0% found this document useful (0 votes)
97 views42 pages

Cri 215 Sim Industrial Security Management

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 42

UNIVERSITY OF MINDANAO

Tagum College

Department of Criminal Justice Education


Criminology Program

Physically Distanced but Academically Engaged

Self-Instructional Manual (SIM) for Self-Directed Learning (SDL)

Course/Subject: CRI 215 Introduction to Industrial Security Concepts

Name of Teacher: Maria Rosalie R. Maglana, RCrim

THIS SIM/SDL MANUAL IS A DRAFT VERSION ONLY; NOT FOR


REPRODUCTION AND DISTRIBUTION OUTSIDE OF ITS INTENDED
USE. THIS IS INTENDED ONLY FOR THE USE OF THE STUDENTS
WHO ARE OFFICIALLY ENROLLED IN THE COURSE/SUBJECT.
EXPECT REVISIONS OF THE MANUAL.
Course Outline: CRI 215 – Industrial Security Management

Course Coordinator: Maria Rosalie R. Maglana, RCrim


Email: [email protected]
Student Consultation: By appointment
Mobile: 0920-660-2320
Effectivity Date: August 2020
Mode of Delivery: Distance Education Delivery
Time Frame: 54 Hours
Student Workload: Expected Self-Directed Learning
Requisites: None
Credit: 3
Attendance Requirements: A minimum of 100% attendance is required at all
scheduled sessions.

Course Outline Policy

Areas of Concern Details


Contact and Non-contact Hours This 3-unit course self-instructional manual is designed
for distance learning mode of instructional delivery.
The expected number of hours will be 54 including the
supplemented traditional contact and/or social media
platform (if necessary).

Assessment Task Submission Submission of assessment tasks shall be on 3 rd, 5th, 7th
and 9th week of the term. The assessment paper shall
be attached with a cover page indicating the title of the
assessment task (if the task is performance), the
name of the course coordinator, date of submission and
name of the student. The document should be emailed
to the course coordinator. It is also expected that you
already paid your tuition and other fees before the
submission of the assessment task.

If the assessment task is done in real time through the


features in the Quipper, the schedule shall be
arranged ahead of time by the course coordinator.

2
Since this course is included in the licensure examination
for criminologist, you will be required to take the
Multiple- Choice Question exam inside the University.
This should be scheduled ahead of time by your course
coordinator. This is non-negotiable for all licensure-
based programs.
Turnitin Submission To ensure honesty and authenticity, all assessment
(if necessary) tasks are required to be submitted through Turnitin
with a maximum similarity index of 30% allowed. This
means that if your paper goes beyond 30%, the
students will either opt to redo her/his paper or explain
in writing addressed to the course coordinator the
reasons for the similarity. In addition, if the paper has
reached more than 30% similarity index, the student
may be called for a disciplinary action in accordance
with the University’s OPM on Intellectual and Academic
Honesty.

Please note that academic dishonesty such as cheating


and commissioning other students or people to
complete the task for you have severe punishments
(reprimand, warning, expulsion).
Penalties for Late The score for an assessment item submitted after the
Assignments/Assessments designated time on the due date, without an approved
extension of time, will be reduced by 5% of the possible
maximum score for that assessment item for each day
or part day that the assessment item is late.

However, if the late submission of assessment paper


has a valid reason, a letter of explanation should be
submitted and approved by the course coordinator. If
necessary, you will also be required to present/attach
evidences.
Return of Assignments/ Assessment tasks will be returned to you two (2) weeks
Assessments after the submission. This will be returned by email or
via Quipper portal.

For group assessment tasks, the course coordinator will


require some or few of the students for online or virtual
sessions to ask clarificatory questions to validate the
originality of the assessment task submitted and to
ensure that all the group members are involved.
Assignment Resubmission You should request in writing addressed to the course
coordinator his/her intention to resubmit an assessment
task. The resubmission is premised on the student’s
failure to comply with the similarity index and other
reasonable grounds such as academic literacy

3
standards or other reasonable circumstances e.g.
illness, accidents financial constraints.
Re-marking of Assessment You should request in writing addressed to the program
Papers and Appeal coordinator your intention to appeal or contest the score
given to an assessment task. The letter should explicitly
explain the reasons/points to contest the grade. The
program coordinator shall communicate with the
students on the approval and disapproval of the
request.

If disapproved by the course coordinator, you can


elevate your case to the program head or the dean with
the original letter of request. The final decision will
come from the dean of the college.
Grading System All culled from Quipper sessions and traditional
contact
Course discussions/exercises – 30%
1st formative assessment – 10%
2nd formative assessment – 10%
3rd formative assessment – 10%

All culled from on-campus/onsite sessions (TBA):


Final exam – 40%

Submission of the final grades shall follow the usual


University system and procedures.

Preferred Referencing Style Depends on the discipline; if uncertain or inadequate,


use the general practice of the APA 6th Edition.

Student Communication You are required to create an email account which is a


requirement to access the Quipper portal. Then, the
course coordinator shall enroll the students to have
access to the materials and resources of the course. All
communication formats: chat, submission of
assessment tasks, requests etc. shall be through the
portal and other university recognized platforms.

You can also meet the course coordinator in person


through the scheduled face to face sessions to raise
your issues and concerns.

For students who have not created their student email,


please contact the course coordinator or program head.

4
Contact Details of the Dean Gina Fe G. Israel, EdD
Email:[email protected]
Phone: 0915 832 5092 / 0909 994 2314
Contact Details of the Program Jun Mark A. Asis, MSCrim
Head Email: [email protected]
Phone: 0938 493 1993
Students with Special Needs Students with special needs shall communicate with the
course coordinator about the nature of his or her
special needs. Depending on the nature of the need,
the course coordinator with the approval of the program
coordinator may provide alternative assessment tasks
or extension of the deadline of submission of
assessment tasks. However, the alternative
assessment tasks should still be in the service of
achieving the desired course learning outcomes.
Help Desk Contact Globe: 0917 466 709
Smart: 09308920005
Library Contact [email protected]
0927 395 1639

Course Information – see/download course syllabus in the Black Board LMS

CC’s Voice: Hello there! Good day! Welcome to this course CRI 215: Industrial Security
Management. As a criminology student it is imperative to gain literacy regarding
security management as it is considered as an important knowledge that should
be learned by future security providers who are regarded as a closed partner of
our law enforcement agencies in combating criminality in our country. An old
adage states that, “Security in every organization is everybody’s business.” Thus,
as a responsible citizen and a Criminology student this course will help you in
understanding the fields of security business and its role in the prevention and
reduction of criminal acts committed against privately-owned and government-
owned enterprises and agencies. This would be of great help considering that the
bulk of security providers are Criminology graduates. Studying this course maybe
challenging but it will equip you with essential knowledge that will help you not
just in practicing your profession but of everyday life. Thus, enjoy while learning
this course.

CO As a student of this course you are expected to explain the general concept of
industrial security management; the types and major divisions of security applied in
modern industries and enterprises; the methods of conducting security survey and
security inspection as well as security investigation; the qualifications, attributes,
functions of security personnel; memorize the different security agencies
authorized by law.

Let us begin!
5
Big Picture

Week 1-3: Unit Learning Outcomes (ULO): At the end of the unit, you are expected to

a. Understand the general concept of the need for security, the types of security applied
in modern industries, the basic principles of Industrial security management, and the
major divisions of security.
b. Explain the various types of physical security, barriers that are placed between the
potential intruder and the matter to be protected.
c. Comprehend the methods of conducting survey and security inspection.

Big Picture in Focus: ULOa. Understand the general concept of


the need for security, the types of security applied in modern
industries, the basic principles of Industrial security
management, and the major divisions of security.

Metalanguage
Below are the essential terms that you are going to encounter in the pursuit of ULOb.

1. Cryptography - is associated with the process of converting ordinary plain text into
unintelligible text and vice-versa. It is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can read and process it.
2. Law Enforcement Agency – A government agency responsible for enforcing the law.
3. Security Agency - A private security company is a business corporation, which provides
armed and unarmed security services and expertise to private and public clients.

Essential Knowledge
It is innate to human beings to seek security and protection from dangers for them to
survive and continue existing free from anything that may cause damage to their properties or
may result to injury or death. In the ancient world, humans learned to unite themselves into
clans, then into tribes, and later into bigger communities. As they organized themselves, their
primary reason is security of their life, their livelihoods and security of their existence.

1. Security
It is defined as the state or quality of being secured, freedom from fear or danger,
assurance or certainty. To secure is to make safe or be protected.
It is any measures taken to keep an individual or group from dangers or hazards that
may cause harm, injury, loss of life, and or loss or damage of property.

2. Necessity of Security. Security measures are necessary for the attainment of goals
and objectives of a certain individual, group or organization. It follows that when an
individual or organization is exposed to hazards, their productivity is adversely
affected. We have this so called internal and external threat. Internal threats include
communist aggressions, Muslim separatists, extreme rightists such as the threat of
military takeover of the government and the restless mass actions like strikes and
protests by civil organizations. External threats include the country’s incapability to
defend itself in case of war. All of these threats if not deterred or reduced, will bring
political instability which surely hampers the economy of the country.

3. The Role of PNP and other Government Law Enforcement Agencies. Industrial
security is indispensable part of the Philippine economy because it serves as a
partner of Law Enforcement agencies in the country such as PNP.

 PNP takes responsibilities in the supervision, control and training and


operations of security agencies and in the issuance of license to operate and
the license to practice the security profession.
 Assist security guards and security agencies in the performance of their
security functions such as accepting and processing crime reports submitted
by the private security agency.

4. Hazards – refer to conditions that may cause damage to property, injury, or loss of
life. It is also defined as “exposure to the chance of loss or injury”. Hazards are
caused either by nature or by man himself. The role of security is to prevent or stop
these hazards in causing unintentional or intentional damage to property, injury or
loss of life.

5. RA 5487 – Philippine legislative body enacted this Act governing the organization and
management of private security agency, company guard forces and government
security forces.

6. Fundamentals of Industrial Security Management

6.1 Industry – “earnest or constant application to work or business”, “special branch


of productive work, or the capital of workers employed in it”
6.2 Security – the state or quality of being secured, freedom from fear or danger,
assurance, or certainty.
6.3 Industrial security – security measures applied to business industries; or the
business of providing security and protection to private individuals, business
enterprises, or government and non-government industries.
6.4 Industrial security management – the skillful handling of the security and safety
measures of business enterprises and industrial establishments.

7. Types of Security. Various types of security are applied depending on the installation
and the security needs of the installation.
7.1 Physical Security – the broadest branch of security which is concerned with the
physical measures adopted to prevent unauthorized access to equipment,
facilities, materials, and documents, and to safeguard them against espionage,
sabotage, damage and theft.
7.2 Communication Security – it is the protection resulting from the application of
various measures that prevent or delay unauthorized person in gaining
information through the communication system. This includes:

a 62
7.2a Transmission security – a component of communications security that
results from all measures designed to protect transmission from the interception,
traffic analysis and imitative deception.
7.2b Cryptographic Security – Result from the provisions of technically sound
crypto-systems and their proper use.
7.2c Physical Security – providing of safeguards to equipment and materials
from access by unauthorized persons.

7.3 Hotel Security – it refers to the protection of assets, guests, personal effects and
other properties in hotels, inns and other similar establishments.

7.4 Bank Security - a specialized type of physical security protecting the asstes,
personnel, and operation of a bank, with special emphasis on the precaution and
measures to safeguard the cash and assets while the storage, in transit, and during
transaction.

7.5 Document Security – it is the physical security involving the protection of


documents and classified papers from loss access by unauthorized persons,
damage, theft and compromise through disclosure.

7.6 Personal Security – protection of personnel especially ranking officials from any
harm, kidnap and other acts. Very Important people(VIP) security type is a type of
personal security.

7.7 Crises Security – This is a part of VIP security involved in hostage and kidnapping
of VIPs.

7.8 Industrial Security – a type of security applied to business groups engaged in


industries like manufacturing, assembling research and development, processing,
warehousing and even agriculture. It is a form of physical security involving industrial
plants and business enterprises where the personnel, processes, properties and
operations are safeguards.

7.9 Operational security – a type of security that deals with the protection of processes,
formula, patents and other industrial and manufacturing activities from espionage,
infiltration, loss, compromise, or photocopying.

7.10 Other special Types of Security:


7.10.1 Air Cargo Security – to minimize, if not prevent, losses of cargo during in
transit, storage or transfer.
7.10.2 School Security – this is applied in response to the increase of violent crimes
committed against students and school personnel and school properties.
7.10.3 Supermarket Security – this is applied in response to the mushrooming of
bazaars, malls and the like.
7.10.4 Personnel Security – involved in the background checks of individuals
commensurate with the security requirements of their work. This also includes
measures designed to protect employees of an organization or business
establishment.

8. Major Divisions of Industrial Security


8.1 Physical Security – broadest type of security. It can be defined as those measures
a 62
taken to prevent physical access or entry to an installation or area by unauthorized
personnel.
8.2 Personnel security – this division of security is applied to check the background of
persons as well as the protection of company personnel against potential harm acts
or conditions.
8.3 Document and Information Security – includes every measure designed to
safeguard company documents from unintentional or intentional harmful acts or
against unauthorized disclosure of the information contained therein.
.

Self-Help: You can also refer to the sources below to help you further
understand the lesson

Ajero J.M. (2014). Industrial and Corporate Security Management. Wiseman’s Books Trading.
Quezon City Philippines.

Let’s Check

Let us try the following activities to check your understanding in this unit.

Activity 1. Multiple Choice. Please encircle the letter under each item which you think is the correct
answer.

1. A type of security that deals with the protection of processes, formula, patents and other
industrial and manufacturing activities from espionage, infiltration, loss, compromise, or
photocopying.
a. Document security
b. Strategic security
c. Tactical security
d. Operational security

2. This includes the background checks of individuals commensurate with the security
requirements of their work and measures designed to protect employees of an organization or
business establishment.
a. Employee security
b. Personal security
c. Air cargo security
d. Personnel security

3. In the field of industrial security, different types of security are applied depending on the
a. Financial capabilities of the installation
b. Time and season
c. Installation and security needs
d. People and environment

a 62
4. The skillful handling of the security and safety measures of business enterprises and industrial
establishments.
a. Industrial security management
b. Security operations
c. Security enterprises
d. Security administration

5. What is the broadest branch of security which is concerned with the physical measures
adopted to prevent unauthorized access to equipment, facilities, materials and documents, and
to safeguard them against espionage, sabotage, damage and theft.
a. VIP security
b. Physical security
c. Industrial security
d. Communication security

6. The act governing the organization and management of private security agency, company
guard forces and government security forces is known as
a. RA 8551
b. RA 8553
c. RA 5487
d. RA 6975

7. Which of these does not describe security?


a. State or feeling of safety
b. Freedom from worry about possible loss
c. Security hazards
d. Something giving assurance

8. The state or quality of being secured or freedom from fear on danger is referred to as
a. liberty
b. security
c. dangerless
d. security

9. These are conditions or acts that may cause damage to property, injury, or loss of life.
a. danger
b. risks
c. warning
d. hazards

10. All are three major divisions of security, except:


a. Personnel security
b. Communication security
c. Physical security
d. Document and information security

Let’s Analyze
Let us try the following activities to know how deep your understanding about the topics

a 62
of this unit.

1. How important is security?


__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

2. Make a scenario affecting the security of our country in terms of Internal Threat.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
3. Make a scenario affecting the security of our country in terms of External Threat.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
a 62
In a Nutshell

In this part you are going to jot down what you have learned in this unit. The said
statement of yours could be in a form of concluding statements, arguments, or perspective you
have drawn from this lesson. I have indicated my arguments or lessons learned.

1. To achieve the objectives of effective security management, the company concerned and the
security personnel assigned should work hand in hand.
2. Security in every organization is everybody’s business. This means that the avoidance of loss
and damage to properties as well as the prevention of injury or loss of life because of
hazards is not possible without the active support of all individuals within an organization.

Now it’s your turn!


3.

4.

Q&A List
In this section you are going to list what boggles you in this unit. You may indicate your
questions but noting you have to indicate the answers after your question is being raised and
clarified. You can write your questions below.

Questions/Issues Answers
1.

2.

3.

4.

5.

a 62
Keywords Index
Air Cargo Security Industrial Security Management
Bank Security Internal Threats
Communication Security Law Enforcement Agency
Crises Security Operational Security
Cryptographic Security Personal Security
Cryptography Personnel Security
Document and Information Security Physical Security
Document Security School Security
External Threats Security
Hazards Security Agency
Hotel Security Supermarket Security
Industry Transmission Security
Industrial Security

Big Picture in Focus: ULObc. Explain the various types of


physical security, barriers that are placed between the
potential intruder and the matter to be protected and
comprehend the methods of conducting survey and security
inspection.

Metalanguage
The following are terms to be remembered as we go through in studying this unit. Please
refer to these definitions as supplement in case you will encounter difficulty in understanding the
basic concepts of special crime investigation.

1. Intensity - The unit for the quantity of light flowing from a source in any one second
(the luminous power, or luminous flux) is called the lumen.
2. Luminous - relating to light as it is perceived by the eye, rather than in terms of its
actual energy.
3. Portable - able to be easily carried or moved, especially because being of a lighter
and smaller version than usual.

Essential Knowledge
Physical security is the protection of personnel hardware, programs, networks, and data
from physical circumstances and events that could cause serious losses or damage to

a 62
corporation, agency, or institution. This includes protection from fire, natural disasters, burglary,
theft, vandalism, and terrorism.
1. PHYSICAL SECURITY: Principles of Physical Security.
In every establishment, physical measures are needed to deny unauthorized access
or intrusion because of the following:
1.1 Enemy agents must access – acquisition of information is the ultimate results,
and the means and form in which the information is obtained.
1.2 There is no impenetrable barrier – for the unfriendly government or
organization, they are willing to spend enough time, money and material in
passing barriers. So physical security attempts to build defense by using a certain
barrier.
1.3 Defense in depth – barrier after barrier. In order that barrier could prevent
unauthorized access and serve its purpose well, there should be an integration of
all barriers adopted in the installation.
1.4 Surreptitious versus Non-surreptitious entry – the possibility of surreptitious
entry is the greatest hazard from the standpoint of counterintelligence security
because it is actually difficult to determine that the formation has been
compromised. Surreptitious entry means not observable while non-surreptitious
entry is observable. Observable or not, intruders usually find the right place and
right opportunity to gain access. Physical security then is needed to detect or deny
unauthorized entries.
1.5 Each installation is different – since each installation is different, each will have
different problems to overcome.

2. Barriers. It refers to any physical structure whether natural or man-made capable of


restricting, deterring, delaying or preventing illegal or unauthorized access to an
installation.

3. Two general types of Physical Security Barriers

3.1 Natural Barriers – these are offered by nature which could obstruct or delay the
passage way of potential intruders. These also refer to natural structures that
serve as deterrents or obstructions to intruders such as high cliff, desert or bodies
of water.
3.2 Man-made Barriers – these are structural constructions like fences, walls, floors
grills, bars, roadblocks or other physical means to deter or impede penetration.

4. Specific Types of Physical Security Barriers


4.1 Natural barriers – cliffs, canyons, seas, deserts, marshes, mountains or terrain
difficult to traverse.
4.2 Structural barriers – features constructed by man regardless of their original
intent that tends to delay the intruder. Examples of these are: walls, door, ceilings
and fences.
4.3 Human barriers include guards, charges of quarters, office and shop workers,
who stand between the intruder and the matter to be protected.
4.4 Animal barrier – usually shepherd dogs trained for and used as guards.
4.5 Energy barriers – usually electrical and electronic devices that could assist
security personnel in detecting intrusions. Examples are lighting and anti-intrusion
devices.

5. Levels of Physical Security. It also varies depending on the type and location and
a 62
facility, and other factors needing security. The levels of physical security could be
any of the following.
5.1 Minimum security – a system designed to impede unauthorized external activity
such as simple intrusion to armed attack.
5.2 Low level security – a system designed to impede and detect some
unauthorized external activity such as on small retail store, storage warehouses.
5.3 Medium security – designed to impede, detect and asses most external activity
and some unauthorized internal activity that range from simple shoplifting to
conspiracy to commit sabotage. This include the
a. Use of advance intrusion alarm system
b. Establishment of perimeter and perimeter barriers
c. Use of an unarmed guard
5.4 High level security – designed to impede, detect and assess most unauthorized
external and internal activities of certain prisons, defense contractors,
pharmaceutical companies and sophisticated electronic manufacturers.
5.5 Maximum security – the application of the following:
a. Sophisticated alarm system
b. On-site response force
Ex. Water sprinkler, smoke detector

6. Concept of Perimeter Barriers.


Perimeter barrier is a medium of structure which defines the physical limits of an
installations or area to restrict or impede access thereto. It is any physical barrier
used to supplement the protection of an inside or outside perimeter.

7. Line of Physical Defense. Security managers and security personnel also consider
the various lines of defense that could help delay or stop intruders. These are:

7.1 First line of defense- includes all perimeter barriers.


7.2 Second line of defense- includes the building exterior
7.3 Third line of defense- those internal control measures.

8. Perimeter Barrier Openings


8.1 Gates and doors- should also be guarded or locked as much as possible.
8.2 Windows and similar openings- should be guarded or grills should be installed
so as not to be used by intruders.
8.3 Sidewalk elevators- are elevated parts of the land near the perimeter barrier that
provides access to areas within the perimeter and should be locked and guarded.
8.4 Utilities openings- such as sewers, air intakes, exhaust tunnel which penetrate
the barriers and which have cross-sectioned area of 96 square or more should be
protected by bars, grills etc.
8.5 Clear zone- is an unobstructed area maintained on both sides of the perimeter
barrier.
8.6 A clear zone of 20 ft. or more is desirable between the barrier and extension
structures and natural covers which may provide concealment or assistance to a
person seeking unauthorized entry.
a. A clear zone of 20 ft. or more should exist between the perimeter barriers and
exterior structures, parking areas and natural or man-made features.
b. A clear zone of 50 ft. or more should exist between the perimeter barrier and
structures within the protected areas except when building wall constitute part
of the perimeter barrier.
a 62
9. Types of Perimeter Barrier
9.1 Fences - are independent structures designed to control physical and visual
access between outside areas.
a. Solid Fence - is made of opaque material in such a way that visual access
through the fence structure is denied.

b. Advantage of Solid Fence


I. Denies visual access of the installation to the intruder.
II. Denies the intruder the opportunity to become familiar with the
personnel, activities and the schedule of the movement of the guards.
c. Disadvantage of Solid Fence
I. Prevents the guards from observing the area around the installation.
II. Creates shadow which may be used by the intruders fro cover and
concealment.

d. Full-view Fence- is constructed in such a manner that visual access is


permitted such as wire fence, through the fence structure.

e. Advantage of Full-view Fence


I. Guards are able to keep the area surrounding the installation under
a 62
observation.
II. Does not create any shadow

f. Disadvantage of Full-view Fence


I. Allows the visual access to the installation.
II. Allows the intruder to get familiar with the movements and the time
schedule of the guard patrols.

g. Wire fence- is a type of fence made of chain-link barbed wire concertina


design with small opening not larger than 2 square inches and made of
number 9 gauge wires or heavier, twisted and barbed salvage at top and
bottom.

h. Specifications for using Chain-link Fences


I. It must be constructed of 7 feet material excluding top guard.
II. It must be 9 gauge or heavier.
III. Mesh openings are not to be larger than 2 inches per side.
IV. It should be twisted and barbed salvage at top bottom.
V. It should be security fastened to rigid metal or reinforced concrete.
VI. It must reach below surface enough on soft grounds to compensate for
shifting solid or sand.
VII. It must reach within 2 inches of hard ground or paving.

a 62
i. Specifications for using Barbed wire
I. Standard barbed wire is twisted, double-stand 12 gauge wire with 4
point barbs spaced on equal distance apart.
II. Barbed wire fencing must be firmly affixed to posts high excluding top
guard.
III. Barbed wire fencing should not be less than 7 ft. high excluding top
guard.
IV. The distance between stands will not exceed 6 inches and midway
between parts.

9.2 Building Walls - includes walls, floor, roofs or their combinations serve also as
barriers and they should be of such constructions to provide uniform protection
just like wire-fencing.
9.3 Bodies of Water- like river, cataract and etc

a 62
10. Additional Protective Measures

1. Top guard- is an
additional overhang of
barbed wire placed on
vertical perimeter fences
upward and outward with
a 45-degree angle with
three to four strands of
barbed wire spaced 6-
inches apart.

2. Guard control station-


are normally provided at
main perimeter entrance
to secure areas located
out of doors and manned
by guards on a full-time
basis.

3. Towers or Guard
Towers- are house-like
structures above the
perimeter barriers. It gives
a psychological effect to
the violators.

a 62
4. Sign and Notices or
Control Sign- should be
erected where necessary
in the management of
unauthorized ingress and
preclude accidental entry.
It includes entry, ID
prohibited and exclusive
areas sign.

11. Perimeter Guards. They also augment the existing perimeter security or perimeter
barriers of a certain establishment.
11.1 Fixed post - security guards are assigned in a particular place of the compound
to guard and watch the area surrounding.
11.2 Patrol (Roving)- in this system the security guard is required to walk and go
around regularly around the company premises.

12. Perimeter Guard Employment


12.1 Mutually Supporting Fixed Post
- the most secured system of perimeter guard employment
- each guard should be visible to each adjacent guard
- this type of employment is expensive
12.2 Employing guards as patrols
- less expensive system
- security value is reduced
- should traverse an irregular route, providing different intervals between visual
and actual contact with any given point on the fence

13. Double Checking guards could be done by:


13.1 Personal Inspection- security supervisors conduct on-the-spot and random
inspection of posted guards.
13.2 Artificial Inspection- this is done through Bundy clocks strategically installed
around the perimeter; and reporting through handled two-way radio or similar
communication gadget.

14. Security Lightings or Protective Lightings


Protective lighting provides a means of continuing illumination during hours of
darkness, a degree of protection that is maintained during daylight hours. It is an
essential element of an integrated physical security program.
15. Characteristics of Protective Lightings. Using protective lighting is expensive and
is an additional cost to the company or establishment. Therefore, consider the
following in planning for protective lighting systems.
15.1 Protective lighting usually requires less intensity than working light, except for
identification and inspection at authorized portals and in emergencies.
15.2 Lightings needed may vary because each area of an installation or facility
presents its particular problem based on physical layout, terrain, atmospheric and
climatic conditions and the protective requirements.
15.3 The data available from the manufacturers of lighting equipment which will assist
in designing a lighting system.

a 62
16. Protective Lightings Significance to Security Forces
When properly employed, protective lightings offers the following:
16.1 Reduction of the need for security forces
16.2 Personal protection for forces by reducing the advantages of concealment and
surprise for a determined intruder.
16.3 Relieved security forces could be used to better advantage elsewhere.

17. Types of Security Lightings


17.1 Stationary Luminary (Continuous) – most common type consisting of services
of fixed luminous to flood a given area continuously with overlap. It may either be:
17.1a Glare-projection type – the intensity is focused to the intruder while the
observer or guard remains in the comparative darkness. The lighting is
toward the approach of an entrance to an installation. It is a strong
deterrent to a potential intruder because it makes it difficult for him to see
the inside of the area. It also protects the guard by keeping him in
comparative darkness and enabling him to observe intruders at
considerable distance beyond the perimeter.
17.1b Controlled lighting – the width of the lighted-atop can be controlled and
adjusted to suit the security needs. The lighting is focused on a pile of
items rather than on the background.
17.2 Stand-by Lighting – similar to continuous lighting but in turned on manually or
by special device or other automatic means when there is suspicion of entry.
17.3 Movable lighting – consists of stationary or portable, manually operated search
lights which may be lighted continuously during hours of darkness or only as
needed and usually supplementary to either of the first 2 types.
17.4 Emergency lighting – a stand-by-lighting which can be utilized in the event of
electrical failure, either due to local equipment or commercial power failure.

18. Types of Security Lighting Equipment


18.1 Floodlights are used for outdoor security lighting including the illumination of
boundaries, fences, and buildings.
18.2 Street lights produce diffused light rather than directional beam. They are widely
used in parking area.
18.3 Searchlights are incandescent lights that provide a type of crime-related lighting
system.

19. Lighting Applications/Lighting Systems


19.1 Fenced Perimeter Lighting – is used to illuminate the fence itself and the area
beyond it (“detection zone”). Its objective is to reveal an intruder’s approach and
produce glare towards him, thus reducing his ability to see in the site. However, it
can be difficult to apply because it may create nuisance or hazards.
19.2 Area lighting – is used in a building face perimeters consist of faces of buildings
on or within 20 ft. of the property or area line to be protected and where the public
may approach the building.
19.3 Flood lighting – is used to cast a strong light on the walls of buildings so that
intruders are visible either in silhouette or by shadows which they cast.
19.4 Gate House Lighting – is installed on active entrances for pedestrians and
vehicles to facilitate complete inspection of passengers, cars, trucks and freight
cars as well as their contents and passengers.
19.5 Topping-up Lighting – is used to illuminate dark areas not adequately lit by
a 62
area or flood lighting. Areas and structures within the installation property lines
consist of yards, storage spaces, large open working areas, piers, and other
sensitive areas and structures.

20. Protective Alarms


Another safeguard used to assist security to complement if not to supplement
physical security is an array of alarms. These alarms of various types and cost can be
installed indoors or outdoors. Basically, alarm systems are designed to alert security
personnel to consummated or attempted intrusion into an area, building or compound.
Alarms are not meant to prevent criminal acts. Each type of alarm is activated in the
event that an intruder tampers the circuitry, a beam or radiated waves. In short
intrusion, alarms can be electrical, mechanical or electronic.
20.1 Alarm (signal) – warning to imminent danger.
- Security device: a security device fitted to property,
especially a house or car, to make a warning sound if a
break-in or theft is attempted
- Sound of security or warning device: the sound made by a
security or warning device.
20.2 Protective Alarm – it is an aural or visual signal given by the enunciator to
security guard when intruder actuates device in a protected area.
20.3 Enunciator – a visual or audible-signaling device, which initiates condition of
associated circuits.

21. Operation and Types of Intrusion Alarm Systems. Alarms work in various types
and they emit signals through a variety of mechanisms. With their methods of
operations, alarms could be classified into the following:
21.1 Breaking an Electrical Circuit through a Metallic Foil or Wire – All possible
point of entry can be wired by using electrically charge strips of tinfoil wire. Any
actions that will move the foil or wire will break the circuit and activate the alarm.
Metallic foil or wire is used in window or glass surfaces.
21.2 Interruption of Light Beam of Photo-Cell through a Photoelectric or Electric
Eye Device – an invisible light beam is transmitted at a frequency of several
thousand per second to a special receiver. An infrared filter over the light source
makes the beam invisible to intruders. It is connected by a wire to control station
and when an intruder crosses the beam he makes contact with the photo
electronic coil which thus activates the alarm.
21.2a Disadvantage of photo-cell:
I. Can be bypassed by crawling underneath or climbing over it
II. It is not fit for external or outdoor installations because of fog, smoke, dust,
rain and other vision obstructions when devise enough can interrupt the
light and trigger false alarms
21.3 Detecting Sound and Vibration through an Audio Detection Device –
supersensitive microphone speaker sensors are installed in walls; floors and
ceilings of the protected area of any sound caused by attempted forced entry
inspected by the sensor. This can be effectively used in enclosed areas, vaults,
safes, file rooms, warehouse and similar enclosures.
21.3a Disadvantage:
I. Limited application to enclosed vaults, and depositories where minimum
external sound exists.
21.4 Vibration Detection Device – the vibration sensitive sensor is attached to walls,
ceilings or floors of the protected areas. The sensor detects any vibration caused
a 62
by attempted forced entry.
21.5 Space and Motion Detectors – Constant sound waves in a cubicle disturbed by
an object will cause change of frequency and wave motion thereby causing an
alarm to trigger.
21.6 Penetration of an Electron or Electromagnetic Fence – it is an electronic
fence consisting of 3 to 5 strands of wire spaced from 9 to 24 inches above one
another which serves as antenna, a monitor panel, and an electric circuitry. When
power is put on, an Electromagnetic field is set among the wires from the top to
the ground. An intruder about two feet from this field will trigger the alarm.
21.7 Foot Rail Activator – placing the front of their foot to engage the activation bar
placed on the floor in such a position that tellers may activate the alarm. Foot rails
do not acquire obvious use of teller’s hand and their hands may be kept in full
view of the robbers for reason of safety. Foot rail can be activated safely, it is
frequently found in the banks where tellers normally operate while standing up.
21.8 Bill traps – Bill traps or currency activation devices are usually placed in the
teller’s cash drawer and connected to the alarm system using a wire connector.
When currency is removed from the devices, the alarm is activated. The
advantage of these devices is that the robbers frequently remove the currency
and activate the alarm. This is particularly helpful when the employees are forced
immediately to leave their station without having an opportunity to activate the
alarm safely.
21.9 Knee or Thigh Button – installed inside the desk or teller station so they can be
activated by knee or thigh pressure. They are commonly found in location where
personnel usually perform their duties from a seated position.
21.10 Foot Button – like the foot rail permit alarm activation safely while both
hands remain clear in view of the robber.
21.11 Double Squeeze Button – pressure is required on both side of the
device and therefore the probability of accidental alarm is reduced.

22. Types of Alarm Detection System


22.1 Central Station System – a type of protective alarm system where the central
station is located outside the installation. It can be located in an agency and the
installation is one of the subscribers. A system in which the alarm signal is relayed
to remote panel located at the facilities of private owned protection Service
Company manned by its personnel. Alarm signal is transmitted over telephone
lines to the central station. Here, operator on duty is 24 hours to supervise, record,
and maintain alarms. Several separate compounds tie their alarm system to a
central station so that in case of need, the central station calls for assistance to
the police, hospital, fire department or with other government assistance units.
22.2 Propriety System – this function is the same way as the central system except
that it is owned and leased by the subscriber, and operated and located in the
facility. Response to all alarms is by facility’s own security or fire personnel. Since
this system is monitored locally, the response time to an alarm is considerably
reduced.
22.3 Local Alarm System – consists of rigging up a visual or audible alarm near the
object to be protected, a bell or light indicates an attempted or successful
intrusion. In case of alarm, response will be made by the local guards and other
personnel with sight or hearing. Its success relies on someone hearing or seeing
and calling the responsible authorities. It also serves to notify burglars that they
have been detected. In this case, the sensor activates the circuit, which in turn
activates a horn or siren or even flashing located in the immediate vicinity of the
a 62
alarmed area.
22.4 Auxiliary System – in this system installation circuits are led into local police or
fire department by leased telephone lines usually by special arrangements. The
dual responsibility for circuits and the high incidence of false alarms have made
this system unpopular with public fire and police personnel.
22.5 Local Alarm-by-chance System – this is local alarm system in which a bell or
siren is sounded with no predictable response. These systems are used in
residence or small retail establishments, which cannot afford a respond system.
The hope is that a neighbor or passing will reach to the alarm and call for police
assistance, but such a call is purely a matter of chance.
22.6 Dial Alarm System – this system is set to dial a predestined number when the
alarm is activated. The number selected might be the police or the subscriber’s
home number, or both. When the phone is answered, recording states that an
intrusion is in progress at the location so alarmed. This system is relatively
inexpensive to install and operate, but since it is dependent on general phone
circuits, it could fail if line were busy or if the phone connection were cut.

23. Fire Alarms - devices installed to help detect fires or detect anything that causes fire
such as smoke or unusual rising of a temperature.
23.1 Automatic Sprinkling System – an integrated network of hydraulically designed
piping installed in a building structure or area with outlets arranged in a systematic
pattern which discharges water when activated by heat or combustion. Automatic
sprinkler – is a type of built-in sprinklers which works by the increase of room
temperature and which automatically operates the system to put out the fire. It
goes into action when the fire starts and those will open are directly above the fire.
l. Wet Pipe System- is a fully charge with water coming from reliable
water supply. The piping has water with pressure
ll. Dry pipe system - the pipes are filled with air under pressure which
holds the water at a valve located in a room.

23.2 Fire Pumps - is a part of fire sprinkler system’s water supply and powered by
electric, diesel or steam. It is either connected to the public underground water
piping, or a static water source. (river, tank, reservoir, lake)

a 62
23.3 Standpipes - located inside the building from lowest to the top floor with water
under pressure for use in case of fire.

23.4 Fire hydrant - Located in installations or street where fire hose is connected so
water with pressure will be available to put out fire.

23.5 Portable hand extinguisher - Fire fighting equipment which can be portable or
in a cart that is used to put out fire depending on the contents to extinguish certain
types of fire. This is the most important and useful piece of fire fighting equipment
in a plant, building or facility.

a 62
23.6 Alarm system - Equipped with detection systems that will transmit an alarm.
Some detectors are designed to respond to smoke and others to heat.

24. Fire Detection System - A system that provides sensor in fire-prone areas in
building whereby smoke or heat will actuates these strategically located sensors or
automatic fire detectors so that alarm is automatically sounded warning the
employees and summoning fire fighting units.
25. Smoke Detectors - these detectors trigger an alarm ahead of the heat-actuated
device or detector. Smoke detectors are classified into the following types.

a 62
Photo taken from http://bhadrafiresafety.blogspot.com/2012/12/ionization-vs-
photoelectric.html

a 62
Photo taken from http://bhadrafiresafety.blogspot.com/2012/12/ionization-vs-
photoelectric.html

26. Protective Locks and Key Control and Protective Cabinets - Lock is one of the
most widely used physical security devices in the asset protection program of an
a 62
installation. It complements other physical safeguards of the installation against any
possible surreptitious entry.
26.1 Lock - is defined as a mechanical, electrical, hydraulic or electronic device
designed to event entry into a building, room, container or hiding place.
26.2 Key – instrument for locking and unlocking: a metal bar with notches or grooves
that, when inserted into a lock and turned, operates the lock’s mechanism
26.3 Padlock – a portable and detachable lock having a sliding hasp which passes
through a staple ring or the like and is then made fast or secured.
26.4 Peterman – an English term used to describe a lock picker

27. Types of Locks


27.1 Key Operated Mechanical Lock - it use some sort of arrangement of internal
physical barriers (wards tumblers) which prevent the lock from operating unless
they are properly aligned. The key is the device used to align these internal
barriers so that the lock may be operated.

27.2 Padlock - a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.

27.3 Combination Lock - instead of using the key to align tumblers, the combination
mechanism uses numbers, letters or other symbols as reference point which
enables an operator to align them manually.

a 62
27.4 Code-Operated Lock - a type of lock that can be opened by pressing a series
of numbered button in the proper sequence.

27.5 Electrical Lock - a type of lock that can be opened and closed remotely by
electrical means.

a 62
27.6 Card-opened Lock - a type of lock operated by coded card.

28. What is Key? It is a device which is used to open a door. Consists of two parts: the
blade which is inserted into the lock, and the bow, left protruding so that the torque
can be applied. The blade of a key is normally designed to open one specific lock,
although master keys are designed to open sets of similar locks.
28.1 Change key - a specific key, which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
28.2 Sub-master key - a key that will open all the lock within a particular area or
grouping in a given facility.
28.3 Master key - a special key capable of opening a series of lock.
28.4 Grand Master Key - a key that will open everything in a system involving two or
more master key groups.

29. Key Control. Once an effective key control has been installed, positive control of all
keys must be gained and maintained. This can be accomplished only if it is
established in conjunction with the installation of new locking devices.
29.1 Key Cabinet - a well-constructed cabinet will have to be procured. The cabinet
will have to be of sufficient size to hold the original key to every lock in the system.
It should be secured at all times.
29.2 Key Records - some administrative means must be set up to record code
numbers and indicates to whom keys to specific locks have been issued.
29.3 Inventories - periodic inventories will have to be made of all duplicate and
original keys in the hands of the employees whom they have been issued.
29.4 Audits – in addition to periodic inventory, an unannounced audit should be
made of all key control records and procedures by a member of management.
29.5 Daily Report - should be made to the person responsible for key control from
the personnel department indicating all persons who have left or will be leaving
the company. In an event that a key has been issued, steps should be initiated to
insure that the key is recovered.

30. Three Types of Security Cabinet


30.1 Safe - a metallic container used for the safekeeping of documents or small items
in an office or installation. Safe can be classified as either robbery or burglary
resistance depending upon the use and need. Its weight must be at least 750 lbs
and should be anchored to a building structure. Its body should at least one inch
thick steel.
30.2 Vault - heavily constructed fire and burglar resistance container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than safe but smaller than a file room. The vault
door should be made of steel at least 6 inches in thickness. The vault walls,
ceiling, floor reinforce concrete at least 12 inches in thickness. The vault must be
resistive up to 6 hours.

30.3 File Room - a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside. The file
room should at most be 12 ft. high. It must have a watertight door and at least fire
proof for 1 hour.

31. Security Survey - a physical security is an in-depth analysis to determine the extent
of security measures, which will be needed for protecting the personnel, property, and
a 62
information. It is also known as security audit which is actually a fact-finding probe to
determine a plant’s adequacy and deficiency in all aspects of security, with the
corresponding recommendations. In the field of police and military intelligence,
Security survey is defined as a counterintelligence service to assist heads of office in
determining the security measures required to protect key installations from possible
sabotage, espionage, subversion, and unauthorized disclosures of, or access to,
classified information or material contained therein.

32. Types of Surveys


32.1 Initial Survey – conducted prior to constructing, leasing, acquiring, modifying, or
occupying a facility or area.
32.2 Follow-up Survey – when recommendations are made in the initial physical
security survey, a follow-up survey is conducted to ensure the completion of
modifications. This survey should be conducted before acceptance of the property
for occupancy.
32.3 Supplemental Survey – conducted when changes in the organization, mission,
facility, or the threat level of the facility alter or affect the security posture of the
facility or area. This survey is conducted at the discretion of the management.
32.4 Special Survey – conducted to examine or resolve a specific issue, such as
when there is a request for a Sensitive Compartmented Information (SCI)
accredited facility or there is a need to investigate or assess damage resulting
from an incident.

33. Security Inspection – inspections which may be announced or unannounced are


usually conducted to determine the extent of compliance with security regulations or
procedures, including those recommended during surveys. The inspections should
result in written inspection reports.

34. Types of Security Inspections


34.1 Continuous Inspection – to keep pace with the constant changes in the
organization, changes in our security terms of attitudes, life-style and moral
values, and the rapid advancement of technological modifications are all around
us, the inspection must be an on-going and never ending activity.
34.2 Formal or Informal – Formal Inspection is one which some fanfare is
attached. It is usually preceded by an announcement, and the unit under
inspection “prepares” for events, including some extra housekeeping activities that
would not otherwise happen at that point in time.
Informal Inspection – the result of a long and firmly entrenched inspection
program, understood by all end and accepted as part of the organizational life.
34.3 Structured or Unstructured Inspection – Structured Inspection is one that
moves systematically from one area to the next and so on. There is a format or
logical sequence to the process. For instance, the audit may start with the first line
of defense, then the second line, then the third line, etc.
Unstructured Inspection is conducted in a random manner. There is no format
or logical sequencing. For example, the inspection may start with
countermeasures for proprietary information, then emergency plan, followed by
investigation and so forth.

Self-Help: You can also refer to the sources below to help you further
understand the lesson
a 62
Ajero J.M. (2014). Industrial and Corporate Security Management. Wiseman’s Books Trading.
Quezon City Philippines.

Let’s Check

Let us try the following activities to check your understanding in this unit.

Activity 1. Identification. In the space provided, write the term/s being asked in the following
statements: (One point each)
1. It is any physical structure whether natural or man-made capable of
restricting, deterring, delaying or preventing illegal and unauthorized access to an installation.
2. These barriers are usually shepherd dogs trained for and used as
guards.
3. The broadest branch of security which is actually a system of barriers
placed between potential intruders and the matters to be protected.
4. These barriers include mountains, cliffs, canyons, ravens, seas,
marshes, deserts, or terrain difficult to traverse.
5. A medium of structure which defines the physical limits of an
installations or area to restrict or impede access thereto.
6. It is an unobstructed area maintained o both sides of the perimeter
barrier.
7. These are independent structures designed to control physical and
visual access between outside areas.
8. Employment of mechanical, electrical, electronic energy imposes a
deterrent to entry by the potential intruder or to provide warning to guard personnel.
9. Additional protective measures normally provided at main perimeter
entrances to secure areas located out-of-doors, and manned by guards on full time basis.
10. A type of protective lighting being used in prisons and correctional
institutions to illuminate walls and outside barriers.
11. A stand-by lighting which can be utilized in the event of electrical
failure, either due to local equipment or commercial power failure.
12. Similar to continuous lighting but in turned on manually or by special
device or other automatic means, when there is suspicion of entry.
13. This system consists of ringing up a visual or audible alarm near the
object to be protected.
14. A kind of alarm wherein a visible or an invisible beam is emitted and
when this is disturbed or when an intruder breaks contact with the beam, it will activate the
alarm.
15. A type of protective alarm system where the central station is located
outside the installation.

Activity 2. True or False. In the space provided, write T if the given statement is true and F if
false. (One point each).
a 62
1. Safe are bigger than vault but smaller than security file room.
2. The master key is a key that could open all the lock within a particular area or
grouping in a particular facility.
3. Peterman is an English term used to describe a lock picker.
4. File room is made of steel at least 6 inches in thickness; the vault walls, ceiling, floor
reinforce concrete at least 12 inches in thickness and the vault must be resistive to fire up to 6
hours.
5. The master key is a special key that is capable of opening a series of locks.

Let’s Analyze
Let us try the following activities to know how deep your understanding about the topics
of this unit. At this juncture, you will be required to ELABORATE your answers about the
following questions:

1. Which type of smoke detector do you prefer to use in your establishment and why?
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

2. Which do you think is the better type of fence? Solid fence or full-view fence? And why?
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

a 62
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

In a Nutshell

In this part you are going to jot down what you have learned in this unit. The said
statement of yours could be in a form of concluding statements, arguments, or perspective you
have drawn from this lesson. I have indicated my arguments or lessons learned.

1. One barrier is not enough. Therefore, we have this so called defense in depth meaning
barrier after barrier. This is of great advantage and a must so that if one barrier will be
penetrated there will still be other barriers protecting the things/ installation to be
protected and it would lessen the opportunity of the intruder to execute his/her plan.
2. There are two types of fences: sold and full-view fence. Each type has its advantages
and disadvantages. Choosing what type of fence to be used depends on the type of
installation. Full-view fence is commonly used in residential area or houses while solid
fence is commonly used in factories, warehouses so that inside activities will not be seen
outside.

Now it’s your turn!


3.

4.

5.

Q&A List
In this section you are going to list what boggles you in this unit. You may indicate your

a 62
questions but noting you have to indicate the answers after your question is being raised and
clarified. You can write your questions below.

Questions/Issues Answers
1.

2.

3.

4.

5.

Keywords Index
Audio Detection Device Low level security
Audits Luminous
Auxiliary System Non-surreptitious entry
Card-opened Man-made Barriers
Central Station System Master key
Change key Maximum security
Clear zone Medium Security
Code-Operated Metallic Foil or Wire
Combination Lock Minimum security
Continuous Inspection Movable lighting
Controlled lighting Mutually Supporting Fixed Post
Daily Report Natural Barriers
Defense in depth Padlock
Dial Alarm System Patrol (Roving)-
Double Squeeze Button Perimeter Barrier Openings
Electric Eye Device Perimeter Guards
Electrical Lock Perimeter Guard Employment
Electromagnetic Fence Personal Inspection
Emergency lighting Peterman
Employing guards as patrols Physical Security
Enemy agents must access Portable hand extinguisher
Energy barriers Protective Alarms
Enunciator Protective Cabinets
a 62
Fenced Perimeter Lighting Protective lighting
Fences Protective Locks
File Room Propriety System
Fire Alarms Safe
Fire Detection System Searchlights
Fire hydrant Second line of defense
First line of defense Security Inspection
Fixed post Security Survey
Floodlights Security Lightings
Flood lighting Sidewalk elevators
Follow-up Survey Sign and Notices or Control Sign
Foot Button Smoke Detectors
Foot Rail Activator Special Survey
Formal Inspection Standpipes
Full-view Fence Stand-by Lighting
Gate House Lighting Stationary Luminary (Continuous)
Gates and doors Street lights
Glare-projection type Structural barriers
Grand Master Key Structured Inspection
High level security Solid Fence
Human barriers Space and Motion Detectors
Informal Inspection Sub-master key
Initial Survey Supplemental Survey
Installation Surreptitious Entry
Intensity Third line of defense
Inventories Top guard
Key Topping-up Lighting
Key Control Towers or Guard Towers
Key Operated Mechanical Lock Utilities openings
Key Records Unstructured Inspection
Knee or Thigh Button Vault
Levels of Physical Security Guard control station-
Line of Physical Defense Vibration Detection Device
Local Alarm-by-chance System Wire fence
Local Alarm System Windows and similar openings
Lock

a 62
Big Picture

Week 4-5: Unit Learning Outcomes (ULO): At the end of the unit, you are expected to

a. Demonstrate deep knowledge on personnel security. This includes recruitment


issues, insiders, pre-employment screening, background investigation, screening
insider threat, purpose and screening process, security culture, controlling employee
access and protecting the organization.
b. Comprehend the methods of conducting security investigation.
c. Demonstrate deep knowledge about document and information security in light of
security management for private industrial establishments.
d. Analyze the Rule XVI Republic Act 5487 which is the Investigation of Cases.

Big Picture in Focus: ULOa. Demonstrate deep knowledge on


personnel security. This includes recruitment issues,
insiders, pre-employment screening, background
investigation, screening insider threat, purpose and
screening process, security culture, controlling employee
access and protecting the organization.

Metalanguage
The following are terms to be remembered as we go through in studying this unit. Please
refer to these definitions as supplement in case you will encounter difficulty in understanding the
basic concepts of special crime investigation.

1. Disaffected employee – an individual within an organization who is disillusioned or


disgruntled and takes action that has a security implication.
2. Insider activity – the exploitation by an insider of their legitimate access to the
organization’s assets for unauthorized purposes.
3. Pass back – a procedure where an individual hands their pass to the person behind
them, so that both can gain entry to a restricted area.
4. Tailgating – gaining unauthorized access to a secure area by following closely
behind someone who has authorized access, and entering before the door has closed
behind them.

Essential Knowledge
Personnel Security includes all the security measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to the government, from gaining access to classified
matter or to any security facility, and to prevent appointment, or retention as employees of such
individuals. The Security Chain: Personnel security is the “weakest link” in the security “chain”.

a 62
This weakness can be best minimized or eliminated by making the personnel security conscious
through good training program. Security depend the action of the individuals. The superior must
instruct his subordinates so that they will know exactly what security measures to take in every
instance, a safe will not lock itself. An individual must be properly instructed and must do the
locking.

1. Objectives of Personnel Security


1.1 To provide the standards and procedures necessary to insure the appointment,
employment of retention of suitable and loyal individuals.
1.2 To develop the necessary and proper security discipline among the applicants
and employee as well as protect and preserve the security interest of the
organization.
1.3 Inculcate the desirable security attitudes and habits among the applicants and
employees.

2. Basic Policies in Personnel Security


2.1 No person is entitled solely by virtue of his grade or position to knowledge or
possession of classified matter. Classified matter shall be entrusted only to those
individuals whose official duties require such knowledge or possession, and who
have been granted the proper clearance.
2.2 All personnel whose duties require access to classified matter shall be subject to
a security investigation to determine eligibility for the required security clearance.
2.3 All personnel shall undergo security orientation, indoctrination and security
education.

3. Control of Personnel in the Physical Facility


The most practical and generally accepted system of personnel identification is the
use of identification cards badges or passes. Generally speaking, this system
designates when and where and how identification cards should be displayed, and to
whom. This helps security personnel eliminate the risk of allowing the access of
unauthorized personnel within the establishments.
3.1 Two (2) Types of Personal Identification
3.1A Personal Recognition – familiarity of the person’s characteristics.
3.1B Artificial Recognition – identification cards, passes, passwords, etc.

3.2 Use of Pass System


3.2A Single Pass System – the badge or pass coded for authorization to enter
specific areas is issued to an employee who keeps it in his possession until his
authorization terminates.
3.2B Pass Exchange System – an exchange takes place at the entrance of
each controlled area. Upon leaving the personnel surrenders his badge or
passes and retrieve back his basic identification.
3.2C Multiple Pass System – this provides an extra measure of security by
requiring that an exchange take place at the entrance of each restricted area.

3.3 Badge and Pass Control


3.3A The system should have a complete record of a badges and identification
cards issued, return, mutilated or lost by serial number and cross-indexed
alphabetically.
3.3B The supervisor from time to time for its accuracy and authenticity should

a 62
check the lists.
3.3C Passes and badges reported lost should be validated and security at
entrance be informed through conspicuous posting.

3.4 Visitors Movement Control


Security should establish proper methods of establishing the authority for
admission of visitors as well as the limitation threat. This security measures
would depend on the sensibility of the installation, but could include the following.
3.4A Visitor’s Logbook – all visitors to any facility should be required to identify
their selves and should be given a visitor’s ID by the security. Visitor’s logbook
should be filled up with the names of visitors, nature and duration of visit.
3.4B Photograph – taking of photographs should also be considered. Extreme
caution must be exercised in areas where classified information is classified to
preclude unauthorized taking of pictures of the installation.
3.4C Escort – if possible visitors should be escorted by the security to monitor
their activity within the establishment and guide them where to go.
3.4D Visitor Entrances – separate access for visitors and employees of the
establishment should be provided.
3.4E Time-traveled – if there is a long delay or time lapse between the
departure and arrival, the visitors may be required to show cause for the delay.
3.4F Access List – record of pre-determined visitors

3.5 Personnel Security Investigation


It is an inquiry into the character, reputation, discretion and loyalty of individual in
order to determine a person’s suitability to be given security clearance. Here are
the types of Personnel security Investigation (PSI)
3.5A National Agency Check (NAC) – an activity that involves sources of
information from national government agencies.
 National Bureau of Investigation (NBI)
 National Intelligence Coordinating Agency (NICA)
 CIDG
3.5B Local Agency Check (LAC) – the sources of information came from local
agencies or local government units.
 Barangay Clearance
 MTC Clearance
 Local Police Clearance
 Court Clearance

3.6 Background Investigation


This is a more comprehensive investigation than the NAC and LAC. A thorough
and complete investigation of all or some of the circumstances or aspects of a
person’s life is conducted. The following are the types of BI.
3.6A Complete Background Investigation – this is performed for business or
personal reasons. This profile report provides the essential facts you must know.
The report confirms a person’s identity, and includes comprehensive levels of
Local and National administrative or Criminal Records searches. The depth and
wideness of information returned often makes the difference between success
and failure in a variety of situations and relationships.

Components of BI:

a 62
Applicant’s name Foreign travel history
Organization membership Citizenship
Date of Birth Physical data
Neighborhood check Credit records
Present residence address Criminal records
Character references Educational history
Personal history statement Applicants signature
Marital history Date of application
Residence history

3.6B Partial Background Investigation – consist of the investigation of the


background of an individual but limited only to some of the circumstances of his
personal life which are deemed pertinent to the investigation.

3.7 Insider
An insider is someone (a permanent, temporary or contract worker) who
exploits, or has the intention to exploit, their legitimate access to assets for
unauthorized purposes. Insider motivations vary greatly and are often a
combination of factors which can be hard to determine. Examples include
political or religious ideology, revenge, notoriety and financial gain or even fear
or coercion (where external pressure is exerted on an employee).
3.7A Innocent Insider – an employee who causes damage to an
organization through carelessness or ineptitude.

3.8 Factors influencing likelihood of insider activity


3.8A Poor management practices and a weak organizational culture, which can
help to diminish employee loyalty and commitment.
3.8B Ineffective grievance processes for employees to voice discontent before it
escalates into disaffection.
3.8C the lack of a strong security culture, resulting in employees not taking
individual responsibility for security and reduced compliance with security
procedures.
3.8D Inadequate personnel security measures during pre-employment
screening, reducing an organization’s ability to identify deliberate insiders.
3.8E Inadequate personnel security measures after recruitment, limiting the
organization’s ability to identify or prevent insider activity among its employees.

3.9 Recruitment Issue


In other corporation or establishment, personnel security is still regarded as a
recruitment issue rather than something to address throughout a staff member’s
time in employment. But ongoing personnel security measures can not only
reduce vulnerabilities, they can also encourage a hugely beneficial security
conscious culture among staff at every level of the organization.

3.10 Pre-Employment Screening


Pre-employment screening is designed to verify information supplied by
candidates on their resumes and applications. Investigations are also conducted
to uncover character flaws and criminal tendencies that might jeopardize the
employer, tarnish its reputation, endanger staff, or limit the effectiveness of the

a 62
candidate. Screening is often done to determine if employees can be trusted to
manage financial resources or protect sensitive or confidential information.

a 62

You might also like