equipment, facilities, materials, and documents, and to safeguard then against
theft, damage, sabotage, or espionage. It also encompasses protection of
personnel from any criminal act.
Communications Security - It is the protection resulting from the application of
various measures which prevent or delay the enemy or unauthorized person in
gaining information through the communication system. This includes
transmission, cryptographic, and physical security.
Hotel Security - This is another specialized physical security. Hotel detectives,
uniformed guards, and security supervisors see to it that the guests and their
personal effects are safeguarded, hotel properties are protected from pilferage,
loss, damage, and the functions in the hotel restaurants, bars and clubs are not
disturbed and troubled by rowdy outsiders, or by the guests themselves.
Bank Security - “Bank security” is another specialized line in physical security.
Due to the peculiar nature of bank operations, the main objective of the bank
security force is the protection of the life of employees and assets of the bank.
The physical size of the banking institution, its location, volume of the cash
handed, number of personnel employed and its clientele are the main
considerations in determining the strength and type of the security unit.
Document Security - “Document security” is physical security involving the
protection of documents and classified information from loss, access by
unauthorized persons, damage, theft, and compromise through disclosure.
Safeguarding vital records is one of the most difficult tasks that can be assigned
to security personnel.
Personal and VIP Security - The protection of top ranking officials of the
government, visiting persons of illustrious standing, and foreign dignitaries is no
easy job. This calls for a real “pro” in security field. VIP security is part of
personal security.
Crises Security - Another new specialized field is “crises security” which is allied
if not a part of VIP security. Crises security is now involved in kidnapping of VIPs
like dignitaries, rich scions, industrial magnates, political leaders. Motives can be
economic, political, emotional, nationalistic, religious, or their combinations.
Industrial Security - Industrial security is physical security as applied to business
groups engaged in industries, like manufacturing, assembling, research and
development, processing, warehousing, and even agriculture. Usually, industrial
enterprises are located in a complex, with separate buildings for work, storage,
administration, and other activities.
Operational Security - Operational security is part of physical security that deals
primarily with the protection of processes, formulas, patents, and other industrial
and manufacturing activities from espionage, infiltration, loss, compromise, or
photocopying.
Other Special Types of Security - Due to peculiarities of different business activities,
specialized types of security appeared. These types are adaptations, variations,
innovations, and/or modifications of physical security, i.e., air cargo security, school
security, supermarket security, and personnel security.
Air Cargo Security – This is applied to minimize, if not prevent, losses or cargo
during in transit storage or transfer.
School Security – This is applied in response to the increase of violent crimes
committed against students and school personnel, and school properties.
Supermarket security – This is applied in response to the mushrooming of
bazaars, marts, super malls, and the like.
Personnel security – This is involved in the background checks of individuals
commensurate with the security requirements of their work. This also includes
measures designed to protect employees of an organization or business
establishments.
Passive Measures – are those that will deter man from committing such acts for
fear of being caught, or charged in court or get dismissed. Security education
programs,
THE (3) MAJOR DIVISION OF INDUSTRIAL SECURITY
Physical Security
Personnel Security
Document and Information Security
I. PHYSICAL SECURITY
Physical security as earlier discussed, is the broadest branch of security which is
actually a system of barriers placed between potential intruders and the matters
to be protected. It is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials, and documents, and to
safeguard them against espionage, sabotage damage and theft. It also
encompasses protection of personnel from any criminal act.
PRINCIPLES OF PHYSICAL SECURITY
In every establishment, physical measures are needed to deny unauthorized
access or intrusion because of the following:
Enemy Agents Must Access – Acquisition of information is the ultimate results,
and the means and form in which the information is obtain.
There is No Impenetrable Barrier – For the unfriendly government or organization,
they are willing to devote enough time, money, personnel, material, and
imagination in passing barriers. So physical security attempts to build defense by
using a certain barrier.
Defense in depth means barrier after barrier. In order that barrier could prevent
unauthorized access and serve its purpose very well, there should be an
integration of all barriers adopted in the installation.
Surreptitious versus Non-surreptitious Entry – The possibility of surreptitious
entry is the greatest hazard from the standpoint of counterintelligence security
because it is usually difficult to determine that the information has been
compromised. No action is taken to neutralize the act of espionage because
surreptitious entry is not usually detected. Surreptitious entry means not
observable while non-surreptitious entry is observable. Observable or not,
intruders usually find the right place and right opportunity to gain access.
Physical security then needed to detect or deny unauthorized entries.
Each Installation is Different – Since each installation is different each will have
different problems to overcome. The security procedures will not be adequate for
all installations.
A. BARRIERS
Barriers refer to any physical structure whether natural or man made capable of
restricting, deterring, delaying, or preventing illegal and unauthorized access to
an installation.
PERIMETER BARRIER
Perimeter barrier is a medium of structure which defines the physical limits of an
installations or area to restrict or impede access thereto. It is any physical barrier
used to supplement the protection of an inside or outside perimeter. Perimeter
barrier also includes the utilization of security personnel.
WIRE FENCE - is a type of fence made of chain link bared wire concertina design
with small opening not larger than 2 square inches and made of number 9 gauge
wires of heavier, twisted and barbed salvage at top and bottom.
Specifications for Using Chain-link Fences:
It must be constructed of 7-feet material excluding top guard.
It must be 9 gauge or heavier.
Mesh openings are not to be larger than 2 inches per side.
It should be twisted and barbed salvage at top bottom.
It should be security fastened to rigid metal or reinforced concrete.
It must reach below surface enough on soft grounds to compensate for shifting
soil or sand.
It must reach within 2 inches of hard ground or paving.
Specifications for Using Barbed Wire:
Standard barbed wire is twisted, double-stand 12 gauge wire with 4 point barbs
spaced on equal distance apart.
Barbed wire fencing must be firmly affixed to posts high excluding top guard.
Barbed wire fencing should not be less than 7 ft. high excluding top guard.
The distance between strands will not exceed 6 inches and midway between
parts.
Using concertina wire fence – concertina fences are formed like accordions.
BUILDING WALLS - include walls, floor, roofs or their combination serve also as
barriers and they should be of such constructions to provide uniform protection
just like wire-fencing.
BODIES OF WATER - like river, lake, cataract, sea, pond or any bodies of water
forming part of the wall, building or fencing should not be considered an
adequate perimeter barrier. Additional security measures like wire fence,
concrete walling, security patrolling and flood lighting at night may be necessary
for the portions of the perimeter.
C. PROTECTIVE ALARMS
PROTECTIVE ALARMS DEFINED:
Alarm – a security device fitted to property, especially a house or a car, to make a
warning sound if a break-in or theft is attempted or a warning device the sound
made by a security.
Protective Alarm – It is an aural or visual signal given by the enunciator to
security guard when intruder actuates device in a protected area.
Enunciator – is a visual or audible signaling device, which initiates conditions of
associated circuits.
TYPES OF LOCKS
Warded Locks – The underlying principle is the incorporation of wards or
obstructions inside the lock to prohibit a key from operating the bolt unless the
key has corresponding notches cut in it do that it will pass the wards. Warded
locks offer very little security. This type of lock must therefore be used only to
have privacy but not to provide a high degree of security.
Disc Tumbler Locks – These are also known as wafer locks. They have flat metal
tumblers with open center fitted into slots in a plug that it is in turn fitted into a
lock case. When the plug is turned, it activates a cam.
Lever Tumbler Locks – Each lever in the lock hinges on a fixed point and is held
down against a stop by the pressure of a flat spring. Each lever has a cut in it,
and all the gates can be located at different places. When the proper key is
inserted and turned, notches of various depths raise all the lever whatever
distanced is required to line up the entire gate exactly opposite the fence on the
bolt. When the key is turned, a portion of the key catches the bolt and slides it
back. Because there is no resistance to the post entering the gate, the lock is
opened. If the key is not the correct one and if even one gate does not line up to
let the post slide into it, the lock cannot be opened.
Pin Tumbler Lock – The pin tumbler mechanism depends for its security, and a
number of round pin or tumblers operating on a cylinder. Each tumbler pin is
divided into two parts, the upper which is flat on bolt, is called the driver; the
bottom part called the pin is rounded or slightly pointed on the lower end to fit
the grooves or cuts in the key. A coil spring above each driver constantly forces it
downward. When the right key is inserted, the various depths of the cuts and the
key compensate for the different lengths in the pins. The dividing point between
each of the two pin segments is brought into line with. The top of the plug,
allowing it to rotate in the cylinder. When the plug turns, it carries with its cam,
which activates the bolt and other lock mechanism.
KEY CONTROL
Key cabinet – a well-constructed cabinet will have to be produced. The cabinet
will have to be of sufficient size to hold the original key to every lock in the
system. It should be lock at all times.
Key Records – Some administrative means must be set up to record code
numbers of the locks and to whom the keys of a specific locks was issued.
Inventories – Periodic account must be made of all duplicates and original keys
in the hands of the employees whom they have been issued.
Audits – in addition to periodic inventories, an unannounced audit should be
made of all the key control records and procedures by a member of the
management.
Daily report – A regular report must be made to the person responsible for the
key control from the personnel department indicating all persons who have left or
will be leaving the department or the company. In the event that a key was issued,
steps should be made to recover the key.
TYPES OF KEYS
Change Key – is a specific key, which operates the lock and has a particular
combination of cuts, or batting, which match the tumblers in the lock.
Sub-Master Key – is a key that could open all the lock within a particular area or
grouping in a particular facility.
Master Key – is a special key that is capable of opening a series of locks.
Grand Master Key – is a type of a key that will open everything in a system
involving two or more master key groups.
PROTECTIVE CABINETS
The final line of defense of any facility. High security storage area for valuable
asset.
Safe – Small metallic container used for the safekeeping of documents or small
items in an office or installation.
The standard weight is 750 lbs.
It should be anchored to a building structure.
Its body should at least one inch thick steel.
Vault – Heavily constructed fire and burglar resistant container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than Safe but smaller than a security file room.
Vault door – 6 inches thick steel
Walls, ceiling, floor – 12 inches thick reinforce thick
Fire resistant up to 6 hours
File Room
A cubicle in a building constructed a little lighter than a vault but bigger size to
accommodate limited people to work on the records inside.
Standard height – 12 feet
Fire resistant for 1 hour