0% found this document useful (0 votes)
43 views207 pages

Lea 3

The document provides an overview of industrial security concepts, emphasizing the importance of safeguarding physical, informational, and human assets from various threats. It discusses theories of security, related concepts such as risk and vulnerability, and the legal framework governing industrial security in the Philippines. Additionally, it highlights the evolution of the security industry and the professionalization of security personnel through laws and regulations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views207 pages

Lea 3

The document provides an overview of industrial security concepts, emphasizing the importance of safeguarding physical, informational, and human assets from various threats. It discusses theories of security, related concepts such as risk and vulnerability, and the legal framework governing industrial security in the Philippines. Additionally, it highlights the evolution of the security industry and the professionalization of security personnel through laws and regulations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 207

INTRODUCTION TO INDUSTRIAL

SECURITY CONCEPTS

BY:
PCOL ESTEBAN C. DULNUAN, (Ret), Rcrim, DSC, Ph.D
What is the best definition of Security
the state of being or feeling secure; freedom from fear, anxiety, danger, doubt, etc.;
state or sense of safety or certainty. 2. something that gives or assures safety,
tranquility, certainty, etc.; protection; safeguard
Security is protection from, or resilience against, potential harm (or other unwanted
coercion) caused by others, by restraining the freedom of others to act.
What is Industrial Security Concept?
Industrial security management is the practice of safeguarding physical, information,
and human assets of an industrial facility, organization or company from potential
threats, risks or harm.

It is a critical component of business operations, particularly in the modern era,


where companies are often faced with a host of security challenges.

The term refers to the process of safeguarding industrial facilities, personnel, and
THEOREIS OF SECURITY
1. Risk Theory = is a widely used scientific discipline, based on the
identification of a threat, the specification of risk and the specification
of how to overcome the risk.
2. Crisis Theory = is a scientific discipline focused on the theoretic
aspects of crisis research, mainly on nature and causes of crisis. The
basics of crisis prevention and its handling are based on the crisis
theory, it is important to determine what is the reason and nature of
safety and security problems. Moreover, we need to examine what is
the relation between the theory of safety and security and the crisis
theory
3. CAUSALITY THEORY OF SAFETY AND SECURITY
The term causality has evolved from the Latin word „causa“. The cause is
relation, where cause and effect are mutually
connected. The law of causality determines that anything that happens has at
least one cause, and also any cause has
future consequences. The same causes create the same effects. It is structured by
a causal relationship (causal nexus).
Causality is an expression of the relationship between two events, where one of
them raises and the second is called the
"cause"
• Related Concepts
Understanding the concept of security requires further definition of other
related concepts such as asset, risk, threat and vulnerability.
• Asset is anything tangible or intangible that is capable of being owned or
controlled to produced value. If it has positive economic value it is considered an
asset. Or more simply, if its value can be converted into cash. e.g.
• Risk is the uncertainty of financial loss, the probability that a loss has occurred or
will occur, or the possible occurrence of an undesirable event. The end results of
risk is loss or a decrease in value. e.g. lost of life of your love once.
• Threat is anything that could adversely affect assets; it can be classified into
natural hazards (such as floods), accidents (chemical spills), or intentional acts
(domestic or international terrorism).
• Vulnerability means weakness, flaw, or virtually anything that may conceivably be
exploited by a threat; examples are holes in a fence, an out –of-date key system
or the introduction of a computer virus.
• What are the philosophies of security?
Security is a political principle with the primary function to guarantee
national and international peace. As a philosophical concept security is an ancient
human ideal to which individuals as well as communities have constantly aspired.
Thus, the concept of security assumes a metaphysical and ethical meaning.
What is the industrial security concept in criminology?
The term refers to the process of safeguarding industrial facilities, personnel, and
information from various threats, including theft, sabotage, and cyber attacks.
What is the meaning of industrial security?
The portion of internal security that refers to the protection of industrial
installations, resources, utilities, materials, and classified information essential to
protect from loss or damage.
What is the aim of industrial security?
The main aim is to ensure the availability and reliability of plants and equipment,
as well as the confidentiality and integrity of machine data and processes. The
threats can be substantial and the effects far-reaching.
What does security mean in human rights?
The right to security requires the State to take reasonable measures to protect a
person's security (both physical and mental). The government does this through
the work of the police and emergency services, for example. Subsection 2 states
Concepts of Security
Identity and Authentication, Authorization, and Accountability. The term “AAA”
*Authentication
*Authorization
*Accountability
Concepts of Security and Safety
Security refers to the protection of an agency's staff from deliberate threats
or acts of violence. Protection refers to the risk of violence against civilian
noncombatant populations that are not an agency's staff. Safety refers to
accidental hazards such as road accidents, fire, diseases and natural disasters
Main Purpose of Security
The most crucial purpose of security is to protect people and their property.
This includes both their physical safety and their possessions. Good security
measures will make it difficult for criminals to target a person or a place.
CHAPTER I
Security Operation

Learning Objectives:
At the end of this chapter the students will
be able to:
1. Explain the legal basis of Industrial
Security
2. Discuss the functions of security in the
different industries
3. Understand the concept of Cybersecurity
INTRODUCTION
In the history of man, it was always shown he
values his property next to his life and loved ones
that even cave dwellers in the Philippines era
fought for its protection. This was later on followed
by families and clans forming bands for mutual
protection.

The world War II brought further growth in the


security industry. Moreover, historians believe that
the enhancement and expansion of the security
industry was brought about by industrialization,
increase of urban population, war, the cold war,
After World War II in the Philippines, the rapid growth
of the local security industry was pointed out to be the
result of several factors: proliferation of loose
unlicensed firearms worsened by the uncontrolled
backyard gunsmith of Filipino technicians; to adopt a
long term economic and political solution; the non stop
corruption in the public service; the lack of political will
in fighting quasi-political-religious lawless groups; and
countless reasons that eroded the normal values of the
people.

As of 1999, the security personnel with 400,000


population outnumbered the total AFP and PNP
personnel combined.
In 1950’s private security agencies were controlled and supervised by the
Municipal or City Mayors of the locality whom they were assigned. A civilian could be
employed as a security guard even without training and the only requirement was a
permit from the City and or Municipal Mayor in the area where they were detailed.

Ancient practices reveal that villages and other community already have their
own security force composed of able-bodied-man comprised of the head of every
family with the primary function of protecting sources of living from wild animals and
human destruction. Such was considered the pinnacle of barangay police, community
Tanods, and security guards.

The enactment of RA 5487 ( Private Security Agency law) with the purpose of
governing the organization and management of the forgoing forces made the PC the
sole authority to supervise all Private Security Guards. Later, the control of Guard
Forces was removed from the PC and was transferred to the National Intelligence
Security Agency). Now National Intelligence Coordinating Agency (NICA). Several PDs
were issued to amend certain portions of RA 5487: PD11 amending Section 4 on who
may security and watchman agency; PD 100 further amending sections, 3,4,5,8,9
which provide for the improvement of PC to assigned any private detectives.
On August 4,1969, with a Staff Memo issued by the Headquarters PC, the PC
Security and Investigation Agency Supervisory Office (PCSIASO) was organized.
On October 21, 1969, HPC General Staff Memo No. 8 renamed PCSIASO to
PCSOSIA ( Supervisory Office for Security and Investigation Agencies) and later
renamed as the PC Supervisory Unit for Security and Investigation Agencies
(PCSUSIA) pursuant to GO No. 404 on June 29, 1970.
Pursuant to RA 6975 and with the creation of the PNP on January 01,1991,
PCSOSIA was renamed Security Agencies and Guards Supervision Division (SAGSD).
upon the changed of the government administration, the office was changed
and now called the Supervisory Office for Security and Investigation Agency (SOSIA)
with mandate to regulate and supervise the Security Agency (PSAs), Private
Detective Agencies (PDAs), Company Guard Forces (CGFs), Government Guard
Units (GGUs), Private Security Training Schools (PSTSs), Security personnel and
Security Training School Staff.
Implementing Rules and Regulation (IRR) of RA 5487, as amended:
The 2003 revised rules and regulations is the most current implementing
guidelines of RA 5487, as amended, with the purpose of “governing the organization
and management of private security agencies, company guard forces and government
security forces”
A proposed 2009 Implementing Rules and Regulations of EA 5487, as amended,
has been developed but it’s promulgation was not yet effected. It’s scope focuses on
Specialized Security Courses, Security Personnel Identification and Record Book
(SPIRB), Five-Year License to Operate (LTO) Renewal Cycle, among specific provisions
stipulated in 2003 Implementing Rules and Regulations (IRR).

Purpose of the Promulgation of the Revised 2003 Implementing Rules and


Regulations:
Designed to professionalize the security industry as envisioned by the Philippine
National Police in order to make the security business as more credible and reliable
sector in our community.
LEGAL BASIS OF INDUSTRIAL
SECURITY
1. NATURAL AUTHORITY
A. The Highest law is the law of preservation
by instinct, man naturally react to protect himself, his honor,
freedom, liberty and property from danger, threat of hazard, he does it
personally and/ or thru the help of others.
Even before the coming of early Chinese traders were already
organized into tribes. Each tribe has his own chieftain but also of the
members. The inherent mechanism of self-preservation became the
unwritten law of the early Filipinos to protect themselves and their
property against the natural and man-made hazards.
CONSTITUTIONAL AUTHORITY
A. The prime duty of the government is to serve and protect people.
The Government may call upon the people to defend the state and,
in the fulfillment, therefore, all citizens may be required, under
conditions provided by law, or to render personal military civil
service. (Art. II sec. 4 of the 1987 Philippine Constitution)
Although the defense of the state is the one contemplated here
people being one of the elements of the state Is directly affected in
whatever protection the state will receive from the government and
the people, take note also that all citizens who are qualified, including
the security guards, may be required by law to render personal military
of civil service. The service requires or the citizens personal.
B. No person shall be deprived of life, liberty or property without due
process of law, nor shall any person be denied the equal protection or
the laws. (Art. III Sec. 1 of the 1987 Philippine Constitution)
This means the life, liberty; freedom and property can only be
taken from a person after the observance of due process of law. Due
process of law is composed of two aspects: substantive and procedural.
Daniel Webster in brief defines procedural due process as “one which
hears before it condemns, which proceeds upon inquiry, and render
judgments only after trial”. But if the taking of life, liberty, freedom or
property does not fall within the framework of due process of law,
available remedies under the law should be restored to.
C. Private Property shall not be taken for public use without just compensation.
(Art. III Sec. 9 of the 1987 Philippine Constitution)
The constitution protects not only ownership but also possession,
enjoyment use and disposition of private property by their rightful owners
subject to such limitations imposed by law. In this regards, private property to be
taken by the government in it’s exercise of the power of the eminent domain
must satisfy two important conditions, namely; public use and just
compensation.

D. The right of the people to be secure in their persons, houses, papers, and
effects against unreasonable search and seizures of whatever nature and for any
purpose shall be individual, and no search warrant or warrant of arrest shall be
issue expert upon examination under oath or affirmation of the complaint and
the witnesses he may produce, and particularly describing the place to be
searched and the persons or things to be seized. (Art. III Sec. 2 of the 1987
Philippine Constitution)
2. STATUTORY AUTHORITY
A. The Revised Penal Code. (Act No.3815, as amended.)
The applicable provision of the code on Crime Against Person,
Personal Liberty and security and property have bearing on the security
and protection of one’s life, liberty and property.

B. Private Security Agency Law (RA 5487 as amended)


This law governs the operation, administration of security agency
and activities, qualifications, duties and licensing of security guards,
watchman and private detectives. In short, it is the intention of this law
to professionalize the security service in order to upgrade the level of
security protection.
C. Presidential Decree No. 11 (amending RA 5487)
presidential Decree 11 amended the Sec. 3 (d) which defines Watchman or
Security Guard Agency, Sec.4 who may organize a security or watchman agency and
the Sec. 18 of the penal provision of Republic Act No. 5487.
D. Presidential Decree No. 100 (Amending RA 5487 & PD 11)
The following are amended by PD No. 100:
Further amended the Sec.3 (d) which further define the watchman or
Security Guard Agency;
Further amended Sec. 4 by adding as the last paragraph thereof.
Amended the Sec.5 and 8 of Private Security Agency Law inserting before the
final provision thereto:
Amended the Sec. 9 that provides employee need not be licensed;
Amended the Sec. 11 by adding as the second paragraph thereof; and
Amended the Sec.
Presidential Decree No. 100 (Amending RA 5487)
The following are amended by PD No. 100:
Further amended the Sec. 3 (d) which further define the watchman or
security guard or watchman agency;
Further amended sec.4 by adding as the last paragraph thereof.
Amended the Sec. 5 and 8 of Private Security Agency Law inserting before
the final provision thereto;
Amended the Sec.9 that provides employees need not be licensed;
Amended the Sec. 11 by adding as the second paragraph thereof;
Security as an Occupation
Many security personnel are in this field because of survival reason. They
may be in security by force, by chance, and or by accident. It was said that there is
nothing wrong with the mindset of seeking employment with security to earn but
it should be accompanied if that mindset is reinforced with a passionate heart.
Security as a Profession
Here are some of the many criteria that defines that a particular respectable
occupation can be regarded as a profession:
1. Income = the post 9-11 (World Trade Center in the US) era open a great opportunity for
security practitioner many organizations have realized that security is an essential cost
of doing business in the demand of security professionals with justifiable renumeration.
2. Competence = Security requires qualified personnel to carry out desired results and
demands extensive training and specialized study given the fragile business
environment.
3. Institutional Training = Roll out of skills training, practical experiences, and continuous
upgrading of skills are necessary attributes to exercise profession.
4. Career = this is a full time commitment because of the critically of the responsibility
which defines a profitable and a non-profitable business organization which directly
translates to achieving high status, privilege, and reward as well.
5. Morality = this is directly correlated to career development which state that the skill,
knowledge, and authority belongs to the professionals it self not to the organization he
is employed with which open an opportunity to professional to move from one
6. Licensing = security is regulated by a national law and supervised by a national
policing body. License to exercise profession is a mandatory requirement for those
who would wish to conduct security functions including the mandated curriculum
for training. Security license reflect the legitimacy of the profession.
7. Ethical standard = Security profession is provided with Code of Professional
Conduct and Ethics which defines the acceptable behavior in the actual
performance of security functions and provides disciplinary procedure for those
who infringe the rules.
8. Professional Association = local and international security organizations have
been developed for Professional Advancement such as the American Society for
Industrial Security, Philippine Society for Industrial security, Philippine Association
of Detective and Protective Agency Operators, INC. (PADPAO) among others.
9. Autonomy = this refers to the work autonomy or controlling and or dominating a
particular situation particularly in enforcing physical access procedures. It also
relates to the control of a professional own theoretical knowledge.
10. Self Regulation = security tends to operate independently but complementary
Security Management
It is a tool that is protective in nature defined by many as the act of
decentralizing basic security functions across the organization. Decentralized
strategy aims to develop a mindset of shared responsibility, accountability, and
awareness among the officers and employees at the onset of their engagement
with the organization.
Security Leadership and Security Management
A study in security discipline suggested that security management is not the
right term that should be used to describe its purpose of assets protection. It was
therefore encouraged that security leadership should be used instead as it is all
about educating people and employees about security and planting in their minds
the importance of security in the culture of organization.
Security management is all about development and implementation of meaningful
security process and on the other hand, security leadership is all about the creation
of strategy to be able to manage the security well.
Security as essential Partner
* Security as Force Multiplier. As active partner of law enforcement forces,
security serve as multiplier of the basic responsibilities in terms of preventing the
development or reasons of crime, preserving order in the community and
protecting lives and property within reach.
* Security as fast-Growing Career. It helps the government in providing
employment opportunity thereby reducing significantly the percentage of poverty
and unemployment.
* Security as Generalist. Security performs various roles such as loss
prevention agent, protection agent, investigator, traffic enforcer, fire fighter, public
relation agent, facility inspector, safety inspector, among others.
Women in Security
In the traditional setting, the field of security is composed mainly of male
individuals. However, with the transition of time, organizations have started to
recognize the role of women with their in-house appointment for the
implementation of security until they absorb ground recognition in terms of
Security Defined
Security is a state or quality, condition of being secured, freedom from fear,
harm, danger, loss, destruction or damages, to secure is to make safe or be
protected.
The security of any business establishment today is a complex process.
security work involves active and passive measures so that effective defense can be
established against crimes.
Active measures are the physical barriers, security lighting, use of vaults,
locks and others. Passive measures are those that will prevent man from
committing such acts for fear of being caught, charged in court, or get dismissed;
Security education programs, investigation, fire prevention seminars, personal
security checks are examples of passive security.
Three major Areas of Security
1. Physical Security
2. Personnel Security
THE INDUSTRIES
The primary goal of industrial security management is the mitigation of
threats and risk that come with the operation of a certain industry. It involves
several measures which are unique from each installation depending on the needs
that has to be fulfilled.
a. The Mining Industry
The mining industry usually focuses on protecting the people and the assets
within the industry. Thus, adapting security measures which includes manned
guarding, CCTV surveillance, access control, perimeter security, fire protection,
alarms, X-ray systems and plant management system.
Video Surveillance in Mine Security
a. Open-pit mines – based on authority and risk levels; put emphasis on
access control.
b. Underground Mines – higher requirement for safety; put emphasis on
people location management.
> Surveillance is not considered as a practical security measure for many
underground mines due to severe conditions and the depth of the tunnels which
may not be monitored by surveillance cameras.
Intrusion Detection in Mines
> Although perimeter security should be considered as the first concern in a
mines security profile, perimeter fencing is often regarded as an impractical
practice due to the large and complicated landscape of min site
B. The Mall Industry
Common Threats
1. Theft
2. Vandalism
3. Emergency situations – threat of an attack or a possible fire
Emergency Equipment in case of Fire
a. ABC Extinguishers 4. Unauthorized Pass
b. Axe 5. Parking Theft
c. Fire Hose 6. Lost Children
d. Water Pail
e. Protective Helmet
f. Rubber Boots
g. Search Lights
h. First Aid Kits
i. Stretcher
j. Rope
k. Ladder
l. Communication Equipment
Prevention and Access Control Systems in Shopping Centers
1. Video surveillance system through CCTV with Video Analysis
2. System of detection and extinction of fire
3. Alarm System
4. Thermal Cameras on the Perimeter of the Shopping Center with Video Analysis
Responsibilities of a Mall Security Officer
5. Prevent Criminal Activity – presence of security officers diminishes criminal
opportunities
6. Maintain Order – security officers often act as mediators on disagreements
between customers and employees
7. Patrol the property
8. Monitor Surveillance Equipment 7. Provide customer Service
9. Promote Safety 8. Emergency Response
10. Write Accurate Reports
c. Hotel Industry
Responsibilities of a Hotel Security Officer
1. Monitoring Entrances and Exits
2. Physical surveillance
3. Preventing property Damage
4. Protecting Guests and providing a Sense of Security
5. Responding quickly and effectively to emergencies
6. Protecting assets
7. Escorting guest and staff
Basic Qualifications of a Hotel Security Officer
8. Customer Service – Security officers at hotels will often interact with hotel
guests
9. Licensing and training
10. Specialized Services
Factors to consider in the creation of Security Measures around the Hotel
1. Lighting – isolated places should be well lit
2. Control Access – individuals should only pass through areas that are controlled
and monitored by security officers
3. Regulate the number of entrances – the fewer the entrances are, the fewer
security personnel are needed to monitor them
4. Exterior Maintenance
5. Hotel Room Maintenance
Security Tools and Devices in Hotels
6. Access Control
7. CCTV Security Cameras
8. Wearable Panic Buttons – the main purpose is delivering effective help or
stopping incidents escalating
9. Registration process – taking account of individuals entering and exiting the
d. The School
The Significance of school security
1. It will alleviate the concerns from both parents and helps in incoming students
2. It helps in the prevention of violence and harassment of all kinds
3. It helps in meaning student diversity
Campus Security Measures
4. Lighting – the use of light on dark areas has the ability to discourage criminal
activities
5. Emergency Telephones
6. Environmental design for safety – the main purpose is to prevent crime by
designing a physical environment to influence behavior positively
7. Alarm System
8. Alarm response
9. Keying – key control may go either way, the innovation of threats if handed
7. Signing in visitors and requiring them to wear badges
8. Controlled access to building
9. Use of surveillance cameras.
e. The Maritime Industry
Maritime security to the protection of vessels externally and internally
through supervision, inspection, and proactive procedures.
Common Security Issues
1. Thievery 2. Trespassing 3. Terrorist Threat
4. Illegal Maritime Trade 5. Piracy
6. Human Trafficking 7. Environmental Damage
Preventive Security Measures
1. Inspect the vessel regularly
2. Supervise the maintenance of the ship
3. Manage the coordination and handling of the vessel is practicing
4. Report problems, even the most minor
5. Encourage security awareness and vigilance among the crew members
6. Subject the crew members under security training
7. Reports and record security incidents for future reference
8. Subject every crew member under background investigation
9. Monitor the installed security equipment
10. Supervise and support crew members
f. Aviation Industry
Two types of Airport Security Measures
1. standardized security tests – all passengers must go under; baggage X-
rays. Metal detection.
2. Elevated-risk screening – only a few of the passengers are selected; pat-
downs and strip
Common Standards in airport Security;
• Screening of passengers, cabin baggage, and hold baggage
• Access control
• Camera surveillance
• Aircraft security check and searches
• Screening of cargo and mail
• Screening of air support
• Staff recruitment and training
h. The Banking Industry
Physical Security for Banks
1. Risk Assessment – lighting infrastructure placement, transportation patterns, and other
factors that may cause physical vulnerabilities to the installation.
2. Access control and biometrics
3. Convergence – the bank should work with skilled security providers to achieve security
convergence
4. Video surveillance
5. Security system management
6. Housing all critical or sensitive computers and network equipment in physically secure
location
7. Installation of physical protection facilities/devices (water and fire detector)
8. Social engineering awareness – spotting scams
9. Bank employee Training – every employee should be trained on how to respond to
emergencies
10. Place security specialist on the ground
h. The Cyberspace
Types of Cybersecurity
1. Network security – as most attacks occur over the network, several solutions must
be adopted tp prevent and block such attacks (data Loss prevention Identity access
management, Network access control and others.
2. Cloud security – protection of an organization’s entire cloud development
3. Endpoint security – creation of micro-segments around data.
4. Mobile security – prevention of attacks of malicious apps, zero-day phishing, and
instant messaging attacks
5. Internet of things security – the use of internet protocols to protect exploits and
instant messaging attack.
6. Application security – prevention of security flaws such as injection, broken
authentication.
7. zero trust – construction of walls around valuable assets
8. Infrastructure security – limitation of vulnerabilities from corruption, sabotage, or
CHAPTER 11
PHYSICAL SECURITY
Learning Objectives:
At the end of this chapter the students will be able to:
Define the important terms related to physical security
Discuss the different types of barriers
Explain the important of physical security
Physical Security measures are being used to define, protect, and monitor
property rights and assets. These measures consist of barriers and devices that
would detect, impede, and prevent unauthorized access to equipment, facilities,
material and document, sabotage, damage and theft.
Definition of Terms
a) Physical Security – is a system of barrier placed between the potential intruder
and the material to be protected.
b) Natural Barriers or Features – such as rivers, mountains and others
c) Structural Barriers – these are barriers are features constructed by man, regardless
of their original intent, which tent to delay the intruders.
d) Human barriers – such as security guards, employees
e) Animal Barriers – usually German shepherd dog.
f) Energy Barriers
Concepts:
a) Enemy Agents must have access
b) There is no impenetrable barriers
c) Surreptitious VS non- surreptitious
d) Each installation is different
Barriers Define
any structure or physical devices capable of restriction, detering, delaying illegal
access to an installation.
Two General Types of Physical Barriers:
1. Natural barriers
2. Man made barriers/structural Barriers
Generally, a barriers is used for the following purposes:
3. Outline the physical limits of an area.
4. Create a physical and psychological deterrent to unauthorized entry
5. Prevent penetration therein or delay intrusion, thus, facilitating apprehension
of intruders.
6. Assist in more efficient and economical employment of guards.
7. Facilitate and improve the control and vehicular traffic.
Types of Barriers
8. Natural Barriers 3. Human Barriers 5. Energy Barriers
9. Structural Barrier 4. Animal barriers
Three Line of Physical Defense
1. First line of defense – perimeter fences/barriers
2. Second Line of defense – Doors, floors, windows, walls, roofs, and grills and
other entries in the building
3. Third line of defense – storage system like steel cabinets, safes, vaults and
interior files.
PERIMETERS BARRIERS
A medium or structure which defines the physical limits of an installation or
area to restrict or impede access thereto. It is any physical barriers used to
supplement the protection of an inside or outside perimeter.
The main purpose of perimeter barriers is to deny or impede access or exit
of unauthorized person. Basically it is the first line of defense of an installation.
Three types of Perimeter Barrier
1. Fences 2. Walls 3. Bodies of Water
Type of fences
1. Solid Fence
Advantage of Solid Fence
a. Denied visual access of the installation to the intruders;
b. Denies the intruder the opportunity to become familiar with the personnel,
activities, and time scheduled of the movement of the guards on the installation.
Disadvantage of Solid Fence
c. It prevent the installation guards from observing the area around the installation.
d. A solid fence creates shadows w/c may used by the intruder to cover and
concealment
2. Full-View Fence
Advantages of Full View Fence
e. Roving patrols and stationary guards are able to keep the area surrounding the
installation under observation
f. 2. It does not create shadows w/c would provide cover and concealment for the
Disadvantages of Full – View Fence:
1. It’s allowing visual access to the installation, its personnel, its guards; and its
activities.
2. It allows the intruder become familiar with the movements and the time schedule
of the guards patrol;
Types of Full-View Fence
a. Chain link Fence
1. It must constructed of 7 feet material excluding top guard
2. It must be 9 gauges or heavier
3. The mesh openings are not to be larger than 2 inches per side
4. It should be twisted and barbed salvage at top and bottom
5. It must be securely fastened to rigid metal or reinforce concrete
6. It must reach within 2 inches of hard ground or paying
7. On soft ground, it must reach below surface deep enough to compensate for
b. Barbed Wire Fence
Standard barbed wire is twisted, double-standard 12-gauge wire with 4-point barbs
spaces on equipment distance apart.
Barbed wire fencing should not be less than 7 feet high excluding top guard.
Barbed wire fencing must be firmly affixed to post high excluding top guard
The distance between strands will not exceed 6 inches and midway between parts.
c. Concertina Wire Fence
Standard concertina barbed wire is comercially manufactured wire coil of high
strength steel barbed wire clipped together at intervals to form a cylinder.
Open concertina wire is 50 feet long and 3 feet in diameter.
Perimeter Barrier Opening
1. Gates and Doors – when not in use and controlled by guards, gates and doors in
the perimeter should be locked by guards.
2. Side-walk- elevator – these provide access to areas within the perimeter barrier
and should be locked and guarded
3. Utilities Opening – such as exhaust tunnels and other utility openings w/c penetrate
the barrier and w/c have cross sectional areas of 96 square inches or more.
4. Clear Zone – An obstructed area or a clear Zone should be maintained on both sides
of the perimeter barrier.
Specification of a Clear Zones:
a. Clear zones of 20 feet or more should exist between the perimeter barriers and
exterior structure, parking areas and natural or man made features.
b. A clear zone of 50 feet or more should exist between the perimeter barrier and
structure within the protected areas except when a building wall constitutes part
of the perimeter barrier.
Security Specification for windows or Opening
windows or opening less than 18 feet above ground. Roof, ledges, etc. or less
than 14 feet directly or diagonally, opposite uncontrolled windows in other walls, fire
and others.
Additional Protective Measures
1. Top Guard – Overhang of barbed wire placed on vertical perimeter fences upward and outward with
a 45 degree angle with3 to 4 strands of barbed wires.
2. Guard Control Stations – this is normally provided at main perimeter entrances to secure areas
located out-of-doors.
3. Tower Guard- this is a house-like structure above the parameter barriers. The higher the tower, the
more visibility it provides. It gives a psychological unswerving effect to violators. By and large guard
towers, whether permanent or temporary, must have a corresponding support force in the event of
need. Towers as well as guard control stations should have telephones, intercoms and if possible two-
way radios connected to security headquarters or office to call for reserves in the event of need.
4. Barrier Maintenance Fencing barriers and protective walls should always be regularly inspected by
security. Any sign or attempts to break in should be reported for investigation. Destruction of fence or
sections thereof should be repaired immediately and guard vigilance should be increased.
5. Protection in Depth -In large open areas or ground where fencing or walling is impractical and
expensive, warning signs should be conspicuously placed. The depth itself is protection reduction of
access roads, and sufficient notices to warn intruders should be done. Use of animals as guards and
intrusion device can also be good as barriers.
6. Signs and notices - "Control signs should be erected where necessary in the management of
unauthorized ingress to preclude accidental entry. Signs should be plainly visible and legible from any
approach in an understood language or dialect.
In counter intelligence security consideration there are two outstanding
energy barriers:
a. Protective lighting
b. Protective alarms
Protective Lighting
The idea that lighting can provide improve protection for people and facilities
is as old as civilization. Protective lighting is the single most cost-effective
deterrent to crime because it creates a psychological deterrent to the
intruders.
Purpose of Protective Lighting
a. It provides sufficient illumination to the areas during hours of darkness.
b. Lighting can help improve visibility so that intruder can be seen and
identified and, if possible, apprehended.
c. It serves as deterrent to would-be thieves.
Types of Protective Lighting
1. Continuous Lighting the most familiar type of outdoor security lighting, this is designed
to provide two specific results: glare projection or controlled lighting. It consists of a series
of fixed luminaries at range to flood a given area continuously during the hours of
darkness.
a. Glare projection type The intensity is focused to the intruder while the observer or
guard remained in the comparative darkness, the lighting is toward of the approach of an
entrance to an installation.
b. Controlled lighting-The lighting is focused on the pile of items, rather than the
background.
The width of the lighted strip can be controlled and adjusted to suit the security needs.
2. Standby lighting it is designated for reserve or standby use or to supplement continuous
systems. A standby system can be most useful to selectively light a particular area in an
occasional basis.
3. Movable lighting or Portable this system is usually made up of movable search or
floodlights that can be located in selected or special locations which will require lighting
only for short period of time.
4. Emergency lighting this system is used in times of power failure or other emergencies
General Types of Lighting Sources
Listed below are the general lighting sources that are mostly used in providing indoor or
outdoor lighting.
1. Incandescent Lamp it is the least expensive in terms of energy consumed and has the
advantage of providing instant illumination when the switch is on.
2. Mercury Vapor lamp it is considered more efficient than the incandescent and used
widespread in exterior spread lighting. This emits a purplish-white color, caused by an
electric current passing through a tube of conducting and luminous gas.
3. Metal halide -it has similar physical appearance to mercury vapor but
provides a light source of higher luminous efficiency and better color
rendition.
4. Fluorescent provides good this color rendition, high lamp efficiency as
well as long life. However, it cannot project light over long distance and
thus are not desirable as flood type lights.
5. High pressure sodium vapor this has gained acceptance for exterior
lighting of parking areas, roadways, buildings and commercial interior
installations. Constructed on the same principle as mercury vapor lamps,
they emit a golden white to light pink color and this provide high lumen
efficiency and relatively good color rendition
Types of Lighting Equipment
Three types of lighting equipment are generally used or associated with
security lighting. These are:
1. Floodlights - These can be used to accommodate most outdoor security
lighting needs, including the illumination of boundaries, fences and buildings
and for the emphasis of vital areas or particular buildings.
2. Streetlights-This lighting equipment received the most widespread
notoriety for its value in reducing crime.
3. Search Lights These are highly focused incandescent lamp and are
designed to pinpoint potential trouble spots.
4. Fresnel Lights - These are wide beam units, primarily used to extend the
illumination in long, horizontal strips to protect the approaches to the
perimeter barrier. Fresnel projects a narrow, horizontal beam that is
approximately 180 degrees in the horizontal and from 15 to 30 degrees in the
vertical plane
Protective Lighting Requirement
1. Protective lighting needs at installation and facilities depend on each situation and the
areas to be protected. Each situation requires careful study to provide the best visibility
practicable for security duties identification of badges and people at gate, inspection of
vehicles, prevention of illegal entry, and detection of intruders inside or outside the
buildings and other structures and inspection of unusual or suspicious circumstances.
2. When such lighting provisions are impractical, additional security posts, patrols, sentry
dog patrols, or other security means will be necessary.
3. Protective lighting should not be used as a psychological deterrent only. It should be
used on a perimeter fence line only where the perimeter fence is under continuous or
periodic observation.
4. Protective lighting may be desirable for those sensitive areas or structures within the
perimeter, which are under specific observation. Such areas include vital buildings,
storage, and vulnerable control points in communication, power and water distribution
system. In interior areas where night operations are conducted, adequate lighting on the
area facilitates detection of unauthorized persons approaching or attempting malicious
acts within the area.
General Consideration in Protective lighting
In planning a protective lighting system, the owner of the installation or his security director
must give specific considerations to the following areas:
1. The determination of lighting needs must be dependent upon the threat, perimeter
extremities, surveillance capabilities, and available guard forces.
2. Protective lighting must be designed to discourage unauthorized entry and to facilitate
detection of intruders approaching or attempting to gain entry into protected areas.
3. The protective lighting must be continuously operating during periods of reduced visibility,
and that standby lighting is maintained and periodically tested for use during times of
emergency and mobilization alerts.
4. Cleaning and replacement of lamps and luminaries, particularly with respect to costs and
means required an available.
5. The effects of local weather conditions may be a problem in cases where fluorescent units
are used.
6. Fluctuating or erratic voltages in the primary power sources.
7. Requirements for grounding of fixtures and use of common ground on an entire line to
provide a stable ground potential.
Areas to be lighted
1. Perimeter fence
2. Building face perimeter
3. Pedestrian and vehicle entrance
4. Parking area
5. Storage, large opened working areas, piers, docks and other sensitive areas.
Alarms-Aural or visual signal given by the annunciator to security when intruder
actuates device in a protected area. An annunciator is a visual or audible signaling
device which initiates conditions of associated circuits.
Basically, alarm systems are designed to alert security personnel to consummated or
attempted intrusions into area, building or compound. Each type of alarm activities
in the event that an intruder tempers with the circuitry, a beam or radiated waves.
Intrusion alarm can be electrical, mechanical or tempers with the circuitry, a beam or
radiated waves. Intrusion alarm can be electrical, mechanical or electronics. Alarms
are also used for fire, smoke or other emergencies and presence of other hazards.
PROTECTIVE ALARMS
Protective alarm is one of the important barriers in security. It assists the security in
detecting, impeding or deterring potential security threat in the installation. Basically, its
function is to alert the security personnel for any attempt of intrusion into a protected
area, building or compound. Once an intruder tampers the circuitry, the beam or radiated
waves of the alarm system, it will activate an alarm signal.
On the other hand, the use of communication equipment in the installation helps security
in upgrading its operational efficiency and effectiveness.
Three Basic Parts of Alarm System
1. Sensor or trigger er de device - it emits the aural or visual signals or both.
2. Transmission line a circuit which transmit the message to the signaling apparatus.
3. Annunciator it is the signaling system that activates the alarm.
Types of Protective Alarm System
1. Central Station System a type of alarm where the control station is located outside the
plant or installation. When the alarm is sounded or actuated by subscriber, the central
station notifies the police and other public safety agencies.
2. Proprietary system the proprietary a centralized monitor of alarm system is located in the industrial firm
itself with a duty operator. In case of alarm, the duty operator calls whatever is the primary need;
firefighters, police, an ambulance or a bomb disposal unit.
3. Local Alarm - this system consists of ringing up a visual or audible alarm near the object to be protected.
When an intruder tries to pry a window, the alarm thereat goes off.
4. Auxiliary alarm-company-owned alarm systems with a unit in police station the nearest so that in case
of need, direct call is possible. The company maintains the equipment and lines both for the company and
those in the police, fire and other agencies by special arrangements. The auxiliary system can landlines, or
cell phones.
Kinds of Alarms
1. Audio Detection Device - it will detect any sound caused by attempted force entry. A supersonic
microphone speaker sensor is installed in walls, ceilings and floors of the protected area.
2. Vibration Detection Device It will detect any vibration caused by attempted force entry. A vibration
sensitive sensor is attached to walls, ceiling or floors of the protected area.
3. Metallic foil or wire - it will detect any action that moves that foil or wire. An electrically charge strips of
tinfoil of in the doors, windows or glass surfaces of the protected area.
4. Laser Beam Alarm- a laser emitter floods a wall or fencing with a beam so that when this beam is
disturbed by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device- an invisible/ visible beam is emitted and when this is disturbed or
when an intruder makes contact with the beam, it will activate the alarm.
Desirable Characteristics of Intrusion Alarm System
Intrusion alarm devices are designed to detect and not to prevent criminal acts and
should be used normally as an adjunct and not a replacement of the human guard
forces. The primary consideration on the choice of a particular alarm system includes
stability, durability and reliability. Desirable characteristics furthermore should include:
1. A detection unit should initiate the alarm upon intrusions of a human being in the
area or vicinity upon intrusion of a human being in the area or vicinity to the
protected area or object.
2. Panel board central annunciator operating console monitoring activities should be
manned at all times.
3. An annunciator console indication the audible and/or aural signal and the specific
location of incident so that proper action can be made by security and other units.
4. Fail-safe features which give alarm in the annunciator when something is wrong
with the system.
5. System should be difficult to tamper or render ineffective by outsiders, competitors
or saboteurs.
Summing up Protective Alarm Devices
1. Alarm devices are physical safeguards used to assist security but not a
replacement in the protection of assets and lives in the installation.
2. It assists the guards to extend their hearing and vision even in areas
where they are not physically present.
3. The alarm system whether a local, a central, proprietary, or auxiliary
type are to inform the guard either visually or aurally of an attempt or a
break-in within the premises being protected.
4. Maintenance of alarm system must be regularly made, the signal line
must be protected, and there must be alternate source of power.
5. New and improve intrusion hardwires are being developed and placed
in the market but again, the human guard is irreplaceable in spite of
computerization and the arrival of super sophisticated devices in security
alarm systems.
PROTECTIVE LOCKS AND KEY CONTROL
Lock is one of the most widely used physical security devices in the asset protection program of
an installation. It complements other physical safeguards of the installation against any possible
surreptitious entry. However, the owner of the installation or his security officer needs to
understands the weaknesses and strength of each type of lock including the door, window or
walls to be used to achieve maximum benefit from its application. This is because highly skilled
burglars more often concentrate on the locks are considered as delaying devices which cannot
really top a determine intruder from destroying the lock just to launch an attack. Hence,
knowledge of the basic principles of locking systems will enable the installation owner or the
security officer to evaluate any lock and determine its quality and effectiveness in a particular
application.
Lock Defined
A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent
entry into a building, room, container or hiding place.
Types of Locks
1. Key operated mechanical lock - it uses some sort of arrangement of internal physical barriers
(wards tumblers) which prevent the lock from operating unless they are properly aligned. The
key is the device used to align these internal barriers so that the lock may be operated.
Four general groups and key control:
a. Disc tumbler lock - Designed for the use of the automobile industry and are
in general used in car doors today, because this lock is easy and cheap to be
manufactured, its use has expanded to other areas such as desk, files and
padlocks. The delay afforded is approximately ten minutes.
b. Pin tumbler lock
c. Lever tumbler lock- Are difficult to define in terms of security, since they
vary greatly in their effectiveness. These locks are used in safe deposit boxes
and are for all practical purposes, pick proof. The least of these locks are
used in desk, lockers and cabinets and are generally less secure than pin
tumbler lock.
d. The warded lock- offer very little security, this type of lock must therefore be
use only to have privacy, but not to provide a degree of security.
2. Padlock a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.
3. Combination lock- instead of using the key to align the tumblers, the combination
mechanism uses numbers, letters or other symbols as reference point which enables an
operator to align them manually.
4. Code-operated lock- a type of lock that can be opened by pressing a series of
numbered button in the proper sequence.
5. Electrical lock- a type of lock that can be opened and closed remotely by electrical
means.
6. Card-operated lock- a type of lock operated by code card.
Type of Keys
1. Change key- a specific key, which operates the lock and has a particular combination of
cuts, or biting, which match the arrangement of the tumblers in the lock.
2. Sub-master Key - a key that will open all the lock within a particular area or grouping in
a given facility.
3. Master Key- a special key capable of opening a series of lock.
4. Grand Master Key- a key that will open everything in a system involving two or more
master key groups.
Key Control
Once an effective key control has been installed, positive control of all keys must be gained
and maintained. This can be accomplished only if it is established in conjunction with the
installation of new locking devices. The following methods can be used to maintain effective
key control;
1. Key Cabinet - a well- constructed cabinet will have to be procured. The cabinet will have
to be of sufficient size to hold the original key to every lock in the system. It should be
secured at all times.
2. Key record some administrative means must be set up to record code numbers and
indicates to whom keys to specific locks have been issued.
3. Inventories- periodic inventories will have to be made of all duplicate and original keys in
the hands of each employee whom they have been issued.
4. Audits- in addition to periodic an unannounced audit should be made of all key control
records and procedures by a member of management.
5. Daily report - a daily report should be made to the person responsible for key control
from the personnel department indicating all persons who have left or will be leaving the
company. In the event that a key has been issued, steps should be initiated to ensure that
the key is recovered.
Security Cabinet
The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or other especially
valuable assets are protected. These security containers will be of a size and quantity,
which the nature of the business dictates.
In protecting property, it is essential to recognize that protective containers are
designed to secure against burglary or fire. Each type of equipment has a specialized
function and it will depend on the owner of the facility which type that is going to use.
Three (3) Types of Security Cabinet
1. Safe- a metallic container used for the safekeeping of documents or small items in an
office or installation. Safe can be classified as either robbery or burglary resistance
depending upon the use and need.
• At least 750 lbs. anchored
• Any safe that weigh less than 750 lbs. should be anchored to a building structure.
• Its body should at least one-inch-thick steel or equal
• Safe as a general rule, require the door to be made of steel and at least 11/2 thick.
2. Vault-heavily constructed fire and burglar resistance container usually a part
of the building structure used to keep and protect cash, documents and
negotiable instruments. Vaults are bigger than safe but smaller than a file
room.
• The vault door should be made of steel at least 6 inches in thickness.
• Vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
• Electrical conduits into the vaults should not exceed 11/2 in diameter.
• Vault floor should be higher by four inches with the surrounding floors and if
in level with the floor buttons, storage container should be raised at least 4
inches above the floor.
• Vault should not be made part of the wall due to moisture and concentration
caused by temperature.
• Standard vaults, to reduce destroying of too much record, should not be more
than 5,000 cubic feet.
• The vault must be resistive up to 6 hours.
3. File room a cubicle in a building constructed a little lighter than a vault but
of bigger size to accommodate limited people to work on the records inside.
• The file room should at most be 12 feet high. The interior cubage should not
more than 10,000 cubic feet.
• The ventilation should be through the door.
• It must have a watertight door and at least fire proof for one hour.
• The supporting structure, the walls, floor and roof should be made fire-proof.
Guard and Guard System:
A. Four basic function that must be accomplished by this guard system:
1. Detect intruders;
2. Sound Alarm;
3. Apprehend unauthorized personnel; and
4. Identify authorized personnel.
B. Human Barriers:
1. Guard Procurement: Selection criteria:
a. Must eligible for security clearance;
b. Vigorous and physically able to serve in the capacity of a guard;
c. Intelligence necessary to accomplished the guard function;
d. The ability to make rapid decisions and react in a calm way to emergencies:
e. Loyalty and discretion are required attributes; and
f. Experience is highly desirable although not usually mandatory.

2. Guard training: Programs of training should include:


a. General orientation
b. Instruction in security procedures of the installation, first aid, and communication
c. Instruction in traffic control, riot control, self defense.
d. Weapons qualifications to include maintenance and safety.
e. Refresher course and advance training in specific subjects
3. Guard employment: Two basic techniques of guard employment:
a. Fixed post
b. Patrols
4. Guard supervision:
a. Personal supervision: Personal inspection of all guards prior to their
starting tour of duty. Periodic checks of guards during their tour by
the senior members of each relief or his representative.
b. Artificial supervision:
1. Recorded Tour- guards takes with him on his tour of duty a form of
which must have the time punched on it at each station.
2. Supervisory Tour- this is where the guards send signals to gard
headquarters from each station that he checks.
5. Guard Equipments:
a. Distinctive uniform
b. Credentials
c. Weapons
d. Whistle
e. Notebook
f. Flashlights
g. Nightsticks
h. Other uniform or equipment's as may be directed by the unit SOP
6. Guard Communication
i. Primary Communication – direct line telephone or in some instance radio.
j. Emergency Communication- Ex: messengers
C. Animal Barriers- this is where an animal is used to provide or partially provide a
guard system. The animals is used are limited to dogs which known as guard or sentry
dogs.
D. Energy Barriers- This is where employment of a mechanical, electrical or electronics
energy to impose a deterrent to entry by the potential or to provide advertisement of
his presence.

PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL


In every installation, the use of protective barriers, security lighting, communication
and electronic hardware provides physical safeguards but these are insufficient to
maximize the effort of the guard force. A control point must be established for positive
personnel identification and check system. This is to ensure that only those persons
who have the right and authority will be given the necessary access to the area.
The most practical and generally accepted system of personnel identification is the use
of identification cards should be displayed, and to whom. This helps security personnel
eliminate the risk of allowing the access of unauthorized personnel within the
establishments.
2 Types of Personnel Identification
1. Personal Recognition
2. Artificial Recognition- identification cards, passes, passwords, etc.
Uses of Pass System
1. Single Pass System - the badge or pass coded for authorization to enter
specific areas is issued to an employee who keeps it in his possession until his
authorization is terminated.
2. Pass Exchange System - an exchange takes place at the entrance of each
controlled area. Upon leaving the personnel surrenders his badge or passes
and retrieve back his basic identification.
Note: in this system the second badge never leaves the controlled area, thus
reducing the possibility of switching, forging or alteration.
3. Multiple Pass System this provides an extra measure of security by by
requiring that an exchange take place at the entrance of each restricted area.
Badge and Pass Control
1. The system should have a complete record of all badges and identification cards
issued, return, mutilated or lost by serial number and cross indexed
alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check
the lists.
3. Passes and badges reported lost should be validated and security at entrance
be informed through conspicuous posting.
Types of Controlled Areas
4. Controlled Areas - Are those areas where access is restricted as to entrance or
movement by all authorized personnel and vehicles. It should additionally be
marked by a fence or other barrier, and access to it should be limited to as few
guests as possible;
5. Limited Areas- Are used only for handling and storage of high value cargo and
classified documents. The number of people authorized to enter this area
should be strictly limited, and the area should be under surveillance at all times.
Traffic Control System:
Controlling traffic in and out within a facility is essential to its security program.
Perimeter barriers, locked doors and screened windows prevent or deter the entry
of authorized visitors, since some traffic essential to every operation, no matter how
highly, classified it maybe, provision must be made for the control of this movement.
Specific solution will depend upon the nature of the business. Obviously retail
establishment, which encourage high volume traffic and which regularly handle a
great deal of merchandise both in and out, have a problem of a different dimension
from the industrial operation working on a highly classified government project.
Both, however, must work from the same general principles towards providing the
greatest possible security within the efficient and effective operation of the job at
hand. Traffic controlling includes.
1. Identification of employees and visitors and directing or limiting their
movements;
2. Control of all incoming and outgoing packages;
3. Control of trucks and private vehicles
Personnel Identification:
The most practical and generally accepted system is the use of badges and
identification cards. Generally speaking, this system designates when and where
and how passes should be displayed, and to whom, what is to be done in case of
the loss of the pass; procedure for taking a pass from terminating significant
number of badges have reported lost or stolen. To be effective:
1. Badge must be tamper-resistant, which mean that they should be printed or
embossed on a distinctive stock with a series of design difficult to reproduce;
2. They should contain a clear and recent photograph of the bearer, preferably in
the color;
3. The photograph should be at least one inch square and should be updated
every two or three years or when there is any significant change in facial
appearance; and
4. Should additionally contain vital statistic such as date of birth, height, weight,
color of hair and eyes, sex and thumbprints.
Visitors Movement Control
Security should establish proper methods of establishing the authority for admission of
visitors well as the limitation thereat. This security measure would depend on the
sensibility of the installation, but could include the following;
1. Visitor's logbook - All visitors to any facility should be required to identify them and
should be given a visitor's ID by the security. Visitor's logbook should be filled up
with the names of visitors, nature and duration of visit.
2. Photograph- Taking of photographs should also be considered. Extreme caution
must be exercised in areas where classified information is display to preclude
unauthorized taking of pictures the installation. If a visitor has a camera and it is
prohibited to take picture, said camera should be left in a designated area within
the establishment and guide them where to go.
3. Visitor's entrances - separate access for visitors and employees of the
establishment should be provided.
4. Time traveled - If there is a long delay or time lapse between the departure and
arrival, the visitors may be required to show cause for the delay.
Package Movement Control
Every facility must establish a system for the control of package entering or leaving
the premises.
However, desirable it might seem it is simply unrealistic to suppose that a blanket rule
forbidding packages either in or out would be workable. Such a rule would be damaging to
the employee morale and, in many cases, would actually work against the efficient
operation in the facility. Therefore, since the transporting of packages through the portals is
a fact of life, they must be dealt with in order to prevent theft and misappropriation of
company propertied. Thus;
1. No packages shall be authorized to be brought inside the industrial installation, offices
and work area without proper authority. This basic precept help reduce if not eliminate
pilferage, industrial espionage or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles
should also be checked as many pilfered items are hidden in the surface of the vehicles
leaving the compound.
3. Any personnel/ visitor entering the installation with a package pack should deposit the
same to the which he/she will security and in return receives a numbered tag, upon
departing. use in claiming his/her package upon departing
Vehicle Movement and Identification
Vehicular traffic within the boundaries of any facility must be carefully controlled
for safety as well as to control the transporting of pilfered goods from the premises. Thus;
1. Privately owned vehicle of personnel/visitor should be registered and are subject to
the identification and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of each installation.
3. All visitors with vehicle should provide his security
as to the complete details of their duration of stay, person to be visited, and other
information.
4. All vehicles of visitors should be given a sign/ sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the visitors in
their destination as well to provide them with the necessary safety precautions while
they are inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent spots
searches of vehicles found there.
Building Access Control
At any physical barrier, a security system must possess the ability to
distinguish among authorized persons, unauthorized visitors, an and other
unauthorized persons. This is to assist the security personnel who protects
sensitive area and in formation within the installation.
Appropriate warning signs should be posted at the building perimeter.
Special restricted entry facilities to public access should be provided. This
will be dependent on the degree of security needed for the protection of
property, activity and other processes within the building.
The access to the restricted area shall be limited to authorize personnel
who have the direct involvement with the installation, construction and
operation and maintenance of each equipment and systems and/or use of
the materials contained within the restricted hate area. A clear-cut policy
on his access control should be disseminated to all personnel of the
installation.
CHAPTER 111

PERSONNEL SECURITY
Learning Objective:
At the end of this chapter the students will be able to:
1. Understand the purpose and scope of Personnel Security
2. Explain the Categories of documents
3. Discuss four types of classified matters
Of the three major aspects of security, personnel security is considered as the
most important. This is for the simple reason that security involves people, both
an asset to be protected and as source of security threats. It is an acknowledge
fact that losses are attributed mainly to negligence or active participation of
employees, either through theft and sabotage. This emphasizes the need to set up
a system of hiring the people for the company.
Purpose of Personnel Security
1. To ensure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees
while they are carrying out them functions.
Scope of Personnel Security
1. Personnel Security Investigation (PSI)
2. Security Education
Key Functions of Personnel Security
1. It serves as a screening device in hiring suitable employees.
2. It provides background investigation services of both potential and present employees, for possible assignment to sensitive
position.
3. It handles investigation of employees suspected of wrong doing.
4. It develops security employees. awareness among
5. It attempts to ensure the protection of employees from discriminatory hiring or termination procedures as well as
unfounded allegations of illegal or unethical activities and conduct.
PERSONNEL SECURITY INVESTIGATION
Personnel Security Investigation (PSI) is a process of inquiry into the character, reputation, discretion, integrity, morals and
loyalty of an individual to determine the suitability for appointment or access to classified matter.
General Techniques of PSI
1. Background Investigation (BI) - This technique is very expensive but necessary in personnel security. It serves to verify
information on the application form and to obtain other information pertinent to the decision to employ.
Factors to consider in the conduct of BI
a. Loyalty
b. Integrity
c. Discretion
d. Morals
e. Character
f. Reputation
Components of complete BI
a. Applicants Name
c. Present residence address Types of Local Agency Check (LAC)
d. Personal History a. Barangay Clearance
e. Marital History b. City of Municipal Clearance
f. Residence History c. Local Police Clearance
g. Citizenship d. Court Clearance
h. Physical Data Types of National Agency Check (NAC)
j. Organizational membership a. National Bureau of Investigation (NBI)
i. Educational History Clearance
k. Neighborhood investigation b. PNP Directorate for Intelligence (DI)
1. Character reference Clearance
m. Employment History
n. Military History 2. Positive Vetting – is the process of
o. Foreign travel History inspecting examining careful
p. Criminal record thoroughness. The essence of vetting
q. Credit records that is a personal interview conducted
r. Applicant's signature under stress. It is based on information
previously given by his applicant.
3. Prowling - is the process whereby a subject's reaction in a future critical situation is
predicted by such as an honesty test. The Reid Report is an example of honesty test.
4. Deception Detection Techniques - this process of using devices in detection
deception during the interview stage. This includes the use of a Polygraph,
Psychological Stress Evaluator and Voice Analyzer.
5. Financial and Lifestyle Inquiry - this type of investigation seeks to gather information
on income and mode of living, sometimes referred to as the earning-to-debt ratio.
6. Undercover Investigation - this is the placement of an agent in a role in which the
agent's true identity and role remains unknown, in order to obtain information for
criminal prosecution or for recovery or limitation of asset losses.
7. Exit Interview - this is a valuable tool because it gives departing employees an
opportunity to list grievances. It offers security managers an opportunity to learn of
problems not previously known. Incorporating a checklist of company- issued property
and confronting a departing employee of this has resulted in reducing losses of
company property. Debriefing an employee is also incorporated in to the exit Interview
to remind employees of their continuing legal obligation to safeguard confidential
company information.
Security Education
Security Education is conducted to develop security awareness among
employees of the company. It should cover all employees, ergardless of rank or
position.
Security Education Program
The basic goal of security education program is to acquaint all the employees
the rationale behind the security measures and to insure their cooperation at all
times.
Objective of Security Education
1. Guidance for all supervisory and executive levels of the organization.
2. A mandatory indoctrination of the security for all new personnel before their
assignment to their respective jobs.
3. Development of a high degree of security consciousness among the selected
supervisors and key personnel.
4. That the program is also to develop discipline, loyalty and belongingness.
Phases of Security Education Program
1. Initial Interview - it is the first contact of the prospective employee wherein the
interviewer determines the suitability of the applicant for employment through his
given answers on the different types of questions being conducted. It is in this stage
where; the interviewer may start providing the necessary information as to the
overview of company security policies and at the same time on the employee
accountability and corresponding penalties that could result from violation there
from.
2. Orientation and Training- it is in this stage where new employees receive detailed
presentation of personnel security policy.
3. Refresher Conference – it is design to remind of the company about their
responsibilities
4. Security Reminders – a phase which employs an indirect approach of education
the employees such as posting security posters and distributing fliers
5. Security Promotion – it is the act of emphasizing the importance and role of
security achieving the company goals and objectives. It involves security employee
CHAPTER IV
DOCUMENT AND INFORMATION SECURITY
Learning Objectives:
At the end of this chapter the students will be able to:
1. Understand the significance of document and Information Security
2. Explain the categories of documents
3. Discuss four types of classified matters
In every installation, document and information are indispensable for their
daily operations and activities, be it in the form of a paper, film, and magnetic
media or in the computer system. Once there is a leakage in the contents of a
company’s document and information, the business operational stability is at stake.
Protection of document and information entails a mammoth task on the part
of the executives and the staff of the installation. There should be a clear
understanding on all types of documents and information of the organization
Understanding Document and Information Security
A. Definition of Terms:
1. Document Security – this involves the protection of documents and classified
papers from loss, access by unauthorized persons, damage, theft and compromise through
disclosure.
2. Classified Information – this includes all information concerning document,
cryptographic devices developed projects and materials following on the categories of Top
Secret, Secret, Confidential or Restricted.
3. Classified Matter – any information or material in any form or of any nature, the
safeguarding of which is necessary in the interest of security and which is classified for such
purpose by the responsible classifying authority.
4. Classify – this refers to the assigning information or material, one of the four
security categories after determination has been made that the information requires the
security protection as provided.
5. Declassify – the act of removing the security classification from classified
information or matter.
6. Reclassifying or Regarding – refer to the act of changing or assigned classification
7. Upgrading – refers to the act of assigning the information or matter to the
higher classification than previously assigned to it.
8. Compartmentation – refers to the grant of access to the classified matter
only to properly cleared person when such classified information is required in the
performance of their official duties.
9. Need to know – is the dissemination of classified information or matter to
limited strictly to those people whose duties requires knowledge or possession
thereof.
10. Unauthorized – refer to person not authorized to have access on
classified matters.
11. Compromise – this takes place through the loss of security, which results
from unauthorized persons obtaining knowledge of classified matters.
12. Damage to Nation Security – refers to the prejudice, embarrassment or
injury to the country resulting from act or omission.
What is the Purpose of Protecting Classified Materials?
1. Deter and impede potential spy
2. Assist in security investigations by keeping accurate records of the moments of
classified materials.
3. Enforce the use of “ Need to Know” principle
Two Kinds of Documents
4. Personal – letters, diary and notebooks. These should be treated usually the same
with official document.
5. Official – orders, manuals, letters, overlays, maps, and magazines. You may be
careful and follow the chain of command.
Document/ Information Cycle
each document or information has a life cycle in the sense that its usefulness
has a beginning and an end. It passes various stages from the time it is created unitil it
is finally disposed. This cycle consist of the following:
1. Creation 2. Classification 3. Storage 4. Retrieval 5. Retention/purging 6.
If an organization has no plan for seeing that all records/document flow smoothly through the
record cycle, it it will be faced with more of the following problems which may severely drain
profits:
1. An unmanageable tangle of papers within the office
2. Wasted clerical effort searching for information
3. Loss of important operating information
4. Extravagant use of operating information
5. Possible loss of key information in defending the company against legal or governmental
inquiries.
Categories of Document
6. Category A
* Information which contains reportable time sensitive, order of battle and
significant information
* It should be given priority because it is critical information
* It must be forwarded without delay
* It is critical to friendly operation
2. Category B
* anything that contains communications, cryptographic documents, or
systems that should be classified a secret and requires special handling
* Higher authorities should declassify it.
3. Category C
* Other information, which contains something that could be an intelligence
value.
* Contain exploitable information regarding of its contains.
* Unscreened materials/ documents should be categorized as Category C.
4. Category D
* No value, yet lower level will never classify documents as category D
* No decision must be made at the lower echelon that document has no
value. It is the responsibility of the higher headquarters.
Three security Concepts
1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of
document.
3. Training is necessary for the practice of “Need to Know” principle.
The need to know principle’s objective is to assure that only individuals who are
entrusted with important information or systems needed for the undertaking of their
duties have exclusive access on such.
Four Types of Classified Matters
4. Top Secret ( Green Color) – is any information and materials the unauthorized
disclosure of it would cause exceptional grave damage to the nation, politically,
economically and military operation
5. Secret (Red color- is any information and material, the unauthorized disclosure of
it would be prejudicial to the interest and prestige of the national governmental
activity or would cause administrative embarrassment or unwanted injury to and
be of advantage to and be of advantage to a foreign country.
3. Confidential (blue color code) – is any information and material, the
unauthorized disclosure of it would be prejudicial to the interest and prestige of the
national governmental activity or would cause administrative embarrassment or
unwanted injury to and be of advantage to and be of advantage to a foreign country
4. Restricted (white or no color) – is any information and material which requires
special protection other than those determines confidential, secret and top secret.
Rules of Classification of Documents
1. Documents shall be classified according to their content.
2. The overall classification of a file or of a group of physically connected therein.
Pages, paragraphs, sections or components thereof may be bearing different
classifications. Documents separated from file or group shall be handled in
accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain classified
information or which contain information classified lower than that of the
preceding element or enclosure shall include a notation for automatic
downgrading.
4. Correspondence, Indexes, receipts, reports of possessions transfer or
destruction, catalogs, or association list shall not be classified if any reference to
classified matter does not disclosed classified information.
5. Classified matter obtained from other department shall retain the same original
classification.
Protection of Sensitive Information
Proprietary information is information that in some special way relates to the
status or activities of the possessor and over which the possessor asserts
ownership. In the business community, proprietary information relates to the
structure, products or business method of the organization. It is usually protected
in same way against causal or general disclosure.
All proprietary information is confidential, but not all confidential
information is proprietary. For example, confidential personal date in employee
files is not considered as proprietary although the company treats it as confidential.
Types of Documents:
Class I- Vital Documents:
In this category these are records that are irreplaceable, records of which reproduction does not
have the same value the original; record as records needed to recover cash, to replace building,
equipment, raw materials, finished products, and work in process and records needed to avoid delay in
restoration of production, sales and services. Ex. Application letter, consent forms complaint forms and
others.
Class II-Important Documents:
This includes records the reproduction of which will close considerable expense and labor, or
considerable delay. Ex. Birth Certificate, Death Certificate.
Class III - Useful Documents:
This includes records whose loss might cause inconvenience but could be readily replaced and
which would not in the meantime present an insurmountable obstacle to the prompt restoration of the
business. Ex. Balance sheet, Business report, TOR and others
Class IV - Non-essential Documents:
These records are daily files, routine in nature even if lost or destroyed, will not affect operation
or administration. This class represents the bulk of records which should not be even attempted to be
protected in the event of disasters. They should, however, be kept in ordinary files ready for reference,
if needed, and usually discarded after some period of time. Ex. Invitations, Publication, Drafts and
Basic Consideration in Document and Information Security:
1. Security if information is based on the premise that the government has
the right and the duty to protect official papers from unwarranted and
indiscriminate disclosure;
2. The authority and responsibility for the preparation and classification of
classified matters rest exclusively with the originating office;
3. Classified matter shall be classified according to their contents and not to
the classification of files in which they are held or another document to which
they are referred;
4. Classification shall made as soon as possible by placing appropriate marks
on the matter to be classified; and
5. Each individual whose duties allow access to classified matter or each
individual who knowledge of classified matter while it is in his position shall
insure that dissemination of such classified matter is on the "need to know"
basis and to properly cleared persons
Types of Proprietary Information
1. Trade Secrets
consist this of any pattern, device or compilation of formula,
information used in one's and which gives him an opportunity to gain
an advantage over competitors who do not know or use it. It may be a
formula for a chemical compound a process of manufacturing, treating
or preserving materials, a pattern for machine or device, or a list of
customers. It differs from other secret information as to single or
ephemeral events. A trade secret is a process or device for continuous
use in the protection of the business.
2. Patents - this is a grant made by the government to an inventor,
conveying or securing to him the exclusive right to make, use, or sell his
invention for term of years.
Primary Distinctions between Patents and Trade Secrets
1. Requirements for obtaining a patent are specific; to qualify for a patent the invention must be more
than novel and useful. It must represent a positive contribution beyond the skill of the average
person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive
right to patent protection expires after 17 years.
4. Proprietary Information Protection Program
5. Realizing that the most serious threat to trade secrets is the employee, a measure of protection is
often realized through the use of employee agreements which restrict the employee's ability to
disclose information without specific authorization to the company. The following countermeasures
may be adopted:
1. Policy and procedures statements regarding all sensitive information.
2. Pre- and post-employment screening and review.
3. Non-disclosure agreements from employees, vendors. Contractors and visitors.
4. Non-competitive employees. agreements with selected
5. Awareness programs.
6. Physical security measures
7. Informed monitoring of routine activities.
CHAPTER V
SECURITY HAZARD
Learning Objectives:
At the end of this chapter the students will be able to:
1. Understand the concept of Security Hazard
2. 2. Discuss risk management alternatives and strategies
3. 3. Explain espionage as a Security hazard
Definition of Terms:

Risks is the potential damage or loss of an asset. The level of risk is a combination of
two factors: the value placed on that asset by its owner and the consequence, impact
adverse effect of the loss or damage to that asset and; the likelihood that a specific
vulnerability will be exploited by a particular threat.
Risk Management is a process of selecting and implementing security
countermeasures to achieve and acceptable level of risk at an acceptable cost.
Risk Analysis the analysis of risk includes examinations of the vulnerability, probability
and critically of potential threats and include natural and man-made risk.
Adversary an individual, group organization, or government that conducts activities or
has the intention and capability to conduct activities detrimental to the individual,
private or government entity.
Asset any information, facility, material information, or activity which has a positive
value to its owner whether it is an individual, private r government entity.
Vulnerability any weakness that can exploit by an adversary to gain access to and
asset.
Countermeasures - an action taken or used to reduce or eliminate one or more vulnerabilities. The cost
of possible countermeasures may be monetary, but may also include non-monetary cost such as
reduced operational efficiency, adverse publicity unfavorable working conditions, and political
consequences.
Probability - the chance of likelihood that a loss will take place. Indicated by a mathematical statement
concerning the possibility of an event occurring.
Critically - the impact of a loss as measured in financial terms. How important it is in terms of the
survival or existence of the organization.
Risk Management Alternatives and Strategies
Risk Avoidance- eliminating or removing the risk totally from the business, government, or industrial
environment for which the risk manager has responsibility.
Risk Reduction - decreasing the risk by minimizing the potential loss. The probability of the reduction of
criminal opportunity is often accomplished by situational crime prevention strategies to discourage,
deter, or deny criminal incidents.
Risk Spreading- spreading the risk through compartmentation or decentralization to limit the impact
(critically) of the potential loss.
Risk Transfer- moving the financial impact of the potential loss-over to an insurance company.
Risk-Self Assumption- planned assumption and acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or setting aside resources for use in case of a
SECURITY HAZARDS
Any act or condition which may result in the compromise of information, loss
of life, loss or destruction of property or disruption of the objective of the
installation.
Types of Hazards
1. Natural Hazards these are hazards caused by natural phenomena
2. Human or Man-made Hazards these are hazards which are the result of a state
of mind, attitude, weaknesses or character traits of one or more persons. They can
be acts of commission or omission, both overt and covert, which can disrupt
operation of a plant or installation. The following are types of human or man-made
hazards:
a. Carelessness - accidents and dissatisfaction
b. Disloyalty - subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism, bombing etc.
SABOTAGE AS A SECURITY HAZARD
Description of a Saboteur
1. He is the most dangerous for whom security will have to deal with while planning
and implementing security measures and techniques.
2. He is an ordinary looking as the next guy but, in his mind, he has the training in
deception, knowledgeable in incendiaries, explosives, chemistry, psychology.
bacteriology, mechanics and
3. He can work alone, in-groups, or simultaneously in several places.
Possible Targets of Saboteur
1. Armed Forces Installation
2. Natural resources - mines, forests, farms and farm products
3. Industries-buildings, power sources, machinery, fuel etc.
4. Warehouses depots, communications, public utilities, etc.
Countermeasures against Sabotage
1. Use of an efficient, alert and trained guard force
2. Use of Physical security aids like barriers personnel and vehicular control, intrusion
control personnel devices, communication systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination.
10. Good housekeeping methods.
11. Effective and compatible emergency planning.
12. Regular audit.
ESPIONAGE AS A SECURITY HAZARD
Description of an Espionage Agent
1. He is very dangerous adversary and his skills in deception and cunning should never be under
estimated.
2. He is usual a person of extensive training and will be highly effective in gaining the confidence of people
and of extracting information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like the saboteur and he can be
defeated in his own game if proper methods and techniques are undertaken.
Some Methods Employed by Espionage Agent
1. Stealing or information from employees.
2. Stealing information from records ог other sources.
3. Using various methods of reproducing documents products, equipment or working models.
4. Using "front" as commercial concerns, travel agencies, associations, business groups and other
organizations to obtain confidential information or data.
5. Using various form or threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning and individual or
organization.
7. Picking or securing information in social and other gatherings.
Countermeasures against Industrial Espionage
1. Careful and complete pre-employment measures designed to control threats of
industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive
positions even already employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.
SUBVERSIVE ACTIVITY AS A SECURITY HAZARD
Threats of Subversive Activity
1. It can be local or national in nature and their mission is to undermine the authority to
weaken the organization, and eventually take over. This can be in business or any activity.
This can be in the form of rumor mongering propaganda, undermining morale, and
injecting defeatist attitudes, and other emotional approaches.
Countermeasures to Subversive Activity
1. The spreading of rumors, written materials, slogans or any other devices to confuse
the work population and discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and "slow downs"
can be called to disrupt the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing
movements for peace, anti-colonials, anti-trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in "paper organizations"
should report this activity to security.
5. Other methods of subversion like untied fronts, mob action, terrorism and sabotage
will do to gain the subversive ends.
Pilferage as a Business Hazard
1. Pilferage is one of the most annoying and common human hazards which security
has to deal with. This activity if uncontrolled can become a financial drain if not a
menace to smooth and orderly operation. Failure to detect shortage and inaccurate
inventories will cause inventory losses, which may be labeled as pilferage.
Pilferage:
This is one of the most annoying and common human hazards which security has to deal
with. This activity if uncontrolled can become a financial drain if not a menace to smooth and
orderly operation!
Due to this, security force has to concentrate large number men to check this nefarious and
disconnection activity. Petty pilferage is frequent, hard to detect, difficult to prove and win
conviction but definitely dangerous to ignore.
Types of Pilferers
1. Casual Pilferer - one who steals due to his inability to resist the unexpected opportunity and has
little fear of detection is no plan or premeditation and he is usually a "loner" on the job. The
temptation to pick up the article is basically due to poor security measure. The implication of
causal pilfering is the big cumulative cost if it remains unchecked.
2. Systematic Pilferer one who steals with preconceived plans and takes away any or all types of
items or supplies for economic gain. Pilferers of this kind can be employees or outsiders of the
establishment.
Anatomy of Pilferage
1. Where need or desire exists and opportunity is present, theft is almost sure to result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when supplies or goods are
Factors considered by a Pilferer to be Successful on his Act
1. Location of items to be pilfered - the systematic pilferer surveys shopping and store areas, or
through contracts from the firms.
2. Access to the items- techniques can be from fake documents, bribing of guards, outsmarting to
divert attention while pilferage goes on.
3. Removal of item- this can be done as wearing the stolen shoes or shorts, concealment in body
or vehicles, use of false documents, etc. driver may conceal pilfered items in his vehicle.
4. Disposal of Items- there is a need for "fences" "brokers" or "clearing houses" for these "hot“
items
Countermeasures for Casual Pilferage
1. "Spot" checks on outgoing vehicles and persons.
2. An aggressive security education and indoctrination program with emphasis that "crime does
not pay."
3. Superiors should set example of integrity and desirable moral establishments. climate for
employees in the
4. All employees must be enjoined to report any loss to security.
5. Inventory and control methods should be done specially to pilfer able items.
Countermeasures for Systematic Pilferage
1. Guards and electronic surveillance on all exits.
2. Package and material control system.
3. Parking outside perimeter fence of establishment.
4. Careful screening and background checks on applicants to weed out potential thieves.
5. Investigation of all losses quickly and efficiently to determine "modus operandi" or obtain
clues.
6. Alert all patrols to check areas and buildings for possible concealment of stolen properties.
7. Install mechanical, electrical, electronic detection and alarm devices where needed and
applicable.
8. Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking facilities and areas for vehicles
and persons.
10. Store bulk quantities of pilferable items in enclosed security areas and distribute them to
using section in limited quantities.
11. Establish accurate inventory and accounting methods for procurement, use and disposal.
CONTROL SYSTEM
Persons Entering and Leaving the Premises
 Monitor alarms and CCTV cameras
 Control access for employees, visitors, and outside contractors
 Conduct security checks over a specified area
 Write comprehensive reports outlining what they observed while on patrol
 Interview witnesses for later court testimony
 Detain criminal violators
 Personnel entering the premises should be identified.
 The purpose of visit should be verified.
 Body frisking may be conducted in accordance with Standard Operating Procedures.
 Visitor's ID and Pass Slip should be issued and displayed.
 Visitors should be directed or escorted to destination in accordance with Standard
Operating Procedures.
Vehicles Entering and Leaving the Premises
Vehicles entering the premises should be identified.
The driver and passenger's identification should be checked.
The purpose of visit should be verified
Properties Entering and Leaving the Premises
Properties entering or leaving the properties should be classified.
Properties entering and leaving the premises should be documented.
Parking Arrangements
Ensure car parking is secure and well lit.
Insist on residents to park in a way as to facilitate early exit in case of emergency.
Ensure that cars parked are locked.
Ensure that each vehicle is captured by surveillance cameras
Chapter VI
VIP SECURITY
Learning Objectives:
At the end of this chapter the students will be able to:
1. Comprehend the concept of VIP Security
2. Discuss the organization of VIP Security
3. Explain the different attacks tactics.
Protection against any type of crime to safeguard life, assets and operation by the use of various
methods and devices.
1. VIP - Very Important Person
Ex. State President, High ranking Public and Private Officials, etc.
2. ESCORT one or more persons accompanying another to give guidance or protection or to pay honor.
3. BODYGUARD - A person or a group of persons usually armed and responsible for the physical safety of one
or more specific person.
ORGANIZATION OF VIP SECURITY
1. Area Security - Covers the surrounding areas of engagement.
- Conducts prophylactic (neutralize the area),operations in the area of engagement.
2. Perimeter Security- secures the immediate areas surrounding the place of engagement.
- Usually these are the uniformed men.
3. Advance Security – these are the advanced security at the place of engagement before the arrival of the
VIP.
- Sanitize the engagement area.
4. Close-in Security - Accompanies the VIP where ever he goes.
- maximum of four persons
5. Reserve Security - on standby for possible back. up/re-enforcement
Prophylactic Operations
1. Patrolling
2. Putting up of check points, blocks and gates.
Four Common Elements in all Assassination
1. Victim
2. Assassin
3. Modus Operandi (Mode of Operation)
4. Opportunity
REASON WHY DO THEY NEED BODYGUARDS
As a result of the "increased concern about the kidnapping threat" there has
been an escalation in the demand for bodyguards. Thereby, BRAINS is needed and
not BRAWN (meaning muscular in power) has been offered as the basis for
bodyguard selection. The bodyguard should fit the image and lifestyle of the
individual he is guarding.
SELECTION CRITERIA TO BECOME A BODYGUARD
1. Physical Condition
Excellent physical condition is essential. Excessive overweight, high blood pressure,
respiratory problems, or other ailments are all disqualifiers. Hearing should be normal, eyesight
at or close to 20/20 without glasses and color vision normal. Average height is suggested.
Physical stamina is important; the bodyguard should be capable of running several miles at a
sustained pace and able to run at top speed in short dashes.
2. Training
The bodyguard should be trained in both unarmed and armed defense tactics. Regular training,
session should be encouraged, so that body guards maintain proficiency. Also trained in the
operation of equipment's being used. Also trained vehicles driving and troubleshooting, and
likewise have a practical knowledge in first aid technique.
3. Mental Attitude
The bodyguard should be a stable individual, intelligent, and not belligerent, aggressive, easily
angered, careless or easily distracted he/she should be mentally alert, have a good and quick
judgment, he should be responsible, and have an ability to remain calm under condition of
stress or in dangerous situations. Female personnel can be utilized for these assignments. They
require the same temperament and training as the more usual male personnel.
SOME PROTECTION TECHNIQUES WHILE MOVING ON FOOT
1. Individuals in the vicinity of the persons being protected should be observed
especially their hands.
2. If a weapon is displayed, the weapons should be attacks so as to be ready to respond
effectively.
3. The bodyguards should anticipate potential attacks so as to be ready to respond
effectively.
4. If a threatening situation begins to develop the individuals being protected should
immediately be removed from the danger area.
5. If two bodyguards are used and attacks develop, one bodyguard should remove the
individual being protected while the other neutralize the threat The bodyguards should
adequately protect the offending public of those in the area. The primary objective is
to protect the target person, not apprehend the attacker. Escape is certainly more
important than winning the "skirmish" meaning minor primary conflict or dispute.
6. If one bodyguard is utilized, he/she will usually walk in front to the left. While the
second, will take a position to the rear and slightly to the right.
PROTECTION IN TRANSIT
An individual is particularly vulnerable while moving from one place to another.
Hence a regular route and time travel should be established. Frequent changes of
direction, travel time mode of transport, coordinated within the overall protection
plan, will make it more difficult for an abduction to plan of an ambush or to
interpret. The individual should never walk alone in unpopulated areas. If and
automobile during and attempted abduction, the automobile may be used not only
as a means of transportation. But as defensive shield or even as an attack weapon.
Therefore, an individual in an automobile should not usually attempt to escape an
attack by leaving the vehicle. The body of the vehicle will provide a body place of
safety. While the vehicle can be utilized to take evasive action so that it will be
possible to escape from an attack.
VEHICLE SECURITY
The vehicle utilized by a potential kidnap victim should not be placed unattended in
a parking stall with the individual name on it. If possible, when not in use, the
vehicle should be parked in a locked garage under
guard and not on the street. The doors of the vehicles should be locked in all window tightly
closed, whether occupied or non-occupied. Consideration can be given to the installation of
tamper alarms on the vehicles and "panic" or trouble alarms bottoms in the parking area.
The potential victim, should not use the vehicle at all times, but should change
automobiles daily if possible. All serving should be done by a commercial organization which
has been checked out and cleared. Locking gasoline caps and locks for the hoods are
suggested. Gas tanks should never contain less than half a tank to avoid running out of fuel
ATTACK TACTICS
Two types of attack tactics against vehicle maybe expected.
1. Moving Attacks the approach will usually be made from the left or passing side, and the
attacker will attempt to move over into the path of the victim's vehicle, forcing it to stop.
Approach, would be from the right in the left side drive countries. The ideal location for
abduction is where cross street or turn off is available to allow the attacker an easy quick way
to escape. If two vehicles are used to attack, one will cut-off the victim's vehicles, forcing it to
stop. The second may be then, move up on the left side. The abductor will make the attack,
take the victims from his vehicles and escape as quickly as possible.
2. Ambush Attack- the kidnapper will attempt to stop the victim's car with in a zone he
established by blocking the roadway or by shooting the driver.
DRIVER RULE
The driver should always be planning ahead and be alert as to what is happening in at least two or
three blocks of normal city driving. Vehicles that are parked in the roadway or in unusual position,
obstructions, constructions, etc. should be viewed with concern, also, side street or road access.
Ramps, underpasses, service road, etc. are potential trouble spots, and so particular attention should
be given to them. Adequate maneuvering between the potential victim's vehicles and those in traffic
ahead. Also, the lane nearest the center of the roadway should be used, it allows maneuvering room.
The driver should maintain near normal traffic speeds while keeping the vehicle under control at all
times, be alert as to what is in front, behind and on the sides of the vehicles which seems to be
leading or following the rear vision mirror should be done constantly, since most attacks originate
from the rear.
KIDNAPPERS FALL INTO FOUR CATEGORIES
1. Neither opportunities nor Novice Criminals - This constrained of poor planning and lack of true
criminals' expertise.
2. Religious or politically Motivated Individuals - These are the DO or Die who are willing to sacrifice
their lives and or willing to kill their victims to publicize a cause.
3. Mentally derange individual - They may kidnap or kill for the thrill, from confusion, or due to
psychosis.
4. Professional Criminals - They are motivated for kidnapping usually centers on financial gain, with
Chapter VII
COMMUNICATION SECURITY
INTRODUCTION
The ability of an ancient man centuries ago to communicate by means of signs could be
attributed as the key for surviving the stone age era. And comes the new generation where the
signs have been transformed into higher forms as man learned the start of gregarious leaving by
means of oral or written way of communication. This ideal way of transferring thoughts and ideas
made man supreme and progressive and later developed the medium or common language and
the channel of which the language could be transferred to a certain distance.
So today, civilized man communicates with an accepted and sophisticated written or oral
language. The medium has been improved by the introduction of ratio and electronics, but still
man could not understand his neighbor and vice-versa. This is due to the complexity of our lives
at present and the introduction of new languages and sub-dialects.
In the security profession, it could not be denied that the field of operation is concentrated
on dealing with different people and it is deemed proper for any security personnel to know the
most common medium of communication to make him effective on the performance of his job.
DEFINITION
Communication mind of one person The transfer of thought from the mind of another thought common be from oral,
written and other forms.
Conference The exchange of thoughts or opinions by conversations, or seminar. The exchange could be from oral, written
and other forms.
Medium of Communication Refers to the language known for two or more individuals who want to exchange thought or
ideas with each other. common
Example: English: Is the dominant medium of communication in the world.
Ilocano is the common medium of communication in Baguio City
Communication is the process of sending and receiving messages to achieve understanding.
Channel of Communication- refers to the equipment being used to transfer thoughts or ideas.
The following are the common equipment being used for communication:
1. Hand held radio or Walkie talkie-communication on electromagnetic waves transmitted through the space.
2. Basic types of radio's:
a. Amateur radio- for hobby and emergency purpose; and
b. Commercial radio - for business purposes
Cardinal principles in using radio:
a. Speak clearly and distinctly at all times;
b. Think and act promptly on emergency situation;
c. Thorough understanding of the capacity of the communication system; and
Requisites for modulation/ voice transmission:
a. Alertness - give the impression that you are alert and wide awake and interested
as the person calling:
b. Pleasantness - build a pleasant office image with voice of smile;
C. Naturalness slang: use simple language and avoid
d. Distinctness for hobby and emergency purpose; and
e. Expressiveness - normal tone of voice in moderate manner not too fast and not
too slow.
Duty Cycle of PTT:
As a rule, transmitting message in short duration carries 3 to 5 words at a time.
Approaches to adhere the duty cycle:
1. Use of phonetics alphabet and numerals;
Ex. From Alpha to Zebra
2. Use of 2400-hour system and Zulu time;
3. Police term APCO signals:
Ex. 10-1 receiving poorly
10-2 loud and clear
10-4 copied message
10-9- repeat message
10-20- location
10-28 identify yourself/ call sign
10-32- radio check
4. Use mores code.
APCO - Association Public Safety Communication Officers Inc.
PTT- Press to Talk
5. Telephone combination of apparatus of converting speech energy to electrical wave then transmit the same
to a certain point then finally re-convert the electrical energy to audible sound
6. Intercom- wired system of communication being used with in a building or compound for direct exchange of
calls.
7. Audio Hailer-portable transistorized and battery- operated amplifier that magnify the voice user.
Transmission of Reports
With the rapid development the technology is going through, communication within the installations does
not only rely on radio communications but has improved and moved towards the use of networks and other
unconventional ways of communications, thus the adaptation of Communications Security which includes crypto
security, transmission security, emissions security, and physical security.
1. Communication equipment is prepared in accordance with manufacturer's instruction
2. Communication call signs and language are used in accordance with transmitting messages procedures
Call Signs to protect the identity of the parties involved in the radio transmission; serves to simplify
matters when communicating between large groups of people
a. Messages
 Messaging security provides protection for companies' messaging infrastructure (IP reputation-based anti-
spam, pattern- based anti-spam, administrator defined block/allow lists, mail antivirus, zero- hour malware
detection, email intrusion prevention)
b. Memorandum
 Memorandum can only have a certain number of formats and it may dependent to an office or institution.
 If the user is a senior executive, the format is strictly defined and may be limited to one or two pages.
 If the user is a colleague, the format is usually much more flexible.
C. Call Signs and Language
 They are used to prevent the true nature of the subject being discussed from being overheard by uninvited
listeners
CHAPTER VIII
SECURITY SURVEY AND INSPECTION

Learning Objectives:
At the end of this chapter the students will be able to:
1. Explain the concept of Inspection Security Survey and
2. Discuss the different types of Security Inspection
The basic instrument for determining security vulnerability is the security survey. Most
description of security surveys refers principally to checklists , audits or inventories of
security conditions.
Security Service is defined as a critical on- site examination and analysis of an
industrial plan, business, a home or public or private institution done to ascertain the
facility's current security status, to identify deficiencies or excess in current practices, to
determine what protection is needed and to make recommendations for improving the
overall level of security at that installation. As previously noted, security survey is a general
term that often encompasses other related procedures.
Objectives of Security Survey
1. To determine existing vulnerabilities to injury, death, damage, or destruction by natural
causes.
2. To determine existing vulnerabilities of corporate assets due to outside criminal activity.
3. To determine existing vulnerabilities of corporate assets due to criminal activity within
the organization.
4. To determine existing conditions of physical security of corporate property.
5. To measure compliance of employees to security
Planning a Security Survey
1. Verify the need
2. Obtain organization support
3. State the survey's executives
4. Determine how data will be gathered
5. Develop alternatives
6. Prepare a schedule of activities.
Security Inspection
Another important activity, which is necessary to ensure the integrity of the overall
security programs, is security inspection. This complements security survey in its
attempt to prevent losses of company properties,
Security inspection is conducted for two reasons: to check on the degree of
compliance with the recommended countermeasures and to determine the
effectiveness and adequacy of the countermeasures which are in effect.
Types of Security Inspection
1. Continuous Inspection
To keep pace with the constant changes in the organization, changes in our security
terms of attitudes, life-style and moral values, and the rapid advancement of technological
modifications are all around us, the inspection must be an on- going and never-ending activity.
2. Formal or Informal
For the company which has just upgraded the security function, hired a new security
administrator, or initiated a security department and program. The formal approach to
inspection is most desirable, primary because it tells the company how senior management
fells about protection, and thus establishes the desirable climate.
Formal Inspection is one which some fanfare is attached. It is announcement, and
usually preceded by an the unit under inspection "prepares for events, including some extra
housekeeping activities that would not otherwise happen at that point in time.
Informal Inspection is usually the result of a long and firmly entrenched inspection
program, understood by all and accepted as part of the organizational life. The inspection has
been stripped of all external trappings of importance, but their functional importance has not
been lessened in any manner. They are seriously and quietly executed in a spirit of
understanding and cooperation.
3. Structured or Unstructured Inspection
Structured Inspection is one that moves systematically from one area to the
next and so on. There is a format or logical sequence to the process. For instance,
the audit may start with the first line of defense, then the second line, then the
third line, etc.
Unstructured Inspection is conducted in a random manner, there is no
format or logical sequencing. For example, the inspection may start with
countermeasures for proprietary information, then emergency plan, followed by
investigation and so forth.
CHAPTER IX
EMERGENCY AND DISASTER
MANAGEMENT
Learning Objectives:
At the end of this chapter the students will be able to:
1. Explain the concept of Emergency and Disaster Management
2. Discuss the key steps in Emergency Planning
3. Know the different responses to tactical situation
Emergency planning is one of the harsh realities that an installation will
encounter is the occurrence of a disaster or emergency. Any of these can be
regarded as a potential event, occurrence or condition outside the scope of normal
business activities with significant potential for death, injury, property damage,
assets diversions or other favorable impact upon the installation. It is for this
reason that the owner of the installation or its executives will decide in advance
what to do and how to counter the effects of any emergency in order to assure
continuity of operations.
Emergency Defined
Emergency is a sudden, generally unexpected occurrence or set of
circumstances demanding immediate action.
Disaster Management Defined
Is the systematic management of disaster from the initial stage to its
termination using various tools to minimizes loss of lives, damage to property and
enhance rehabilitation.
Disaster Defined
Disaster is the unscheduled event that causes emergency. It upsets the performance of valued activities of the
community in two ways: there is a drastic increase in demand for certain services and there is reduction in the
capability to perform services.
Crisis Defined
Crisis is the turning point of a disaster or emergency, if not contained or controlled.
Types of Emergencies
1. Earthquake
2. Typhoon
3. Tsunamis
4. Volcanic eruption fire
5. Fire
6. Explosion (Bomb, flammable liquids, gases, etc.)
7. Building collapse
8. Leakage of gas or toxic fumes
9. Bomb threat
10. Strikes
11. Work accidents
Keys Steps in Emergency Planning
1. Get in touch with local civil authorities.
2. Visit neighboring plant/installation.
3. Survey the installation for possible hazard and take immediate action to lessen
or eliminate them.
4. Call an organization meeting of heads of services, employee representatives and
key personnel.
5. Establish an organization with specific task to function immediately before,
during and following a disaster
6. Define the disaster programs.
7. Establish a method for utilizing resources on hand and for obtaining additional
resources on the time of disaster or emergency.
8. Provide a recognizable means for moving from normal operation to the
emergency mode of operation.
Basic Considerations in Emergency Planning
1. Goals of the emergency plan.
2. Emergency plan should be in writing.
3. The plan should be precise and specific.
4. A separate plant should be prepared for each type of disaster, which has a
probability of occurring.
5. Key elements of plan: what to do who will do it.
6. General and individual awareness.
7. Checklist before formulating a detailed emergency plan.
Emergency Response Team
An Emergency Response Team must be established to become active during
increased threat levels or when an emergency situation occurs. Your special threat
plant describes the organization, training and function of the team. The ERT must
consider the following:
1. Who will make decisions and have final authority for the team as a whole.
2. Who will be members of the team and what are their responsibilities?
3. What will be the missions of the team?
4. The tasks of the other agencies or individuals.
5. The training needed to prepare team members to operate in stressful situations.
6. Contingency planning beyond that involved in normal day-to-day operations
against threats.
7. The unexpected - the incident will not take place as planned.
Responding to an emergency situation requires special capabilities and
considerations. First, the ERT must identify the kind of emergency. Then, the
operation plan (OPLAN) formulated for the said emergency must be put into effect
as quickly as possible.
Responding to Tactical Situation
1.Bombing-if the terrorist/adversary plant bombs, then you must assume other
bombs have been planted. Remove everyone from the scene to a safe area. Anyone
near the scene at the time of the explosion must be interviewed. Keep in mind that
the people being interviewed may, in fact, be the terrorist/ adversary who planted
anted the bomb. Explosive Ordinance Division (EOD) must further check suspected
devices.
2. Ambush/Attack-always assumes the terrorists/ adversary are still in the area. The
initial response force renders aid to the victims and establishes a defensive
perimeter. Clearing of the area is conducted before crime scene investigation
begins. All vehicles and exits from the area must be controlled and inspected.
3. Kidnapping- in most cases of kidnapping, you will not be aware that a kidnapping
has occurred until the terrorist has the victim safely secured elsewhere. The
immediate response is to dispatch teams to provide protection for other possible
targets, including members of the victim's family. Then, the Emergency Response
Team is activated. The team can materially aid the commander in dealing with the
kidnapping. They could recommend possible courses of action.
4. Hostage/ Barricade situation- the worst possible scenario you could be confronted
with is a prolonged hostage/ barricade situation. The initial response force secures
and isolates the incidents scene. No one must be allowed to enter or leave. Witness's
names are recoded, and the witnesses are directed to a safe location to wait for
further debriefing. The Emergency Response Team is then activated.
5. Arson terrorist/ adversary uses incendiary devices to commit arson. This is done
during and organized civil disturbances (throwing a firebomb) or against specifically
targeted building. They also use incendiary devices to destroy vehicles. As with
bombs, they often use time delay mechanisms to allow themselves time to leave the
area before the fire occurs.
Security Measures against Bombs and Bomb Threats
Although it is very hard to detect the attack of a terrorist or adversary, an establishment can possibly
minimize if not totally eliminate the occurrence of bombing incident within its premises. The following
measures are suggested.
1. Strictly implement the inspection procedures of all bags, knapsacks, boxes, merchandize etc. that will
enter the premises.
2. Suspicious locking package, paper bags, etc. left alone should be cautiously scrutinized as possible
bomb(s).
3. When suspected bombs are noted, security personnel/employees to immediately contact the authorities.
4. Be observant o people roaming around your area doing nothing. Vendors with tricycles, knapsacks/ bags
should be driven out. They may be used as couriers of bombs.
5. Security personnel must always observe people leaving behind bags/packages/boxes in the garbage
cans/bins in the premises.
6. Be observant of cars/motorcycles riding individually who are suspiciously observing constantly the
establishments.
7. Be cautious in opening envelopes and packages sent by unknown individual and return address.
8. The greatest safeguard against the effect of bomb threats is to prevent entry of unauthorized persons
into certain area, whenever possible.
9. Restricted entry and positive identification of staff and visitors can be significant in assessing the
Don'ts in Handling Suspected Bomb Packages
1. Don't attempt to open package.
2. Do not in water submerge in due to conductivity of reaction electrical
circuit and/or possible violent of chemical agent.
3. Do not indiscriminately shake or jar suspected package due to the
possibility of disturbing the rigger mechanism.
4. Do not cut the string or unwrapped package due to the possibility of
pressure release type device.
5. Do not puncture or cut the box with metallic object as the possibility
of electric power maybe employed.
6. Do not accept identifications markings on any suspected package as
legitimate. 7. Do not allow radio transmission within the
vicinity.
8. Do not switch on the lights or any electrical switches just to light up
dark room/areas.
9. Do not use sirens, megaphone or any loud noise- emitting device.
Responding to Bomb Threats
Each threat received through any means of communications should be
treated as real and must be forwarded immediately to the proper authorities.
Training is essential to deal with a bomb threat incident. Instruct all personnel,
especially those at the telephone switch board on what to do if a bomb threat is
received. The receiving party must remain calm and courteous. Try to obtain as
much information as possible from the caller. Take note of the following
procedures:
1. Get the identity of the caller.
2. Take note of the following characteristics; male or female voice; young middle
age, or old sounding voice; accent of voice; speech impediments or peculiar voice
characteristics; any background noise; does the voice sound familiar.
3 The exact words of the person placing the call.
4 Show no emotion on the phone.
5. Know the exact location of the bomb.
6. Ask for the description of the bomb/composition of the explosive.
7. Repeat the message to caller whenever possible and ask for confirmation.
8. The receiving part should remain calm and courteous. He should listen carefully and
write down accurately the information the caller provides.
9. If possible refer the caller to a supervisor in authority to extract more information.
10. Apply delaying tactics and engage the caller the caller in prolonged conversation
11. Take note of the exact time the caller hung up.
12. The person receiving the bomb threat should attempt to as to ask the caller certain
questions: When is the bomb going to explode? What type of bombs it is? What does
the bomb look like? What will cause the bomb to explode? Why did you place the
bomb?
13. Remember that the caller may not answer your question, but any additional
information that he may relate will be helpful.
14. It may be advisable to inform the caller that the building is occupied and the
detonation of a bomb could result in death or serious injury to many innocent people.
Handwritten or Typed Notes
Documents and other materials received should be carefully handled to preserve marks, fingerprints, etc.
for examination by competence authorities. These should be forwarded immediately to proper authorities for
analysis and evaluation. Written messages should never be ignored.
Person to Person or Direct Threat
1. Notify security supervisor immediately.
2. Keep the person making the threat or threat indicating knowledge of a threat under surveillance until relieved
by the superior.
3. Take note of the age, height, weight, sex, color of eyes/hair/skin, clothing, unusual characteristics such as
lameness or any peculiarities of the person under surveillance. Observe other personal behavior, in any.
4. If the person leaves the scene, take note of the make, model, color, plate number and marking of the vehicle
used.
5. Do not underestimate the size of the package like just a pack of cigarette or lighter, it could be a powerful
explosive.
6. Above all, DON'T PANIC.
What to do if a suspected bomb is located
1. Evacuate personnel at least 300 feet away from the bomb.
2. Turn off the electrical and gas units.
3. Do not touch or move unknown objects.
CHAPTER X
SECURITY INVESTIGATION
Learning Objectives:
At the end of this chapter the students will be able to:
1. Discuss Investigation the concept of Security
2. Write a comprehensive Investigation Report
Security Investigation is a planned and organized of facts concerning specific loss
determination of or damage of assets due to threats, hazards or unsecured conditions.
Elements of Investigation
1. Investigator
2. Purpose
3. Subject of Investigator
Tools of Investigation
1. Information - knowledge which the investigator gathers from other persons.
a. Acquired from regular sources conscientious and public-spirited citizens, company files, school
files or records file of other agencies.
b. Acquired from cultivated sources-paid informants, bartenders, cab drivers, acquaintances, etc.
2. Interrogation the skillful questioning of a person who is reluctant to divulge information
concerning the offense under investigation.
3. Interview - the simple questioning of a witness who has no personal reason to withhold
information.
4. Instrumentation - the application of instruments and methods of physical sciences to the
detection of crimes. In other words, the sum total of the detection application of all sciences, in
Three-Fold aims of Investigation
1. To identify the offender
2. To locate the offender
3. To provide evidence for his guilt

Methods Identifying the Offender


1. Confession-acknowledged, disclosed or admitted.
2. Eyewitness/testimony - solemn declaration.
3. Circumstantial evidence - evidence which gives ground for belief as to fact or
guilt.
4. associative evidence
Standard Methods of Recording Investigative Data
1. Photography
2. Sketching the crime scene
3. Written notes
4. Developing and lifting fingerprints
5. Gathering physical evidence
6. Plaster cast
7. Tape recording of sound
8. Video tape recording of objects and sound
9. Written statement of subjects and witnesses
Difficulties in the Investigation
1. Absence of Eyewitness/witnesses
2. Motives Unknown
Qualities of an Effective Investigation
1. Objective all facts are discussed as perceived without any distortion and the
manner of presentation is free from unwarranted opinion.
2. Thorough full detail; exhaust all available means, factual to arrive in a sound and
convincing conclusion.
3. Relevant- significant and demonstrated its relation to one another.
4. Accurate - free from error.
5. Current - terminology is generally accepted.
Guidelines in Investigation
1. Preliminary Investigation
P- Proceed to the scene promptly and safely
R- Render assistance to the victim, if any
E- Effect the arrest of the offender
L- Locates and identifies the witnesses
I- Interview the complainant and witnesses
M- Maintains the crime scene and protects the evidence
I- Interrogate the suspect/offender
N- Note all conditions, events and remarks
A- Arrange for the collection of evidence
R- Reports the incident fully and accurately
Y- Yields the responsibility to the follow-up investigation
2. Investigation Proper
a. Photograph the crime scene
b. Search the crime scene
c. Crime scene sketch
d. Care of evidence
3. Methods of Investigation
a. Information
b. Interrogation
c. Interview
d. Instrumentation
Investigation Report
1. Purpose
a. Record the report provides a permanent official record of the investigation.
b. Leads - the report provides other investigators with information necessary to further advance the
investigation.
c. Prosecutive action the report is a statement of facts on which designated authorities may base a
2. Nature and Qualities
a. The report must be objective statement of the investigation findings.
b. The report must be an official record of the information relevant to the
investigation that the investigator submits to his superior.
c. The report must be clear, brief accurate, impartial but complete.
d. The report must not be a place of the investigator's opinion or other irrelevant
facts foreign to the case.
e. The report is complete when it answers the questions of when, where, who,
what, why and how.
f. The report is accurate when it is a true representation of facts of the case.
g. The report is clear when it is developed logically and chronologically.
3. Parts of the Report
a. Administrative Data
1) Date
2) File Number
3) Subject
4) Complaint
5) Reporting Investigator
6) Office of Origin
7) Status
8) Distribution
b. Synopsis - brief description of the actions of the perpetrator as established in the body of
the report.
C. Details of the report- Objective of the investigation.
d. Conclusion and Recommendation - includes the investigator opinion, conclusions and
recommendations.
INVESTIGATION REPORT FORMAT
CONFIDENTIAL
(Letterhead)

Date

FOR: (The Chief or Commander who assigned the case)


SUBJECT:
I. AUTHORITY
This section should contain a brief statement of when, where and by whom
the investigation was made and should cite the authority for making it.
II. MATTERS INVESTIGATED
This section of the report represents the mission of the investigator. In
essence, it answers the question: what is the investigation all about?
III. FACTS OF THE CASE
This presents the real truth respecting the matter investigated. The description "completeness"
clarity to give the directing authority clearest possible picture. It should contain such related factual matter
of argument as may be necessary in addition to the facts presented, to establish the conclusions and
recommendation based thereon.
IV. DISCUSSION
This section set forth when appropriate, the presumption and inferences from all the circumstances
in the case to give the directing authority the clearest possible picture. It should contain such related
factual matter of argument as may be necessary in addition to the facts presented, to establish the
conclusions and recommendation based thereon.
V. CONCLUSION
This represents concise summary of the results of the investigation directly consequent from and
supported by facts. These logically follow from the facts of case of found and set forth in the report. They
are usually stated in the order naturally suggested by the statement of the allegations or facts.
VI. RECOMMENDATIONS
This should contain the practical suggestions as to appropriate action to be taken to make suitable
position of all phases of the case. They should follow, as far as practicable, the same sequence as was used
in the presentation of conclusion.

Investigator
PREPARATION OF WRITTEN REPORTS
1. The Basics
• Always write in first-person.
• Aim to answer the 5 W's and 1 H.
• Be specific.
• Avoid subjectivity.
2. Take Notes
• Always bring a notepad and pen and take note of the happenings or observations during the shift.
3. Concise
• Do not include useless information.
• Use strong verbs and adjectives.
4. Facts
• The contents of the report should not contain any opinion.
5. Professional
• Avoid using abbreviations, except the most common ones.
• Observe proper punctuation and capitalization, as well as spelling and grammars.
CHAPTER XI
PRIVATE SECURITY AGENCY LAW ORGANIZATION
AND ADMINISTRATION OF SECURITY GUARD FORCE

Learning Objectives:
At the end of this chapter the students will be able to:
1. Understand the Private Security Agency Law
2. Explain the Organization and Administration of Security Guard Force
R.A No. 5487 - The act that regulates the organization and operation of private
detective, watchman and security guard agencies in the Philippines. This act was
approved on June 13, 1969. (Otherwise known as Private Security Agency Law)
RA No. 5487-Otherwise known as "The Private Security Agency Law" has been
amended by PD No. 100 dated January 17, 1973 in order to make more responsive
to the demands of the private security industry in the country.
RA No. 7461-An act amending article 287 of Presidential Decree No. 442 as
amended, otherwise known as the labor code of the Philippines, providing for
retirement pay to qualified private sector employees in the absence of any
retirement plan in the establishment.
- In the absence of a retirement plan or agreement providing for retirement
benefits of employees in the establishment, an employee upon reaching the age of
sixty (60) years or more, but not beyond sixty-five (65) years which hereby declared
the compulsory retirement age, who has served at least five years (5) in the said
the said establishment may retire and shall be entitled to retirement pay
equivalent to at least one-half (1/2) month salary for every year of service, a
REPUBLIC ACT NO. 11917 (July 30, 2022) - an act strengthening the regulation of the
private security service the industry, repealing for the purpose, republic act no. 5487,
entitled "ac act to regulate the organization and operation of private detective
watchmen or security guard agencies", as amended.
Be it enacted by the Senate and House of Representatives of the Philippines in
Congress assembled:
CHAPTER I
GENERAL PROVISIONS
Section 1. Short Title.- This Act shall be known as "The Private Security Services
Industry Act."
Section 2. Declaration of Policies. - The State recognizes the vital role of the private
sector in the protection of the people and safeguarding of property as well as
maintenance of peace and order in the country.
Towards this end, the State shall adopt measures to strengthen the regulation of the
private security services industry and establish quality standards to ensure competent
private security personnel and professionals that complement our law enforcement
Section 3. Definition of Terms. - As used in this Act:
(a) License to Exercise Security Profession
(LESP) refers to a permit issued by the Chief of the Philippine National Police (PNP) or the
duly authorized representative, recognizing a natural person to be qualified to perform
the duties as security professional or training personnel;
(b) License to Operate (LTO) refers to a permit issued by the Chief PNP or the duly
authorized representative certifying and authorizing a person to engage in employing and
deploying security guards, K9 teams, protection agents, private detectives and other
licensed specialized security personnel; or a juridical person to establish, engage, direct,
manage or operate a private detective agency or private security agency or company
guard force after payment of the prescribed dues or fair and reasonable fees and after
complying with all the requirements as provided by the rules and regulations
implementing this Act.
(c) Pre-requisite Training Programs- refer to licensing pre-licensing training programs that
include all training and academic programs and courses with the objective to indoctrinate
the individual with the basic skills and educational backgrounds necessary in the effective
exercise and performance of the security and detective profession. These include, but are
(d) Private Security Agency (PSA) refers to any person, natural or juridical, who
contracts, recruits, furnishes or posts any security guard, to perform its functions or
solicit individuals, businesses, firms, or private, public or government-owned or -
controlled corporations (GOCCs) to engage its service or those of its security guards,
for hire, commission or compensation through subscription or as a consultant/trainer
to any private or public corporation whose business or transactions involve national
security or interest like the operation and/or management of domestic or ocean
vessels, airplanes, helicopters, seaports, airports, heliports, landing strips among
others or as consultant on any security related matter, or to provide highly specialized
security, private escort, detective and investigation services like gangway security,
catering security, passenger profiling, baggage examination, providing security on
board vessels or aircraft, or other security needs that the PNP may approve;
(e) Private Security Industry refers to the industry that is engaged in providing security
consultancy, management, administration, operation, and provision of private or
company watchman, guarding, investigative work, security training, K9 security,
armored vehicle security services, alarm system monitoring services, closed-circuit
television (CCTV) suppliers and other providers of security hardware, security
hardware operation, personal protection services, or security consultant;
(f) Private Security Professional (PSP) refers to a person who is issued a valid LESP
of any classification or category, issued by the designated government agency after
satisfying all the qualifications and requirements set forth by this law and its
implementing rules and regulations. It includes security watchmen, security guards,
security officers, personal security escorts, private investigators, training officers
and directors, k9 handlers, K9 administrators, K9 evaluators, K9 trainers, kennel
masters and other certified or licensed security service providers rendering or
performing security, investigation, security escorting services, security hardware
planners and systems designers, security hardware operators, security managers,
security consultants whether employed by private security agencies, private
corporations, government agencies or independently practicing or providing
professional security services;
(g) Private Security Services refer to the act of providing or rendering security
services for compensation pursuant to mutually agreed terms of reference and
contract and shall include the act of providing or rendering services to watch an
establishment, whether public or private, building, compound/area or property, to
conduct access control/denial in any form whether physically, manually or
scientifically by electronic monitoring systems, for the purpose of securing such
area/property and at the same time ensuring safety and protection of persons
within such areas, to maintain peace and order within such areas, to conduct
private security training, and/or to conduct investigation. It shall also include the
act of contracting, recruiting, training, furnishing or posting any security guard, to
do its functions or solicit individuals, businesses, firms, or private, public or GOCCs
to engage its service or those of its security guards, for hire, commission or
compensation through subscription or as a consultant/trainer to any private or
public corporations;
(h) Private Security Training Agency (PSTA) refers to any person, natural or juridical,
who engages in the and courses duly approved and prescribed by the PNP business
and adopted by the Technical Education and Skills Development pre-licensing
requirements of individual security guards and other security professionals, the
periodic and non periodic in-services skill refreshers for such security personnel,
and other specialized, individual or group, private security personnel skills
development;
(i) Security Consultant refers to a security professional Authorized by law to provide
security services such as sign and formulation of design a security plan, threat and
vulnerability assessment, resiliency planning, security surveying, security auditing,
risk management, travel security training, event security planning and
management, emergency and incident planning and management, crisis
management, business continuity and other services related to the formulation of
security- related solutions other than providing guards and watchmen;
(j) Security Hardware refers to any mechanical or electrical device, which is
designed and used for the detection of an unauthorized entry into a facility, for
alerting others of the commission of an unlawful or unauthorized act within a
building, structure or facility, identification and screening, control, repel and
prevent entry of persons and vehicles of person and materials, recording and
documentation of activities and events, repel and prevent aggression to a person
or a facility; and
(k) Security Hardware and Systems Designers and Planners refer to the security
professionals who specialize in the design of security systems using a combination
of security software and hardware to address security requirements of a facility
and the training for their operation and maintenance.
CHAPTER II
REGISTRATION AND LICENSING OF PRIVATE
SECURITY AGENCY
Section 4. Private Security Agency (PSA).- Any Filipino citizen or juridical entity wholly
owned and controlled by Filipino citizens may organize a private that they shall not employ
more than two thousand (2000) private security professionals as defined in this Act.
Section 5. PSA Operator or Licensee. – No applicant shall be granted a license to operate a
PSA unless the applicant possesses the following qualifications:
(a) Must be at least twenty-five (25) years of age;
(b) Must hold a bachelor's degree;
(c) Must be a part owner of the company or in case of juridical entity, holder of at least one (1) share
of stock with voting rights;
(d) Must be of good moral character;
(e) Must not have been convicted of any crime or offense involving moral turpitude; and
(f) Must be physically and mentally fit, and passed the neuro-psychiatric test and drug test
administered by the PNP or other similar government centers and facilities:
Provided, that in case of juridical entity, the named operator or licensee shall be its
President or any of its directors complying with the above requirements and duly
Section 6. License to Operate.- A license to operate issued by the Chief PNP is required to
operate and manage a PSA and PSTA: Provided, That an LTO for PSTA shall be granted only to
a training school, institute, academy, or educational institution which offers courses
prescribed and approved by the PNP or training programs accredited by TESDA.
Section 7. Period of Validity of LTO. The LTO issued to PSA and PSTA shall be valid for a
maximum period of five (5) years, subject to renewal: Provided, that the Chief PNP may set a
shorter validity period for LTO with applicable fair and reasonable fees adjusted accordingly.
Section 8. Fees and Bond to be Paid.- Every application for LTO shall be accompanied by a
bond issued by competent or reputable surety, fidelity or insurance company duly
accredited by the Insurance Commission. The bond shall be used to answer to any and valid
and legal claim against the agency by its clients and or employees. The amount of bond to
be determined by the Chief PNP must be reasonable and should depend on the number of
PSPs employed.
Section 9. Administrative Fee of PSAs. The minimum administrative fee that may be charged
by PSAs to its clients shall not be less than twenty percent (20%) of the total contract cost,
subject to adjustment by the Department of Labor and Employment: Provided, that
additional fees shall be charged for the acquisition and maintenance of extraneous tools and
equipment used for security operation by the agency or required by the clients and for the
Section 10. Issuance of Firearms.- A PSA shall be entitled to possess firearms after
having successfully passed the requirements prescribed by the Chief PNP and in
accordance with Republic Act No. 10591 or the "Comprehensive Firearms and
Ammunition Regulation Act": Provided, That a PSA shall only be allowed to possess
small arms, not exceeding one (1) firearm for each PSP, to include single-post, in its
employ: Provided, further, That possession of firearms by PSPs shall only be
allowed during their tour of duty, in proper uniform, within the compound of the
establishment, except when they escort and secure large amounts of cash or
valuables, which firearms must be determined by the PNP: Provided, finally, That
inventory of firearms of PSAs shall be subject to periodic inspection by the PNP.
Section 11. Uniform. The uniform of PSPs shall be different from the uniform worn
and prescribed for members of the Armed Forces of the Philippines (AFP), the PNP
and other law enforcement authorities. The PNP, through the authorized
representative, shall prescribe the uniform, ornaments, equipment and
paraphernalia to be worn by the PSPs while on duty.
CHAPTER III
PRIVATE SECURITY
PROFESSIONALS
Section 12. License to Exercise Security Profession (LESP). – No applicant shall be granted license
to exercise private security profession unless the applicanant possesses the following
qualifications:
(a) Must be of legal age;
(b) Must be a Filipino citizen;
(c) Must be physically and mentally fit;
(d) Must be of good moral character; and
(e) Must not have been convicted of any crime or offense involving moral turpitude.
For purposes of securing an LESP, a letter of authority to conduct training must be issued
by the Supervisory Office for Security and Investigation Agency (SOSIA). Such training includes
the pre-licensing requirements of the individual PSPs, periodic and non-periodic in- service skill
refreshers for such security personnel, and other specialized, individual or group, PSP skills
development: Provided, That the Chief PNP shall provide for additional qualifications for security
Section 13. Period of Validity of LESP. - The LESP of duly qualified PSPs shall be valid
for a period of five (5) years from the date of its issuance.
Section 14. Pre-Licensing Training.- No person shall be granted an LESP without
undergoing the Pre-Licensing Training Program as defined in this Act: Provided,
That the PNP shall encourage opening of local and regional security training centers
to provide pre- licensing trainings to applicants.
Section 15. Ladderized Training and Education.- The PNP, in partnership with
private security training institutions or public institutions duly accredited by the
government to provide such training education to private security professionals,
shall develop ladderized training and education which include basic security guards
courses, specialized security guard courses, security officers training courses,
detective training courses, and candidate protection agent courses. It shall also
include enhancement trainings, such as but not limited to, supervisory trainings,
personal upliftment and other specialized trainings to place the security
professional a level up from his current position
CHAPTER IV
PENAL PROVISIONS
Section 16. Penalties.- Any violation of the provisions of this Act shall, after due notice and
hearing, be subject to the corresponding penalties herein provided:
(a) A license to operate of a PSA may be cancelled, revoked or suspended by the Chief PNP
when:
(1) It takes part in an armed conflict against the government;
(2) It uses force or the threat of force or those it represents in a national or local electoral
contest;
(3) It uses its authority to be involved in human rights violations;
(4) It is used as a privately owned and operated para- military organization operating outside of
the regulatory framework established by this law and the implementing rules and regulations
adopted by the PNP;
(5) It intentionally and maliciously makes use of electronic security devices or remote video
surveillance in a manner that violates the privacy of civilians;
(6) It acted with gross negligence in dealing with violations, or mistakes of its members, or
(7) Its named operator or licensee is convicted by final judgement of any crime or felony;
(8) It violates any provision of Presidential Decree No. 442, otherwise known as the “Labor Code of the Philippines”, as
amended, including its implementing rules and regulations; and
(9) It acted in a manner which renders the PSA a detriment to the maintenance of peace and order.
(b) Any PSA or any entity which operates without a valid LTO shall suffer the penalty of a fine of not less than One million
pesos (P1,000,000.00) and not more than Five million pesos (P5,000,000.00) at the discretion of the Chief PNP;
(c) Any PSA or any entity which operates with an expired LTO shall suffer the penalty of a fine of not less than Fifty
thousand pesos (P50,000.00) and not more than One hundred thousand pesos (P100,000.00) at the discretion of the
Chief PNP;
(d) Any person practicing private security profession without valid license or with only an expired license shall suffer the
penalty of a fine of not less than Fifty thousand pesos (P50,000.00) and not more than One hundred thousand pesos
(P100,000.00) at the discretion of the Chief PNP. The same penalty shall be imposed upon a PSA who shall deploy any
person practicing private security profession without a valid license or with only an expired license;
(e) Any person who offers to render or renders services to persons or places conducting illegal activities shall suffer the
penalty of imprisonment of not less than twelve (12) years and one (1) day to twenty (20) years, and a fine of One million
pesos (P1,000,000.00), ), at the discretion of the court, without prejudice to criminal prosecution under other laws; and
(f) Any person who violates any of the provisions of this Act not mentioned in the preceding subsections shall suffer the
penalty of imprisonment of not less than six (6) months and one (1) day to six (6) years, or a fine of One million pesos
(P1,000,000.00), or both, at the discretion of the court, and cancellation or suspension of its license with forfeiture of the
bond without prejudice to criminal prosecution under other laws.
If the offender is a juridical entity, the penalty shall be imposed upon the officer or officers of the juridical who
participated in the decision that led to the violation of any provision of this Act, without prejudice to the cancellation of
their license issued by the PNP.
CHAPTER V
MISCELLANEOUS PROVISIONS
Section 17. Implementing Rules and Regulations (IRR). - The PNP, in consultation with stakeholders
and other national private security associations, representatives of private security cooperatives
other stakeholders of the security industry, and subject to the provisions of existing laws, shall
promulgate the rules and regulations necessary to implement the provisions of this Act within ninety
(90) days from its effectivity. Furthermore, the Chief PNP shall consult with the said stakeholders
prior to the issuance of all regulations and issuances related to and affecting the private security
services industry. The PNP is mandated to review the IRR every three (3) years.
Section 18. Separability Clause. - If any part or provision of this Act is declared unconstitutional, the
remainder of this Act or any provisions not affected thereby shall remain in force and effect.
Section 19. Repealing Clause. - Republic Act No. 5487 is hereby repealed. All other laws, presidential
decrees or issuances, executive orders, letters of instruction, rules, regulations and administrative
orders inconsistent with the provisions of this Act are hereby repealed or modified accordingly.
Section 20. Effectivity. This Act shall take effect fifteen (15) days after its complete publication in the
Official Gazette or in a newspaper of general circulation.
Retail service and agriculture establishment or operations employing not more than ten (10)
employees or workers are exempted from the coverage of this provision.
- Approved December 9, 1992
PNPSAGSD- (Philippines National Police Security Agency, Guard and Supervision Division)
PNP SOSIA- (Philippine National Police Supervisory Officer for Security and Investigative Agencies)
- This is the unit under the Philippines National Police which is charged with the supervision,
direction and control of all security agencies in the Philippine.
Person - shall include not only natural but also juridical persons such as single proprietorship, corporations,
companies or association, duly organized and registered with the Security Exchange Commission and/or the
Department of Trade and Industry.
Private Security Service shall include the act of providing or rendering service to watch an establishment
whether public or private, building, conmpo8nd/ area or property, to conduct access control/denial in any
form whether physical, manually or scientifically by electronic monitoring system, for the purpose of
securing such property and at the same time ensuring safety and protection of person within such areas, to
maintain peace and order with in such areas. To conduct private security training, furnishing or posting any
security guard, to do its function or solicit individuals, businesses, firms, or private, public or government
owned or controlled corporation to engage his/its service or those of his/its security guard, for hire,
commission or compensation thru subscription or as a consultant/ trainer to any private or public
corporation.
Private Detective Services shall include among others the act of providing personal security protection,
inquiry and information gathering, pre-employment verification and individual background profiling,
providing assistance in civil liability and personal injury cases, insurance claims, and fraud, child custody and
protection cases, for the purpose of assisting in gathering information leading to determination and / or
prevention of criminal acts/ or resolutions of legal, financial and personal problems.
Private Security Industry- shall cover those in the legitimate business of providing private security and detective
services.
Security Guard guard- sometimes called private security or watchman shall include any person who offers or renders
personal service to watch or secure either a residence or business establishment or both for hire or compensation,
and with a license to exercise profession.
Private Detective- shall mean any person who does detective work for hire, reward or commission, other than
members of the AFP, Guard of the Bureau of Jail Management Penology, Municipal or city jail guards, and members of
the PNP or of any other Law Enforcement agency of the government.
Private Security Personnel - shall be natural persons which include private security guards, private detectives, security
consultant, security officers and others that may be classified later, rendering performing security and/or detective
services as employed by private security agencies and/or private firms.
Government Security Personnel- shall be natural persons which include government security guards, detective,
security consultant, security officers and others that may be classified later except those of the AFP, PNP, BJMP,
Municipal or City Jail guards rendering / performing security and/or detective services as employed by government
entities.
Private Security Agency (PSA) - shall mean any person association, partnership, film or private corporation, who
contracts, recruits, trains, furnishes or post any security guard, to perform its functions or solicits individuals,
business, firms, or private, public or government-owned or controlled corporation to engage his/its security guards,
for hire, commission or compensation thru subscription or as consultant/trainer to any private or public corporation
whose business or transaction involve national security or interest like the operation and/or management of
domestic or ocean vessels, airplanes, helicopters, seaports, airports, landing strips etc., or as consultant on any
security related matter. Or to provide highly specialized security, detective and investigation services like gangway
security, catering security, passenger profiling, baggage examination, providing security on board vessels or aircraft,
Private Detective Agency (PDA)- shall mean any person association, partnership, firm or
private corporation, who contracts, recruits, trains, furnishes or post any private detective, to
perform its functions or solicits individuals, firms, or private, public or government-owned or
Controlled corporation to engage his/its service or those of his/its detectives,
For hire, commission or compensation thru subscription or as consultant/trainers to any
private or public corporation or a or as consultant on any detective related matter, or to
provide highly specialized detective and investigation services, or other detective needs that
PNPSAGSD - CSG may approve.
License to Exercise Profession- shall mean any document issued by the chief PNP or his duly
authorized representative recognizing a person to be qualified to perform his duties as private
security or training personnel.
License to Operate (LTO)- is license Certificate document, issued by the C/PNP or his duly
authorized representative, authorizing a person to engage in employing security guard or
detective, or a juridical person to establish, engage, direct, manage or operate an individual or
a private detective agency or private security agency/company security force after payment of
the prescribed dues of fees as provided.
Company Guard Force (CGF)- a security force maintained and operated by any private
company/ corporation utilizing any of its employees to watch, secure or guard its business
Government Guard Unit (GGU)- a security unit maintained and operated by any government entity other than
military or police, which is established and maintained for the purpose of securing the office or compound
and/or extension of such government entity.
PNP - s used herein mean the Philippine National Police, which was organized pursuant to the provision of RA
6975 otherwise known as the National Police Act of 1991.
SAGSD- as issued herein shall refer to the current PNP Civil Security Group Security Agency and Guard
Supervision Division or any other PNP office that may be designated later as the primary office for supervision
of the implementation of these rules and regulations.
PADPAO- refers to the Philippines Association of Detective and Protective Agency Operators, Inc., Which is an
association of all licensed security agencies and company security forces.
-The one who are authorized to issue the implementing rules and regulations pertaining to R.A.NO.5487.
Duty Detail Order - is a written order/schedule issued by a superior officer usually the private security agency/
branch manager or operation officers assigning the performance or private security detective.
Security Guard Force- is a group of force selected men, trained or grouped into functional unit for the purpose
of protecting operational processes from those disruptions which impede efficiency or halt operation at a
particular plant, facility, installation or special activity.
A. Who may organize and maintain a PSA and PDA?
-Any Filipino citizen or corporation association, partnership, one hundred percent (100 %) of which is
owned and controlled by Filipino citizen.
B. Basic age requirements of an operator of manager of Agency?
C. New applicant for license to operate:
- Minimum capitalization of one million (1,000,000) with minimum bank deposit of five hundred thousand (P500,
000,000) pesos in order to start its business.
D. Membership:
- No regular license shall be granted to any private security agency unless it has minimum of two hundred (200)
licensed private security personnel under its employ.
- No regular license shall be granted to any company guards' force or private detective agency unless it has a
minimum of thirty (30) licensed private security personnel under its employ.
- The maximum number of private security personnel that a PSA/CGF/PDA may employ shall be one thousand
(1000)
- The validity of all LTO is two (2) years
E. Applicant of LTO.
- Files: Chief of the Philippine National Police (CPNP) through the PNP Security and Guard Supervision Division, Civil
Security Group (SACSD-CSG). Using license application form PNPSF1, the application shall contain the full name of
the applicant, his age, civil status, his residence and location of business.
New applicant- Applicant from NCR may file their application for license to exercise profession with the personnel
licensing section, SAGSD, Civil Security Group, Camp Crame, Quezon City. Applicants from the Province may file their
application with the Firearms, Explosives, Security Agencies and Guards Section (FESAGS), Regional Operation and
Plan Division (ROPD) of the Police Regional Office concerned.
F. Renewal of license to operate:
- all applications for renewal of license to operate shall filed at least sixty (60) days before expiry date of LTO subject
- in addition to other renewal requirements under provision of these rules and regulation, no
application shall be approved unless a certification is issued by FED-CSG to the effect that all licensed
firearms of the agency concerned are updated/renewed for at least one (1) year forthcoming during
the validity of the renewed LTO.
G. Payroll:
- Payroll shall be filed with the main office within fifteen (15) days after pay day.
H. Possession of Firearms
- Ratio: 1 firearm for every two (1:2) security guard in its employ.
- No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500 units.
1. Restriction to possess high powered firearms:
a. The firearm first be registered with the FED before issuance and shall not be used or transferred in
places other than those specially authorized by the Director, CSG.
b. The total number of high-powered firearms that an agency or security force/unit is authorized to
possess shall not exceed ten percent (10%) of the total number of security guards of watchmen in its
employ.
J. Stocking of ammunition:
PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
Individual issue to each security guard shall be limited to one half of such basic load or twenty-five
SECURITY GUARD FORCE
Is a group forces of men selected, trained or grouped into functional unit for the purpose of protecting operational process from
disruption which would impede efficiency of halt operations at a particular plant, facility, installations, or special activity.
TYPES OF SECURITY GUARD FORCE
1. Company guard force
2. Private security guard force
3. Government guard force
SECURITY PROCEDURES GUARD FUNCTIONS /GUARDING
Primarily Functions - Protecting of life and Property
a. Fixed Post
b. Patrol
c. Reserve
d. Administration work
e. Others/investigation and escorts
f. General Functions
QUALIFICATIONS OF PRIVATE DETECTIVES
Any person applying for employment as private detective-shall in addition to the qualifications of security guard, possess
any of the following qualifications.
a. Bachelor of Laws Degree
b. Graduate of B.S. Criminology
c. Graduate of a Criminal Investigation Course offered by the PNP, NBI, Police Training Center, and Private Detective Agency
d. Officers. Enlisted men and policemen honorably discharged from service not otherwise disqualified by the
R.A.NO.5487.
PERMIT- a document issued by CPNP of his duly authorized representative authorizing a person to engage in
the occupation calling or employment of watchman, security guard or private after payment dues of fees.
FIREARMS- possession of firearms by agency are entitled to possess firearms after satisfactory complying the
requirements as provided by law.
FIREARMS/WEAPONS AUTHORIZED FOR USED BY THE SECURITY GUARD WHILE ON DUTY
1. Handguns
2. Shotguns
3. Riot guns of prescribed caliber
JUSTIFICATION FOR A GUARD'S FIREARMS TO BE CONFISCATED
1. When firearm is to be used of being used in the commission of crime.
2. If carried while guard is not on tour of duty.
3. There is written court order.
4. Firearms is carried outside the property, compound or establishment serviced by the agency without
proper authority.
MISSION ORDER- is a written instructions issued by the agency to its guards to perform lawful activity at
specific time, place and date. It shall include the make, model and serial no. of the firearm issued to the
guard and the name of the operation officer or manager of the agency.
CHAPTER XII
INDUSTRIAL GUARD FORCE AND GUARDS
SYSTEM
Learning Objectives:
At the end of this chapter the students will be able to:
1. Explain the structure of Industrial Guard Force and Guard System
2. Know the basic requirements of Security Personnel
TYPICAL STRUCTURE OF SECURITY ORGANIZATION
The security force of any installation must be organized in accordance with the
principles of responsibility and authority. Each personnel must be assigned to a position
which correspond to his experience, skills, training and knowledge. This is to carry out
different functions efficiently and effectively and thus insures smooth flow of the
organization. The security positions may be classified into the following:
1. Office of the General Manager / Security Director
a. The office of the General Manager/Security Director is vested the authority and responsibility of
running the security force by authority of the President of the Company/ Corporation.
b. The General Manager/Security Director is directly responsible to the President of the
Company/Corporation in the operations and administration of the security force.
c. He is principal adviser to the President on matters involving security operations, administration of
the security force.
d. He is the overall head of both various staff departments and field units where he may delegate
corresponding authority commensurate to their assigned responsibility.
e. He implement policies promulgated by the policy making body and executed by the president.
f. He directs controls and supervises all offices and field units of the force in their respective assigned
task.
g. He performs other functions as directed by the President of the company/corporation.
2. Office of the Executive Secretary of the General Manager
a. He is the principal administrative assistant to the General Manager/Security
Director.
b. He prepares communications initiated by the General Manager/Security
Director.
c. He maintains records of scheduled conferences, appointments and other
engagements and advises the GM/SD of such activities.
d. He records and checks outgoing communications signed by the GM/SD as to
its completeness (attachments to be considered) as well as to ensure the
timely dispatch to the addressee through the administrative section.
e. To perform other duties as directed by the General Manger/Security Director.
3. Office of the Assistant General Manager/ Security Executive Director
a. The security Executive Director is the Assistant Manager of the Security
Force and takes the Operational and Administrative Management of the
security force in the absence of the GM/ SD.
b. He is directly responsible to the GM/SD.
c. He performs other duties as directed by GM/ SD.
4. Office of the Human Resources and Administrative Manager/Staff Director for
personnel and Administration
The principal staff assistant to the General Manager/ Security Director for planning
and supervising matters of activities pertaining to personnel management and
miscellaneous administrative function such as:
a. Personnel Strengths
b. Replacement
c. Discipline, Law and order
d. Morale and Personnel Service
e. Personnel Procedures
f. Interior Management
g. Personnel Adviser
5. Office of the Operations Manager/ Staff Director for Operations
This office is the principal staff on operations, training, intelligence and
6. Office of the Finance This office is principally concerned with budgeting, finance,
reports control and program review and analysis. Exercise supervision on over the
management engineering activities of the company and the accounting office.
Renders advice, assistance and guidance to GM/SD on financial management
Specific duties and functions of the Finance Office are:
a. Accounting
b. Credit and collection
c. Bookkeeping
d. Billing
e. Payroll
f. Disbursing
7. Office of the Logistic Manager
- This office is in charge with the following:
a. Coordinates plan and supervise the implementation of directive and guidance
determines divisional responsibility and evaluates in logistical planning and related
planning programs.
b. Develops, administer, and coordinates research and development on logistical
matters.
c. Collects computes and evaluates statistical data on logistical matters.
d. Recommends logistics budget policy including budget planning.
e. Prepares estimates and/or requirements to ensure that logistical plans support
for corporate plans.
f. Performs necessary program and fiscal administration.
g. Supervise all matters pertaining to supply.
h. Determine the organization, allocation of service personnel.
8. Office of the Inspectorate and Special Projects (special Staff)
- This office assists the General Manager in inquiring into, and reports upon matters
pertaining to the performance of the different staff, units, towards the attainment
of corporate objectives. It also inquires on the state of discipline, efficiency and
economy of the company. The Inspectorate Staff conducts inspections,
investigations and submits reports to the General Manager. In the performance of
its duties and functions, the General Manager is provided relevant information
pertaining to meritorious conduct and performance of a unit or individual. This
office is also tasked to conduct overt ad covert inspections and investigations and
other related services.
9. Office of the Communications Officer
The communications Officer who is a licensed radio operator is the principal
adviser of the General Manager on communication matters particularly radio
communication. He is responsible directly to the General Manager.
10. The Detachment Commands/ Officer-in-Charge
A Detachment Commander shall command and responsible for a certain detachment with
fifteen (15) or more security personnel under him. He is directly responsible to the Security manager
of the installation.
a. He prepares and executes the security plan of his Detachment in relation to the security
requirements of the establishments being guarded.
b. He is responsible for the enforcement and Implementation of rules and regulations/ policies.
c. He receives instructions from the Security Manager and implements the same as required.
d. He has full operational and administrative control of all his units to include his assistant and shift-
in-charge/ supervisor.
e. He conducts inspection of his units and institutes corrective measures on the spot on those
problems he may detect or brought to his attention. If not possible, he brings the problem to the
Security manager of the establishment.
11. Assistant Detachment Commander
Detachment with more than twenty (20) security personnel assigned may be provided with an
Assistant Detachment Commander who will be the principal assistant of the Detachment
Commander.
In the absence of the Detachment Commander, he performs the duties of the Detachment
12. Shift-in-Charge
a. The shift-in-charge shall be responsible to the detachment Commander as far as his shift is concerned.
b. He forms his men at least 30 minutes before posting times seeing to it that all are in proper uniform and
presentable.
c. He disseminates instructions coming from his Detachment Commander/OIC or those relayed to him by his
counter-part, counter-part, the outgoing SIC,
d. He inspects the post as often as he can to ensure that his men are on the alert and performing their duties
effectively.
e. He performs other duties as may be directed by the Detachment Commander or by the ADC.
13. Security Guard on Duty/Post
a. The Security Guard (SG) on Duty/ Post must always carry his license to practice his profession, photocopy
of the firearm's license assigned to him, and his duty detail order, authorizing him to carry his issued
firearm within his area of jurisdiction.
b. If the Security Guard is manning a fixed post especially entrance or exit points, he must maintain a guard's
logbook and enters in the same logbook all events/passages of VIP's vehicles and inspections or visits of
Security Manager/Director of the Client/Firm.
c. Guard must observe and apply religiously the provisions of the Code of Ethics, Code of Conduct, and the
General Orders of the Security Guard when on post.
d. He may perform special task as may be directed by his shift supervisor, DC and or ADC, like control of
visitors, inspections of bags of persons coming in and going out of the establishment, vehicle cargoes,
Security Guard's Professional Conduct and Ethics
1. Security Guard's Creed
As a Security Guard, my fundamental duty is to protect lives and properties and
maintain order within the vicinity or place of duty, protect the interest of my employer and
our clients and the security and stability of our government and country without compromise
and prejudice, honest in my action, words and thought, and do my best to uphold the
principle: MAKADIYOS, MAKABAYAN AT MAKATÃO.
2. Ethical Standard
As security guard/detective, his fundamental duty is to serve the interest or mission of
his agency in compliance with the contract entered into with the clients or customers of the
agency he is to serve thus,
1. He shall be honest in thoughts and deeds both in his official actuation, obeying the laws of
the land and the regulations prescribed by his agency and those establish by the company he
is supposed to serve.
2. He shall not reveal any confidential matter committed to him as a security guard and such
other matters imposed upon him by law.
3. He shall act all times with decorum and shall not permit personal feelings, prejudices and
4. He shall not compromise with criminal and other lawless elements to the prejudice of the
customers or clients and shall assist government relentless drive against lawlessness and
other forms of criminality.
5. He shall carry out his assigned duties as required by law to the best of his ability and shall
safeguard life and property of the establishment he is assigned to.
6. He shall wear his uniform, badge, patches and insignia properly as a symbol of public trust
and confidence as an honest and trustworthy security guard, watchman and private
detective.
7. He shall keep his allegiance first to the government he is assigned to serve with loyalty and
utmost dedication.
8. He shall diligently and progressively familiarize himself with the rules and regulations lay
down by his agency and those clients. of the customers or clients
9. He shall at all times be courteous, respectful and salute his superior officers, government
officials and officials of the establishment where her is assigned and the company he is
supposed to serve.
10. He shall report for duty always in proper uniform and neat in his appearance and
11. He shall learn at heart and strictly observe the laws and regulations governing the use of
3. Code of Conduct
1. He shall carry with him at all times during his tour of duty his license
identification card and duty detail order with an authority to carry firearms.
2. He shall not use his license and privileges to the prejudice of the public, the
client or customer and his agency.
3. He shall not engage in any unnecessary conversation with anybody except in the
discharge of his work and shall at all times keep himself alert during his tour of
duty.
4. He shall not read newspapers, magazines, books, etc, while actually performing
his duties.
5. He shall not drink any intoxicating liquor immediately before and during his tour
of duty.
6. He shall know the location of eh alarm box near his post and sound the alarm in
case of fire or disorder.
7. He shall know how to operate any fire extinguishers at his post.
8. He shall know the location of the telephone and/or telephone number of the police
precincts as well as the telephone number of the fire stations in the locality.
9. He shall immediately notify the police in case of any sign of of disorder, disorder,
strike, riot or any serious violations of the law.
10. He or his group or guards shall not participate or integrate any disorder, strike, riot or
any serious violations of the law.
11. He shall assist the police in the preservation and maintenance of peace and order
and in the protection of life, property/ having in mind that the nature of his
responsibilities is similar to that of the latter.
12. He shall familiarize himself with the Private Security Agency Law (RA 5487) as
amended, and the PNP SÅGSD implementing rules and regulations.
13. When issued a pass he should not lend his pass to anybody.
14. He shall always in proper uniform and shall always carry with him his basic
requirements, and equipment such as writing notebook, ball pen, nightstick (baton)
and/or radio. He shall endeavor at all times to merit and be worthy of the trust and
4. General Order
1. To take charge of this post and all companies property in view and protect/preserve the
same with utmost diligence.
2. To walk during tour of duty in military manner, keeping always in the alert and observing
everything that takes place within sight or hearing.
3. To report all violation of orders I am instructed to enforce.
4. To repeat all calls from post more distant from the guardhouse where I am station.
5. To quit my post only when properly relieved.
6. To receive, obey and pass out to the relieving guard all order from company officers or
officials, supervisors post in charge or shift leaders.
7. To talk to no one except in the line of duty.
8. To sound or call the alarm in case of fire or disorder.
9. To call the superior officer in any case not covered by instructions.
10. To salute all company officials, superiors in the agency, ranking public officials and
commission officers of the AFP and officers of the PNP.
11. To be especially watchful at night and during the time of challenging to challenge all
Selection of Guards
R.A 5487 and its implanting rules and regulations prescribed the minimum
requirements for guards to be able to secure a license to exercise profession as a
security guard, private detective, security officers and security consultant.
Who may organize and maintained a Private Security Agency and Private
Detective Agency - Any Filipino Citizen or corporation, association, partnership, one
hundred percent (100%) of which owned and controlled by Filipino citizens, may
organized and maintain a PSA and PDA.
Basic Qualifications of an Agency Operator/Manager Agency
a. The operator or manager of an agency including, managers of branch offices, must
be:
1. Filipino Citizen;
2. Not be less than 25 years of age;
3. College graduate and/or a Commissioned officer, inactive or retired service or retired from the
AFP or PNP.
4. Has taken a course/seminar on industrial Security Management and/or must have adequate
training or experience in the security business; and
b. New applicant for license to operate shall be required to obtained minimum capitalization of
one million pesos (P1,000,000) with a minimum bank deposit of five hundred thousand pesos
(P500,000) in order to start its business operation.
Basic qualification of a Security Consultant
1. Filipino Citizen;
2. Physically fit;
3. Holder of Master degree of Criminology, MPA, MNSA, Industrial Management of LL.B.
4. Must have at least ten (10) years' experience in the operation and management of security
business.
Basic Qualifications of a Security Officer
No person shall be licensed as a private detective unless possesses the following qualification:
1. Filipino Citizen;
2. Physically and mentally fit;
3. Holder of a baccalaureate degree preferably Bachelor of Law, BS Criminology.
4. Graduate of a criminal Investigation Course offered by the PNP or the NBI or any Police training
school, or detective training in any authorized/ recognized training center; and
Basic Qualifications of a Private Security Guard:
No person shall be licensed as security guard unless he possesses the following
qualification:
1. Filipino Citizen;
2. High school graduate;
3. Physically and mentally fit;
4. Not less than 18 years of age nor more than Not years old. (For new applicant and SGs in
supervisory position); and
5. Has undergone a pre-licensing training course or its equivalent
Desirable Qualities of Security Guards
1. Alertness- a good guard must be alert and observant. This can be attained by watchfulness,
dedication and diligence.
2. Judgment - sound and good judgment is more than the use of common sense. It is the arriving
at wise and timely decision.
3. Confidence - it is the state of being sure; a state of mind free from doubt or misgivings. This
attribute includes faith in oneself and in his abilities, which is attained by job knowledge.
4. Physical fitness - security work is strenuous and demanding. Physical conditioning is essential if
5. Tactfulness- ability of the guard to deal with others successfully without offending. In short, he
can be firm but pleasant.
6. Self-control- ability to take hold of oneself regardless of a provoking situation. With self-
control, the guard will do his work without being angry and the situation will be on hand.
7. Interest, loyalty, responsible and trustworthy, is also important attributes of a reliable guard.
License in the Security Profession
1. License to Operate- before a Private Security Agency (PSA) can operate, it has to secure a
License to Operate (LTO) categorized as either Temporary or Regular. A temporary license is
issued by the PNP thru Civil Security Group Directorate after the applicant/ license should have
complied with all the requirements while it has less than two hundred guards. A regular license
to operate is issued to the PSA once it is qualified of having two hundred or more license security
guard in its employ duly posted. Regular license is renewable every two years.
2. Security Guard License - before a security guard can practice his profession; he shall possess
valid security license. The use of expired license is not allowed. In case of doubt, license m may
be verified at the PNP SAGSD whether valid or fake.
3. Firearm's license- all firearms of the security agency should be covered with firearms license
issued by the PNP through its Firearms Explosive Division under the Civil Security Group,
renewable every two years. No duplication of two or more firearms with the same make and
Firearms and Weapons Authorized for Use of the Security Guard while on Duty
1. Handguns/Low-powered (cal. 22 and cal. 38) not exceeding one FÅ for every two
guards employed.
2. Shotguns (not bigger than 12 gauge)
3. High-powered when the agency is operating in areas where there is upsurge of
lawlessness and criminality as determined by the Chief PNP.
Handling Firearms
The Fundamentals of Firearm Safety
1. Always point the muzzle in a safe direction; never point a firearm at anyone or
anything you do not want to shoot.
2. Keep your finger off the trigger guard until you are ready to shoot.
3. Keep the action open and the gun unloaded until you are ready to use it.
Additional Specific Rules of Safe Gun Handling
1. Treat every firearm as if it were loaded.
2. Never pass a firearm to another person, or accept a firearm from another
person, until the cylinder or action is open and you have personally that the
weapon is completely unloaded.
3. Before handling any firearm, understand it’s operation
4. Never rely on any mechanical device for safety
5. Think before shooting.
6. Never joke around or engage in horseplay while handling or using firearms.
7. Be alert at all times: never shoot if you are tired. cold or impaired in any way. Do
not mix alcohol or drugs with shooting.
8. Do not sleep with a loaded firearm in your bedroom if you sleepwalk, have
nightmares, sleep restlessly or have other sleep problems.
9. Safeguard your sight, hearing, and health.
10. Speak up when you observe unsafe behavior.
11. Receive competent instruction from a qualified person.
Safety Rules Related to Your Target
1. Identify your target positively.
2. Note what is behind your target.
3. Never shoot at a hard surface, or at water.
4. Never shoot at glass bottles or other inappropriate targets.
5. Never shoot directly upwards or at high angle of elevation.
6. Never shoot across a highway.
7. Never use a road sign as a target.
8. Never poach a game animal out of season.
Guards' Uniforms, Equipment and Paraphernalia
1. Set of Uniforms for Security Personnel
a. Headgear - perching cap for men and 2 ply caps for women.
b. Service Bush Jacket - intended for Directorial and staff officers.
C Service Shirt
d. Service Trouser
e. Service Belt
f. Footwear
2. Color of Uniforms
a. Private Security Agency Navy blue (upper and lower)
b. Company Security Forces- light blue/ light gray for upper and navy blue for lower.
C. Government Security Forces - white for upper and navy blue for lower.
3. Ornaments and Patches
a. national badge
b. cap device
c. regulation buckle
d. collar device
e. name cloth
4. Equipment and Paraphernalia
a. Leather pistol belt with regulation buckle
b. Holster, black leather for pistol
c. Night stick with horizontal handle
d. Whistle with lanyard
e. Handheld radio
f. Pocket notebook and ball pen
Responding to Emergency Situations
1. Check Emergency Preparedness Plan
The factors to be considered in preparing emergency plans are the following:
Type of emergency
Physical layout of the installation
Observation, description, identification control
Security safety inspection
Communication flow/control
2. Check Emergency Alarm System
Definition Of Terms
ACCESS LIST - an authenticated list personnel given to security guard allowing entry installation or part
thereof.
ANNUCIATOR - is a visual or audible signing device which initiates conditions of associated circuits. The
primarily purpose of alarms is to alert security guards.
AUDIT- an official verification and examination of accounts and records.
BADGE SYSTEM - a system for personnel movement and control whereby badges or identification are issued
to personnel upon entering and an installation. Visitors are also issued temporary badges when entering
the installation.
COMBINATION LOCK- is a lock that requires manipulation of parts according to predetermined combination
code of numbers or letters.
CONTROLLING- the regulation of many different aspects of business activity, controls are needed to
standardized equality and performance, protect assets, measures performance, balance plans and
programs and motivate individuals.
CONTROLLED AREA- an area near the adjacent to limited or exclusive areas where entry is restricted.
COVERAGE FACTOR- The minimum number of directions from which each point in the area should be
lighted depending upon the use of the area.
DOPPLER EFFECT- a physical phenomenon that causes frequency shift if objects move in the area
DRY RUN- practical test or exercise of to test its validity, an operational readiness exercise
DURESS CODE- a type of code system so that security personnel when forced by armed men enter an
installation can give alarm by the use of a certain words in casual conversational with other personnel in the
installation
ELECTRICAL LOCK- type of lock that can be opened and closed remotely by electronic means
ENTRANCE CONFERENCE- a conference or dialogue between the survey team and management officials of a
plant before security survey is conducted .
EXIT CONFERENCE - a conference similar to entrance Conference done after the completion of the security
survey.
EXCLUSION AREA- a restricted area containing materials or operation of security interest.
FALL SAFE- a term applied to a device or system that in the event of failure of a component the incapacity will
be signaled.
INSPECTION - term use for succeeding surveys.
KEY CONTROL- the management of key is a plant of business organization to prevent unauthorized individuals
access to the keys.
LOCK-is defined as a mechanical, electrical, hydraulic, or electronic device to prevent entry to a building,
room, container or hiding place.
MASTER KEY- a special key capable of opening a series of lock.
MASTER KEYING SYSTEM - the system used in big installation whereby keys can open a group or group of
MAISON KEYING- the issue of key to open main entrance gate and office.
PADLOCK - is a portable and detachable look having a pivoted of sliding hasp which
passes through a staple ring which is made fast or secured.
PASS SYSTEM- a method used by security to screen visitors of person admitted into
building premises.
PETERMAN - a term used in England for lock pickers, safecracker and penetrators of
restricted rooms or areas.
PROTECTIVE ALARMS - is an aural signal given by the annunciator to security guard
when intruder actuates device in a protected area.
RESTRICTED AREA- any area access to which is subject to special restriction control.
SECURITY SURVEY - a fact finding probe and determine plans adequacy and
deficiency in all aspects of security, with the corresponding recommendations.
SEP- the exposure and teaching of employees on security and its relevance to their
work.
SURVEY - term to the first detailed "look see" conducted by a term.

You might also like