Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 34

INDUSTRIAL SECURITY

MANAGEMENT
- It deals with the organizational set-up,
operation and administration of
security agencies. The principles and
relevance of industrial security as
partners of law enforcement agencies
in crime prevention and the
maintenance of peace and order in
business, commercial, industrial and
similar establishments.
Security Defined

SECURITY: The term security connotes


safety from harm; it has different
dimensions in public safety, defense
and military matters, information
access and psychology. It is the
condition of being free from fear, doubt,
apprehension, anxiety and danger. It
implies a state of certainty and safety.
TYPES OF SECURITY MEASURES
ACTIVE MEASURES – these involve the
installation of physical barriers, security
lighting, use of vaults, locks and others.

PASSIVE MEASURES – those that will deter


man from committing such act of fear of being
caught, charge in court or get dismissed, such
as: security education, programs,
investigations, seminars, personnel security
check.
FACTORS THAT BRING INSECURE CONDITION:

1.Threat
– An indication of impending danger or harm;
- positive inimical acts
2.Hazard
– A chance of being injured or harmed;
-passive inimical acts
3. Vulnerability
– inability to withstand the effects of a hostile
environment
-measure of how open an establishment to
intrusion, attack or injury

4.Risk
• – is the potential that a chosen action or
activity will result to loss or injury
What is physical security?
Physical Security- is the broadest branch of security.

It is defined as a system of barriers placed between the


matters protected and the potential intruder.

It is concerned utilization of physical measures to


prevent unauthorized access to facilities, plants,
equipment and safeguard them against man-made and
natural hazards.
Three Lines of Physical Defense

 Perimeter defense- such as barriers,


perimeter fences or guards at the gate are
considered as the first line of defense.

 Inside perimeter defense- such as doors,


floors, windows, walls, roofs, grills and
other entries to a building is referred to as
the second line of defense.

 Storage system- such as safes and vaults


are considered as the third line of defense.
Principles of Physical Security
1. There is no impenetrable barrier. If an unfriendly
organization is willing to devote attention, time, money,
personnel and devises passing any type of barrier is
conceivable.

2. Physical security must be built upon a system of


defense in depth. The accumulation of several barriers
or depth after depth will provide measurable time delay
to intrusion into a facility and it will allow control of
any foreseeable penetration.

3. Each installation is different. Variable factors such as


location, type of plant, personnel would make every
installation distinct even though similar security
measures are adopted.
What are security hazards?
Human hazard - An act nor condition caused
by humans which affects the safe operation of
a facility. They include sabotage, theft,
pilferage and espionage.

Natural hazards - Caused by natural


phenomena which results in damage,
disturbance and problems of the normal
functions. These include floods, earthquakes,
lightning storms, typhoons and volcanic
eruption.
What is Personnel security?
Includes all the security measures designed to
prevent individuals of doubtful loyalty,
character, integrity from gaining access to
classified matters and sensitive facilities.

It is composed of conducting personnel security


investigation and security education programs.
What is VIP security?
Also referred to as Personal Security, it utilized in
the protection of personnel especially high
ranking officials, foreign dignitaries, and
prominent private individuals from harm,
kidnapping and other similar threats.

In the practice of industrial security, the term


business executive protection is synonymous
with VIP security.
What is personnel security
investigation?

- Is an inquiry into the reputation, character,


integrity, discretion, morals and loyalty of an
individual in order to determine a person's
suitability for appointment or access to classified
matters.
What are the motives that causes
disloyalty?

Motives that cause people to be disloyal:


Revenge, Material gain, Prestige, Ideological
belief, Friendship.
What are the weaknesses of
personnel?

Weakness that make people susceptible to


pressure: Weakness of character, Jealousy,
Gullibility, Indebtedness, Investment, Addiction
to narcotics, Alcoholism, Gambling problems,
Moral depravity such as lesbianism and
homosexuality.
What is document security?
It is the branch of security involved in the protection of
documents and classified papers from loss, access by
unauthorized person, theft, damage and compromise through
disclosure.

The term document in security matters, covers any form of


recorded information either printed, written, drawn, painted,
sound recording, films, maps, etc.

The object is to secure and control the sensitive information


contained therein so as not to prejudice the firm, company or
agency.
How information is lost?
• a. Information is seldom compromised through
electronic bugging, use of sophisticated equipment
by industrial spies.

• b. It can also be lost through negligence and


inadvertent disclosure by the owner of the
establishment or person in authorized possession.

• c. It can also deliberately stolen by an insider or


person trusted to have access to it.
CLASSIFICATION OF DOCUMENTS
• 1. Unclassified – these are documents with no security
classification. Civilian access to this kind of documents
possesses no danger to the organization. Examples of these
are correspondence sent to civilian and press releases and
other information through brochures and pamphlets
distributed to civilians. .

• 2. Classified – Civilian access to these documents may place
the organization in danger. These contained purely
administrative and operational aspects of the PNP. Keeping
of this kind is strictly secured and only minimal number of
personnel is authorized to access. These are further
classified and called Security Classifications:
A.TOP SECRET – limited to information and material which requires
the highest degree of protection. Applied to information and
material that the unauthorized disclosure of which would cause
exceptionally damage to the nation politically, economically or
military such as:

1. Those that may lead to definite break in the diplomatic relation,


armed war against the Philippines, and

2. Those which may lead to the compromise of military or defense


plans and intelligence operations vital to the national defense.

Authority to classify Top Secret:


– Secretary of National Defense
– CSAFP
– Major Service Commanders
– Area Regional Commanders/Directors
B. SECRET – Limited to information/material that the unauthorized disclosure
of which would endanger the national security, caused serious injury to the
interest and prestige of the nation or any governmental activity or would be of
great advantage to foreign nation such as:

• Jeopardize the international relation of the Philippines;


• Endanger the effectiveness of a program of government scheme or policy vital
to the national defense; and
• Compromise defense plans or scientific or technical development important
to the national defense.

• Authority to classify SECRET:


– Top Secret Authorities
– Commander of Division
– Special and Personal Staff, AFP
– General and Special Staff of Major Services
– Superintendent,PMA,Regional Commanders/Directors
– Armed Forces Attache
– Commandant of Service School
C.CONFIDENTIAL – limited to information/material that
the unauthorized disclosure of which would not
endanger the national security; would be prejudicial to
the interest or prestige of the national or any
governmental activity such as:

• Routine Operational Battle Report containing


information and material vital to the enemy;
• Routine Intel Report
• Plans of government projects
• Military/PNP radio frequency and call sign/word
• Documents which contains information concerning
troop movement or individual travel
• Operational and Technical Doctrine on lesson learned in
operations and
• Meteorological information of designated areas
• D. RESTRICTED–Applied to all
information/material other than (top secret,
secret and confidential) which should not be
published or communicated to anyone except for
official purpose, such as:

• Training and technical documents for official use


only, not intended for release to the public
• Routine information relating to supply and
procurement; and
• Maps and photographs important or related to
defense security.
What is cryptography?
Cryptography is simply defined as an art and science of making,
devising and protecting codes and ciphers. It is a science of
preparing communication intended to be intelligible only to the
person possessing the key or method of developing the hidden
meaning by crypto-analysis using apparently incoherent text. In its
widest sense, cryptography includes the use of concealed
messages, ciphers, and codes.

Concealed messages, such as hose hidden in otherwise innocent


text and those written in invisible ink, depend for their success on
being unsuspected, once they are discovered, they frequently
offer little difficulty to decipherment.
Codes, in which words and phrases are represented by
predetermined words, numbers, or symbols, are
usually impossible to read without they key code book.

The term cryptography is sometimes restricted to the


use of ciphers, that is, to methods of transposing the
letters of plain text (unencrypted) messages or to
methods involving the substitution of other letters or
symbols for the original letters of a message, and to
various combinations of such methods, all according to
prearranged systems.
PERSONS AS SOURCES OF INFORMATION

Informant Net – It is a controlled group of people who worked


through the direction of the agent handler. The informants,
principal or cutouts supply the agent handler directly or
indirectly with Intel information

Informants (Asset) – people selected as sources of


information, which could be voluntary, or in consideration of a
price.
– Informant – refers to a person who gives information to the
police voluntarily or involuntarily with out any consideration
– Informer – those who give information to the police for price or
reward
Types of Informants

• Criminal Informant – an informant who give information to the


police pertaining to the underworld about organized criminals
with the understanding that his identity will be protected

• Confidential Informant – is similar to the former but he gives


information violate of the law to includes crimes and criminals

• Voluntary Informant – a type of informant who give information


freely and willfully as a witness to a certain act

• Special Informant – those who gives information concerning


specialized cases only and it is regarded a special treatment by the
operatives (ex. teachers, businessmen)

• Anonymous Informant – those who gives information through


telephone with the hope that the informant can not be identified
Sub-type of Informant
• Incidental Informant – a person who casually imparts
information to an officer with no intention of providing
subsequent information
• Recruited Informant – A person who is selected
cultivated and developed into a continuous source of
info

Categories of Recruited Informants:


• Spontaneous or Automatic Informant – Informants who
by the nature of their work or position in society have a
certain legal, moral or ethical responsibilities to report
info to the police
• Ordinary (out-of-their-will) Informants – those under
the compulsion to report info to the police
• Special Employee – informants who are of a specific
operational nature
Other Classification of Informant
Other terms related to people who gives
information are Automatic Informant,
Penetrating Agent , Infiltrating Agent , Full
time Informant , Rival – Elimination Informant,
False Informant, Frightened Informant, Self-
aggrandizing Informant, Mercenary Informant
, Double Crosser Informant , Woman Informant
, Legitimate Informant.
Motives of Informants
People give information to the police due
to various reasons. Their motives include
reward, revenge, fear and avoidance of
punishment, friendship, patriotism, vanity,
civic-mindedness, repentance, competition,
and other motives.
INFROMANT RECRUITMENT

• Selection – it is particularly desirable to be able to identity and recruit


an informant who has access to many criminal in-group or subversive
organization. Wide access is probably the single most important
feature in the consideration of recruiting the potential informant
• Investigation – the investigation of the potential informants that has
tentatively identified as a “probable” must be as thorough as possible.
It must establish possible existing motives as to this person might
assist the police Intel community. Failure to do so will deny this office
who must perform the approach and persuasion phase with little
more that a guess. If necessary, conduct complete background
investigation (CBI)
• Approach – must be done in a setting from which might include
pleasant surroundings, perhaps a confidential apartment, completely
free form any probability of compromise, preferably in an adjacent
city or a remote area foreign to the informants living pattern.
• Testing – the testing program should begin, of course, with the limited
assignment, with a gradual integration into the more important areas.
The occasional testing of an informant should continue through the
entire affiliation
“If you know the enemy and know
yourself, you need not fear the result
of a hundred battles.”
“If you know yourself and not the
enemy, for every victory, you are a fool
who will meet defeat in every battle” -
SUN TZU
“Coming together is a beginning,
keeping together is progress and
working together is success”
Thank You!

You might also like