Intro Industrial Security Concept
Intro Industrial Security Concept
Intro Industrial Security Concept
Private Detective - any person who is not a member of a regular police agency or
armed forces who does detective work for hire, reward or commission.
1. No agency operating in the City of manila and suburbs may employ more than 1000
watchmen or security guards.
2. No agency operating in other cities and first class municipalities may employ more
than 500 watchmen or security guards.
3. No agency operating in municipalities other than first class may employ more than
200 watchmen or security guards.
5. No agency shall offer, render or accept services to gambling dens or other illegal
enterprises.
6. The extent of the security service being provided by any security agency shall not
go beyond the whole compound or property of the person or establishment
requesting the security service except when they escort big amount of cash.
Who can Issue rules and regulations to carry out the purpose of RA 5487?
The chief PNP, in consultation with the Philippines Association of Detective and
Protective Agency Operators.
What are the penal provisions for violation of RA5487 or its implementing rules?
Answer:
1. Suspension, fine or cancellation of license to operate with the forfeiture of bond
filed with the Chief PNP.
2. Imprisonment ranging from 1 to 4 years and fine, in the discretion of the courts.
Security warning signs - let workers and visitors in your facility understand
the system you have in place. This is especially crucial if there are emergency
exit doors that will trigger alarms if they're opened. Security warning
signs can also deter trespassing, theft, and other illegal or suspicious activities.
Vehicle height restriction - are designed specifically to allow access to a site for
cars and smaller, lighter vehicles. This bar then pre-warns
the vehicles wishing to gain access to the area that their vehicle may be too
high.
Restricted access point - t means that you can allow only a number of people
who will enter the facility or a building or institution.
Sight lighting and trenches - security lighting is lighting that intended to deter
or detect intrusions or other criminal activity on a piece of real property. It can
also be used to increase a feeling of safety. Lighting is integral to crime
prevention through environmental design.
How to distinguish authorized from unauthorized people.
Access control at the following:
1. Security gates - shall be defined as any gate, door, or other barrier that limits
or restricts public access to or from a property.
2. Security doors - replace conventional doors and revolving doors in fence lines
and entryways. They are used to allow access only to authorized personnel and
are commonly used for high-security access control at construction sites, data
centers, military bases, and prisons.
3. Locks - A lock is a mechanical or electronic fastening device that is released by
a physical object (such as a key, keycard, fingerprint, RFID card, security
token, coin, etc.), by supplying secret information (such as a number or letter
permutation or password), or by a combination thereof or only being able to be
opened from one side such as a door chain.
How to detect intrusion
1. install alarms
2. install intrusion detection monitor
3. install video monitoring system - ex. cctv
Vigiles (in Rome) - origin of the watchmen although their principal duty was as a
fire brigade.
Frank Wills - detected the Watergate burglars ultimately leading to the resignation
of US president Richard Nixon.
Target hardening - the reduction in criminal opportunity, generally through the use
of physical barriers, architectural design and enhanced security measures of a
particular location.
Defensible Space - the range of mechanisms that combine to bring an environment
under the control of its residents.
Demography - the study of the characteristics of population groups.
Principles of Physical Security
1. An intruder must be able to acquire access to the property in order to benefit.
2. The type of access necessary will depend upon a number of variable factors and
therefore may be achieved in a number of ways.
3. There is no impenetrable barrier.
4. Security is built upon a system of defense in depth resulting to accumulated
delay time which may lead to the apprehension of the intruder.
5. Each installation is different from the others.
PHYSICAL SECURITY
Definition: Physical security measures are being used to define, protect, and
monitor property rights and assets. These measures consist of barriers and devices that
would detect, impede, and prevent unauthorized access to equipment, facilities,
material and document and to safeguard them against espionage, sabotage, damage
and theft.
Physical security may be also defined as the safeguarding by physical means, such as
guard, fire protection measures, of plans, policies, programs, personnel, property,
utilities, information, facilities and installation against compromise, trespass, sabotage,
pilferage, embezzlement, fraud, or other dishonest criminal act.
What is a Barrier?
Types of Barriers
A restricted area is any area in which personnel or vehicles are controlled for
reasons of security. Restricted area is established to provide security for installation or
facilities and to promote efficiency of security operations and economy in the use of
security personnel.
a. Interior Area Control - Interior area control is generally affected in two ways.
The first method is the system which is initiated and terminated at the outer
limits of the area to determine the movements of a visitor within the area. A
second somewhat less means of accomplishing the same thing is time travel.
This system provides for checking the actual time used by the visitor against
known time requirements for what the visitor is to accomplish.
b. Visitor Identification and Movements Control - Processing and control of
movements of visitor shall be included in the PASS SYSTEM. The control of
movements of visitor will depend on the installation. A visitor register shall be
maintained to include the name of the visitor, date of visit, purpose of visit,
which may be filed for the future reference.
c. Key Control- A system of controlling keys shall be advised and regulations
covering the disposal, storage or withdrawals, shall be issued and imposed.
d. Fire Prevention- fire is so potentially destructive without human assistance,
with assistance it can be caused to devastate those things you are attempting
to secure and, professionally accomplished, often in a way that does not
leave recognizable evidence of sabotage.
It is the protection of the installation’s inner and the immediate vicinity. The main
purpose of perimeter barrier is to deny or impede access or exit of unauthorized person.
Basically, it is the first line of defense of an installation. This is maybe in the form of
fences, building walls or even bodies of water.
The function and location of the facility itself usually determine the perimeter of
the installation. If the facility is located in a city whereby the facility is located in a city
whereby the building or enterprise occupies all the area where it is located, the
perimeter may be the walls of the building itself. Most of the Industrial companies,
however, are required to have a wide space for warehousing, manufacturing etc.
Types of Perimeter Barrier
Types of Fences
Solid fence -constructed in such away that visual access through the fence is
denied. Its advantage is that it denies the opportunity for the intruder to become familiar
with the personnel, activities and the time scheduled of the movements of the guards in
the installation. On the other hand, it prevents the guards from observing the area
around the installation and it creates shadow that may be used by the intruder for cover
and concealment.
As a standard, the distance between strands must not exceed 6 inches at least
one wire will be interlaced vertically and midway between posts.
Gates and Doors - when not in use and controlled by guards, gates and
doors in the perimeter should be locked and frequently inspected by guards.
Locks should be changed from time to time and should be covered under
protective locks and key control.
Side-walk-elevators - these provide access to areas within the perimeter
barrier and should be locked and guarded.
Utilities Opening - sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of
96 square inches or more should be protected by bars, grills, water filled traps
or other structural means providing equivalent protection to that portion of the
perimeter barriers.
Clear Zones - an obstructed area or a “clear zone” should be maintained on
both sides of the perimeter barrier. A clear zone of 20 feet or more is
desirable between the barriers and exterior structures and natural covers that
may provide concealment for assistance to a person seeking unauthorized
entry.
The idea that lighting can provide improve protection for people and facilities is as old
as civilization. Protective lighting is the single most cost-effective deterrent to crime
because it creates a psychological deterrent to the intruders.
1. Continuous lighting - the most familiar type of outdoor security lighting, this is
designed to provide two specific results: glare projection or controlled lighting. It
consists of a series of fixed luminaries at range to flood a given area continuously
during the hours of darkness.
a. Glare projection type- it is being used in prisons and correctional
institutions to illuminate walls and outside barriers.
b. Controlled lighting- it is generally employed where, due to surrounding
property owners, nearby highways or other limitations, it is necessary for
the light to be more precisely focused.
2. Standby lighting - it is designed for reserve or standby use or to supplement
continuous systems. A standby system can be most useful to selectively light a
particular area in an occasional basis.
3. Movable or Portable lighting - this system is manually operated and is usually
made up of movable search or floodlights that can be located in selected or
special locations which will require lighting only for short period of time.
4. Emergency lighting - this system is used in times of power failure or other
emergencies when other systems are inoperative.
Three types of lighting equipment are generally used or associated with security
lighting. These are:
Protective alarm is one of the important barriers in security. It assists the security
in detecting, impeding or deterring potential security threat in the installation. Basically,
its function is to alert the security personnel for any attempt of intrusion into a protected
area, building or compound. Once an intruder tampers the circuitry, the beam or
radiated waves of the alarm system, it will activate an alarm signal.
On the other hand, the use of communication equipment in the installation helps
security in upgrading its operational efficiency and effectiveness.
1. Central Station System - a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by
subscriber, the central station notifies the police and other public safety agencies.
2. Proprietary system - centralized monitor of the proprietary alarm system is
located in the industrial firm itself with a duty operator. In case of alarm, the duty
operator calls whatever is the primary need; firefighters, police, an ambulance or
a bomb disposal unit.
3. Local Alarm – This system consist of ringing up a visual or audible alarm near
the object to be protected. When an intruder tries to pry a window, the alarm
thereat goes off.
4. Auxiliary alarm - company-owned alarm systems with a unit in the nearest
police station so that in case of need, direct call is possible. The company
maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement. Radio, landlines, or
cell phones can avail of the auxiliary system.
Kinds of Alarms
1. Audio Detection Device - it will detect any sound caused by attempted force
entry. A supersonic microphone speaker sensor is installed in walls, ceilings and
floors of the protected area.
2. Vibration Detection Device - it will detect any vibration caused by attempted
force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of
the protected area.
3. Metallic foil or wire - it will detect any action that moves the foil or wire. An
electrically charge strips of tinfoil or wire is used in the doors, windows or glass
surfaces of the protected area.
4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that
when this beam is disturbed by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and
when this is disturbed or when an intruder breaks contact with the beam, it will
activate the alarm.
What is Protective Lock and Key Control?
Lock is one of the most widely used physical security devices in the asset
protection program of an installation. It complements other physical safeguards of the
installation against any possible surreptitious entry. However, the owner of the
installation or his security officer needs to understand the weaknesses and strength of
each type of lock including the door, window or walls to be used to achieve maximum
benefit from its application. This is because highly skilled burglars more often
concentrate on the lock and its surrounding mechanism in order to make a forcible
entry. It is for this obvious reasons that locks are considered as delaying devices which
can not really stop a determine intruder from destroying the lock just to launch an
attack. Hence, knowledge of the basic principles of locking systems will enable the
installation owner or the security officer to evaluate any lock and determine its quality
and effectiveness in a particular application.
What is a Lock?
Types of Locks
2. Padlock - a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.
3. Combination lock - instead of using the key to align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference
point which enables an operator to align them manually.
4. Code-operated lock - a type of lock that can be opened by pressing a series of
numbered button in the proper sequence.
5. Electrical lock - a type of lock that can be opened and closed remotely by
electrical means.
6. Card-operated lock - a type of lock operated by a coded card.
Types of keys
1. Change key - a specific key, which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
2. Sub-master key - a key that will open all the lock within a particular area or
grouping in a given facility.
3. Master key - a special key capable of opening a series of lock.
4. Grand Master key - a key that will open everything in a system involving two or
more master key groups.
Key Control
Once an effective key control has been installed, positive control of all keys must
be gained and maintained. This can be accomplished only if it is established in
conjunction with the installation of new locking devices. The following methods can be
used to maintain effective key control;
The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or other especially
valuable assets are protected. These security containers will be of a size and quantity,
which the nature of the business dictates.
In protecting [property, it is essential to recognize that protective containers are
designed to secure against burglary or fire. Each type of equipment has a specialized
function and it will depend on the owner of the facility which type ha is going to use.
2. Vault - heavily constructed fire and burglar resistance container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than safe but smaller than a file room.
a. The vault door should be made of steel at least 6 inches in thickness.
b. The vault walls, ceiling, floor reinforce concrete at least 12 inches in
thickness.
c. The vault must be resistive up to 6 hours.
3. File room - a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside.
a. The file room should at most be 12 feet high.
b. It must have a watertight door and at least fire proof for one hour.
1. Personal recognition
2. Artificial recognition- identification cards, passes, passwords, etc.
1. Single pass system - the badge or pass coded for authorization to enter specific
areas is issued to an employee who keeps it in his possession until his
authorization is terminates.
2. Pass exchange system - an exchange takes place at the entrance of each
controlled area. Upon leaving the personnel surrenders his badge or passes and
retrieve back his basic identification.
3. Multiple pass system - this provides an extra measure of security by requiring
that an exchange take place at the entrance of each restricted area.
1. Visitor’s logbook – All visitors to any facility should be required to identify them
selves and should be given a visitor’s ID by the security. Visitor’s logbook should
be filled up with the named of visitors, nature and duration of visit.
2. Photograph - taking of photographs should also be considered. Extreme caution
must be exercised in areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation. If a visitor has camera and it is
prohibited to take picture, said camera should be left in the care of security with
corresponding receipt.
3. Escort - If possible visitors should be escorted by the security to monitor their
activity within the establishment and guide them where to go.
4. Visitor entrances - separate access for visitors and employees of the
establishment should be provided.
5. Time- traveled - If there is a long delay or time lapse between the departure and
arrival, the visitors maybe required to show cause for the delay.
Every facility must establish a system for the control of package entering or
leaving the premises. However, desirable it might seem it is simply unrealistic to
suppose that a blanket rule forbidding packages either in or out would be workable.
Such a rule would be damaging to the employee morale and, in many cases, would
actually work against the efficient operation in the facility. Therefore, since the
transporting of packages through the portals is a fact of life, they must be dealt with in
order to prevent theft and misappropriation of company properties. Thus;
Vehicular traffic within the boundaries of any facility must be carefully controlled
for safety as well as to control the transporting of pilfered goods from the premises.
Thus
At any physical barrier, a security system must posses the ability to distinguish
among authorized persons, unauthorized visitors, and other unauthorized persons. This
is to assist the security personnel protects sensitive are and information within the
installation. Appropriate warning signs should be posted at the building perimeter.
Special restricted entry facilities to public access should be provided. This will be
dependent on the degree of security needed for the protection of property, activity and
other processes within the building. A clear-cut policy on the access control should be
disseminated to all personnel of the installation.
PERSONNEL SECURITY
The Security “Chain”: Personnel Security is the “weakest link” in the security
“chain”. This weakness can best be minimized or eliminated by making init personnel
security conscious through good training program. Security depends upon the action of
the individuals. The superior must instruct his subordinates so that they will know
exactly what security measures to take in every instance, a safe will not lock itself. An
individual must be properly instructed and must do the locking.
Control of Personnel
Local Agency Check (LAC) – This type of investigation consist of the first type
plus written inquiries sent to appropriate local government agencies, former employees,
references and schools listed by the person under investigation. The local agencies
normally check besides the past employment, schools and references are the following:
Place of the locality where the individual is a resident.
Mayor, Police, Fiscal, Judge of the locality where the individual is a resident.
1. Loyalty – faithful allegiance to the country, government and its duly constituted
authority.
2. Integrity- uprightness in character, soundness of moral principles, freedom from
moral delinquencies, ore more simply stated-honesty.
3. Discretion- the ability of tendency to act or decide with prudence; the habit of
wise judgment or simply stated- good judgment
4. Moral- distinctive identifying qualities which serve as an index to the essential or
intrinsic nature of a person; his outward manifestation, personal traits or moral
habits.
5. Character- the sum of the traits that serves as an index of the essential intrinsic
nature of a person. It is the aggregate of distinctive mental and moral qualities
that have been impressed by nature, education and habit upon the individual.
6. Reputation- opinion or estimation in which one is generally held. It is what one
reported to be, whereas character is what a person is.
1. Revenge- a real or fancied wrong can create a hatred which will stop at nothing
to obtain revenge of the offender. Hatred wraps the sense of moral values until
the hater will go to any lengths, even betrayal of his country, to avenge himself
on the person or class of people hated.
2. Material Gain- some people are so avid for material gain that they will stop at
nothing to achieve this end.
3. Personal Prestige- this motivation applies to those whose main desire is for
power-power over others-to prove to the world what leaders they are. However,
their desire for power makes them especially vulnerable to subversion.
4. Friendship –through close attachment to another person, many people,
otherwise of high integrity, will do things inimical to their country’s interest.
5. Ideological Beliefs- If a person holds inimical to their country, they are of course
vulnerable to approach by subversive groups of agents.
The security guard force is the key element in the overall security system of a
plant or installation. Its basic mission is to protect all the property within the limits of the
facility boundaries and protect employees and other persons on the installation.
Sometimes called private security guard or watchman shall include any person
who offers or renders personal service to watch or secure either a residence or
business establishment or both for hire or compensation, and with a license to exercise
profession.
It is a group of force selected men, trained or grouped into functional unit for the
purpose of protecting operational processes from those disruption which would impeded
efficiency or halt operation at a particular plant, facility, installation or special activity
The security force of any installation must be organized in accordance with the
principles of responsibility and authority. Each personnel must be assigned to a position
that corresponds to his experience, skills, training and knowledge. This is to carry out
different functions efficiently and effectively and thus insures smooth flow of the
organization.
12. Shift-in-Charge
a. The Shift-in-Charge shall be responsible to the Detachment Commander
as far as his shift is concerned.
b. He forms his men at least 30 minute before posting time seeing that all are
in proper uniform and presentable.
c. He disseminates instructions coming form his Detachment
Commander/OIC or those relayed to him by his counter-part, the outgoing
SIC.
d. He inspects the posts as often as he can to ensure that his men are on the
alert and performing their duties effectively.
e. He performs other duties as may be directed by the Detachment
Commander or by the ADC.
1. He shall be honest in thoughts and deeds both in his official actuation, obeying
the laws of the land and the regulations prescribed by his agency and those
establish by the company he is suppose to serve.
2. He shall not reveal any confidential matter committed to him as a security guard
and such other matters imposed upon him by law.
3. He shall act all times with decorum and shall not permit personal feelings,
prejudices and undue friendship to influence his actuation in the performance of
his official functions.
4. He shall not compromise with criminal and other lawless elements to the
prejudice of the customers or clients and shall assist government relentless drive
against lawlessness and other forms of criminality.
5. He shall carry out his assigned duties as required by law to the best of his ability
and shall safeguard life and property of the establishment he is assigned to.
6. He shall wear his uniform, badge, patches and insignia properly as a symbol of
public trust and confidence as an honest and trustworthy security guard,
watchman and private detective.
7. He shall keep his allegiance first to the government he is assigned to serve with
loyalty and utmost dedication.
8. He shall diligently and progressively familiarize himself with the rules and
regulations lay down by his agency and those of the customers or clients.
9. He shall at all times be courteous, respectful and salute his superior officers,
government officials and officials of the establishment where he is assigned and
the company he is supposed to serve.
10. He shall report for duty always in proper uniform and neat in his appearance
11. He shall learn at heart and strictly observe the laws and regulations governing
the use of firearm.
Code of Conduct: The watchman should abide by the following code of conduct:
1. He shall carry with him at all times during his tour of duty his license identification
card and duty detail order with an authority to carry firearms.
2. He shall not use his license and privileges to the prejudice of the public, the client
or customer and his agency.
3. He shall not engage in any unnecessary conversation with anybody except in the
discharge of his work and shall at all times keep himself alert during his tour of
duty.
4. He shall not read newspapers, magazines, books, etc., while actually performing
his duties.
5. He shall not drink any intoxicating liquor immediately before and during his tour
of duty.
6. He shall know the location of the alarm box near his post and sound the alarm in
case of fire or disorder.
7. He shall know how to operate any fire extinguishers at his post.
8. He shall know the location of the telephone and/or telephone number of the
police precincts as well as the telephone number of the fire stations in the
locality.
9. He shall immediately notify the police in case of any sign of disorder, strike, riot
or any serious violations of the law.
10. He or his group or guards shall not participate or integrate any disorder, strike,
riot or any serious violations of the law.
11. He shall assist the police in the preservation and maintenance of peace and
order and in the protection of life, property/having in mind that the nature of his
responsibilities is similar to that of the latter.
12. He shall familiarize himself with the Private Security Agency Law (RA5487) as
amended, and the PNP SAGSD implementing rules and regulations.
13. When issued a pass he should not lend his pass to anybody.
14. He shall always in proper uniform and shall always carry with him his basic
requirements, and equipment such as writing notebook, ball pen, nightstick
(baton) and/or radio. He shall endeavor at all times to merit and be worthy of the
trust and confidence of the agency he represents and the client he serves.
1. To take charge of this post and all companies property in view and
protect/preserve the same with utmost diligence.
2. To walk during tour of duty in military manner, keeping always in the alert and
observing everything that takes place within sight or hearing.
3. To report all violations of orders I am instructed to enforce.
4. To repeat all calls from post more distant from the guardhouse where I am
station.
5. To quit my post only when properly relieved.
6. T o receive, obey and pass out to the relieving guard all order from company
officers or officials, supervisors post in charge or shift leaders.
7. To talk to no one except in the line of duty
8. To sound or call the alarm in case of fire or disorder
9. To call the superior officer in any case not covered by instructions.
10. To salute all company officials, superiors in the agency, ranking public officials
and commission officer of the AFP and officers of the PNP.
11. To be especially watchful at night and during the time of challenging to challenge
all persons on or near my post and to allow no one to pass or loiter without
proper authority.