100% found this document useful (1 vote)
113 views87 pages

Introduction To Industrial Security Concept 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
113 views87 pages

Introduction To Industrial Security Concept 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 87

INTRODUCTION TO

INDUSTRIAL SECURITY
CONCEPT
CHAPTER 1: DEVELOPMENT AND
EVOLUTION OF SECURITY AND
SAFETY INDUSTRY
HISTORY OF SECURITY
Private security is not a new concept. Security forces existed long
before a paid police force. Private security has a long history starting in
medieval times when knights protected lords and ladies. In the colonies all
able-bodied men were to stand a citizen’s night watch to protect the
community from invasion and fire. ADT (American District Telegraph
Company) was formed in 1874. it is still today one of the largest alarm
monitoring companies in the country. Washington Brink formed Brinks
armored car service in 1891. In 1895 Allan Pinkerton was the first law
enforcement officer hired to protect the interests of the railroads. It was in
the private sector that the first SWAT (special weapons and tactics) unit was
formed in 1899. Rangers would arrive in a special baggage car that carried
eight men and horses. When a train robbery would occur these rangers
would chase the robbers on horseback. William Burns founded his
Private Security has a long in some cases longer and more
distinguished past than public law enforcement agencies.
Public law enforcement agencies can trace its origin back to Sir Robert
Peel, home Secretary of England and the passage of the metropolitan
police act of 1829. Sir Robert Peel’s reforms developed the structure of
today’s Scotland Yard. A force empowered by law to prevent crime and
apprehend offenders.
Before that time, London had a private security force consisting of a
day time patrol, a night time patrol and a horse patrol to protect its
citizen’s.
HISTORY OF SECURITY IN THE
PHILIPPINE SETTING
In 1950, the late DR. JOSE B. MANIWANG PhD, WSO-CSSD,
Registered Criminologist and well known as the “Father of Philippine
Security” first established, as a single proprietor, a private security agency
the National Intelligence and Security Service, a business he thought of
after World War II, being a war veteran under the USAFFE and as the
country recovers and various business grew. On June 23, 1971 he re-
organized the company as Security and Safety Corporation of the
Philippines with well-known doctors in academics, deans, and
criminology educators in the Philippines. Their vision and mission was to
promote professionalism in the security industry through security
education , academic researches and providing trained, disciplined and
highly motivated security force. Through this vision, the company was
awarded the Most Outstanding Security Agency of the Year in 1989 and
1999. the feat that made the agency of Hail of Famer in the Security
In 1985, Dr. Maniwang organized the Security and Safety Training
Center, Inc., or SSTCI, with the forethought of providing
professionalized training for security guards. As an educator, he
believes that proper training is an aspect in having quality security
personnel. SSTCI was awarded as Security Training Center of the year
for 1989, 1997, 2000, 2001 and 2002, a major feat that made the school
a hall of famer in security trainings. The education curriculum and
programs created by Dr. Maniwang have been adopted by many
security training centers and criminology colleges in the country. His
book Manual for security guards had become a foremost reference for
security guards. On April 4, 2003, SSTCI was reorganized to be known
as Industrial Detective and Security Training School, Inc. or IDSTSI.
The Security & Safety Corporation of the Philippines operates in the
whole Philippine Archipelago composing of 7, 100 islands. It has
offices in the 3 major islands of Luzon, visayas, and Mindanao. Its
main office is located 75 F. Manalo Street, Cubao, Quezon City in the
heart of the Cubao Commercial District.
The company provides armed and unarmed security force, VIP escorts,
background investigation, due diligence services, risk management and
security consulting, security and safety alarm systems and security
awareness education programs.
SECURITY TODAY
Private security today can be found everywhere from the hospital to the
mail. In many cases they are required to perform the same responsibilities
as a law enforcement officer. Yet the security profession does not get the
same respect the law enforcement profession receives. Part of the reason for
this dim view of the security profession is the lack of training requirements.
Training for law enforcement officers came first and has grown over the
years. A “real cop” takes great pride in the achievement of graduation from
a police academy.
Some countries now are requiring certification and training standards for
the private security officer. If every country were to create training and
education standards for security officers to become certified security
professionals, the “rent a cop” could also take pride in his ability to have
passed a training course. Then the officer and the public would perceive
CHAPTER 2: THEORIES, CONCEPTS,
PHILOSOPHY OF SECURITY AND SAFETY
CONCEPT OF SECURITY
A. Security defined….
1. The quality of being secure: such as
a. Freedom from danger: SAFETY
b. Freedom from fear or anxiety
c. Freedom from the prospect if being laid off job security
2. Measures taken to guard against espionage or sabotage, crime,
attack, or escape
3. An organization or department whose task is security
4. Security refers to all the measures that are taken to protect a place or
to ensure that only people with permission enter it or leave it.
SECURITY
1. State or feeling of safety: the state or feeling of being safe and
protected
2. Freedom from worry about possible lose
3. Something giving assurance: something that provides a sense of
protection against loss, attack or harm
4. Safety: protection against attack from without or subversion from
within
5. Precautions to maintain safety: precautions to keep somebody or
something safe from crime, attack, danger
6. Guards: people or an organization entrusted with the job of
protecting somebody or something, especially a building or
installation, against crime
B. Asset defined…
An asset is a resource with economic value that an individual,
corporation or country owns or controls with the expectation that it will
provide future benefit. Assets are reported on a company’s balance
sheet and are bought or created to increase a firm’s value or benefit the
firm’s operations.
An asset can be thought of as something, that, in the future, can
generate cash flow, reduce expenses, or improve sales, regardless of
whether its manufacturing equipment or a patent
C. Risk defined…
Risk is a probability or threat of damage, injury, loss, or any other
negative occurrence that is caused by external or internal
vulnerabilities, and that may be avoided through pre-emptive action
D. Threat defined…
A statement of an intention to inflict pain, injury, damage, or other
hostile action on someone in retribution for something done or not
done.
A person or thing likely to cause damage or danger
E. Vulnerability defined..
The quality or state of being exposed to the possibility of being
attacked or harmed, either physically or emotionally.
Industrial Security – the term means security measures applied to
business industries.
HAZARDS
Hazards refer to conditions that may cause damage to property, injury,
or loss of life. It is also define as “exposure to the chance of loss or
injury. Hazards are caused either by nature or by man himself.
MODES OF HAZARDS
There are different modes to which the threats of hazards belong and
are defined.
a. DORMANT MODE – a hazard is on a dormant mode when it
merely has the potential to be hazardous. No person, property or
environment is affected by this condition. A volcano in an isolated and
uninhabited island is an example.
b. POTENTIAL MODE – a hazard is on a potential mode when it is
in the position or a situation to harm persons or destroy properties or
environment. Hazards in this mode need to be assessed to determine
risk it could bring.
c. ACTIVE MODE – A hazard in an active mode when it is certain to
cause harm as no intervention can be made before the incident.
CLASSIFICATION OF HAZARDS
A. NATURAL HAZARDS – these hazards are generally caused by
natural phenomenon. The following are examples of natural
hazards:
a. Drought
b. Earthquake
c. Flood
d. Hurricane
e. Lahar
B. MAN-MADE HAZARDS- these hazards are acts of omission or
commission of man. Acts of omission are caused by one's ignorance,
indifference or negligence. Acts of commission are actions motivated
The following are examples of man-made hazards:
1. Sabotage
2. Accidents
3. Violation of regulation
4. Theft
C. ACTIVITY-RELATED HAZARDS – activity related hazards are achieved
by the undertaking of a certain activity or condition. This will be
eliminated by stopping the activity, correction of condition or removal
of the cause of hazardous condition.
5. Skydiving
6. Cliff Climbing
7. Combat sports
MAJOR DIVISION OF INDUSTRIAL SECURITY
In providing security and protection to industrial establishments, security and protective measures are
focused on the following major division:
1. PHYSICAL SECURITY – This is the broadest type of security. As a major division of industrial
security. It can be defined as those measures taken to prevent physical access or entry to an
installation or area by unauthorized person
2. PERSONNEL SECURITY – This division of security applied to check the background of
persons as well as the protection of company personnel against potential harmful acts or
conditions.
3. DOCUMENT AND INFORMATION SECURITY – this includes every measures designed to
safeguard company documents from unintentional or intentional harmful acts or against
unauthorized disclosure of information contained therein.
TYPES OF SECURITY
1. PHYSICAL SECURITY- it is the broadest branch of security which is
concerned with the physical measures adopted to prevent unauthorized
access to equipment, facilities, materials, and documents and to
safeguard them against espionage, sabotage damage and theft. Physical
security covers other types of security to protect equipment, documents,
facilities and materials against theft damage, sabotage or espionage. It
also encompasses protection of personnel from any criminal act.
2. SUPERMARKET SECURITY – this is applied in response to the
mushrooming of bazaars, marts, supermalls, and the like
3. PERSONNEL SECURITY – this involved in the background checks for
individuals commensurate with the security requirements of their work.
This also includes measures designed to protect employees of an
organization or business establishment.
4. COMMUNICATION SECURITY – It is the protection resulting from the application
of various measures that prevent or delay the enemy or unauthorized persons in gaining
information through the communication system. This includes:
a. TRANSMISSION SECURITY – a type of communication security that results from
all measures designed to protect transmission from the interception, traffic analysis
and imitative deception.
b. CRYPTOGRAPHIC SECURITY - result from the provisions of technically , sound
crypto-systems and proper use
c. PHYSICAL SECURITY – providing of safeguards to equipment and materials from
access of unauthorized persons
5. HOTEL SECURITY (HOUSE DETECTIVES) – it refers to the protection of assets,
guest, personal affects and other properties in hotels, inns and other similar
establishments.
6. BANK SECURITY – A specialized type of physical security protecting the assets,
personnel and operation of a bank, with special emphasis on the precaution and
measures to safeguard the cash and assets while the storage, in transit and during
7. DOCUMENT SECURITY – It is the physical security involving the
protection of documents and classified papers from loss access by
authorized persons, damage, theft and compromise through disclosure
8. PERSONAL SECURITY – this involves the protection of personnel
especially high ranking officials from any harm, kidnap and other acts.
9. CRISES SECURITY - this is a part of VIP security involved in
hostage and kidnapping of VIP’s
10. OPERATIONAL SECURITY – this type of security that deals
primarily with the protection of processes, formula patents, and other
industrial and manufacturing activities from espionage, infiltration, loss
compromise or photocopying.
11. ENVIRONMENT SECURITY – is that aspect of security where all
the elements that constitute the environment of the organization are
addressed in a manner which will not disrupt the organization in the
conduct of its business.
12. Other special types of security
a. Aviation security – special type of security that deals with a
particular kind of aviation enterprise including its trade application
in the airport terminals and fields.
b. Air Cargo Security – this is applied to minimize, if not prevent,
losses of cargo during in transit, storage or transfer
c. School security – this is applied in response to the increase of
violent crimes committed against students and school personnel and
school properties.
PHYSICAL SECURITY AND
BARRIERS
OBJECTIVES OF PHYSICAL SECURITY
1. Deterrence – to deter as an objective of physical security means that
the mere presence of a physical element serves to discourage the threat
thereby preventing the untoward incident.
2. Detection – a good physical security system must be able to detect a
potential risk such as an intruder and should give out a warning to deter
the intruder and warn the owners or authorities about the intrusion.
3. Delay – perpetrators of man-made risks follow a definite timetable that
they master before starting their operation. Any delay that the
perpetrator encounters increase the chances of him being detected.
4. Denial – this objective is achieved when a physical security
measure actively and actually neutralizes the threat by overpowering
it at the instance of the event. A good locking system is a good
example of security tool that can deny intruder.
5. Diffusion – this is the objective of Physical security where the
same threat from the same source has been neutralize with no
possibility of recurrence
6. Documentation – it is the process of preserving the scene of an
incident. It is an essential reference on the event of an ensuring
investigation after a security incident had occurred.
BARRIERS, defined
Barriers refer to any physical structure whether natural or manmade
capable of restricting, deterring, delaying or preventing illegal and
unauthorized access to an installation.
TWO GENERAL TYPES OF PHYSICAL SECURITY
BARRIERS
1. NATURAL BARRIERS – these are offered by nature which could
obstruct or delay the passage way of potential intruders. These also
refer to natural structure that serve as deterrents or obstruction to
intruders such as high cliff, canyon, desert, or bodies of water
2. MAN-MADE BARRIERS – are structural constructions like
fences, walls, floors, roofs, grills, bars, roadblocks, or other physical
means to deter or impede penetration
SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS
1. Natural barriers – geographical features like mountains, cliffs, canyons,
ravens, seas, marshes, deserts, or terrain that is difficult to traverse.
2. Structural barriers – are those features constructed by man regardless of
their original intent that tend to delay the intruder.
3. Mechanical Barriers – are man made barriers, but unlike structural barriers
they are movable or portable mechanical systems
4. Human Barriers – persons being used in providing a guarding systems or
by the nature of their employment fulfill security functions like guards,
charges of quarters; office and shop workers, who stand between the intruder
and the matter to be protected.
5. Animal Barriers – animals used in partially providing a guarding system
like shepherd dogs, geese and turkey
6. Energy Barriers – are usually electrical and electronic devices that could
LEVELS OF PHYSICAL SECURITY
Also varies depending on the type and location of facility, and other factors needing
security. The levels of physical security could be any of the following.
1. MINIMUM SECURITY – is a system designed to impede unauthorized external
activity such as simple intrusion to armed attack.
2. LOW LEVEL SECURITY – is s system designed impede and detect some
unauthorized external activity such as on small retail store, storage warehouses.
3. MEDIUM SECURITY – is designed to impede, detect and assess most external
activity and some unauthorized internal activity that range from simple shoplifting to
conspiracy to commit sabotage. This includes the:
a. Used of advance intrusion alarm system
b. Establishment of perimeter and perimeter barriers; and
c. Used of unarmed guard
4. HIGH LEVEL SECURITY – is designed to impede, detect and assess most
unauthorized external activity and internal activities of certain prisons, defense
contractors, pharmaceutical companied and sophisticated electronic
manufactures. This includes the utilization of the following:
a. Close Circuit Television (CCTV)
b. Perimeter alarm system
c. High quality lighting
d. Highly trained armed guard
e. Control designed; and
f. Control designed
g. Coordination with local law enforcement agencies
5. MAXIMUM SECURITY – includes the application of the following:
h. Sophisticated alarm system;
i. On site response force
1. PERIMETER BARRIER
CONCEPT OF PERIMETER BARRIER
Perimeter barrier is a medium structure which defines the
physical limits of an installations or area to restrict or impede
access thereto. It is any physical barrier used to supplement the
protection of an inside or outside perimeter. Perimeter barrier
also includes the utilization of security personnel.
LINE OF DEFENSE
1. FIRST LINE includes all perimeter barriers
2. SECOND LINE includes the building exterior; and
3. THIRD LINE includes those internal control measures
PERIMETER BARRIER OPENINGS
4. GATES AND DOORS – should also be guarded or locked as much as
possible
5. WINDOWS AND SIMILAR OPENINGS – should also be guarded or
grills should be installed so as not to be used by intruders. Whenever
possible, windows and openings less than 18ft. Above the ground,
roofs and ledges or less than 14ft. Directly or diagonally opposite
uncontrolled windows in other walls, fire escapes or other openings of
96sq. Inches or larger should be grilled or have steel bar protections
3. SIDEWALL ELEVATOR – are elevated parts of the land near the
perimeter barrier that provides access to areas within the perimeter
barriers should be locked and guarded.
4. UTILITIES OPENINGS – such as sewers, air intakes, exhaust
tunnels which penetrate the barriers and which have cross-sectioned
area of 96sq inches or more should be protected by bars, grills.
5. CLEAR ZONE – is an obstructed area maintained on both sides of
the perimeter barrier. A clear zone of 20ft or more is desirable between
the barrier and extension structures and natural covers which may
provide concealment or assistance to a person seeking unauthorized
entry.
Clear Zones has the following specifications:
a. A clear zone of 20ft. Or more should exist between the perimeter
barriers and exterior structures, parking's areas and natural or man
made features
b. A clear zone of 50ft. Or more should exist between the perimeter
barrier and structures within the protected areas except when a
building wall constitutes part of the perimeter barrier.
TYPES OF PERIMETER BARRIERS
1. FENCES – are independent structures designed to control physical
and visual access between outside areas.
TYPES OF FENCES
a. SOLID FENCES – is made of opaque material in such a way that
visual access through the fence structure is denied. Solid fences are
constructed with heavy materials such as bricks, stone concrete and
usually extended down into the ground to a point view below the frost
line.
ADVANTAGES OF SOLID FENCE DISADVANTAGES OF SOLID
1. Denies visual access of the FENCE
installation to the intruder 1. Prevents the guards from
2. Denies the intruder the opportunity observing the area around the
to become familiar with the installation
personnel, activities and the 2. Creates shadow which may be
schedule of the movement of the used by the intruder for cover and
guard. concealment.
b. FULL VIEW FENCE- is constructed in such a manner
that visual is permitted
ADVANTAGES OF FULL VIEW FENCE DISADVANTAGES OF FULL VIEW FENCE
1. Guards are able to keep the area 1. Allows visual access to the
surrounding the installation under installation
observation 2. Allows the intruder to get familiar
2. Does not create any shadow with the movement and the time
schedule of the guard controls.
c. WIRE FENCE – is a type of fence made of chain link, barbed wire,
concertina design with small opening not larger than 2 square inches
and made of number gauge wires or heavier, twisted and barbed
salvage at top and bottom.
SPECIFICATIONS FOR USING CHAIN LINKS FENCES
-it must be constructed of 7ft material excluding top guard
- It must be 9 gauge or heavier
- Mesh openings are not be larger than 2 inches per side
- It should be twisted and barbed salvage at top bottom
- It should be security fastened to rigid metal or reinforced concrete
- It must reached below surface enough on soft grounds to compensate
for shifting soil and sand
SPECIFICATIONS FOR USING BARBED FENCES
- Standard barbed wire is twisted, double-stand 12 gauge wire with 4
point barbs spaced on equal distance apart
- Barbed wire fencing must be firmly affixed to posts high excluding
top guard
- Barbed wire fencing should not be less than 7ft high excluding top
guard
- The distance between strands will not exceed 6 inches and midway
between parts.
SPECIFICATIONS FOR USING CONCERTINA FENCE
- Concertina wire fence are formed like accordions
- Standard concertina barbed wire is commercially manufactured wire coil
of high strength steel barbed wire clipped together at intervals to from a
cylinder
- Opened concertina wire is 50 feet long and 3 feet in diameter
- Used as temporary roadblock or impediment during strikes and crowds
control.
2. BUILDING WALLS – includes walls, floor, roofs or their combinations
serve also barriers and they should be of such constructions to provide
uniform protection just like wire-fencing.
3. BODIES OF WATER – like river, lake, cataract, sea, pond or any bodies
of water forming part of the wall, building or fencing should not be
ADDITIONAL PROTECTIVE MEASURES
1. TOP GUARD - is an additional overhang of barbed wire placed on
vertical perimeter fences facing upward and outward with a 45
degree angle with three to four strands of barbed wires spaced 6
inches apart. This will increase the protective height and prevent
easy access.
2. GUARD CONTROL STATIONS – are normally provided at main
perimeter entrance to secure areas located out of doors and manned
by guards on a full time basis.
3. TOWERS or GUARD TOWERS – are house like structures above
the perimeter barriers. It gives psychological effect to violators.
4. SIGNS and NOTICES or CONTROL SIGNS – should be erected
where necessary in the management of unauthorized ingress, and
preclude accidental entry. It includes entry, ID, prohibited and
exclusive areas signs.
PERIMETER GUARDS – are also employed in augmenting the
existing perimeter security or perimeter of a certain establishments.
The two (2) types of employing perimeters guards;
1. FIXED POST – security guards are assigned in a place of the
compound to guard and watch the area surrounding and
2. PATROL (ROVING) – In this system, the security guard is required
to walk and go around the company premises.
MIDTERM
Protective Lightings
Protective lighting is designed to illuminate the perimeter barrier
and the outside approaches of an area. A threat cannot be detected, either by
camera or in person, if there is no light. Lighting can also serve as deterrence
since a threat is more likely to attack an asset in relative darkness than in bright
light.

Purpose of Protective Lighting


 To provide sufficient illumination to an area during hours of darkness
 To improve visibility in order to easily spot, identify and even apprehend
intruders
 To present psychological fear
 To serve as deterrent to thieves, pilferer, trespasser and saboteurs
General Characteristics of Protective Lighting
 It is relatively inexpensive to maintain
 It may reduce the need for security forces
 It may provide personal protection for security forces by reducing the
element of surprise by the intruder
 It requires less intensity than working light
Types of Protective Lighting
1. The stationary luminary is the most common type consisting of a series of
fixed luminaries.
 The Glare Projection Type produces bright white light with its intensity
focused on the intruder who is made highly visible but enable to easily see
what lies ahead. Glare lighting also add protection to security officers post
behind the light source.
 Controlled Lighting is focused on certain objects than the background.
1. The standby lighting provides continuous illumination of a protected area
during the hours of darkness, but it can be turned on manually or by
special device or other automatic means.
2. Movable lighting can be stationary or portable and consists of manually
operated searchlights. It may be lighted continuously during hours of
darkness or only as needed. It can supplement or temporarily replace
other types of security lighting.
3. Emergency Lighting is a standby lighting that can be utilized in the event of
electric failure, either due to local equipment or commercial power failure.
The power source of emergency lighting is usually a backup generator or
an arrangement of batteries. Lamps mounted in a stairwell that
automatically light up during a fire into the emergency lighting category.
3. Protective Alarms
Alarm (signal) is synonymous to warning of
imminent danger. This is the system that alerts people
on the presence of an unusual event, an example of
which is intrusion (break-in or theft is attempted).
Concept of Protective Alarms
Another safeguard used to assist security to
complement if not to supplement physical security is
an array of alarms. These alarms of various types and
cost can be installed indoors or outdoors.
Basically, alarm systems are designed to alert
security personnel to consummated or attempted
intrusion into an area, building or compound. Alarms
are not meant to prevent criminal acts. Each type of
alarm is activated in the event that an intruder tampers
the circuitry, a beam or radiated waves. In short,
alarms can be electrical, mechanical or electronic.
Types Of Alarm Detection System
1. Central Station System – a type of protective alarm system where
the central station is subscribers. A system in which the alarm signal is
relayed to remote panel located at the facilities of private owned
protection Service Company manned by its personnel.
- Alarm signal is transmitted over the telephone lines to central station.
Here, operator on duty is 24 hours to supervise record and maintain
alarms. Several separate compound tie their alarm system to central
station so that in case of need, the central station calls for assistance to
the police, fire department, and hospital or with other government
assistance units.
2. Proprietary System – This functions
in the same way as the central system
except that it is owned and leased by
the subscribers and the operated and
located in the facility. Response to all
alarms is by facility’s own security or
fire personnel. Since this system is
monitored locally, the response time
to an alarm is considerably reduced.
Usually, the control console is located
at the security control center where
operators are on continuous duty. Any
triggering information on fire,
intrusion, or violation of security rules
is monitored by security and
appropriate action is initiated.
3. Local Alarm System – Consists of
rigging up a visual or audible alarm near
the object to be protected, a bell or light
indicates an attempted or successful
intrusion. In case of alarm, response will
be made by local guards and other
personnel within sight or hearing. Its
success relies on someone hearing or
seeing the signal and calling the
responsible authorities. It also serves to
notify burglars that they have been
detected. In this case, the sensor
activates the circuit, which in turn
activates a horn or siren or even flashing
light located in the immediate vicinity of
the alarmed area.
4. Auxiliary System – In this system installation circuits are
led into local police or fire department by leased telephone
lines usually by special arrangements. The dual
responsibility for circuits and the high incidence of false
alarms have made this system unpopular with fire and
police personnel.
5. Local Alarm By Chance System – This is a local system in
which a bell or siren is sounded with no predictable
response. These systems are used in residence or small
retail establishments, which cannot afford a respond
system. The hope is that neighbor or passing will reach to
the alarm and call for police assistance, but such a call is
purely a matter or chance.
6. Dial Alarm System - This system is set to dial a
predestined number when alarm is activated. The number
selected might be the police or subscriber’s home number,
or both. When the phone is answered, recording states that
intrusion is in progress at the location so alarmed. This
system is relatively in expensive to install and operate but
since it is dependent on general phone circuits it could fall if
line were busy or if the phone connection were cut.
Three Parts of An Alarm Systems
1. Sensor or trigger device
2. Circuit which carries messages to the signaling
apparatus
3. Signaling systems, sometimes called the
annunciator.

Fire Alarm System


Fire alarms are those devices installed to help
detect fires and detect anything that causes fire
such as smoke or unusual rising or temperature.
Today, many communities are served either with a
telegraph-alarm system or with telephone call
boxes. Many large cities have removed all or many
of their stress alarms boxes because of problems
associated with maintenance and with false alarm
transmission. Some boxes have been replaced with
telephones. All Alarms are then transmitted to the
EMERGENCY ACTION IN CASE OF FIRE
 Anyone who discovers a fire shall sound the alarm or send someone
to sound the alarm
 If the fire has just started, fight the fire with use of the nearest
portable fire extinguishers
 If the alarm is set on, call the fire department
 If there is need to evacuate, follow the prescribed evacuation of the
building
4. PROTECTIVE LOCKS AND KEYS
CONCEPT OF PROTECTIVE LOCKS AND KEY CONTROL
The best defense against lock picking and making of key by impression
is the installation of special pick-resistant, impression resistant lock
cylinders. Generally speaking, locks are the cheapest security
investment that can be made. Locking device is simply a mechanism
that extends the door or window into a wall that hold them. If therefore,
the wall or the door itself is weak or easily destructible, the lock cannot
be effective.
The following can be utilized to
maintain effectively key control:
KEY CABINET – a well-constructed
cabinet will have to be produced. The
cabinet will have to be sufficient size to
hold the original key to every lock in the
system. It should be locked at all times
KEY RECORDS- some administrative
means must be set up to record code
number of the locks and to whom the
keys of a specific locks was issued.
INVENTORIES – periodic account
must be made of all duplicates and
original keys in the hands of the
employees whom they have been issued.
AUDITS – In addition to periodic inventories, an unannounced audit
should be made of all the key control records and procedures by a
member of the management
DAILY REPORT – a regular report must be made to the person
responsible for the key control from the personnel department
indicating all persons who have left or will be leaving the department
or the company. In the event that a key was issued, steps should be
made to recover the key.
OTHER PROTECTIVE
CONTAINER
1. SAFE- it is a metallic container use
for the safekeeping of documents or
small items in an office or installation.
Safe can be classified as either robbery
or burglary resistance depending upon
the used and need. Its weight must be
at least 750 lbs.; it should be anchored
to a building structure; and its body
should at least one inch thick steel.
2. VAULT - this is a heavily
constructed fire and burglar resistance
container usually a part of building
structure used to keep and protect cash,
document and negotiable instruments.
Vaults are bigger than safe but smaller
than a security file room. The vault door
should be made of steel at least 6 inches
in thickness; the vault walls, ceiling,
floor reinforce concrete at least 12
inches in thickness; and the vault must
be resistive to fire up to 6 hours.
3. FILE ROOM – it is a cubicle in
a building constructed a little
lighter than a vault but bigger size
to accommodate limited people to
work on the records. The file room
should at most be 12 feet high and
it must have a watertight door and
at least fire proof for one hour.
PERSONNEL IDENTIFICATION AND MOVEMENT
CONTROL
In every installation, the use of protective barriers, security lighting,
communication and electronic hardware provides physical safeguards
but these are insufficient to maximize the effort of the guard force. A
control point must be established for positive personnel identification
and check system. This is to ensure that only those people who have
the right and authority will be given the necessary access to the area.
TYPES OF PERSONNEL IDENTIFICATION
1. Personal recognition
2. Artificial recognition
BUILDING ACCESS CONTROL
At any physical barrier, a security system must possess the ability to
distinguish among authorized persons, unauthorized visitors, and other
unauthorized persons. This is to assist the security personnel protects
sensitive are and information within the installation.
Appropriate warning signs should be posted at the building perimeter.
Special restricted entry facilities to public access should be provided. This
will be dependent on the degree of security needed for the protection of
property, activity and other processes within the building
The access to the restricted area shall be limited to authorized personnel
who have the direct involvement with the installation, construction and
operation and maintenance of the equipment and systems and/or use of the
materials contained within the restricted area. A clear-cut policy on the
access control should be disseminated to all personnel of the installation.
RISK ANALYSIS AND SECURITY HAZARD
RISK – it is the potential damage or loss of an asset. The level of risk
is a combination of two factors: the value place on that asset by its
owner and the consequences, impact adverse effect of the loss or
damage to that asset and the likelihood that a specific vulnerability
will be exploited by a particular threat.
RISK MANAGEMENT - it is a process of selecting and
implementing security countermeasures to achieve an acceptable level
of risk at an acceptable cost.
RISK ANALYSIS – the analysis of risk includes examination of the
vulnerability, probability and criticality of potential threats and
includes natural and manmade risk.
ADVERSARY – It refers to any individual, group, organization or
government that conducts activities or has the intention and capability to
conduct activities detrimental to the individual, private or government
entity.
ASSET – any information, facility, material, information, or activity
which has a positive value to its owner whether it is an individual, private
or government entity.
VULNERABILITY – any weakness that can be exploited by an
adversary to gain access to an asset
COUNTERMEASURES – action taken or a physical entity used to
reduce or eliminate one or more vulnerabilities. The cost of possible
countermeasures maybe monetary, but may also include non-monetary
cost such as reduced operationally efficiency, adverse publicity
PROBABILITY – is the chance or likelihood that a loss will take
place.
CRITICALLY – the impact of a loss as measured in financial terms.
RELATIVE CRITICALLY OF OPERATION - This pertains to the
importance of the firm with reference to the natural economy and
security.
RELATIVE VULNERABILITY – this is the susceptibility of the
plant or establishment to damage, loss or disruption of operation due to
various hazards.
RISK MANAGEMENT ALTERNATIVES AND STRATEGIES
RISK AVOIDANCE – eliminating or removing the risk totally from the
business, government, or industrial environment for which the risk manager
has responsibility
RISK REDUCTION – decreasing the risk minimizing the probability of the
potential loss. The reduction or criminal opportunity is often accomplished by
situational crime.
RISK SPREADING – spreading the risk through compartment or
decentralization to limit the impact of the potential loss.
RISK TRANSFER – moving the financial impact of the potential loss-over
to an insurance company
RISK SELF-ASSUMPTION – planned assumption and acceptance of the
potential risk by making a deliberate managerial decision of doing nothing
about the threat, or setting resources for use in case of a specific loss incident.
SECURITY HAZARDS
Hazards in General
As earlier defined, hazard could be mean exposure to the
chance of loss or injury: or the term is synonymous to risk and
or peril. In the field of industrial security, any hazardous
situations or conditions are called security hazards.
Normally, loss of life and damage to prosecute are caused by
human negligence in their failure to recognize the adverse effect
of a particular condition or event. Security interferes by
removing or deterring the identified hazards.
TYPES OF HAZARDS
There are various forms and causes of hazards.
1. NATURAL HAZARD – these are hazards which arise from
natural phenomena.
a. Flood caused by typhoons
b. Earthquakes
c. Fire
d. Storms
e. Lightning storms
f. Extreme temperature and humidity
2. HUMAN MAN MADE HAZARDS – these are hazards which are result of state of mind,
attitude, weaknesses or character traits of one or more persons. They can be acts of
commission or omission, both overt or covert, which can disrupt operation of a plant or
installation. It includes but not limited to the following:
a. SABOTAGE – as deliberate destruction or the deliberate damaging or destroying of
property or equipment
b. ESPIONAGE – as the activity of spying of the use of spying or spies to gather secret
information. This is a hazard because people may come to know the confidential
processes or procedures of a certain organization or business establishment
c. PILFERAGE – is the act of stealing small things or items of little value, especially
habitually
d. THEFT AND ROBBERY – both acts involve the taking of another’s property with
intent to gain without the owner’s consent. Theft is committed without violence against
or intimidation or persons nor force upon things
e. DISLOYALTY – this is the act of unfaithfulness to one’s organization. This is
hazardous because it may lead to unauthorized disclosure of information to the other
people.
f. DISAFFECTIONS – this is manifested by losing satisfaction
thereby causing the unsatisfied person to commit acts that may
cause peril to his own organization
g. SUBVERSIVE ACTIVITIES – these are activities designed
to overthrow government or intended of likely to undermine or
overthrow a government or other institution. These are hazards
because they may cause disruption of the normal operations of
an institution or organization
EFFECTS OF HAZARDS
HAZARDS when not immediately
checked usually cause loss of life or
property loss and damages.
PILFERAGE AND OTHER
SECURITY HAZARDS
As earlier discussed, hazards come from
various forms. This lesson includes the
identification of the specific types of
man made security hazards and the
security countermeasures to be taken to
reduce the hazard’s adverse effects.
PILFERAGE AS A SECURITY HAZARDS – as earlier described,
pilferage is the act of stealing small items or items of little value. However,
these little value when accumulated become a great loss to a business
establishment.
1. Types of Pilferage
a. Casual Pilferer – is one who steals due to his inability to resist the
unexpected opportunity and has a little fear of detection is no plan or
premeditation and he is usually a “loner” on the job. The temptation to
pick up the article is basically due to poor security measure. The
implication of casual pilfering is the big cumulative cost if it remains
unchecked.
b. Systematic Pilferer – is one who steels with preconceived plans and
takes away any or all types of items or supplies for economic gain.
Pilferers of this kind can be employees or outsiders o the establishment.
SABOTAGE AS A SECURITY HAZARD
As earlier defined, sabotage is the deliberate destructions of the
deliberate damaging or destroying of property or equipment.
SECURITY SURVEY – this is also
known as security audit which is
actually fact-finding probe to determine
a plant’s adequacy and deficiency in all
aspects of security, with the
corresponding recommendations

SECURITY SYSTEM – this is the set


of policies, procedures and rules and
regulations designed to reduce to an
absolute minimum the possibility of
espionage, sabotage and compromise of
classified information of an office or a
RELATED TERMINOLOGIES – for better comprehension, the following
terminologies are hereby defined:
1. Survey – the term applied to the first detailed “look see” conducted by a team
2. Security Inspections or Follow-up Surveys – this is the term referring to the
succeeding surveys after the initial surveys
3. Supplement surveys – it is conducted when there is business reorganization with
corresponding changes in object and physical by-outs of the complex
4. Special surveys – this is directed by management, if the initial survey appears to
have left certain portions or aspects involving security due to change in policy
or operation that will greatly affect the total security picture.
5. Entrance conference – a conference or a dialogue between the survey team and
management officials of plant before security survey is conducted.
6. Exit Conference – a conference similar to entrance conference done after the
completion of the security survey.
THREE CATEGORIES CONSIDERED - generally, recommendations
from security survey will fall into three categories:
1. Human guard – refers to the number of guards needed and their
respective qualifications like female guards for searching female
employees
2. Equipment – this includes the type and number of firearms needed,
communications, gadgets, metal detectors and other devices
necessary in the implementation of the proposed security system.
3. Procedures – these are the detailed rules and regulations and steps
necessary in the implementation of the proposed or existing security
system.
SECURITY INSPECTION – this is a check of
how well existing security measures and
regulations are being carried out within a
detachment or establishment. A security inspection
may also include an investigation of alleged or
suspected security violations. Physical security is
concerned with forces, entrances and exits,
guards, traffic control, lighting, fire control, and
with such other physical measures, which, if
properly establish and maintained, will deny,
access to unauthorized persons.
In the field of police and military intelligence,
security inspection is defined as a
counterintelligence service performed to
determine compliance with established security
policies and procedures.
Purpose of Security Inspection
1. To determine compliance of security policies
2. To detect weaknesses in the existing security measures
3. To assess assets and the probability of risk or the likelihood that loss will
take place
Phases of Security Inspection
4. Detection of company policy violations- That acts or practices of
employees that are contrary to policy. For example, tampering on
employee time cards or bringing out company property for unknown
reasons
5. Detection of possible defects in protective devices and other security aids-
For example, empty fire extinguishers, destroyed perimeter fences, busted
perimeter lights, and alarm system defects
6. Detection of the condition of properties being protected- For example,
when the property being protected is exposed to rain and sunlight
7. Detection of security hazards- For example, improper storage of waste
materials
Importance of Security Inspection
1. It can help determine the effectiveness of a risk appraisal
2. It can identify weaknesses in security countermeasures
3. It can prevent possible loss of company assets

Safety Inspection
Safety is generally defined as the state of being certain that adverse effects
will not be caused by some agent under defined conditions. It means
freedom from danger, risk or injury. It involves measures used to prevent or
detect an abnormal condition that can endanger people, property or the
enterprise.

Objectives of Safety Inspection


4. To save life-An organizations workers are considered its most valuable
asset. It is the obligation of the company to assure the safety of its
workers, as well as its visitors/clients in its vicinity at all times.
5. To secure properties
To restore the affected facility as soon as possible
SECURITY INVESTIGATION
Security investigation is one of the major functions
of a security organization. Most security officers and
supervisors are called upon to conduct preliminary
investigation on theft, injury or any other kind of untoward
incident. These investigations are usually non-criminal in
nature but still important since they may result in civil
litigation.
The term investigation means a planned and
organized determination of facts concerning specific events,
occurrences or conditions for a particular purpose. Security,
on the other hand, means the protection of property from
loss through theft, fraud, fires, threats or hazards. While
security investigation is a planned and organized
determination of facts concerning specific loss or damage of
assets due to threats, hazards or unsecured conditions.
Elements of Investigation
1. Investigation
2. Purpose
3. Subject of Investigation
The Three I’s of Investigation
4. Information- The knowledge which the investigator gathers from different
sources.
a. Acquired from regular sources. Conscientious and public-spirited citizens,
company files, school files, or records file of other agencies.
b. Acquired from cultivated sources. Paid informants, bartenders, cab
drivers, acquaintances, etc.
1. Interrogation- The skillful questioning of witnesses as well as suspects.
This is different from an interview. An interview means the simple
questioning of a person who has no personal reason to withhold
information. Interrogation, in contrast means the questioning of suspect or
other person who is reluctant to divulge information concerning the
offense under investigation.
2. Instrumentation- it is the application of instruments and methods of
physical sciences to the detection of crimes. In other words, the
summation of the application of all sciences in crime detection known as
criminalistics.
Purpose of Investigation
1. To identify the offender
2. To locate the offender
3. To provide evidence

Investigation Report
Report writing is a crucial part of the investigation. The most
diligent and professionally conducted investigation losses its value if the
effort is not properly reported. An investigative report is a written document
in which the investigator records the activity in the investigation and the
evidence gathered. A competent investigator writes a report so that a reader
can be readily understand what the investigator did, why it was done and
the results of the action.

Purpose of the Investigation Report


The following are the rationale of an investigation report.
4. To provide a permanent official record of the investigation
5. To provide other investigators with information necessary to further
advance the investigation
6. To uphold the statements as facts on which designated authorities may
base a criminal corrective or disciplinary action
Parts of the Report

The investigation report contains the following components:


1. Administrative Data
a. Date
b. File Number
c. Subject
d. Complaint
e. Reporting investigator
f. Office of origin
g. Status
h. Distribution
1. Synopsis – a brief description of the actions of the perpetrator as
established in the body of the report.
2. Details of the report-objective of the investigation
3. Conclusion and recommendation- include the investigator’s opinion,
conclusion and recommendations
4. Enclosures-photographs, sketches, sworn statement, etc.
SECURITY EDUCATON
oftentimes employees of companies or
business establishment rely on the
assigned security personnel for their
security and protection. This attitude
normally results to vulnerability and
susceptibility of the concerned company
to security hazards. When a loss or
damage to property occurs, company
management puts to blame on the security
personnel. One thing is always forgotten,
“Security is everybody’s business.
With these, company employees should
be educated and make aware of their roles
in the security of their own company.
IMPLEMENTING RULES AND REGULATIONS OF THE PRIVATE
AGENCY LAW OF THE PHILIPPINES
R.A. 5487 – it is the law that governs the organization and operation of private
security agency throughout the Philippines. It is otherwise known as the PRIVATE
AGENCY LAW OF THE PHILIPPINES.
SAGSD – referred to the current PNP Civil Security Agency and Guard
Supervision Division or any other PNP office that may be designated later as the
primary office for supervision of the implementation of RA 5487
SECURITY GUARD – also known as “private guard or watchman” shall be
include any person who offers or “renders personal services” to watch or secure
either a residence or business establishment or both or buildings, compound or
areas for hire or compensation or as employee thereof, including any employee of
the national or local governments or agencies or instrumentalities thereof and or
governmental buildings, compounds, premises and other properties, other than
members of the AFP, BJMP, PNP or of any other law enforcement agency of the
CHARACTERISTIC OF SECURITY GUARD
1. ALERTNESS – being watchful in spotting violator, a vehicle, a
person or any incidents
2. JUDGMENT – sound good discretion to arrive at a wise and
timely decision
3. CONFIDENCE - faith in himself and his abilities to attain
through knowledge of job
4. PHYSICAL FITNESS – always in good condition to render
effective service even under the most strenuous condition
5. TACTFULNESS – ability to deal with other successfully without
offending
6. SELF-CONTROL – ability to take hold on oneself regardless of
provoking situations
PRIVATE DETECTIVE – refers to any person who does not
detective work for hire, reward or commission, other than members of
the AFP, BJMP, Provincial guards, PNP, or any law enforcement
agency of the government.
LICENSE TO EXERCISE PROFESSION or LICENSE
CERTIFICATE – the document issued by CPNP or his duly
authorized representatives recognizing a person to be qualified to
perform his duties as security guard or detective.
SECURITY GUARD FORCES - it is a group of force selected
men, trained or grouped into functional unit for the purpose of
protecting operational processes from those disruption which would
impede efficiency or halt operation at a particular plant, facility,
installation or special activity.
PRIVATE SECURITY AGENCY (PSA) refers to any person,
association, partnership, film or Private Corporation, who contracts,
recruits, trains, furnishes or posts any security guard, to do its functions
or solicit individuals, business, firms or private, public or government-
owned or controlled corporations to engage his/its service or those of
his/its security guard for hire, commission or compensation
COMPANY SECURITY FORCES (CSF) – is a security force
maintained and operated by any private company or corporation for its
own security requirements only.
GOVERNMENT SECURITY UNIT (GSU) – is a security unit
maintained and operated by any government entity other than military
and/ a police, which is established and maintained for the purpose of
securing the office or compound and/or extension of such government
PHILIPPINE ASSOCIATION OF DETECTIVE AND PROTECTIVE
AGENCY OPERATIONS, INC. (PADPAO) –
This is the national association of all licensed security agencies and
company security forces. This was established as 1958 purposely for
the self-regulation of all security agencies.
DUTY DETAIL ORDER – a written order or schedule issued by a
superior officer usually the private security agency or branch manager
or operations officer assigning the performance of private security;
detective services duties

You might also like