100% found this document useful (1 vote)
681 views65 pages

Ais 1

This document provides an introduction to security guard profession. It defines security as freedom from harm or danger, and explains that the philosophy of security is prevention. The primary duty of security is to prevent crime. It also outlines some key international security principles like the need-to-know principle, doctrine of least privilege, and defense in depth. Active security measures involve physical barriers while passive measures aim to deter criminal acts through education and the risk of being caught.

Uploaded by

shela lapeña
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
681 views65 pages

Ais 1

This document provides an introduction to security guard profession. It defines security as freedom from harm or danger, and explains that the philosophy of security is prevention. The primary duty of security is to prevent crime. It also outlines some key international security principles like the need-to-know principle, doctrine of least privilege, and defense in depth. Active security measures involve physical barriers while passive measures aim to deter criminal acts through education and the risk of being caught.

Uploaded by

shela lapeña
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 65

MODULE IN AIS 1

SECURITY GUARD PROFESSION

SHELA MAE JR L. ESCALONA


Printed by Polytechnic College of Davao del Sur
Inc.
Acknowledgement

I am grateful to God through our Lord Jesus Christ for this opportunity to serve the
younger generation, to help them when it comes to Education, mold them to become a good
leader and help them be the person that they want to be in the near future. It is such a blessing to
be part of his mission, all praises and glory belongs to him alone.

With heartfelt gratitude, I sincerely express my appreciation to our Program Head Sir
Joselito B. Relativo MSCJ for the help and encouragement in the development of this module;
Dr. Jose J. Adlawan for the valuable support, Vice President for Finance Christiaan Dave Ramos,
RN for facilitating and managing the printing of this module and to most especially to the Vice
President for academic Affairs Dr. Marina L. Ledesma for encouraging us to do an initiative to
fulfill our duties and tasks.

I would also love to express my heartfelt appreciation to my Dear Family and Colleagues
for the support and unconditional love through the journey that I walk and profession that I
chose. It might not be as easy as I thought but with all of you, this path will be easier and at the
end of the road, it will be worth the walk.
Foreword

Teachers, students and thinking enthusiasts are invited to explore this academic work.
Conceptual and practical contents of this module are expressed concisely, but with high degree
of prudence. They are based on the existing Security Guard Profession and Industrial Security
Management Books which is redesigned to fit the demand of distance or online learning.
Though, it is equally considered that this module can be used in self-online learning activity even
without the use of internet. The concepts, teaching methodologies and assessments are readily
available to significantly capture the learning dynamics and absorption of the learner. This
module is also suitable for teachers use in Security Guard Profession course both in direct
teaching and distance learning.

The variety of activities provided for in this module is sufficient to assess and
evaluate the understanding of the students about Criminology as an academic course. Their
ability to complete the open ended test to self-help activities shall serve as demonstrative aspect
of the learner’s ability to apply the concepts that are discussed in this module, as well as,
meeting the aims and learning outcomes of each sub-topic.

Nonetheless, the Author gladly encourages the readers of this module to use
supplemental references that may be relevant in further understanding and developing profound
ideas in the process of reasoning.
Table of Contents

Module Objectives

PRELIMINARY TOPIC

Chapter I

A. Introduction
B. The Legal Basis and concepts of Security Management
C. Types of Control

PRE-MID TOPIC

Chapter II

A. Major Activities of Security


B. Security Investigation
C. Important Terminologies when it comes to Security

MIDTERM TOPIC

Chapter III

A. Security Guards’ Proper Uniform


B. Gadgets
C. Traffic Control

PREFI TOPIC

Chapter IV

A. 11 General Orders
B. Code of conduct
C. Salute

FINAL TOPIC

Chapter V

A. Handling Hazard and VIP Security


B. Categories of Kidnappers and Information Security
C. Important Terminologies
MODULE IN AIS 1
SECURITY GUARD PROFESSION

MODULE OBJECTIVES

1. To familiarize fundamental matters when it comes to Security.

2. To develop new knowledge with the legal bases and concepts of Security Management.

3. To encourage and apply to other individuals for the benefit of extending assistance to
security personnel in minimizing crime if prevention is untenable.

Chapter 1

Aims and Learning Outcomes

That Student can:

1. Discuss the introduction of Security

2. Explain the legal Bases and concepts of security management

A. Introduction

Aims and Learning Outcomes

That Student can:

1. Define Security and principles of security Management

2. Explain the Philosophy of security, Security Motto and the primary duty of Security

3. Familiarize International Security Principles

4. Discuss Active and Passive Measure

A. INTRODUCTION

Security today covers different fields, business or industry; it may include the world
security, nation’s security or even human security. Security as a topic and subject is global,
national and local in nature and scope. This is because the principle of security management is
universal in application.

Security is defined operationally as safety from harm or danger, a term that has different
dimensions in psychology, public safety, defense and military matters, and information access.

Security in its semantic and philosophical sense, implies a stable, relatively predictable
environment which an individual or group may pursue its ends without disruption or harm, and
without fear of such disturbance or injury. The concept of security is an organizational sense is a
means by which safety and stability can be attained by wide variety of institutional and cultural
patterns.

Throughout the years men started practicing the utilization of workers and equipment in
order to protect his well being and property. Thus the civilized men adopt security measures to
have adequate protection against unsecured and unsafe conditions. This probably led to
establishment of the “police” an institution today responsible for law and order as well as public
safety.

The incredible growth of the security industry in the Philippines now a day is evident.
Most of companies are using guard forces, protective barriers, communication and electronic
hardware and other state of the art protection methods and techniques in their assert protection.
However, every installation cannot escape the emerging complicated security problems like
deteriorating peace and tranquility, the threat of terrorism and the social conditions of the
community. A determine intruder can sneak in the properties of another while the owner is
asleep out of trip or anytime of the day and dives all valuable items which he can find. The
incidents of fire and other disaster should also be considered in the asset of protection.

Hence, a basic understanding on the concept and methods of security is a primordial concern of
everybody in the industry.

What is Security?

Security is a state or quality, condition of being secured, freedom of fear, harm, danger,
loss, destruction or damages, to secure is to make safe or be protected.

- Freedom from fear or danger (protection) or defense against crime.

- Security is a condition of being protected against danger or loss.

- The subjective meaning of Security as “freedom from anxiety or fear” resonates in the origins
of the word latin “SE-CURA”.

The security of any business establishments today is complex process. Security work
involves passive and passive measures so that effective defense can be established against
crimes.

Active measures are the physical barriers, security lighting, use of vaults, locks and
others. Passive measures are those that will dates man from committing such acts or fear of being
caught, charge in court, or get dismissed; Security Education programs, investigations, fire
preventions seminars; personal security checks are example of passive security.

Basically, it was the action of man against man led to many unsecured and unsafe
conditions. Reason could be economic, revenge or plain greed and avarice. Whatever is the
motive, the civilized man needs adequate protection.
THE PHILOSOPHY OF SECURITY

The essence of existence of security in the business establishment, company or institution


is PREVENTION. Prevention being the reason of their existence is always primordial interest.
Security exists to prevent or avert any loss or damage to properties, loss of life and limbs and to
some extent, the prevention of crime. If something happen and we were not able to prevent the
happening, this is simply called the lapses of Security.

SECURITY MOTTO

The security motto is “VigilatutQuiescant” meaning “He watches that they may
sleep”. The essence of this motto still holds true today and could be considered an international
motto not only for the police but also for security guards. The local motto being observed today
by security guards and personnel is “observe and report” because it’s part of their basic function
to report to the authorities or management any observed illegal or legal activities in their area of
Jurisdiction.

THE PRIMARY DUTY OF SECURITY

Security is synonymous to the word Prevention. Prevention of crime is the primary


reason of the existence of a security forces in the industrial business and all other functions are
inherent in order to attain its existence in the business. The importance of Security is the
preventive and proactive mindset. Everyone must be vigilant even if high tech gadgetry is
available.

INTERNATIONAL SECURITY PRINCIPLES

The following are international security principles which are very important in security
management. The discussion and explanation are found in the different chapter of this book.

- The “Need To Know Principle”


- Doctrine of Least Privilege
- Principle of Defense in Depth
- Target Hardening
- Crime Prevention Through Environmental design (CPTED)
- Crime Proofing
- Courteous Deterrent

PRINCIPLES OF SECURITY MANAGEMENT

In the parlance of security management, the following are considered universal principles
which are considered basic foundation in security management. It is universal in the
sense that the applications are applicable to the different industry, fields, system, and
business. The following are the basic principles of security management.

1. Security is everybody’s concern.


2. Security is good only as far as its weakest link.
3. No single security system or element can stand alone.
4. High relative security can be achieved
5. Each installation or establishment is different and unique.
6. What do you want to protect will determine the degree of protection.
7. Security measures could only be effective when enforced.
8. The most effectiveness single component of any security program is security
awareness of all employees.
9. Security is consistency through obscurity.
10. Security is preventive measure and counter measure.
11. Good security must start from the top with executives who help create corporate
value of security.
12. Security is a way of life.
13. There is no absolute security.
14. No two facilities have the same security needs.
15. Harm or danger may come from outside or inside of the facility.
16. There is no impenetrable barrier.

Exercise 1: Multiple Choices

Select the best answer. Encircle the letter of your answer that corresponds to the given question.

1. It is defined operationally as safety from harm or danger.

a. Security

b. Law

c. Barrier

2. The incredible growth of security industry in the Philippines now a day is ________.

a. Evident

b. Primordial

c. None of the above

3. The subjective meaning of security as “Freedom from anxiety of fear” resonates in the
origins of the latin word __________.

a. Se-cura

b. Se-dura

c. None of the above

4. The essence of the existence of security in the business establishment, company or


institution is prevention.

a. The Philosophy of Security

b. Security Motto

c. The Primary Duty of Security

5. VigilatutQuiescant

a. The Philosophy of Security


b. Security Motto

c. The Primary Duty of Security

6. Security is synonymous to the word Prevention.

a. The Philosophy of Security

b. Security Motto

c. The Primary Duty of Security

7. ___________ being the reason of their existence is always primordial Interest.

a. Prevention

b. Prevent

c. Philosophy

8. VigilatutQuiescant means ________?

a. He watches that they may sleep

b. He watches that he may steal

c. He watches overnight

9. The following are international security principles except;

a. The need to know principle

b. Doctrine of Least Privilege

c. Security is everybody’s concern.

10. Are the Physical Barriers, securing lighting, use of vaults, locks and others?

a. Active Measure

b. Passive Measure

c. None of the Above

Exercise 1a: Fill in the Blanks

1. Security is everybody’s ________________________________.

2. Security is good only as far is its __________________________________ link.

3. No single security system or element can stand _______________________________.

4. High Relative Security can be achieved in _________________________________.

5. Each installation or establishment is __________________________________.


Exercise 1b: Self-help Task

Present clear and relevant ideas/opinions in answering each question. Write the paragraph with at
least five sentences for your answer.

The self-help task will be graded based on the following criteria.

1. Neatness/Clarity – 3 points 2. Coherence/thoughts- 4 points

3. Grammar – 3 points

1. Explain and expand the phrase “Active Measure”.

________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
____________________________________________________________

2. Explain and expand the phrase “Passive Measure”.

________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_____________________________________________________________

B. Legal Bases and concepts of Security Management.

Aims and Learning Outcomes

That Student Can:

1. Familiarize the Triad of Crime.

2. Familiarize the Triangular Function of Law Enforcement

3. Discuss the factors that bring about unsecured conditions or situations

4. Define Risk, Hazard, Risk and Vulnerability.

THE LEGAL BASES ANDE CONCEPTS OF SECURITY MANAGEMENT

1. National Authority
2. Constitutional Authority
3. Statutory Authority

A. The revised Penal Code. (Act No. 3815, as amended).


The applicable provisions of the code on crime against Person, Personal Liberty and
security and property have bearing on the security and protection of one’s life, and
property.

B. Private Security agency Law (R.A No. 5487 as amended)


This law governs the operation, administration of security agency, and activities,
qualification, duties and licensing of security guards, watchman and private detectives. In
short, it is the intention of this law to professionalize the security services in order to
upgrade the level of security protection.

C. Presidential Decree No. 11 (Amending RA No. 5487)


Presidential Decree 11 amended the Sec. 3 (d) which defines Watchman or Security
Guard, Watchman or Security Guard Agency, Sec. 4 who may organize a security or
watchman agency and the sec. 18 of the penal provision of Republic Act 5487.

D. Presidential Decree No. 100 ( Amending RA No. 5487 and PD 11)

E. Presidential Decree No. 1919 ( Amending RA No. 5487, PD No. 11 and 100)

F. Republic Act No. 6975 (DILG LAW) – This is the law authorizing the PNP the control
and supervision of security agency in the Philippines.

FACTORS THAT BRING ABOUT UNSECURED CONDITIONS OR


SITUATIONS

The following are the different factors why security personnel in the industry have to plan
and prepare. The different terminology stated are the challenges that the security industry
has to face today. It is because of threat, hazard, risk and vulnerabilities that create the
existence of security management in the business or industry.

Threat is activity that could lead to a loss

Hazard is a condition that could lead to a loss

Risk is a potential loss/damage to an asset

Vulnerability is a weakness that can be gained to an access to an asset

THE SECURITY FUNCTIONS CYCLE

To address the different stages of events and conditions the risk might bring about the
guard has specific functions to perform. The functions of the security are classified as to
their basic purpose, namely;
1. Preventive Functions. These functions are performed to address threats and deter or
prevent the risk from occurring.
2. Reactive Function. There functions are performed to address emergency situations
when risks are occurring to prevent further loss or damage of resources.

3. Investigative Functions. These functions are performed with the following objective:
- To reconstruct the circumstances of a risk occurrence possibly recover the loss.
- To identify the person responsible and liable for the event and subsequent loss and justify
sanctions against the said person.
- To find ways to prevent the recurrence of the loss.

With the adoption of the new preventive measure is another start of preventive stage
of the security functions cycle.

COMPONENTS OF SECURITY MANAGEMENT


1. Preventive Measure – are important tools and element used in prevention of an
incident from happening.

2. Counter Measure – are programs implemented to avoid repetition of the same event.

Crime Prevention – is using instinct, common sense and action to eliminate or greatly reduce
criminal’s opportunity. A large share of responsibility in reducing criminal opportunity lies in the
awareness, understanding and everybody’s commitment.
TRIAD OF CRIMES

There are three elements that should be satisfied in order to complete commission of
crime. They are Desire, Opportunity and Ability. Eliminate one of these elements and no
crime will happen. Practically in crime prevention you have no control over the first two
elements because it remains in the imagination of the person with interest. However, you
can have great control in the commission of crime if you eliminate Opportunity, which is
the very essence of crime prevention effort.
TRIANGULAR FUNCTIONS OF LAW ENFORCEMENT

It is important to note that proactive measures and reactive measures are totally different
from countermeasures, although they have similar objective. Proactive measures are
designed to prevent crime from happening while counter measures are designed to
prevent a crime from happening again. Reactive measure will come into play to point out
what was wrong? What was the problem? Identify the criminal and solve the crime.

Exercise 2: Multiple Choices


Select the best answer. Encircle the letter of your answer that correspond to the given
questions.

1. The applicable provisions of the crime against person, personal liberty and security
and property have bearing on the security and protection of one’s life, liberty and
property.

a. The revised Penal Code ( Act. 3815, as amended)


b. Private Security Agency Law (R.A No. 5487 as amended)
c. Presidential Decree No. 11 ( Amending RA 5487)

2. This law governs the operation, administration of security agency, and activities,
qualification, duties and licensing of security guards, watchman and private
detectives. In short, it is the intention of this law to professionalize the security
services in order to upgrade the level of security protection.
a. The revised Penal Code ( Act. 3815, as amended)
b. Private Security Agency Law (R.A No. 5487 as amended)
c. Presidential Decree No. 11 ( Amending RA 5487)

3. Presidential Decree 11 amended the Sec. 3 (d) which defines Watchman or Security
Guard, Watchman or Security Guard Agency, Sec. 4 who may organize a security or
watchman agency and the sec. 18 of the penal provision of Republic Act 5487.

a. The revised Penal Code ( Act. 3815, as amended)


b. Private Security Agency Law (R.A No. 5487 as amended)
c. Presidential Decree No. 11 ( Amending RA 5487)

4. Is activity that could lead to a loss


a. Threat
b. Hazard
c. Risk

5. A condition that could lead to a loss


a. Threat
b. Hazard
c. Risk

6. Is a potential loss/damage to an asset


a. Threat
b. Hazard
c. Risk

7. Is a weakness that can be gained to an access to an asset


a. Threat
b. Risk
c. Vulnerability

8. These functions are performed to address threats and deter or prevent the risk from
occurring.

a. Reactive Measure
b. Preventive Measure
c. All of the above
9. These functions are performed to address emergency situations when risks are
occurring to prevent further loss or damage of resources.

a. Reactive Measure
b. Preventive Measure
c. All of the above

10. Are important tools and elements used in prevention of an incident from happening.
a. Preventive Measure
b. Counter Measure
c. None of the Above

Exercise 2a: Self-Help Task

The self-help task will be graded based on the following


criteria.
1. Neatness/Clarity – 3 points 2. Coherent/thought- 4 points
3. Spelling – 3 points

Give at least 10 examples of known Crimes in the Philippines.

1. ______________________________________

2. ______________________________________

3. ______________________________________

4. ______________________________________

5. ______________________________________

6. ______________________________________

7. ______________________________________

8. ______________________________________

9. ______________________________________

10. ______________________________________

C. TYPES OF CONTROL
Aims and Learning Outcomes
That Student Can:
1. Familiarize types of control
2. Identify access control
3. Define Physical security, Personnel Security and Information Security
4. Discuss the types of security

1. Administrative controls consist of approved written policies, procedures, standards and


guidelines. Administrative control form the framework for running the business and
managing people. They inform people on how the business is to be run and how day to
day operations are to be conducted.

2. Logical controls (also called technical control) use software and data to monitor and
control access to information and computing systems.
(E.g. passwords, network and host based firewalls, network intrusion detection systems.
Access control lists, and data encryption and logical control.

3. Physical controls monitor and control the environment of the workplace and computing
facilities. They also monitor and control access to and form such facilities.
(E.g. doors, locks, heating and air conditioning, smoke and fire alarms, fire suppression
system, cameras, barricades, fencing, security, guards, cable, locks, etc.)

ACCESS CONTROL

Identification is an assertion of who someone is or what something is.

1. Authentication is the act of verifying a claim of identity. When Dr. Miller Peckley goes
into a bank to make a withdrawal, he tells the bank teller he is Dr. Peckley (a claim of
identity). The bank teller asks to see a photo ID, so he hands the teller his driver license.
The bank teller checks the license to make sure it has Dr. Peckley printed on it and
compares the photograph on the license against the person claiming to be Dr. Peckley. If
the photo and name match the person, then the teller has authenticated that Dr. Peckley is
who he claimed to be.

There are three different types of information that can be used for authentication;
something you know (e.g. include such thing as a PIN, a password, or your mother’s
maiden name), something you have (e.g. include a drivers license or a magnetic swipe
card) or something you are refers to biometrics. Example of Biometrics includes palm
prints, finger prints, voice prints and retina (eye) scans. Strong authentication requires
providing information from two of the three different types of authentication information.
For example, something you know plus something you have. This is called two factor
authentications.

THE PRINCIPAL DIVISIONS OF SECURITY MANAGEMENT

In the business world, the major areas of security management is considered universal,
whatever countries, what industry, the application is the same.
In the field of security there are only three areas covering the different types, kinds or
specialization in security. They are the following:

1. Physical Security is the sum total of all physical protection employed or installed to
secure assets.

2. Personnel Security is the sum total of procedures followed, inquiries conducted and
criteria applied to determine the work suitable of a particular applicant or retention or
transfer of a particular employee.

3. Information Security is the sum total of all policies, regulation, practices, enforce to
safeguards the contents and integrity of any classified information or document from
compromise or loss.

Principal Divisions of Security Management

TYPES OF SECURITIES

1. Hotel Security- A type of security applied to hotels where its properties are protected
from pilferage, loss, damage and the function in the hotel restaurants are not disturbed
and troubled by outsiders or the guest themselves. This type of security employs
house detectives, uniform guards and supervisor and insures that hotel guests and
their personal effects safeguarded.

2. Bank Security- This type of security is concern with bank operations. Its main
objective is the protection of bank cash and assets, its personnel and clientele.
Security personnel are trained to safeguard bank and assets while in storage, in transit
and during transactions.

3. School Security- A type of security that is concern with the protection of students,
faculty members, and school properties. Security personnel are trained to protect the
school property from theft, vandals, handling campus riots and detecting the use of
intoxicated drugs and alcohol by the students.

4. Supermarket or Mall Security- A type of Security which is concern with the


protection of the stores, warehouses, storage, its immediate premises and properties as
well as the supermarket personnel and customers. Security personnel are trained to
detect shoplifter, robbery, and bomb detection and customer relation.

5. Aviation Security- A type of security which is concern with the protection of the
airline industry.

Exercise 3: Multiple Choices


Select the best answer. Encircle the letter of your answer that corresponds to the given
question.

1. Consist of approved written policies, procedures, standards and guidelines


a. Logical Control
b. Administrative Control
c. Physical Control

2. Also called technical control/ use software and data to monitor and control access to
information and computing systems.

a. Logical Control
b. Administrative Control
c. Physical Control

3. Is the sum total of all physical protection employed or installed to secure assets.

a. Physical Security
b. Personnel Security
c. Information Security

4. Is the sum total of all policies, regulation, practices, enforce to safeguards the
contents and integrity of any classified information or document from compromise or
loss.
a. Physical Security
b. Personnel Security
c. Information Security
5. Is the sum total of procedures followed, inquiries conducted and criteria applied to
determine the work suitable of a particular applicant or retention or transfer of a
particular employee?

a. Physical Security
b. Personnel Security
c. Information Security

6. A type of security which is concern with the protection of the airline industry.
a. Hotel Security
b. School Security
c. Aviation Security

7. A type of security applied to hotels where its properties are protected from pilferage,
loss, damage and the function in the hotel restaurants are not disturbed and troubled
by outsiders or the guest themselves. This type of security employs house detectives,
uniform guards and supervisor and insures that hotel guests and their personal effects
safeguarded.

a. Hotel Security
b. School Security
c. Aviation Security

8. A type of security that is concern with the protection of students, faculty members,
and school properties. Security personnel are trained to protect the school property
from theft, vandals, handling campus riots and detecting the use of intoxicated drugs
and alcohol by the students.

a. Hotel Security
b. School Security
c. Aviation Security

9. This type of security is concern with bank operations. Its main objective is the
protection of bank cash and assets, its personnel and clientele. Security personnel are
trained to safeguard bank and assets while in storage, in transit and during
transactions.

a. Bank Security
b. Supermarket or Mall Security
c. Hotel Security

10. A type of Security which is concern with the protection of the stores, warehouses,
storage, its immediate premises and properties as well as the supermarket personnel
and customers. Security personnel are trained to detect shoplifter, robbery, and bomb
detection and customer relation.
a. Bank Security
b. Supermarket or Mall Security
c. Hotel Security
Exercise 3a: Self-help Task

The self-help Task will be graded based on the


following criteria:
1. Clean cut - 1 point 2. Neatness/ Clarity- 3 points
3. Craftsmanship- 1 point

1. Paste an example or a picture of Physical Security

2. Paste an example or a picture of Personnel Security

3. Paste an example or a picture of Information Security


Chapter II: The Science and Art of Security

Aims and Learning Outcomes

That Student can:

1. Explain the definition of Guarding

2. Distinguish the difference between Patrolling and recording

3. Explain The components of Area of Responsibility

A. Major Activities of Security

Aims and Learning Outcomes

That Student can:

1. Identify and discuss the types of patrolling

2. Identify and discuss the types of recording

3. Distinguish the difference of visitor control from access control

Guarding

Guarding is an activity where one watches over or shields another person or


property from danger, harm, loss or damage. Guarding is a science because it is a
body of knowledge which is composed of time tested principles and theories and the
application of such.

Guarding as an art requires skills in performing specifically prescribed functions.


It involves the use of human intelligence, physical senses, physical attributes;
experience and flexibility to address a desired security need or result.
A. Major Activities of Security

The basic functions of security are classified as preventive, reactive and


investigative.

1. Patrolling

Patrolling is an activity where the continuously observe the surrounding of the


facility for any unusual situation or condition that can be inimical to its
security and safety.

There area to be patrolled is basically called the Area of Responsibility (AOR)

The Components of an Area of Responsibility

a. Critical Point (CP). Critical point is a resource whose lose or damage is detrimental
to the organization. It is also a condition which can provide opportunity for risks to
occur.

b. Area Control Point (ACP). Area control point is a control point in the AOR where
the guard can have a maximum sensory coverage and reasonable physical control of
the situation.

c. Fixed Area Control Point (FACP). Is a set point on a particular location in the area
of responsibility, from where the guard shall record his location at a particular time.

d. Transient Area Control Point (TACP). Is the actual location of the guard while on
patrol.

e. Control Area (CA). It is the area surrounding the TACP. Experiment conduacted
show that a guard can be physically effective within a radius of 50 meters ithot
obstruction. This area is also called Area of Liability because it is the area where a
guard can control a subject within his capability.

2. Recording

Recording is the process of preserving information obtained by guard while on duty and
while performing his specific functions.

The two basic types of security records are reports and logbooks.

Examples of these are the unusual incident report and investigation report.

Reports are also used to summarize routine operational activities within a specific period
of time. Examples are daily operations Report and weekly summary report.

Logbooks are used for recording the performance of routine functions.

Logbooks are classified according to their application namely, operations journal and
technical logbooks,

Operations Journal is used to record all the guard activities and observation during his
tour of duty. It is used to record the general compliance of the guard to the performance
of all other functions.

All guards shall maintain a security operations journal while on duty.


The Technical Logbook

The technical logbook is a record of compliance of the guard of a specific security


function or procedure. A technical logbook generally has a prescribed format for the
information solicited and it is accomplished in strict chronological order. Its contents are
classified and it is proprietary to the client/organization. Examples of these are the
visitor’s logbook and material logbooks.

1. Visitor Control

Controlling is an important function in the security work, this is an activity that


challenge the security personnel the use of their technical knowledge and
expertise in security. Controlling includes use of keen observation, observing the
people entering a building, observing the object getting in and getting out f the
building, observing places around the corner and observing the events happening
inside and out the building. This is known in Security as the Observe and report
principles which are focused in the application of the Pope doctrine (People,
Objects, Places and Events).

Visitor Control is the process of screening out undesirable or illegitimate persons


from entering the facility premises.

Access Control is the process of preventing the intrusion of critical spaces and
areas within the facility by authorized persons.

Exercise 1: Multiple choices

Select the best answer. Encircle the letter of your choice that corresponds to the given questions.

1. ____________ is an activity where one watches over or shields another person.

a. Guarding

b. Securing

c. Security

2. is an activity where the continuously observe the surrounding of the facility for any
unusual situation or condition that can be inimical to its security and safety.

a. Recording

b. Patrolling

c. Roving

3. It is the area surrounding the TACP

a. Control Area

b. Transient Area Control Point

c. Fixed Area Control Point

4. Is the actual location of the guard while on patrol.


a. Control Are

b. Transient Area Control Point

c. Fixed Area Control Point

5. Is a set point on a particular location in the area of responsibility, from where the guard
shall record his location at a particular time.

a. Control Area

b. Transient Area Control Point

c. Fixed Area Control Point

6. Critical point is a resource whose lose or damage is detrimental to the organization. It is


also a condition which can provide opportunity for risks to occur.

a. Critical Point

b. Area Control Point

c. Fixed Area Control Point

7. Area control point is a control point in the AOR where the guard can have a maximum
sensory coverage and reasonable physical control of the situation.

a. Critical Point

b. Area Control Point

c. Fixed Area Control Point

8. Used to summarize routine operational activities within a specific period of time.

a. Logbooks

b. Reports

c. Operations Journal

9. Used to record all the guard activities and observation during his tour of duty. It is used to
record the general compliance of the guard to the performance of all other functions.

a. Logbooks

b. Reports

c. Operations Journal

10. Is the process of screening out undesirable or illegitimate persons from entering the
facility premises?

a. Visitor Control

b. Access Control

c. POPE Doctrine
Exercise 1a: Self-help Task

The self-help Task will be graded based on the following criteria

1. Grammar- 1 point 3. Coherence/thoughts- 3 points

2. Neatness/Clarity- 1 point

1. Write an example of an Operations Journal of a Security Guard.

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

2. Distinguish the difference between Visitor Control and Access Control.

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

________________________________________________________________________

B. Security Investigation

Aims and Learning Outcomes

That Student can:

1. Define Security Investigation in Security Management

2. Discuss Reactive Measure

3. Familiarize the tools of Investigation

4. Familiarize Qualities of an Effective Investigation

Security Investigation

Is a reactive measure in security management, we have to admit that there is no such thing as
perfect crime, only imperfect investigation. We cannot prevent crime in totality, an accident or
crime may always happen but at least at a minimum and security investigation constitute a small
pie in the security management job.
Is a planned and organized determination of facts concerning specific loss or damage of assets
due to threats, hazard or unsecured conditions. It is the identification and location of criminals,
and gathering evidence that will be used as evidence in court to convict them.

The general principle of Security Investigation is never to try to cover up an incident or


complaint.

Elements of Security Investigation

1. Investigator

2. Purpose

3. Subject of Investigation

Tools of Investigation

1. Information- Knowledge which the investigators gathers from other persons.

a. Acquired from regular sources

b. Acquired from Cultivated Sources- Paid Informants

2. Interrogation- The simple questioning of a person who is reluctant to divulge


information.

3. Interview- The simple questioning of a witness who has no personal reason to withhold
information.

4. Instrumentation- The application of instruments and methods of physical sciences to the


detection of crimes. In other words, the sum total of the application of all sciences in
crime detection otherwise known as Criminalistics.

3 fold Aims

1. To Identify the offender

2. To Locate the offender

3. To provide Evidence of his guilt

Methods Identifying the Offender

Confession

Eyewitness/ Testimony

Circumstantial Evidence

Associative Evidence

Difficulties in the Investigation

1. Absence of eyewitness/ witness

2. Motives Unknown

3. Lack of Physical clues (Evidence)


Qualities of an Effective Investigation

1. Objective- All of facts are discussed as perceived without any distortion and manner of
presentation is free from unwarranted opinion.

2. Thorough- Full detail, exhaust all available means, factual to arrive in a sound and
convincing conclusions.

3. Relevant- Significant and demonstrated its relation to one another.

4. Accurate- Free from error

5. Current

Guidelines in Investigation

Preliminary Investigation

Proceed to the scene promptly and safely

Render assistance to the victim

Effect the arrest of the Offender

Locates and Identifies the Witnesses

Interview the complainant and the witnesses

Maintains the crime scene and protect the Evidence

Interrogate the Suspects or the Offender

Note all conditions, events and remarks

Arrange for the collection of Evidence

Report the incident fully and accurately

Yields the Responsibility to the follow up Investigation

Investigation Proper

a. Photograph the Crime Scene

b. Search the Crime Scene

c. Crime Scene Sketch

d. Care of Evidence

Methods of Investigation

a. Information

b. Interrogation

c. Interview

d. Instrumentation
Confession is an express acknowledgement by the accused in a criminal prosecution of the truth
of his guilt as to the offense charge.

Admission is a statement of facts not directly constituting an acknowledgement of guilt.

Circumstantial Evidence

Is evidence that relies on an interference to connect it to a conclusion of fact, such as a


fingerprint at the scene of a crime and blood analysis or DNA analysis.

Security Survey

Important tool to evaluate and assist the security conditions of an institution or


establishment. It measures compliance of employees to security policy and guidelines. It is
defined as a critical on site examination and analysis of an Industrial plant, business, a home or
public or private institution done to ascertain the facility’s current security status, to identify
deficiencies or excess in current practices, to determine what protection is needed and to make
recommendations for improving the overall level of security at that installation.

Objective of Security Survey

1. To determine existing vulnerabilities to injury, death, damage, or destruction by natural


causes.

2. To determine existing vulnerabilities of corporate assets due to outside criminal activity.

3. To determine existing vulnerabilities of corporate assets due to criminal activity within


the organization.

4. To determine existing conditions of physical security of corporate property.

5. To measure compliance of employees to security.

Security Inspection

It is conducted for 2 reasons

1. To check on the degree of compliance with the recommend countermeasures and

2. To determine the effectiveness and adequacy of the countermeasures which are in effect.

Types of Security Inspection

1. Continuous Inspection

2. Formal or Informal

3. Structured or Unstructured Inspection

Exercise 2: Multiple Choices

Select the best answer. Encircle the letter of your choice that corresponds to the given questions.

1. Is a reactive measure in security management, we have to admit that there is no such


thing as perfect crime, only imperfect investigation.
a. Security Investigation

b. Investigation

c. Security Measure

2. These are the Elements of Security Investigation except;

a. Investigator

b. Purpose

c. Instrumentality

3. The application of instruments and methods of physical sciences to the detection of


crimes. In other words, the sum total of the application of all sciences in crime detection
otherwise known as Criminalistics.

a. Instrumentation

b. Interview

c. Interrogation

4. The simple questioning of a witness who has no personal reason to withhold information.

a. Instrumentation

b. Interview

c. Interrogation

5. The simple questioning of a person who is reluctant to divulge information.

a. Instrumentation

b. Interview

c. Interrogation

6. Is an express acknowledgement by the accused in a criminal prosecution of the truth of


his guilt as to the offense charge.

a. Confession

b. Admission

c. Admittance

7. A statement of facts not directly constituting an acknowledgement of guilt.

a. Confession

b. Admission

c. Admittance
8. Evidence that relies on an interference to connect it to a conclusion of fact, such as a
fingerprint at the scene of a crime and blood analysis or DNA analysis.

a. Direct Evidence

b. Primary Evidence

c. Circumstantial Evidence

9. Important tool to evaluate and assist the security conditions of an institution or


establishment.

a. Security Survey

b. Investigation Report

c. Security Journal

10. It is conducted for 2 reasons, to check on the degree of compliance with the recommend
countermeasures and to determine the effectiveness and adequacy of the countermeasures
which are in effect.

a. Security Inspection

b. Security Measure

c. None of the Above

Exercise 2a: Self-help Task

The Self-Help task will be graded based on the following


criteria

1. Grammar- 3 points 3. Neatness/Clarity- 2 points

2. Coherence/Thoughts- 5 points

Write an Investigation report and follow the format.

I. AUTHORITY

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_______________________________

II. MATTERS INVESTIGATED

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
______________________________

III. FACTS OF THE CASE

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
______________________________

IV. DISCUSSION

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
______________________________

V. CONCLUSION

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_______________________________

VI. RECOMMENDATIONS

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
________________________________
Chapter 3: Security Guard Proper Uniform, Gadgets and Traffic Control
Aims and Learning Outcomes
That Student can:

1. Identify Security Guard’s proper uniform


2. Describe the scope of security
3. Describe the value of security in the society
4. Learn traffic control

A. Security Guard Proper Uniform

Aims and Learning Outcomes


That Student Can:
1. Identify the Security Guards’ uniform
2. Know its value in the field of security
3. Determine its purpose
Exercise 1a: Modified True or False. Write TRUE if the statement is correct and FALSE if the
statement is not correct and underline the word or phrases that makes the statement incorrect.

____________1. A security Guard doesn’t necessarily need to wear his/her uniform during
his/her duty.

____________2. A Security Guard can bring his/her gun outside his/her area of responsibility.

____________3. A Security Guard is a big help to prevent crime from happening in an


establishment by his/her presence.

Exercise 1b:Self-help Task

Rubrics:

Content = 5 points

Grammar = 2 points

Clarity = 3 points

Give at least 5 things that are part of a Security Guards’ uniform and explain its purpose.

1. ________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
__________________________________________

2. ________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_________________________________________

3. ________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_________________________________________

4. ________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________
5. ________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________

B. What is a Security Guard


Aims and Learning Outcomes
That Student can:
1. Understand how important security guard is
2. Explain the job of a security guard
3. Identify the gadgets of security guard

What is a Security Guard?

A security guard (or security officer) is a person who is paid to protect property,
assets, or people. Security guards are usually privately and formally employed
personnel. Often, security officers are uniformed and act to protect property by
maintaining a high visibility presence to deter illegal and inappropriate actions,
observing (either directly, through patrols, or by watching alarm systems or video
cameras) for signs of crime, fire or disorder; then taking action and reporting any
incidents to their client and emergency services as appropriate.
Exercise 1: Self-help Task

Rubrics:

Content = 5 points

Clarity = 3 points

Grammar = 2 points

Give at least 6 gadgets of a security guard and explain its purpose.

1. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
___________________________________

2. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________

3. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
____________________________________

4. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
____________________________________

5. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
____________________________________

6. __________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
____________________________________

C. TRAFFIC CONTROL LEFT TURN


Aims and Learning Outcomes
That Student can:
1. Explain and discuss traffic control

This turn is very dangerous, as vehicle will be turning into incoming traffic.
You must take a decision about when to allow left turns depending on how
heavy the traffic is and how many people need to make the turn. Use caution:

1. Stop the traffic coming from the opposite direction. Hold the stop signal.

2. Make sure the intersection is clear of vehicle and pedestrian.


3. With your opposite arm fully extended, point at the driver who want to turn.

4. Make sure that the driver has notice that you had made a downward
swinging motion in the direction you want the driver to go

STOPPING TRAFFIC

1. Choose the vehicle you want to stop.

2. Look directly at the driver and point at them with your arm fully extended.

3. Make sure the driver has notice your gesture, and then raise your hand so
that your palm is facing the driver bend your arm slightly at the elbow.

4. Hold this position until the vehicle has stopped.

5. Keep your arm in position and turn your head to the opposite direction.

6. Repeat step 1 to 4.

7. Do not lower your arms until all traffic has completely stopped.
Exercise 1: Self-help Task

Rubrics:

Content = 5 points

Clarity = 3 points

Grammar = 2 points

1. Post a picture of a Security Guard or Traffic enforcer with a STOPPING hand signal.

2. Post a picture of a Security Guard or Traffic Enforcer with a STARTING hand signal.

Chapter 4: 11 General Orders and Code of Conduct


Aims and Learning Outcomes
That Student can:

1. Understand the 11 General order and its purpose


2. Understand the code of conduct and its purpose

A. 11 General Order

1. To take charge of this post and all company properties in view and to protect/preserve
the same with utmost diligence.

2. To walk in an alert manner during my tour of duty, keeping always on the alert and
observing everything that takes place within sight or hearing.

3. To report all violations of orders I am instructed to enforce.

4. To relay all calls from posts more distant from the guard house than my own.

5. To quit my post only when properly relieved.

6. To receive, obey, and pass on to the relieving me all orders from company officers or
Officials, supervisors, post-in-charge or shift leaders.

7. To talk to no one except in line of duty.

8. To give the alarm in the case of fire or disorder.

9. To call the superior officer in any case not covered by instructions.

10. To salute all company officials, superiors in the agency, ranking public officials and
Officers of the Philippine National Police.

11. To be especially watchful at night and during the time for challenging, to challenge
all persons on or near my post, and to allow no one to pass or loiter without proper
authority

Activity 1: Self-help Task

Rubrics:

Content = 5 points

Clarity = 3 points

Grammar = 2 points

1. Explain the phrase “To report all violations of orders I am instructed to enforce” and
cite an example.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_________________________________________
2. Explain the phrase “To talk to no one except in line of duty” and cite an example.

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_________________________________________

3. What do you think is the importance of 11 General Order in the field of security?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
________________________________________

B. Code of Conduct and Code of Ethics

Code of Conduct

1. To carry with him at all times during his tour of duty his license and identification
card and the permit to carry firearms.

2. He shall not use his license and privileges to the prejudice of the public, clients or
customers and his agency.

3. He shall not engage in any unnecessary conversation with anybody except in


discharge of his duties or sit down unless required by the nature of his work and at all
times keep himself alert during his tour of duty.

4. He shall not read newspapers, magazines, books, etc. while actually performing his
duties. 5. He shall not drink intoxicating liquor immediately during or before his tour
of duty.

6. He shall know the location of the fire alarm box near his post and to sound the
alarm in case of fire or disorder.

7. He shall know to operate the fire extinguisher at his post.

8. He shall know the location of the telephone / and the telephone number of the
police precincts as well as the telephone number of the fire stations in the locality.

9. He shall immediately notify the police in case of any sign of disorder, strikes, riot,
or any serious violation of the life and property.

10. He shall familiarize himself with the Private Security Agency Law (RA No.5487)
and the implementing rules and regulations.

Code of Ethics
1. As a security agent, his fundamental duty is to serve the interest or mission of his
agency in compliance with the contract entered into with the clients of the agency he is
supposed to serve.

2. He shall be honest in thoughts and deeds both in his personal and official actuations,
obeying the law of the land and the regulations prescribed by his agency and those
established by the company he is supposed to protect.

3. He shall not reveal any confidential matter that is confided to him as security guard
and such other matters imposed upon him by law.

4. He shall act at all times with decorum and shall not permit personal feelings,
prejudices and undue friendship to influence his actuation in the performance of his
official functions.

5. He shall not compromise with criminals and other lawless elements to the prejudice of
the customer or his client but assist government in its relentless drive against lawlessness
and other forms of criminality.

6. He must carry his assigned duties as security guard or watchman as required by law to
the best of his ability and safeguard life and property to the establishment he is assigned.

7. He shall wear his uniform, badge, patches and insignia properly as a symbol of public
trust and confidence as an honest and trustworthy security guard, watchman and private
detective.

8. He must keep his allegiance first to the government, to the agency he is and to the
establishment he is assigned to serve with loyalty and dedicated service.

9. He shall diligently and progressively familiarize himself with the rules and regulations
laid down by his agency and that of the customer or clients.

10. He shall at all times be courteous, respectful and salute to his superior officers,
government officials and officials of the establishment where he is assigned and the
company he is supposed to serve.

11. He shall report to perform his duties always in proper uniform and neat in his
appearance.

12. He shall learn at heart or memorize and strictly observe the laws and regulations
governing the use of firearms.

Activity 1: Self-help task


Rubrics:

Content = 5 points

Clarity = 5 points

Grammar = 2 points

1. What do you think is the importance of Code of conduct in the field of Security?

__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
_______________________________________

2. What do you think is the importance of Code of Ethics in the field of Security?

__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
______________________________________

C. Salute
Is the Most Important and the Most Common Form of All

1. Except when walking one should always be at attention when saluting. The right hand
is raised smartly until the tip of the forefinger touches the lower part of the headgear or
forehead and slightly to the right eye.

2. Thumb and finger are extended and joined. The palm is turned slightly in front of the
body. The forearm is inclined at 45 degrees angle and the hand and wrist are in straight
line.

3. The first position of the hand salute or the nearest point of approach is more or less six
paces. The first position of the salute should be held until the person saluted to have
passed or the salute is returned.

4. The hand salute under the naval custom is accompanied by a word of greeting such as
"good morning, Sir/Ma'am" depending on the time of day.

5. Naval custom permits saluting with left hand when a salute cannot be rendered by the
right hand

HOW TO SALUTE
Stand attention raise the right hand smartly finger extended and joints touching the tip of
the right eyebrow by the middle finger. Palm facing forearm in 45 digress and arm
parallel to the ground.

WHO AND WHAT TO INTITLED TO SALUTE

Security Officer (both Male & Female) of the Agency Police Officer (both Male &
Female) of PNP Army Officer (both Male & Female) of AFP Civilian high officials &
our Agency Client

WHEN TO SALUTE

= AFTER CONVERSING WITH AN OFFICER

= REPORTING TO AN OFFICER.

= MEETING AN OFFICER.

= WHEN THE NATIONAL COLOR PASSES BY

WHEN NOT TO SALUTE

=WHEN OFFICER ARE AT WORK.

= INDOORS, EXCEPT WHEN REPORTING TO

=AN OFFICER. WHEN CARRYING ARTICLES WITH BOTH

=HANDS, OR BEING OCCUPIED AS TO MAKE SALUTING IMPRACTICABLE

= WHEN ATTENDING TO A VEHICLE

=WHEN MEETING A PRISONER

=WHEN IN RANKS

SALUTE PROTOCOL

1.) Enlisted personnel salute officers.

2.) Junior officers salute senior officers when meeting or passing.

3.) When several officers are being saluted, all shall return the salute.

4.) When overtaking a senior officer (passing), salute when abreast, while saying “By
your leave, sir or ma’am.” The senior officer should return your salute and say, “carry
-on,” “very well,” or “permission granted.” You may then drop the salute and
proceed.

Marks of Respect
While travelling in a vehicle, salutes are returned by the senior most officers only.
However on being passed by a common superior all officers embarked are to sit/stand
quietly till courtesies are exchanged. Similar drill is to be followed when embarked in
boats. Additionally, boat coxswains should be directed to keep a sharp lookout and
pay appropriate marks of respect whenever passing boats with officers embarked pass
by.

Opening Car Doors

As a matter of policy a specific individual is not required for opening or shutting a car
door for an arriving or departing visiting dignitary or senior officer. Discretion,
however, should be exercised and a sailor should be nominated for this task only if
the visiting dignitary requires assistance in getting down from the car. A Lady should
always be helped with the car door and the door should be firmly shut after ensuring
that her entire apparel is inside the vehicle.

Seating in Cars

In cars, the senior always sits on the left and the junior sits on the right (behind the
driver). If three officers are sitting in the rear of a car, the senior most sits to the left,
the next senior on the right and the junior most in the middle. In case the car is full,
the junior most officer sits in the front. While travelling with ladies, the preferred
seat, the left seat, is offered to them. On occasions when a Liaison officer (LO) has to
escort a visiting dignitary, he is to occupy the rear right seat. The LO is to sit in the
front only if any officer senior to him is also required to travel along with the
dignitary or if the visitor is accompanied by a lady.

Activity 1a: Modified True or False. Write TRUE if the statement is correct and FALSE if the
statement is not correct and underline the word or phrases that makes the statement incorrect.

_____________1. Senior officers salute Junior officers when meeting or passing

_____________2. Naval custom does not permits saluting with left hand

_____________3. As a matter of policy a specific individual is required for opening


or shutting a car door for an arriving or departing visiting dignitary or senior officer

_____________4. In cars, the juniors always sits on the left and the seniors sits on the
right

_____________5. On occasions when a Liaison officer (LO) has to escort a visiting


dignitary, he is to occupy the rear right seat

Exercise 1b: Self-help task


Rubrics:

Content = 5 points

Clarity = 3 points

Grammar = 2 points

Q1. Explain the importance of salute in the field of Security and Law Enforcement.

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
______________________

Q2. Give an example of WHEN TO SALUTE and WHEN NOT TO SALUTE.

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

Chapter 5: Handling Hazard Security, VIP Security


Aims an Learning Outcomes
That Student can:

1. Understand and Explain on how to handle Hazard Security


2. Discuss the importance of VIP Security
3. Distinguished the organization of VIP Security
4. Understand the common elements in assassination
5. Familiarize Important terminologies in the field of security

A. Handling Security Hazard and VIP Security


Hazard Elimination

The best alternative, if realistic, is to eliminate the hazard entirely. For example,
the hazard losses from bad checks or credit card fraud can be avoided if the business
does not accept checks or credit card. Dynamic Hazard can be voided or eliminated.
They exist because of a management decision and can be eliminated by change in
management decision

Hazard Reduction

Pure hazard will always exist and cannot be completely eliminated, and some
dynamic hazard cannot be avoided without incurring some other type of loss. The
best alternative is to establish procedures and use physical hardware to reduce or
minimize the hazard. For example, establishing and implementing check cashing
policies can reduce the hazard of loss from bad checks.

Hazard Acceptance

It is never cost effective or indeed possible to provide 100 percent security for an
establishment. Hazard can never be entirely eliminated. Some must simply be
accepted.

Security Hazard Management

is a complex challenge to security and safety activities, Consequently, it is


essential to define and to analyze all hazards that might be encountered, to make it
possible to restrict the number and the scope of such disturbances.

VIP Security

1. VIP Very Important Person

Ex. State President, High ranking and Private Officials

2. Escort- One or more persons accompanying another to give guidance or protection


or to pay honor.

3. Body Guard- A person or a grouped of persons usually armed and responsible for
the physical safety of one or more specific persons.

Organization of VIP Security

1. Area Security- Covers the surrounding areas of engagement


2. Perimeter Security- Secures the immediate areas surrounding the place of engagement.

3. Advance Security- Advance security at the place of engagement before the arrival of the
VIP.

4. Close In Security- Accompanies The VIP where ever he does.

5. Reserve Security- Standby for possible back up.

6. Routine Security- Neutralized the possible route of the VIP party.

Prophylactic Operations

1. Patrolling

2. Putting up of checkpoints, blocks and gates.

4 Common Elements in all Assassination

1. Victim

2. Assassin

3. MO

4. Opportunity

Protection in Transit

An individual is particularly vulnerable while moving from one place to another.


Hence, a regular route and time travel should be established. Frequent changes of
direction, travel time, mode of transport, coordinated with all the overall protection plan
would make it more difficult for an abduction to plan of an ambush.

Vehicle Security

The vehicle utilized by potential kidnap victim should not be placed unattended in
a parking stall within the individual name on it. If possible when not in use, the vehicle
should be parked in a locked garage under a guard and not on the street.

Attack Tactics

1. Moving Attacks

2. Ambush Attack

Reasons why do they need Bodyguard


As a result of the “increased concern about kidnapping threat” there has been an
escalation in the demand for bodyguards. Thereby, BRAIN is needed and not
BRAWN( meaning muscular power) has been offered as the basis for the body guard
selection. The body guard should fit the image and life style of the individual he is
guarding.

Some Protection Techniques while moving on foot

1. Individuals in the vicinity of the persons being protected should be observed and
especially their hands.

2. If the weapon is displayed, the weapons should be attacks so as to be ready to respond


effectively.

3. The bodyguards should anticipate potential attacks so as to be ready to respond


effectively.

4. If a threatening situation begins to develop the individuals being protected should


immediately be removed from the danger area.

5. If two bodyguards are used and attacks develop, one body guard should remove the
individual being protected while the other neutralized the threat.

6. If one bodyguard is utililized, he/she will usually walk in front and slightly to the left of
the person being protected.

7. When two body guards are utilized, one will take positioned in front to the left, while the
second, walk take position to the rear and slightly to the right.

Exercise 1a: Encircle the letter of the correct answer.


1. Can we eliminate Hazard?

a. No
b. Yes
c. Both A and B

2. One or more persons accompanying another to give guidance or protection or to pay


honor.

a. Escort
b. Body Guard
c. None of the Above

3. A person or a grouped of persons usually armed and responsible for the physical safety of
one or more specific persons.
a. Escort
b. Body Guard
c. None of the Above

4. Covers the surrounding areas of engagement


a. Area Security
b. Perimeter Security
c. Advance Security

5. Secures the immediate areas surrounding the place of engagement.


a. Area Security
b. Perimeter Security
c. Advance Security

6. Advance security at the place of engagement before the arrival of the VIP.
a. Area Security
b. Perimeter Security
c. Advance Security

7. Accompanies The VIP where ever he does.


a. Close in Security
b. Reserve Security
c. Routine Security

8. Standby for possible back up.


a. Close in Security
b. Reserve Security
c. Routine Security

9. Neutralized the possible route of the VIP party.


a. Close in Security
b. Reserve Security
c. Routine Security

10. Hazard exists because of Management __________.


a. Decision
b. Planning
c. None of the Above

Exercise 1b: Self-help Task


Rubrics:

Content = 5 points

Clarity = 3 points

Grammar = 2 points

Q1. Can we eliminate Hazard? Explain why.

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
_____________________________________

Q2. Explain these 4 common elements in all assassination.

Victim:

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

Assassin:

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

Modus Operandi:

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

Opportunity:

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

B. Categories of Kidnappers and Information Security


Categories of Kidnappers

1. Neither opportunities nor novice criminals 2

2. Religious or Politically motivated Individuals

3. Mentally derange Individual

4. Professional Criminals

Information Security

Closing the window of Exposure

-defined as the sum total of all policies, regulation, practices, enforce to safeguards the contents
and integrity of any classified information or document from compromise or loss.

CIA Triad

Confidentiality- accessible only to those authorized to have access.

Integrity- Accurate and complete.

Availability- Associated assets when needed.

2 kinds of Documents

Personal- Letters, diary and notebook

Official- Orders, Manual, Letters, Overlays, maps and Magazines

Security Problems

Any Condition which may result in the compromise of information, loss of life, and loss or
destruction of property or disruption of the activity of the installation.

Types of Hazard

Natural Hazard

Floods

Earthquake

Storms

Lightning Storms

Extreme Temperature

Human made Hazard


Carelessness

Disloyalty

Espionage, Pilferage and Theft

Document/ information Cycle

1. Creation

2. Classification

3. Storage

4. Retrieval

5. Retention/Purging

6. Transfer

7. Disposition

CRISIS MANAGEMENT

The hostage taking of Chinese nationals that happen in Manila is a lesson to learn for our
Government. The PNP recognize different pitfalls on the operation from negotiation to assault.
In this case, crisis management plays a very significant role in dealing with the problem. In
security management, Crisis management is very important tool in dealing with the day to day
operation of the security business.

Crisis- point of a condition, improper handling on which immediately places under threat or
danger of one’s life, limbs, freedom and property.

Crisis Management- it is the totality of action of handling or responding to a given crisis


situation.

Crisis Management Plan- Is a complete and comprehensive plan of actions designed to protect
life, limbs, freedom and property, before, during and after any given crisis situation.

2 Kinds of Crisis according to Origin

Natural Crisis

Man made Crisis

Emergency Response Team


It must be established to become active during the increased threat levels or when an emergency
situation occurs.

1. Who will make decisions and have final authority for the team as a whole.

2. Who will be members of the team and what are their responsibilities?

3. What will be the mission of the team?

4. The tasks of the other agencies or individuals.

5. The training needed to prepare team members to operate on stressful situations.

6. Contingency planning beyond that involved in normal day to day operations against
threats.

7. The unexpected- the incident will not take place as planned

Responding to Tactical Situation

1. Bombing. If the terrorist plant bombs, then you must assume other bomb have been
planted. Remove everyone from the scene to a safe area. Anyone near the scene at that
time must be interviewed, keep in mind that the people being interviewed may, in fact, be
terrorist who planted the bomb.

2. Ambush/Attack- always assume that terrorist are still in the area.

3. Establishes a defensive perimeter- Clearing of the area is conducted before crime scene
investigation begins. All vehicles and exits from the area must be controlled and
inspected.

4. Kidnapping- in most cases of kidnapping, you are not aware that a kidnapping has
occurred until the terrorist has the victim safely secured elsewhere. The immediate
response is to dispatch team to provide protection for other possible targets, including
members of the victim’s family. The ERT is activated. The team can materially aid the
commander in dealing with the kidnapping. They could recommend possible courses of
action.

5. Hostage Situation- The worst possible scenario you could be confronted with is a
prolonged hostage situation. The initial response force secures and isolate the incident
scene. No one must be allowed to enter or leave. Witness’s names are recorded, and the
witnesses are directed to a safe location to wait for further debriefing.

6. Arson- This is done during an organized civil disturbance (throwing of firebomb) or


against a specifically targeted building. As with bombs they, they often use time delay
mechanisms to allow themselves time to leave the area before the fire occurs.

Don’ts in handling Suspected Bomb Packages

1. Don’t attempt to open the package.

2. Do not submerge in water due to conductivity of electrical circuit and/or possible violent
reaction of chemical agent.
3. Do not indiscriminately shake or jar suspected package due to the possibility of
disturbing the trigger mechanism.

4. do not cut the string or unwrapped package due to the possibility of pressure release type
device.

5. Do not puncture or cut the box with metallic object as the possibility of electric power
may be employed.

6. Do not accept identifications markings on any suspected package as legitimate.

7. Do not allow radio transmission within the vicinity.

8. Do not switch on the lights on any electrical switches just to light up dark rooms or area.

9. Do not use sirens, megaphone or any loud noise emitting device

Responding to Bomb Threats

Each threat received through any means of communications should be treated as real and
must be forwarded immediately to the proper authorities. Training is essential to deal
properly with a bomb threat incident. Instruct all personnel, especially those at the
telephone switch board if a bomb threat is received. The receiving team must remain
calm and courteous. Try to obtain as much information as possible from the caller. Take
note of the ff. procedures:

1. Get the identity of the caller

2. Take note of the ff. characteristics; male or female voice; young middle age or old
sounding voice; accent of voice; any background noise.

3. The exact words of the person placing the call.

4. Show no emotion on the phone

5. Know the exact location of the bomb

6. Ask for the description of the bomb/ composition of the explosive.

7. Repeat the message to the caller whenever possible and ask for confirmation.

8. The receiving party should remain calm and courteous. He should listen carefully and
write down accurately the information the caller provides.

9. If possible refer the caller to a supervisor in authority to extract more information.

10. Apply delaying tactics and engage the caller in prolonged conversation.

11. Take time of the exact time the caller hung up.

12. The person receiving the bomb threat should attempt to ask the caller certain questions;
when is the bomb going to explode? Where is the bomb right now? What type of bomb is
it? What does the bomb looks like? What will cause the bomb to explode? Why did you
place the bomb?
13. Remember that the caller may not answer your question, but any additional information
that he may relate will be helpful.

14. It may be advisable to inform the caller that the building is occupied and detonation of
the bomb could result to death or serous injury to many innocent people.

15. Once the telephone threat is received, notify your local police at once.

Exercise 1a: Multiple choices. Encircle the letter of the correct answer.

1. Point of a condition, improper handling on which immediately places under threat or danger of
one’s life, limbs, freedom and property.

a. Crisis
b. Crisis Management
c. Crisis Manage Plan

2. It is the totality of action of handling or responding to a given crisis situation.

a. Crisis
b. Crisis Management
c. Crisis Manage Plan
3. Is a complete and comprehensive plan of actions designed to protect life, limbs, freedom
and property, before, during and after any given crisis situation.

a. Crisis
b. Crisis Management
c. Crisis Manage Plan

4. Each threat received through any means of communications should be treated as real and
must be forwarded immediately to the proper __________.

a. Police
b. Authorities
c. Firefighter

5. . If the terrorist plant bombs, then you must assume other bomb have been ________.

a. Planted
b. Exploded
c. All of the above
Exercise 1b: Self-help Task

Rubrics:

Content = 5 points

Clarity = 3 points

Grammar = 2 points

Give at least 2 examples of attack tactics and explain

1.____________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

2.____________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
C. Important Terminologies
Aims and Learning Outcomes
That Student can:

Define and familiarize these important terminologies in the field of Security

Terminologies

Abduction- taking away of person by force, usually to minors, female, not necessarily with a
demand for ransom.

Accident Investigation- process of ascertaining the circumstance of the incident and whether
there are implications as to shortcomings in the design of performance of equipment, local
procedures or the competence, effectiveness, and efficiency of the personnel and employees.

Active Barriers- a type of barrier designed normally at the entrances of the building against
threat vehicle or car bomb.

Air Cargo Security- designed to prevent and/or minimize losses of commercial cargo during
transit, storage or transfer.

Area of Responsibility AOR- specific place where the guards on duty are stationed and detailed.

Arrest- the taking of person into custody in order that he may be forthcoming to answer to
answer for the commission of specific offense.

Assault- the threat to strike.

Background Investigation- The process of checking an individual character, general reputation,


personal characteristics, or mode of living for consideration of employment, promotion, access to
sensitive assets or for continued employment.

Battery- the actual strike

Bank Security- a specialized type of physical security protecting the assets, personnel and
operation of the bank with special emphasis on the precautions and measures to safeguard the
cash and asset while the storage, in transit and during transactions.

Bomb- any hollow projectile with the incendiary chemical materials that may explode by means
of concussion or by time fuse.

Bomb Threat- a form of conveyance of any messages regarding presence of bomb, whether it
may be true or false, but intends to create panic, fear or disorder. It is said that 95% of bomb
threat are hoax.

Business Continuity Plan- an ongoing process supported by senior management and funded to
ensure that the necessary steps are taken to identify the impact or potential losses, maintain
viable recovery strategies and plans, and ensure the continuity of operations through personnel
training, plan testing, evaluation and maintenance.

Civil Disturbance- disturbance of the piece either through the formation of crowd, mob,
spectators, riot, strikes and rallies/protests that pose danger and create fear to the public.
Communication Security- Aspect of security where company ensures that no unauthorized entry
could be attributed against the communication area through the application of various physical
security measures.

Competitive Intelligence- also called business intelligence, which focus mainly in monitoring the
external environment to the firm for information that is relevant to the decision making process
of the company.

Force Multiplier- refers to the complex responsibility of private security personnel where they
duplicate the works of police in terms of crime prevention, maintenance of peace and order, and
protection of lives and property.

General Investigation- a process of investigation where all personnel of a given entity are
subjected for one on one and closed door interview with an independent private investigator.

Hazard- factors that bring about insecure condition to an asset: it is a passive inimical act.

Hazardous Material- run away experiments, storage accident involving large quantities of
substances. This could happen during production, storage, transportation and disposal.

High Level Security- security designed to impede, detect and assess unauthorized external and
internal activities.

Identification- is an absolute control measure to prevent unauthorized entry access to the facility.

Industrial Security- type of installation mainly focusing on industrial plants and business
enterprises where the personnel processes, properties and operations are safeguard.

Internal Scanning- examination and re examination of the workplace as essential element to


draw realistic and relevant plan against loss of lives, property and personnel injuries.

Job Hazard Analysis- identifying the basic steps of job, determining any existing or potential
hazard.

Kidnapping- taking away of person by force against his/her will, usually with a demand or
ransom.

KRA- Key Result Area- expected output to an employee necessary to ensure productivity.

Low –level Security- system designed to impede and detect unauthorized activity that threatens
safety.

Man made emergency- unlawful assemblies resulting to riots, gang war, frat brawl, labor strikes
large scale demonstration, utility failures, bomb threats, shooting incidents, fire explosions and
etc.

Maximum Security- to impede, detect, assess and neutralize all unauthorized external and internal
activities.

Medium Security- to impede, detect, assess and neutralize most unauthorized external and
internal activities.

Minimum Security- to impede unauthorized external activity, which may be on form of simple
intrusion or serious armed attacked.
Natural Access Control- refers to use of doors, fences and gates to control access to your
business or property. The intention is not to necessarily stop the offender, but rather make your
business look like a riskier crime target.

Natural Surveillance- is a designed concept primarily at keeping intruders under observation.


This information is to teach people how to facilitate observation and create the effect of an
increased perception of risk to the intruder.

Operational Management- focuses on the sets of activities that create effective services by
transforming inputs to outputs.

Operation Security- aspect of security where the company ensures that all policies, rules,
regulations, systems and procedures are followed and enforced.

Observation- the complete and accurate awareness by an individual of his surrounding and it
composes the use of all major senses of an individual.

PADPAO- Philippine Association of Detective and Protective Agency Operators, Inc.

Passive Barrier- designed against threat vehicle or car bomb and normally installed permanently
at the perimeter of the facility .

Personal Security- protection of personnel especially known personality from harm and other
passive inimical acts against his/her will.

Personnel- aspect of security where the company ensures that employees it hires are capable,
trustworthy, honest and loyal to the company.

Physical- any structure, facility, documents

Physical Security- these are kinds of barriers such as objects, equipment or gadgets, which are
used to protect the facility from unauthorized access to the assets being protected.

Prevention- these are plans and processes that will allow an org to avoid, preclude, or limit the
impact of a crisis occurring.

Private Detective- person who perform and does detective work for hire, reward or compensation
and a non regular member of the PNP, AFP and other law enforcement agency of the
government.

Private Security Officer- an individual, other than armored car personnel or a public employee,
employed part of full time, in uniform or plain clothes, hired to protect the employing party’s
assets, ranging from human lives to physical property and its premises and contents.

Public Relations- the art of bringing about better public understanding.

Public Safety- support mechanism that sustain the life and vitality of a community’s health,
safety and social stability by performing such service as law enforcement, fire prevention.
Personal and facility security, disaster preparedness and emergency medical assistance.

RA 5487, as amended- an act governing the organization and management of private security
agencies, company guards forces and government security forces.

Recover/ resumption- plans and processes to bring an organization out of a crisis that resulted in
an interruption. It should include damage and impact assessments, priotization of critical
processes to be resumed and to return to normal operations to a new condition.
Risk- probability of an event to happen that will lead to losses.

Risk Analysis- The process of identifying assets in need of protection and determine the
probability of risk and its potential impact.

Risk Assessment- the process of detailed, rational and orderly approach and comprehensive
solution to problem identification and probability determination.

Risk Management- the process to mitigate, reduce or minimize potential risk and impact to the
business.

Safety Audit- process to determine the adequacy, compliance, and effectiveness of environmental
safety and health standard in a certain workplace.

Search Warrant- order in writing issued in the name of the people of the Philippines, signed by a
judge or an officer authorized by law, and directed to a peace officer, commanding him to search
personal property and bring it before the court.

Security Guard- any person who offers personal service to watch or secure an asset and is duly
licensed by the regulating office.

Security Investigation- the process of determining circumstances and essential elements of an


unusual event that caused harm, loss or damage to person or properties.

Security vulnerability- the process of identifying vulnerable areas on how establishment may
experience attack or intrusion.

SMART- Specific, Measurable, Attainable, Realistic and Time Bound.

Surveillance Operation- is a type of investigative procedure to monitor subjects whereabouts,


activities and endeavors.

SWOT- Strength, Weaknesses, Opportunities and Threats Analysis.

Threat- A passive inimical act that brings insecure condition and commonly introduce by a
person.

Vulnerability- factor that secure condition on how open is an establishment to an intrusion,


attack or injury.

Warrant of Arrest- is an order in writing, issued in the name of the people of the Philippines,
signed by a judges or an officer, authorized by law, and directed to a peace officer, commanding
him to arrest a person designated and bring him before the bar of justice.

Exercise 1a: Multiple choices. Encircle the letter of the correct answer.

1. Specific place where the guards on duty are stationed and detailed

a. Area of Responsibility
b. Assault
c. Arrest

2. These are plans and processes that will allow an org to avoid, preclude, or limit the impact of
a crisis occurring.
a. Prevention
b. Risk assessment
c. Risk Management

3. Is an order in writing, issued in the name of the people of the Philippines, signed by a judges
or an officer, authorized by law, and directed to a peace officer, commanding him to arrest a
person designated and bring him before the bar of justice

a. Warrant of arrest
b. Search Warrant
c. SWOT

4. The process of identifying vulnerable areas on how establishment may experience attack or
intrusion

a. Security Vulnerability
b. Surveillance Operation
c. Vulnerability

5. Order in writing issued in the name of the people of the Philippines, signed by a judge or an
officer authorized by law, and directed to a peace officer, commanding him to search personal
property and bring it before the court

a. Warrant of Arrest
b. Search Warrant
c. Security Investigation

6. An act governing the organization and management of private security agencies, company
guards forces and government security forces

a. RA 5487
b. RA 8754
c. RA 5478

7. The process of identifying assets in need of protection and determine the probability of risk
and its potential impact

a. Risk Analysis
b. Risk Assessment
c. Risk

8. The process of detailed, rational and orderly approach and comprehensive solution to problem
identification and probability determination

a. Risk Analysis
b. Risk Assessment
c. Risk

9. Support mechanism that sustain the life and vitality of a community’s health, safety and social
stability by performing such service as law enforcement, fire prevention. Personal and facility
security, disaster preparedness and emergency medical assistance
a. Public Safety
b. Public Relation
c. All of the above

10. These are plans and processes that will allow an org to avoid, preclude, or limit the impact
of a crisis occurring

a. Prevention
b. Physical Security
c. Physical

Exercise 1b: Self-help Task

Rubrics:

Content = 5 points

Clarity = 3 points

Grammar = 2 points

Give at least 5 important terminologies in the field of security and explain each briefly (own
idea).

1.____________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
___________________________________

2.____________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
___________________________________

3.____________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
__________________________________

4.____________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
__________________________________
5.____________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
_________________________________
You are braver than you believe,

Stronger than you seem, and smarter than


you think.

Keep on believing! We can do this!

You might also like