Introduction To Industrial Security Concept 1
Introduction To Industrial Security Concept 1
INDUSTRIAL SECURITY
CONCEPT
CHAPTER 1: DEVELOPMENT AND
EVOLUTION OF SECURITY AND
SAFETY INDUSTRY
HISTORY OF SECURITY
Private security is not a new concept. Security forces existed long
before a paid police force. Private security has a long history starting in
medieval times when knights protected lords and ladies. In the colonies all
able-bodied men were to stand a citizen’s night watch to protect the
community from invasion and fire. ADT (American District Telegraph
Company) was formed in 1874. it is still today one of the largest alarm
monitoring companies in the country. Washington Brink formed Brinks
armored car service in 1891. In 1895 Allan Pinkerton was the first law
enforcement officer hired to protect the interests of the railroads. It was in
the private sector that the first SWAT (special weapons and tactics) unit was
formed in 1899. Rangers would arrive in a special baggage car that carried
eight men and horses. When a train robbery would occur these rangers
would chase the robbers on horseback. William Burns founded his
Private Security has a long in some cases longer and more
distinguished past than public law enforcement agencies.
Public law enforcement agencies can trace its origin back to Sir Robert
Peel, home Secretary of England and the passage of the metropolitan
police act of 1829. Sir Robert Peel’s reforms developed the structure of
today’s Scotland Yard. A force empowered by law to prevent crime and
apprehend offenders.
Before that time, London had a private security force consisting of a
day time patrol, a night time patrol and a horse patrol to protect its
citizen’s.
HISTORY OF SECURITY IN THE
PHILIPPINE SETTING
In 1950, the late DR. JOSE B. MANIWANG PhD, WSO-CSSD,
Registered Criminologist and well known as the “Father of Philippine
Security” first established, as a single proprietor, a private security agency
the National Intelligence and Security Service, a business he thought of
after World War II, being a war veteran under the USAFFE and as the
country recovers and various business grew. On June 23, 1971 he re-
organized the company as Security and Safety Corporation of the
Philippines with well-known doctors in academics, deans, and
criminology educators in the Philippines. Their vision and mission was to
promote professionalism in the security industry through security
education , academic researches and providing trained, disciplined and
highly motivated security force. Through this vision, the company was
awarded the Most Outstanding Security Agency of the Year in 1989 and
1999. the feat that made the agency of Hail of Famer in the Security
In 1985, Dr. Maniwang organized the Security and Safety Training
Center, Inc., or SSTCI, with the forethought of providing
professionalized training for security guards. As an educator, he
believes that proper training is an aspect in having quality security
personnel. SSTCI was awarded as Security Training Center of the year
for 1989, 1997, 2000, 2001 and 2002, a major feat that made the school
a hall of famer in security trainings. The education curriculum and
programs created by Dr. Maniwang have been adopted by many
security training centers and criminology colleges in the country. His
book Manual for security guards had become a foremost reference for
security guards. On April 4, 2003, SSTCI was reorganized to be known
as Industrial Detective and Security Training School, Inc. or IDSTSI.
The Security & Safety Corporation of the Philippines operates in the
whole Philippine Archipelago composing of 7, 100 islands. It has
offices in the 3 major islands of Luzon, visayas, and Mindanao. Its
main office is located 75 F. Manalo Street, Cubao, Quezon City in the
heart of the Cubao Commercial District.
The company provides armed and unarmed security force, VIP escorts,
background investigation, due diligence services, risk management and
security consulting, security and safety alarm systems and security
awareness education programs.
SECURITY TODAY
Private security today can be found everywhere from the hospital to the
mail. In many cases they are required to perform the same responsibilities
as a law enforcement officer. Yet the security profession does not get the
same respect the law enforcement profession receives. Part of the reason for
this dim view of the security profession is the lack of training requirements.
Training for law enforcement officers came first and has grown over the
years. A “real cop” takes great pride in the achievement of graduation from
a police academy.
Some countries now are requiring certification and training standards for
the private security officer. If every country were to create training and
education standards for security officers to become certified security
professionals, the “rent a cop” could also take pride in his ability to have
passed a training course. Then the officer and the public would perceive
CHAPTER 2: THEORIES, CONCEPTS,
PHILOSOPHY OF SECURITY AND SAFETY
CONCEPT OF SECURITY
A. Security defined….
1. The quality of being secure: such as
a. Freedom from danger: SAFETY
b. Freedom from fear or anxiety
c. Freedom from the prospect if being laid off job security
2. Measures taken to guard against espionage or sabotage, crime,
attack, or escape
3. An organization or department whose task is security
4. Security refers to all the measures that are taken to protect a place or
to ensure that only people with permission enter it or leave it.
SECURITY
1. State or feeling of safety: the state or feeling of being safe and
protected
2. Freedom from worry about possible lose
3. Something giving assurance: something that provides a sense of
protection against loss, attack or harm
4. Safety: protection against attack from without or subversion from
within
5. Precautions to maintain safety: precautions to keep somebody or
something safe from crime, attack, danger
6. Guards: people or an organization entrusted with the job of
protecting somebody or something, especially a building or
installation, against crime
B. Asset defined…
An asset is a resource with economic value that an individual,
corporation or country owns or controls with the expectation that it will
provide future benefit. Assets are reported on a company’s balance
sheet and are bought or created to increase a firm’s value or benefit the
firm’s operations.
An asset can be thought of as something, that, in the future, can
generate cash flow, reduce expenses, or improve sales, regardless of
whether its manufacturing equipment or a patent
C. Risk defined…
Risk is a probability or threat of damage, injury, loss, or any other
negative occurrence that is caused by external or internal
vulnerabilities, and that may be avoided through pre-emptive action
D. Threat defined…
A statement of an intention to inflict pain, injury, damage, or other
hostile action on someone in retribution for something done or not
done.
A person or thing likely to cause damage or danger
E. Vulnerability defined..
The quality or state of being exposed to the possibility of being
attacked or harmed, either physically or emotionally.
Industrial Security – the term means security measures applied to
business industries.
HAZARDS
Hazards refer to conditions that may cause damage to property, injury,
or loss of life. It is also define as “exposure to the chance of loss or
injury. Hazards are caused either by nature or by man himself.
MODES OF HAZARDS
There are different modes to which the threats of hazards belong and
are defined.
a. DORMANT MODE – a hazard is on a dormant mode when it
merely has the potential to be hazardous. No person, property or
environment is affected by this condition. A volcano in an isolated and
uninhabited island is an example.
b. POTENTIAL MODE – a hazard is on a potential mode when it is
in the position or a situation to harm persons or destroy properties or
environment. Hazards in this mode need to be assessed to determine
risk it could bring.
c. ACTIVE MODE – A hazard in an active mode when it is certain to
cause harm as no intervention can be made before the incident.
CLASSIFICATION OF HAZARDS
A. NATURAL HAZARDS – these hazards are generally caused by
natural phenomenon. The following are examples of natural
hazards:
a. Drought
b. Earthquake
c. Flood
d. Hurricane
e. Lahar
B. MAN-MADE HAZARDS- these hazards are acts of omission or
commission of man. Acts of omission are caused by one's ignorance,
indifference or negligence. Acts of commission are actions motivated
The following are examples of man-made hazards:
1. Sabotage
2. Accidents
3. Violation of regulation
4. Theft
C. ACTIVITY-RELATED HAZARDS – activity related hazards are achieved
by the undertaking of a certain activity or condition. This will be
eliminated by stopping the activity, correction of condition or removal
of the cause of hazardous condition.
5. Skydiving
6. Cliff Climbing
7. Combat sports
MAJOR DIVISION OF INDUSTRIAL SECURITY
In providing security and protection to industrial establishments, security and protective measures are
focused on the following major division:
1. PHYSICAL SECURITY – This is the broadest type of security. As a major division of industrial
security. It can be defined as those measures taken to prevent physical access or entry to an
installation or area by unauthorized person
2. PERSONNEL SECURITY – This division of security applied to check the background of
persons as well as the protection of company personnel against potential harmful acts or
conditions.
3. DOCUMENT AND INFORMATION SECURITY – this includes every measures designed to
safeguard company documents from unintentional or intentional harmful acts or against
unauthorized disclosure of information contained therein.
TYPES OF SECURITY
1. PHYSICAL SECURITY- it is the broadest branch of security which is
concerned with the physical measures adopted to prevent unauthorized
access to equipment, facilities, materials, and documents and to
safeguard them against espionage, sabotage damage and theft. Physical
security covers other types of security to protect equipment, documents,
facilities and materials against theft damage, sabotage or espionage. It
also encompasses protection of personnel from any criminal act.
2. SUPERMARKET SECURITY – this is applied in response to the
mushrooming of bazaars, marts, supermalls, and the like
3. PERSONNEL SECURITY – this involved in the background checks for
individuals commensurate with the security requirements of their work.
This also includes measures designed to protect employees of an
organization or business establishment.
4. COMMUNICATION SECURITY – It is the protection resulting from the application
of various measures that prevent or delay the enemy or unauthorized persons in gaining
information through the communication system. This includes:
a. TRANSMISSION SECURITY – a type of communication security that results from
all measures designed to protect transmission from the interception, traffic analysis
and imitative deception.
b. CRYPTOGRAPHIC SECURITY - result from the provisions of technically , sound
crypto-systems and proper use
c. PHYSICAL SECURITY – providing of safeguards to equipment and materials from
access of unauthorized persons
5. HOTEL SECURITY (HOUSE DETECTIVES) – it refers to the protection of assets,
guest, personal affects and other properties in hotels, inns and other similar
establishments.
6. BANK SECURITY – A specialized type of physical security protecting the assets,
personnel and operation of a bank, with special emphasis on the precaution and
measures to safeguard the cash and assets while the storage, in transit and during
7. DOCUMENT SECURITY – It is the physical security involving the
protection of documents and classified papers from loss access by
authorized persons, damage, theft and compromise through disclosure
8. PERSONAL SECURITY – this involves the protection of personnel
especially high ranking officials from any harm, kidnap and other acts.
9. CRISES SECURITY - this is a part of VIP security involved in
hostage and kidnapping of VIP’s
10. OPERATIONAL SECURITY – this type of security that deals
primarily with the protection of processes, formula patents, and other
industrial and manufacturing activities from espionage, infiltration, loss
compromise or photocopying.
11. ENVIRONMENT SECURITY – is that aspect of security where all
the elements that constitute the environment of the organization are
addressed in a manner which will not disrupt the organization in the
conduct of its business.
12. Other special types of security
a. Aviation security – special type of security that deals with a
particular kind of aviation enterprise including its trade application
in the airport terminals and fields.
b. Air Cargo Security – this is applied to minimize, if not prevent,
losses of cargo during in transit, storage or transfer
c. School security – this is applied in response to the increase of
violent crimes committed against students and school personnel and
school properties.
PHYSICAL SECURITY AND
BARRIERS
OBJECTIVES OF PHYSICAL SECURITY
1. Deterrence – to deter as an objective of physical security means that
the mere presence of a physical element serves to discourage the threat
thereby preventing the untoward incident.
2. Detection – a good physical security system must be able to detect a
potential risk such as an intruder and should give out a warning to deter
the intruder and warn the owners or authorities about the intrusion.
3. Delay – perpetrators of man-made risks follow a definite timetable that
they master before starting their operation. Any delay that the
perpetrator encounters increase the chances of him being detected.
4. Denial – this objective is achieved when a physical security
measure actively and actually neutralizes the threat by overpowering
it at the instance of the event. A good locking system is a good
example of security tool that can deny intruder.
5. Diffusion – this is the objective of Physical security where the
same threat from the same source has been neutralize with no
possibility of recurrence
6. Documentation – it is the process of preserving the scene of an
incident. It is an essential reference on the event of an ensuring
investigation after a security incident had occurred.
BARRIERS, defined
Barriers refer to any physical structure whether natural or manmade
capable of restricting, deterring, delaying or preventing illegal and
unauthorized access to an installation.
TWO GENERAL TYPES OF PHYSICAL SECURITY
BARRIERS
1. NATURAL BARRIERS – these are offered by nature which could
obstruct or delay the passage way of potential intruders. These also
refer to natural structure that serve as deterrents or obstruction to
intruders such as high cliff, canyon, desert, or bodies of water
2. MAN-MADE BARRIERS – are structural constructions like
fences, walls, floors, roofs, grills, bars, roadblocks, or other physical
means to deter or impede penetration
SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS
1. Natural barriers – geographical features like mountains, cliffs, canyons,
ravens, seas, marshes, deserts, or terrain that is difficult to traverse.
2. Structural barriers – are those features constructed by man regardless of
their original intent that tend to delay the intruder.
3. Mechanical Barriers – are man made barriers, but unlike structural barriers
they are movable or portable mechanical systems
4. Human Barriers – persons being used in providing a guarding systems or
by the nature of their employment fulfill security functions like guards,
charges of quarters; office and shop workers, who stand between the intruder
and the matter to be protected.
5. Animal Barriers – animals used in partially providing a guarding system
like shepherd dogs, geese and turkey
6. Energy Barriers – are usually electrical and electronic devices that could
LEVELS OF PHYSICAL SECURITY
Also varies depending on the type and location of facility, and other factors needing
security. The levels of physical security could be any of the following.
1. MINIMUM SECURITY – is a system designed to impede unauthorized external
activity such as simple intrusion to armed attack.
2. LOW LEVEL SECURITY – is s system designed impede and detect some
unauthorized external activity such as on small retail store, storage warehouses.
3. MEDIUM SECURITY – is designed to impede, detect and assess most external
activity and some unauthorized internal activity that range from simple shoplifting to
conspiracy to commit sabotage. This includes the:
a. Used of advance intrusion alarm system
b. Establishment of perimeter and perimeter barriers; and
c. Used of unarmed guard
4. HIGH LEVEL SECURITY – is designed to impede, detect and assess most
unauthorized external activity and internal activities of certain prisons, defense
contractors, pharmaceutical companied and sophisticated electronic
manufactures. This includes the utilization of the following:
a. Close Circuit Television (CCTV)
b. Perimeter alarm system
c. High quality lighting
d. Highly trained armed guard
e. Control designed; and
f. Control designed
g. Coordination with local law enforcement agencies
5. MAXIMUM SECURITY – includes the application of the following:
h. Sophisticated alarm system;
i. On site response force
1. PERIMETER BARRIER
CONCEPT OF PERIMETER BARRIER
Perimeter barrier is a medium structure which defines the
physical limits of an installations or area to restrict or impede
access thereto. It is any physical barrier used to supplement the
protection of an inside or outside perimeter. Perimeter barrier
also includes the utilization of security personnel.
LINE OF DEFENSE
1. FIRST LINE includes all perimeter barriers
2. SECOND LINE includes the building exterior; and
3. THIRD LINE includes those internal control measures
PERIMETER BARRIER OPENINGS
4. GATES AND DOORS – should also be guarded or locked as much as
possible
5. WINDOWS AND SIMILAR OPENINGS – should also be guarded or
grills should be installed so as not to be used by intruders. Whenever
possible, windows and openings less than 18ft. Above the ground,
roofs and ledges or less than 14ft. Directly or diagonally opposite
uncontrolled windows in other walls, fire escapes or other openings of
96sq. Inches or larger should be grilled or have steel bar protections
3. SIDEWALL ELEVATOR – are elevated parts of the land near the
perimeter barrier that provides access to areas within the perimeter
barriers should be locked and guarded.
4. UTILITIES OPENINGS – such as sewers, air intakes, exhaust
tunnels which penetrate the barriers and which have cross-sectioned
area of 96sq inches or more should be protected by bars, grills.
5. CLEAR ZONE – is an obstructed area maintained on both sides of
the perimeter barrier. A clear zone of 20ft or more is desirable between
the barrier and extension structures and natural covers which may
provide concealment or assistance to a person seeking unauthorized
entry.
Clear Zones has the following specifications:
a. A clear zone of 20ft. Or more should exist between the perimeter
barriers and exterior structures, parking's areas and natural or man
made features
b. A clear zone of 50ft. Or more should exist between the perimeter
barrier and structures within the protected areas except when a
building wall constitutes part of the perimeter barrier.
TYPES OF PERIMETER BARRIERS
1. FENCES – are independent structures designed to control physical
and visual access between outside areas.
TYPES OF FENCES
a. SOLID FENCES – is made of opaque material in such a way that
visual access through the fence structure is denied. Solid fences are
constructed with heavy materials such as bricks, stone concrete and
usually extended down into the ground to a point view below the frost
line.
ADVANTAGES OF SOLID FENCE DISADVANTAGES OF SOLID
1. Denies visual access of the FENCE
installation to the intruder 1. Prevents the guards from
2. Denies the intruder the opportunity observing the area around the
to become familiar with the installation
personnel, activities and the 2. Creates shadow which may be
schedule of the movement of the used by the intruder for cover and
guard. concealment.
b. FULL VIEW FENCE- is constructed in such a manner
that visual is permitted
ADVANTAGES OF FULL VIEW FENCE DISADVANTAGES OF FULL VIEW FENCE
1. Guards are able to keep the area 1. Allows visual access to the
surrounding the installation under installation
observation 2. Allows the intruder to get familiar
2. Does not create any shadow with the movement and the time
schedule of the guard controls.
c. WIRE FENCE – is a type of fence made of chain link, barbed wire,
concertina design with small opening not larger than 2 square inches
and made of number gauge wires or heavier, twisted and barbed
salvage at top and bottom.
SPECIFICATIONS FOR USING CHAIN LINKS FENCES
-it must be constructed of 7ft material excluding top guard
- It must be 9 gauge or heavier
- Mesh openings are not be larger than 2 inches per side
- It should be twisted and barbed salvage at top bottom
- It should be security fastened to rigid metal or reinforced concrete
- It must reached below surface enough on soft grounds to compensate
for shifting soil and sand
SPECIFICATIONS FOR USING BARBED FENCES
- Standard barbed wire is twisted, double-stand 12 gauge wire with 4
point barbs spaced on equal distance apart
- Barbed wire fencing must be firmly affixed to posts high excluding
top guard
- Barbed wire fencing should not be less than 7ft high excluding top
guard
- The distance between strands will not exceed 6 inches and midway
between parts.
SPECIFICATIONS FOR USING CONCERTINA FENCE
- Concertina wire fence are formed like accordions
- Standard concertina barbed wire is commercially manufactured wire coil
of high strength steel barbed wire clipped together at intervals to from a
cylinder
- Opened concertina wire is 50 feet long and 3 feet in diameter
- Used as temporary roadblock or impediment during strikes and crowds
control.
2. BUILDING WALLS – includes walls, floor, roofs or their combinations
serve also barriers and they should be of such constructions to provide
uniform protection just like wire-fencing.
3. BODIES OF WATER – like river, lake, cataract, sea, pond or any bodies
of water forming part of the wall, building or fencing should not be
ADDITIONAL PROTECTIVE MEASURES
1. TOP GUARD - is an additional overhang of barbed wire placed on
vertical perimeter fences facing upward and outward with a 45
degree angle with three to four strands of barbed wires spaced 6
inches apart. This will increase the protective height and prevent
easy access.
2. GUARD CONTROL STATIONS – are normally provided at main
perimeter entrance to secure areas located out of doors and manned
by guards on a full time basis.
3. TOWERS or GUARD TOWERS – are house like structures above
the perimeter barriers. It gives psychological effect to violators.
4. SIGNS and NOTICES or CONTROL SIGNS – should be erected
where necessary in the management of unauthorized ingress, and
preclude accidental entry. It includes entry, ID, prohibited and
exclusive areas signs.
PERIMETER GUARDS – are also employed in augmenting the
existing perimeter security or perimeter of a certain establishments.
The two (2) types of employing perimeters guards;
1. FIXED POST – security guards are assigned in a place of the
compound to guard and watch the area surrounding and
2. PATROL (ROVING) – In this system, the security guard is required
to walk and go around the company premises.
MIDTERM
Protective Lightings
Protective lighting is designed to illuminate the perimeter barrier
and the outside approaches of an area. A threat cannot be detected, either by
camera or in person, if there is no light. Lighting can also serve as deterrence
since a threat is more likely to attack an asset in relative darkness than in bright
light.
Safety Inspection
Safety is generally defined as the state of being certain that adverse effects
will not be caused by some agent under defined conditions. It means
freedom from danger, risk or injury. It involves measures used to prevent or
detect an abnormal condition that can endanger people, property or the
enterprise.
Investigation Report
Report writing is a crucial part of the investigation. The most
diligent and professionally conducted investigation losses its value if the
effort is not properly reported. An investigative report is a written document
in which the investigator records the activity in the investigation and the
evidence gathered. A competent investigator writes a report so that a reader
can be readily understand what the investigator did, why it was done and
the results of the action.