Lea 3
Lea 3
SECURITY CONCEPTS
BY:
PCOL ESTEBAN C. DULNUAN, (Ret), Rcrim, DSC, Ph.D
What is the best definition of Security
the state of being or feeling secure; freedom from fear, anxiety, danger, doubt, etc.;
state or sense of safety or certainty. 2. something that gives or assures safety,
tranquility, certainty, etc.; protection; safeguard
Security is protection from, or resilience against, potential harm (or other unwanted
coercion) caused by others, by restraining the freedom of others to act.
What is Industrial Security Concept?
Industrial security management is the practice of safeguarding physical, information,
and human assets of an industrial facility, organization or company from potential
threats, risks or harm.
The term refers to the process of safeguarding industrial facilities, personnel, and
THEOREIS OF SECURITY
1. Risk Theory = is a widely used scientific discipline, based on the
identification of a threat, the specification of risk and the specification
of how to overcome the risk.
2. Crisis Theory = is a scientific discipline focused on the theoretic
aspects of crisis research, mainly on nature and causes of crisis. The
basics of crisis prevention and its handling are based on the crisis
theory, it is important to determine what is the reason and nature of
safety and security problems. Moreover, we need to examine what is
the relation between the theory of safety and security and the crisis
theory
3. CAUSALITY THEORY OF SAFETY AND SECURITY
The term causality has evolved from the Latin word „causa“. The cause is
relation, where cause and effect are mutually
connected. The law of causality determines that anything that happens has at
least one cause, and also any cause has
future consequences. The same causes create the same effects. It is structured by
a causal relationship (causal nexus).
Causality is an expression of the relationship between two events, where one of
them raises and the second is called the
"cause"
• Related Concepts
Understanding the concept of security requires further definition of other
related concepts such as asset, risk, threat and vulnerability.
• Asset is anything tangible or intangible that is capable of being owned or
controlled to produced value. If it has positive economic value it is considered an
asset. Or more simply, if its value can be converted into cash. e.g.
• Risk is the uncertainty of financial loss, the probability that a loss has occurred or
will occur, or the possible occurrence of an undesirable event. The end results of
risk is loss or a decrease in value. e.g. lost of life of your love once.
• Threat is anything that could adversely affect assets; it can be classified into
natural hazards (such as floods), accidents (chemical spills), or intentional acts
(domestic or international terrorism).
• Vulnerability means weakness, flaw, or virtually anything that may conceivably be
exploited by a threat; examples are holes in a fence, an out –of-date key system
or the introduction of a computer virus.
• What are the philosophies of security?
Security is a political principle with the primary function to guarantee
national and international peace. As a philosophical concept security is an ancient
human ideal to which individuals as well as communities have constantly aspired.
Thus, the concept of security assumes a metaphysical and ethical meaning.
What is the industrial security concept in criminology?
The term refers to the process of safeguarding industrial facilities, personnel, and
information from various threats, including theft, sabotage, and cyber attacks.
What is the meaning of industrial security?
The portion of internal security that refers to the protection of industrial
installations, resources, utilities, materials, and classified information essential to
protect from loss or damage.
What is the aim of industrial security?
The main aim is to ensure the availability and reliability of plants and equipment,
as well as the confidentiality and integrity of machine data and processes. The
threats can be substantial and the effects far-reaching.
What does security mean in human rights?
The right to security requires the State to take reasonable measures to protect a
person's security (both physical and mental). The government does this through
the work of the police and emergency services, for example. Subsection 2 states
Concepts of Security
Identity and Authentication, Authorization, and Accountability. The term “AAA”
*Authentication
*Authorization
*Accountability
Concepts of Security and Safety
Security refers to the protection of an agency's staff from deliberate threats
or acts of violence. Protection refers to the risk of violence against civilian
noncombatant populations that are not an agency's staff. Safety refers to
accidental hazards such as road accidents, fire, diseases and natural disasters
Main Purpose of Security
The most crucial purpose of security is to protect people and their property.
This includes both their physical safety and their possessions. Good security
measures will make it difficult for criminals to target a person or a place.
CHAPTER I
Security Operation
Learning Objectives:
At the end of this chapter the students will
be able to:
1. Explain the legal basis of Industrial
Security
2. Discuss the functions of security in the
different industries
3. Understand the concept of Cybersecurity
INTRODUCTION
In the history of man, it was always shown he
values his property next to his life and loved ones
that even cave dwellers in the Philippines era
fought for its protection. This was later on followed
by families and clans forming bands for mutual
protection.
Ancient practices reveal that villages and other community already have their
own security force composed of able-bodied-man comprised of the head of every
family with the primary function of protecting sources of living from wild animals and
human destruction. Such was considered the pinnacle of barangay police, community
Tanods, and security guards.
The enactment of RA 5487 ( Private Security Agency law) with the purpose of
governing the organization and management of the forgoing forces made the PC the
sole authority to supervise all Private Security Guards. Later, the control of Guard
Forces was removed from the PC and was transferred to the National Intelligence
Security Agency). Now National Intelligence Coordinating Agency (NICA). Several PDs
were issued to amend certain portions of RA 5487: PD11 amending Section 4 on who
may security and watchman agency; PD 100 further amending sections, 3,4,5,8,9
which provide for the improvement of PC to assigned any private detectives.
On August 4,1969, with a Staff Memo issued by the Headquarters PC, the PC
Security and Investigation Agency Supervisory Office (PCSIASO) was organized.
On October 21, 1969, HPC General Staff Memo No. 8 renamed PCSIASO to
PCSOSIA ( Supervisory Office for Security and Investigation Agencies) and later
renamed as the PC Supervisory Unit for Security and Investigation Agencies
(PCSUSIA) pursuant to GO No. 404 on June 29, 1970.
Pursuant to RA 6975 and with the creation of the PNP on January 01,1991,
PCSOSIA was renamed Security Agencies and Guards Supervision Division (SAGSD).
upon the changed of the government administration, the office was changed
and now called the Supervisory Office for Security and Investigation Agency (SOSIA)
with mandate to regulate and supervise the Security Agency (PSAs), Private
Detective Agencies (PDAs), Company Guard Forces (CGFs), Government Guard
Units (GGUs), Private Security Training Schools (PSTSs), Security personnel and
Security Training School Staff.
Implementing Rules and Regulation (IRR) of RA 5487, as amended:
The 2003 revised rules and regulations is the most current implementing
guidelines of RA 5487, as amended, with the purpose of “governing the organization
and management of private security agencies, company guard forces and government
security forces”
A proposed 2009 Implementing Rules and Regulations of EA 5487, as amended,
has been developed but it’s promulgation was not yet effected. It’s scope focuses on
Specialized Security Courses, Security Personnel Identification and Record Book
(SPIRB), Five-Year License to Operate (LTO) Renewal Cycle, among specific provisions
stipulated in 2003 Implementing Rules and Regulations (IRR).
D. The right of the people to be secure in their persons, houses, papers, and
effects against unreasonable search and seizures of whatever nature and for any
purpose shall be individual, and no search warrant or warrant of arrest shall be
issue expert upon examination under oath or affirmation of the complaint and
the witnesses he may produce, and particularly describing the place to be
searched and the persons or things to be seized. (Art. III Sec. 2 of the 1987
Philippine Constitution)
2. STATUTORY AUTHORITY
A. The Revised Penal Code. (Act No.3815, as amended.)
The applicable provision of the code on Crime Against Person,
Personal Liberty and security and property have bearing on the security
and protection of one’s life, liberty and property.
PERSONNEL SECURITY
Learning Objective:
At the end of this chapter the students will be able to:
1. Understand the purpose and scope of Personnel Security
2. Explain the Categories of documents
3. Discuss four types of classified matters
Of the three major aspects of security, personnel security is considered as the
most important. This is for the simple reason that security involves people, both
an asset to be protected and as source of security threats. It is an acknowledge
fact that losses are attributed mainly to negligence or active participation of
employees, either through theft and sabotage. This emphasizes the need to set up
a system of hiring the people for the company.
Purpose of Personnel Security
1. To ensure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees
while they are carrying out them functions.
Scope of Personnel Security
1. Personnel Security Investigation (PSI)
2. Security Education
Key Functions of Personnel Security
1. It serves as a screening device in hiring suitable employees.
2. It provides background investigation services of both potential and present employees, for possible assignment to sensitive
position.
3. It handles investigation of employees suspected of wrong doing.
4. It develops security employees. awareness among
5. It attempts to ensure the protection of employees from discriminatory hiring or termination procedures as well as
unfounded allegations of illegal or unethical activities and conduct.
PERSONNEL SECURITY INVESTIGATION
Personnel Security Investigation (PSI) is a process of inquiry into the character, reputation, discretion, integrity, morals and
loyalty of an individual to determine the suitability for appointment or access to classified matter.
General Techniques of PSI
1. Background Investigation (BI) - This technique is very expensive but necessary in personnel security. It serves to verify
information on the application form and to obtain other information pertinent to the decision to employ.
Factors to consider in the conduct of BI
a. Loyalty
b. Integrity
c. Discretion
d. Morals
e. Character
f. Reputation
Components of complete BI
a. Applicants Name
c. Present residence address Types of Local Agency Check (LAC)
d. Personal History a. Barangay Clearance
e. Marital History b. City of Municipal Clearance
f. Residence History c. Local Police Clearance
g. Citizenship d. Court Clearance
h. Physical Data Types of National Agency Check (NAC)
j. Organizational membership a. National Bureau of Investigation (NBI)
i. Educational History Clearance
k. Neighborhood investigation b. PNP Directorate for Intelligence (DI)
1. Character reference Clearance
m. Employment History
n. Military History 2. Positive Vetting – is the process of
o. Foreign travel History inspecting examining careful
p. Criminal record thoroughness. The essence of vetting
q. Credit records that is a personal interview conducted
r. Applicant's signature under stress. It is based on information
previously given by his applicant.
3. Prowling - is the process whereby a subject's reaction in a future critical situation is
predicted by such as an honesty test. The Reid Report is an example of honesty test.
4. Deception Detection Techniques - this process of using devices in detection
deception during the interview stage. This includes the use of a Polygraph,
Psychological Stress Evaluator and Voice Analyzer.
5. Financial and Lifestyle Inquiry - this type of investigation seeks to gather information
on income and mode of living, sometimes referred to as the earning-to-debt ratio.
6. Undercover Investigation - this is the placement of an agent in a role in which the
agent's true identity and role remains unknown, in order to obtain information for
criminal prosecution or for recovery or limitation of asset losses.
7. Exit Interview - this is a valuable tool because it gives departing employees an
opportunity to list grievances. It offers security managers an opportunity to learn of
problems not previously known. Incorporating a checklist of company- issued property
and confronting a departing employee of this has resulted in reducing losses of
company property. Debriefing an employee is also incorporated in to the exit Interview
to remind employees of their continuing legal obligation to safeguard confidential
company information.
Security Education
Security Education is conducted to develop security awareness among
employees of the company. It should cover all employees, ergardless of rank or
position.
Security Education Program
The basic goal of security education program is to acquaint all the employees
the rationale behind the security measures and to insure their cooperation at all
times.
Objective of Security Education
1. Guidance for all supervisory and executive levels of the organization.
2. A mandatory indoctrination of the security for all new personnel before their
assignment to their respective jobs.
3. Development of a high degree of security consciousness among the selected
supervisors and key personnel.
4. That the program is also to develop discipline, loyalty and belongingness.
Phases of Security Education Program
1. Initial Interview - it is the first contact of the prospective employee wherein the
interviewer determines the suitability of the applicant for employment through his
given answers on the different types of questions being conducted. It is in this stage
where; the interviewer may start providing the necessary information as to the
overview of company security policies and at the same time on the employee
accountability and corresponding penalties that could result from violation there
from.
2. Orientation and Training- it is in this stage where new employees receive detailed
presentation of personnel security policy.
3. Refresher Conference – it is design to remind of the company about their
responsibilities
4. Security Reminders – a phase which employs an indirect approach of education
the employees such as posting security posters and distributing fliers
5. Security Promotion – it is the act of emphasizing the importance and role of
security achieving the company goals and objectives. It involves security employee
CHAPTER IV
DOCUMENT AND INFORMATION SECURITY
Learning Objectives:
At the end of this chapter the students will be able to:
1. Understand the significance of document and Information Security
2. Explain the categories of documents
3. Discuss four types of classified matters
In every installation, document and information are indispensable for their
daily operations and activities, be it in the form of a paper, film, and magnetic
media or in the computer system. Once there is a leakage in the contents of a
company’s document and information, the business operational stability is at stake.
Protection of document and information entails a mammoth task on the part
of the executives and the staff of the installation. There should be a clear
understanding on all types of documents and information of the organization
Understanding Document and Information Security
A. Definition of Terms:
1. Document Security – this involves the protection of documents and classified
papers from loss, access by unauthorized persons, damage, theft and compromise through
disclosure.
2. Classified Information – this includes all information concerning document,
cryptographic devices developed projects and materials following on the categories of Top
Secret, Secret, Confidential or Restricted.
3. Classified Matter – any information or material in any form or of any nature, the
safeguarding of which is necessary in the interest of security and which is classified for such
purpose by the responsible classifying authority.
4. Classify – this refers to the assigning information or material, one of the four
security categories after determination has been made that the information requires the
security protection as provided.
5. Declassify – the act of removing the security classification from classified
information or matter.
6. Reclassifying or Regarding – refer to the act of changing or assigned classification
7. Upgrading – refers to the act of assigning the information or matter to the
higher classification than previously assigned to it.
8. Compartmentation – refers to the grant of access to the classified matter
only to properly cleared person when such classified information is required in the
performance of their official duties.
9. Need to know – is the dissemination of classified information or matter to
limited strictly to those people whose duties requires knowledge or possession
thereof.
10. Unauthorized – refer to person not authorized to have access on
classified matters.
11. Compromise – this takes place through the loss of security, which results
from unauthorized persons obtaining knowledge of classified matters.
12. Damage to Nation Security – refers to the prejudice, embarrassment or
injury to the country resulting from act or omission.
What is the Purpose of Protecting Classified Materials?
1. Deter and impede potential spy
2. Assist in security investigations by keeping accurate records of the moments of
classified materials.
3. Enforce the use of “ Need to Know” principle
Two Kinds of Documents
4. Personal – letters, diary and notebooks. These should be treated usually the same
with official document.
5. Official – orders, manuals, letters, overlays, maps, and magazines. You may be
careful and follow the chain of command.
Document/ Information Cycle
each document or information has a life cycle in the sense that its usefulness
has a beginning and an end. It passes various stages from the time it is created unitil it
is finally disposed. This cycle consist of the following:
1. Creation 2. Classification 3. Storage 4. Retrieval 5. Retention/purging 6.
If an organization has no plan for seeing that all records/document flow smoothly through the
record cycle, it it will be faced with more of the following problems which may severely drain
profits:
1. An unmanageable tangle of papers within the office
2. Wasted clerical effort searching for information
3. Loss of important operating information
4. Extravagant use of operating information
5. Possible loss of key information in defending the company against legal or governmental
inquiries.
Categories of Document
6. Category A
* Information which contains reportable time sensitive, order of battle and
significant information
* It should be given priority because it is critical information
* It must be forwarded without delay
* It is critical to friendly operation
2. Category B
* anything that contains communications, cryptographic documents, or
systems that should be classified a secret and requires special handling
* Higher authorities should declassify it.
3. Category C
* Other information, which contains something that could be an intelligence
value.
* Contain exploitable information regarding of its contains.
* Unscreened materials/ documents should be categorized as Category C.
4. Category D
* No value, yet lower level will never classify documents as category D
* No decision must be made at the lower echelon that document has no
value. It is the responsibility of the higher headquarters.
Three security Concepts
1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of
document.
3. Training is necessary for the practice of “Need to Know” principle.
The need to know principle’s objective is to assure that only individuals who are
entrusted with important information or systems needed for the undertaking of their
duties have exclusive access on such.
Four Types of Classified Matters
4. Top Secret ( Green Color) – is any information and materials the unauthorized
disclosure of it would cause exceptional grave damage to the nation, politically,
economically and military operation
5. Secret (Red color- is any information and material, the unauthorized disclosure of
it would be prejudicial to the interest and prestige of the national governmental
activity or would cause administrative embarrassment or unwanted injury to and
be of advantage to and be of advantage to a foreign country.
3. Confidential (blue color code) – is any information and material, the
unauthorized disclosure of it would be prejudicial to the interest and prestige of the
national governmental activity or would cause administrative embarrassment or
unwanted injury to and be of advantage to and be of advantage to a foreign country
4. Restricted (white or no color) – is any information and material which requires
special protection other than those determines confidential, secret and top secret.
Rules of Classification of Documents
1. Documents shall be classified according to their content.
2. The overall classification of a file or of a group of physically connected therein.
Pages, paragraphs, sections or components thereof may be bearing different
classifications. Documents separated from file or group shall be handled in
accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain classified
information or which contain information classified lower than that of the
preceding element or enclosure shall include a notation for automatic
downgrading.
4. Correspondence, Indexes, receipts, reports of possessions transfer or
destruction, catalogs, or association list shall not be classified if any reference to
classified matter does not disclosed classified information.
5. Classified matter obtained from other department shall retain the same original
classification.
Protection of Sensitive Information
Proprietary information is information that in some special way relates to the
status or activities of the possessor and over which the possessor asserts
ownership. In the business community, proprietary information relates to the
structure, products or business method of the organization. It is usually protected
in same way against causal or general disclosure.
All proprietary information is confidential, but not all confidential
information is proprietary. For example, confidential personal date in employee
files is not considered as proprietary although the company treats it as confidential.
Types of Documents:
Class I- Vital Documents:
In this category these are records that are irreplaceable, records of which reproduction does not
have the same value the original; record as records needed to recover cash, to replace building,
equipment, raw materials, finished products, and work in process and records needed to avoid delay in
restoration of production, sales and services. Ex. Application letter, consent forms complaint forms and
others.
Class II-Important Documents:
This includes records the reproduction of which will close considerable expense and labor, or
considerable delay. Ex. Birth Certificate, Death Certificate.
Class III - Useful Documents:
This includes records whose loss might cause inconvenience but could be readily replaced and
which would not in the meantime present an insurmountable obstacle to the prompt restoration of the
business. Ex. Balance sheet, Business report, TOR and others
Class IV - Non-essential Documents:
These records are daily files, routine in nature even if lost or destroyed, will not affect operation
or administration. This class represents the bulk of records which should not be even attempted to be
protected in the event of disasters. They should, however, be kept in ordinary files ready for reference,
if needed, and usually discarded after some period of time. Ex. Invitations, Publication, Drafts and
Basic Consideration in Document and Information Security:
1. Security if information is based on the premise that the government has
the right and the duty to protect official papers from unwarranted and
indiscriminate disclosure;
2. The authority and responsibility for the preparation and classification of
classified matters rest exclusively with the originating office;
3. Classified matter shall be classified according to their contents and not to
the classification of files in which they are held or another document to which
they are referred;
4. Classification shall made as soon as possible by placing appropriate marks
on the matter to be classified; and
5. Each individual whose duties allow access to classified matter or each
individual who knowledge of classified matter while it is in his position shall
insure that dissemination of such classified matter is on the "need to know"
basis and to properly cleared persons
Types of Proprietary Information
1. Trade Secrets
consist this of any pattern, device or compilation of formula,
information used in one's and which gives him an opportunity to gain
an advantage over competitors who do not know or use it. It may be a
formula for a chemical compound a process of manufacturing, treating
or preserving materials, a pattern for machine or device, or a list of
customers. It differs from other secret information as to single or
ephemeral events. A trade secret is a process or device for continuous
use in the protection of the business.
2. Patents - this is a grant made by the government to an inventor,
conveying or securing to him the exclusive right to make, use, or sell his
invention for term of years.
Primary Distinctions between Patents and Trade Secrets
1. Requirements for obtaining a patent are specific; to qualify for a patent the invention must be more
than novel and useful. It must represent a positive contribution beyond the skill of the average
person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive
right to patent protection expires after 17 years.
4. Proprietary Information Protection Program
5. Realizing that the most serious threat to trade secrets is the employee, a measure of protection is
often realized through the use of employee agreements which restrict the employee's ability to
disclose information without specific authorization to the company. The following countermeasures
may be adopted:
1. Policy and procedures statements regarding all sensitive information.
2. Pre- and post-employment screening and review.
3. Non-disclosure agreements from employees, vendors. Contractors and visitors.
4. Non-competitive employees. agreements with selected
5. Awareness programs.
6. Physical security measures
7. Informed monitoring of routine activities.
CHAPTER V
SECURITY HAZARD
Learning Objectives:
At the end of this chapter the students will be able to:
1. Understand the concept of Security Hazard
2. 2. Discuss risk management alternatives and strategies
3. 3. Explain espionage as a Security hazard
Definition of Terms:
Risks is the potential damage or loss of an asset. The level of risk is a combination of
two factors: the value placed on that asset by its owner and the consequence, impact
adverse effect of the loss or damage to that asset and; the likelihood that a specific
vulnerability will be exploited by a particular threat.
Risk Management is a process of selecting and implementing security
countermeasures to achieve and acceptable level of risk at an acceptable cost.
Risk Analysis the analysis of risk includes examinations of the vulnerability, probability
and critically of potential threats and include natural and man-made risk.
Adversary an individual, group organization, or government that conducts activities or
has the intention and capability to conduct activities detrimental to the individual,
private or government entity.
Asset any information, facility, material information, or activity which has a positive
value to its owner whether it is an individual, private r government entity.
Vulnerability any weakness that can exploit by an adversary to gain access to and
asset.
Countermeasures - an action taken or used to reduce or eliminate one or more vulnerabilities. The cost
of possible countermeasures may be monetary, but may also include non-monetary cost such as
reduced operational efficiency, adverse publicity unfavorable working conditions, and political
consequences.
Probability - the chance of likelihood that a loss will take place. Indicated by a mathematical statement
concerning the possibility of an event occurring.
Critically - the impact of a loss as measured in financial terms. How important it is in terms of the
survival or existence of the organization.
Risk Management Alternatives and Strategies
Risk Avoidance- eliminating or removing the risk totally from the business, government, or industrial
environment for which the risk manager has responsibility.
Risk Reduction - decreasing the risk by minimizing the potential loss. The probability of the reduction of
criminal opportunity is often accomplished by situational crime prevention strategies to discourage,
deter, or deny criminal incidents.
Risk Spreading- spreading the risk through compartmentation or decentralization to limit the impact
(critically) of the potential loss.
Risk Transfer- moving the financial impact of the potential loss-over to an insurance company.
Risk-Self Assumption- planned assumption and acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or setting aside resources for use in case of a
SECURITY HAZARDS
Any act or condition which may result in the compromise of information, loss
of life, loss or destruction of property or disruption of the objective of the
installation.
Types of Hazards
1. Natural Hazards these are hazards caused by natural phenomena
2. Human or Man-made Hazards these are hazards which are the result of a state
of mind, attitude, weaknesses or character traits of one or more persons. They can
be acts of commission or omission, both overt and covert, which can disrupt
operation of a plant or installation. The following are types of human or man-made
hazards:
a. Carelessness - accidents and dissatisfaction
b. Disloyalty - subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism, bombing etc.
SABOTAGE AS A SECURITY HAZARD
Description of a Saboteur
1. He is the most dangerous for whom security will have to deal with while planning
and implementing security measures and techniques.
2. He is an ordinary looking as the next guy but, in his mind, he has the training in
deception, knowledgeable in incendiaries, explosives, chemistry, psychology.
bacteriology, mechanics and
3. He can work alone, in-groups, or simultaneously in several places.
Possible Targets of Saboteur
1. Armed Forces Installation
2. Natural resources - mines, forests, farms and farm products
3. Industries-buildings, power sources, machinery, fuel etc.
4. Warehouses depots, communications, public utilities, etc.
Countermeasures against Sabotage
1. Use of an efficient, alert and trained guard force
2. Use of Physical security aids like barriers personnel and vehicular control, intrusion
control personnel devices, communication systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination.
10. Good housekeeping methods.
11. Effective and compatible emergency planning.
12. Regular audit.
ESPIONAGE AS A SECURITY HAZARD
Description of an Espionage Agent
1. He is very dangerous adversary and his skills in deception and cunning should never be under
estimated.
2. He is usual a person of extensive training and will be highly effective in gaining the confidence of people
and of extracting information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like the saboteur and he can be
defeated in his own game if proper methods and techniques are undertaken.
Some Methods Employed by Espionage Agent
1. Stealing or information from employees.
2. Stealing information from records ог other sources.
3. Using various methods of reproducing documents products, equipment or working models.
4. Using "front" as commercial concerns, travel agencies, associations, business groups and other
organizations to obtain confidential information or data.
5. Using various form or threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning and individual or
organization.
7. Picking or securing information in social and other gatherings.
Countermeasures against Industrial Espionage
1. Careful and complete pre-employment measures designed to control threats of
industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive
positions even already employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.
SUBVERSIVE ACTIVITY AS A SECURITY HAZARD
Threats of Subversive Activity
1. It can be local or national in nature and their mission is to undermine the authority to
weaken the organization, and eventually take over. This can be in business or any activity.
This can be in the form of rumor mongering propaganda, undermining morale, and
injecting defeatist attitudes, and other emotional approaches.
Countermeasures to Subversive Activity
1. The spreading of rumors, written materials, slogans or any other devices to confuse
the work population and discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and "slow downs"
can be called to disrupt the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing
movements for peace, anti-colonials, anti-trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in "paper organizations"
should report this activity to security.
5. Other methods of subversion like untied fronts, mob action, terrorism and sabotage
will do to gain the subversive ends.
Pilferage as a Business Hazard
1. Pilferage is one of the most annoying and common human hazards which security
has to deal with. This activity if uncontrolled can become a financial drain if not a
menace to smooth and orderly operation. Failure to detect shortage and inaccurate
inventories will cause inventory losses, which may be labeled as pilferage.
Pilferage:
This is one of the most annoying and common human hazards which security has to deal
with. This activity if uncontrolled can become a financial drain if not a menace to smooth and
orderly operation!
Due to this, security force has to concentrate large number men to check this nefarious and
disconnection activity. Petty pilferage is frequent, hard to detect, difficult to prove and win
conviction but definitely dangerous to ignore.
Types of Pilferers
1. Casual Pilferer - one who steals due to his inability to resist the unexpected opportunity and has
little fear of detection is no plan or premeditation and he is usually a "loner" on the job. The
temptation to pick up the article is basically due to poor security measure. The implication of
causal pilfering is the big cumulative cost if it remains unchecked.
2. Systematic Pilferer one who steals with preconceived plans and takes away any or all types of
items or supplies for economic gain. Pilferers of this kind can be employees or outsiders of the
establishment.
Anatomy of Pilferage
1. Where need or desire exists and opportunity is present, theft is almost sure to result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when supplies or goods are
Factors considered by a Pilferer to be Successful on his Act
1. Location of items to be pilfered - the systematic pilferer surveys shopping and store areas, or
through contracts from the firms.
2. Access to the items- techniques can be from fake documents, bribing of guards, outsmarting to
divert attention while pilferage goes on.
3. Removal of item- this can be done as wearing the stolen shoes or shorts, concealment in body
or vehicles, use of false documents, etc. driver may conceal pilfered items in his vehicle.
4. Disposal of Items- there is a need for "fences" "brokers" or "clearing houses" for these "hot“
items
Countermeasures for Casual Pilferage
1. "Spot" checks on outgoing vehicles and persons.
2. An aggressive security education and indoctrination program with emphasis that "crime does
not pay."
3. Superiors should set example of integrity and desirable moral establishments. climate for
employees in the
4. All employees must be enjoined to report any loss to security.
5. Inventory and control methods should be done specially to pilfer able items.
Countermeasures for Systematic Pilferage
1. Guards and electronic surveillance on all exits.
2. Package and material control system.
3. Parking outside perimeter fence of establishment.
4. Careful screening and background checks on applicants to weed out potential thieves.
5. Investigation of all losses quickly and efficiently to determine "modus operandi" or obtain
clues.
6. Alert all patrols to check areas and buildings for possible concealment of stolen properties.
7. Install mechanical, electrical, electronic detection and alarm devices where needed and
applicable.
8. Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking facilities and areas for vehicles
and persons.
10. Store bulk quantities of pilferable items in enclosed security areas and distribute them to
using section in limited quantities.
11. Establish accurate inventory and accounting methods for procurement, use and disposal.
CONTROL SYSTEM
Persons Entering and Leaving the Premises
Monitor alarms and CCTV cameras
Control access for employees, visitors, and outside contractors
Conduct security checks over a specified area
Write comprehensive reports outlining what they observed while on patrol
Interview witnesses for later court testimony
Detain criminal violators
Personnel entering the premises should be identified.
The purpose of visit should be verified.
Body frisking may be conducted in accordance with Standard Operating Procedures.
Visitor's ID and Pass Slip should be issued and displayed.
Visitors should be directed or escorted to destination in accordance with Standard
Operating Procedures.
Vehicles Entering and Leaving the Premises
Vehicles entering the premises should be identified.
The driver and passenger's identification should be checked.
The purpose of visit should be verified
Properties Entering and Leaving the Premises
Properties entering or leaving the properties should be classified.
Properties entering and leaving the premises should be documented.
Parking Arrangements
Ensure car parking is secure and well lit.
Insist on residents to park in a way as to facilitate early exit in case of emergency.
Ensure that cars parked are locked.
Ensure that each vehicle is captured by surveillance cameras
Chapter VI
VIP SECURITY
Learning Objectives:
At the end of this chapter the students will be able to:
1. Comprehend the concept of VIP Security
2. Discuss the organization of VIP Security
3. Explain the different attacks tactics.
Protection against any type of crime to safeguard life, assets and operation by the use of various
methods and devices.
1. VIP - Very Important Person
Ex. State President, High ranking Public and Private Officials, etc.
2. ESCORT one or more persons accompanying another to give guidance or protection or to pay honor.
3. BODYGUARD - A person or a group of persons usually armed and responsible for the physical safety of one
or more specific person.
ORGANIZATION OF VIP SECURITY
1. Area Security - Covers the surrounding areas of engagement.
- Conducts prophylactic (neutralize the area),operations in the area of engagement.
2. Perimeter Security- secures the immediate areas surrounding the place of engagement.
- Usually these are the uniformed men.
3. Advance Security – these are the advanced security at the place of engagement before the arrival of the
VIP.
- Sanitize the engagement area.
4. Close-in Security - Accompanies the VIP where ever he goes.
- maximum of four persons
5. Reserve Security - on standby for possible back. up/re-enforcement
Prophylactic Operations
1. Patrolling
2. Putting up of check points, blocks and gates.
Four Common Elements in all Assassination
1. Victim
2. Assassin
3. Modus Operandi (Mode of Operation)
4. Opportunity
REASON WHY DO THEY NEED BODYGUARDS
As a result of the "increased concern about the kidnapping threat" there has
been an escalation in the demand for bodyguards. Thereby, BRAINS is needed and
not BRAWN (meaning muscular in power) has been offered as the basis for
bodyguard selection. The bodyguard should fit the image and lifestyle of the
individual he is guarding.
SELECTION CRITERIA TO BECOME A BODYGUARD
1. Physical Condition
Excellent physical condition is essential. Excessive overweight, high blood pressure,
respiratory problems, or other ailments are all disqualifiers. Hearing should be normal, eyesight
at or close to 20/20 without glasses and color vision normal. Average height is suggested.
Physical stamina is important; the bodyguard should be capable of running several miles at a
sustained pace and able to run at top speed in short dashes.
2. Training
The bodyguard should be trained in both unarmed and armed defense tactics. Regular training,
session should be encouraged, so that body guards maintain proficiency. Also trained in the
operation of equipment's being used. Also trained vehicles driving and troubleshooting, and
likewise have a practical knowledge in first aid technique.
3. Mental Attitude
The bodyguard should be a stable individual, intelligent, and not belligerent, aggressive, easily
angered, careless or easily distracted he/she should be mentally alert, have a good and quick
judgment, he should be responsible, and have an ability to remain calm under condition of
stress or in dangerous situations. Female personnel can be utilized for these assignments. They
require the same temperament and training as the more usual male personnel.
SOME PROTECTION TECHNIQUES WHILE MOVING ON FOOT
1. Individuals in the vicinity of the persons being protected should be observed
especially their hands.
2. If a weapon is displayed, the weapons should be attacks so as to be ready to respond
effectively.
3. The bodyguards should anticipate potential attacks so as to be ready to respond
effectively.
4. If a threatening situation begins to develop the individuals being protected should
immediately be removed from the danger area.
5. If two bodyguards are used and attacks develop, one bodyguard should remove the
individual being protected while the other neutralize the threat The bodyguards should
adequately protect the offending public of those in the area. The primary objective is
to protect the target person, not apprehend the attacker. Escape is certainly more
important than winning the "skirmish" meaning minor primary conflict or dispute.
6. If one bodyguard is utilized, he/she will usually walk in front to the left. While the
second, will take a position to the rear and slightly to the right.
PROTECTION IN TRANSIT
An individual is particularly vulnerable while moving from one place to another.
Hence a regular route and time travel should be established. Frequent changes of
direction, travel time mode of transport, coordinated within the overall protection
plan, will make it more difficult for an abduction to plan of an ambush or to
interpret. The individual should never walk alone in unpopulated areas. If and
automobile during and attempted abduction, the automobile may be used not only
as a means of transportation. But as defensive shield or even as an attack weapon.
Therefore, an individual in an automobile should not usually attempt to escape an
attack by leaving the vehicle. The body of the vehicle will provide a body place of
safety. While the vehicle can be utilized to take evasive action so that it will be
possible to escape from an attack.
VEHICLE SECURITY
The vehicle utilized by a potential kidnap victim should not be placed unattended in
a parking stall with the individual name on it. If possible, when not in use, the
vehicle should be parked in a locked garage under
guard and not on the street. The doors of the vehicles should be locked in all window tightly
closed, whether occupied or non-occupied. Consideration can be given to the installation of
tamper alarms on the vehicles and "panic" or trouble alarms bottoms in the parking area.
The potential victim, should not use the vehicle at all times, but should change
automobiles daily if possible. All serving should be done by a commercial organization which
has been checked out and cleared. Locking gasoline caps and locks for the hoods are
suggested. Gas tanks should never contain less than half a tank to avoid running out of fuel
ATTACK TACTICS
Two types of attack tactics against vehicle maybe expected.
1. Moving Attacks the approach will usually be made from the left or passing side, and the
attacker will attempt to move over into the path of the victim's vehicle, forcing it to stop.
Approach, would be from the right in the left side drive countries. The ideal location for
abduction is where cross street or turn off is available to allow the attacker an easy quick way
to escape. If two vehicles are used to attack, one will cut-off the victim's vehicles, forcing it to
stop. The second may be then, move up on the left side. The abductor will make the attack,
take the victims from his vehicles and escape as quickly as possible.
2. Ambush Attack- the kidnapper will attempt to stop the victim's car with in a zone he
established by blocking the roadway or by shooting the driver.
DRIVER RULE
The driver should always be planning ahead and be alert as to what is happening in at least two or
three blocks of normal city driving. Vehicles that are parked in the roadway or in unusual position,
obstructions, constructions, etc. should be viewed with concern, also, side street or road access.
Ramps, underpasses, service road, etc. are potential trouble spots, and so particular attention should
be given to them. Adequate maneuvering between the potential victim's vehicles and those in traffic
ahead. Also, the lane nearest the center of the roadway should be used, it allows maneuvering room.
The driver should maintain near normal traffic speeds while keeping the vehicle under control at all
times, be alert as to what is in front, behind and on the sides of the vehicles which seems to be
leading or following the rear vision mirror should be done constantly, since most attacks originate
from the rear.
KIDNAPPERS FALL INTO FOUR CATEGORIES
1. Neither opportunities nor Novice Criminals - This constrained of poor planning and lack of true
criminals' expertise.
2. Religious or politically Motivated Individuals - These are the DO or Die who are willing to sacrifice
their lives and or willing to kill their victims to publicize a cause.
3. Mentally derange individual - They may kidnap or kill for the thrill, from confusion, or due to
psychosis.
4. Professional Criminals - They are motivated for kidnapping usually centers on financial gain, with
Chapter VII
COMMUNICATION SECURITY
INTRODUCTION
The ability of an ancient man centuries ago to communicate by means of signs could be
attributed as the key for surviving the stone age era. And comes the new generation where the
signs have been transformed into higher forms as man learned the start of gregarious leaving by
means of oral or written way of communication. This ideal way of transferring thoughts and ideas
made man supreme and progressive and later developed the medium or common language and
the channel of which the language could be transferred to a certain distance.
So today, civilized man communicates with an accepted and sophisticated written or oral
language. The medium has been improved by the introduction of ratio and electronics, but still
man could not understand his neighbor and vice-versa. This is due to the complexity of our lives
at present and the introduction of new languages and sub-dialects.
In the security profession, it could not be denied that the field of operation is concentrated
on dealing with different people and it is deemed proper for any security personnel to know the
most common medium of communication to make him effective on the performance of his job.
DEFINITION
Communication mind of one person The transfer of thought from the mind of another thought common be from oral,
written and other forms.
Conference The exchange of thoughts or opinions by conversations, or seminar. The exchange could be from oral, written
and other forms.
Medium of Communication Refers to the language known for two or more individuals who want to exchange thought or
ideas with each other. common
Example: English: Is the dominant medium of communication in the world.
Ilocano is the common medium of communication in Baguio City
Communication is the process of sending and receiving messages to achieve understanding.
Channel of Communication- refers to the equipment being used to transfer thoughts or ideas.
The following are the common equipment being used for communication:
1. Hand held radio or Walkie talkie-communication on electromagnetic waves transmitted through the space.
2. Basic types of radio's:
a. Amateur radio- for hobby and emergency purpose; and
b. Commercial radio - for business purposes
Cardinal principles in using radio:
a. Speak clearly and distinctly at all times;
b. Think and act promptly on emergency situation;
c. Thorough understanding of the capacity of the communication system; and
Requisites for modulation/ voice transmission:
a. Alertness - give the impression that you are alert and wide awake and interested
as the person calling:
b. Pleasantness - build a pleasant office image with voice of smile;
C. Naturalness slang: use simple language and avoid
d. Distinctness for hobby and emergency purpose; and
e. Expressiveness - normal tone of voice in moderate manner not too fast and not
too slow.
Duty Cycle of PTT:
As a rule, transmitting message in short duration carries 3 to 5 words at a time.
Approaches to adhere the duty cycle:
1. Use of phonetics alphabet and numerals;
Ex. From Alpha to Zebra
2. Use of 2400-hour system and Zulu time;
3. Police term APCO signals:
Ex. 10-1 receiving poorly
10-2 loud and clear
10-4 copied message
10-9- repeat message
10-20- location
10-28 identify yourself/ call sign
10-32- radio check
4. Use mores code.
APCO - Association Public Safety Communication Officers Inc.
PTT- Press to Talk
5. Telephone combination of apparatus of converting speech energy to electrical wave then transmit the same
to a certain point then finally re-convert the electrical energy to audible sound
6. Intercom- wired system of communication being used with in a building or compound for direct exchange of
calls.
7. Audio Hailer-portable transistorized and battery- operated amplifier that magnify the voice user.
Transmission of Reports
With the rapid development the technology is going through, communication within the installations does
not only rely on radio communications but has improved and moved towards the use of networks and other
unconventional ways of communications, thus the adaptation of Communications Security which includes crypto
security, transmission security, emissions security, and physical security.
1. Communication equipment is prepared in accordance with manufacturer's instruction
2. Communication call signs and language are used in accordance with transmitting messages procedures
Call Signs to protect the identity of the parties involved in the radio transmission; serves to simplify
matters when communicating between large groups of people
a. Messages
Messaging security provides protection for companies' messaging infrastructure (IP reputation-based anti-
spam, pattern- based anti-spam, administrator defined block/allow lists, mail antivirus, zero- hour malware
detection, email intrusion prevention)
b. Memorandum
Memorandum can only have a certain number of formats and it may dependent to an office or institution.
If the user is a senior executive, the format is strictly defined and may be limited to one or two pages.
If the user is a colleague, the format is usually much more flexible.
C. Call Signs and Language
They are used to prevent the true nature of the subject being discussed from being overheard by uninvited
listeners
CHAPTER VIII
SECURITY SURVEY AND INSPECTION
Learning Objectives:
At the end of this chapter the students will be able to:
1. Explain the concept of Inspection Security Survey and
2. Discuss the different types of Security Inspection
The basic instrument for determining security vulnerability is the security survey. Most
description of security surveys refers principally to checklists , audits or inventories of
security conditions.
Security Service is defined as a critical on- site examination and analysis of an
industrial plan, business, a home or public or private institution done to ascertain the
facility's current security status, to identify deficiencies or excess in current practices, to
determine what protection is needed and to make recommendations for improving the
overall level of security at that installation. As previously noted, security survey is a general
term that often encompasses other related procedures.
Objectives of Security Survey
1. To determine existing vulnerabilities to injury, death, damage, or destruction by natural
causes.
2. To determine existing vulnerabilities of corporate assets due to outside criminal activity.
3. To determine existing vulnerabilities of corporate assets due to criminal activity within
the organization.
4. To determine existing conditions of physical security of corporate property.
5. To measure compliance of employees to security
Planning a Security Survey
1. Verify the need
2. Obtain organization support
3. State the survey's executives
4. Determine how data will be gathered
5. Develop alternatives
6. Prepare a schedule of activities.
Security Inspection
Another important activity, which is necessary to ensure the integrity of the overall
security programs, is security inspection. This complements security survey in its
attempt to prevent losses of company properties,
Security inspection is conducted for two reasons: to check on the degree of
compliance with the recommended countermeasures and to determine the
effectiveness and adequacy of the countermeasures which are in effect.
Types of Security Inspection
1. Continuous Inspection
To keep pace with the constant changes in the organization, changes in our security
terms of attitudes, life-style and moral values, and the rapid advancement of technological
modifications are all around us, the inspection must be an on- going and never-ending activity.
2. Formal or Informal
For the company which has just upgraded the security function, hired a new security
administrator, or initiated a security department and program. The formal approach to
inspection is most desirable, primary because it tells the company how senior management
fells about protection, and thus establishes the desirable climate.
Formal Inspection is one which some fanfare is attached. It is announcement, and
usually preceded by an the unit under inspection "prepares for events, including some extra
housekeeping activities that would not otherwise happen at that point in time.
Informal Inspection is usually the result of a long and firmly entrenched inspection
program, understood by all and accepted as part of the organizational life. The inspection has
been stripped of all external trappings of importance, but their functional importance has not
been lessened in any manner. They are seriously and quietly executed in a spirit of
understanding and cooperation.
3. Structured or Unstructured Inspection
Structured Inspection is one that moves systematically from one area to the
next and so on. There is a format or logical sequence to the process. For instance,
the audit may start with the first line of defense, then the second line, then the
third line, etc.
Unstructured Inspection is conducted in a random manner, there is no
format or logical sequencing. For example, the inspection may start with
countermeasures for proprietary information, then emergency plan, followed by
investigation and so forth.
CHAPTER IX
EMERGENCY AND DISASTER
MANAGEMENT
Learning Objectives:
At the end of this chapter the students will be able to:
1. Explain the concept of Emergency and Disaster Management
2. Discuss the key steps in Emergency Planning
3. Know the different responses to tactical situation
Emergency planning is one of the harsh realities that an installation will
encounter is the occurrence of a disaster or emergency. Any of these can be
regarded as a potential event, occurrence or condition outside the scope of normal
business activities with significant potential for death, injury, property damage,
assets diversions or other favorable impact upon the installation. It is for this
reason that the owner of the installation or its executives will decide in advance
what to do and how to counter the effects of any emergency in order to assure
continuity of operations.
Emergency Defined
Emergency is a sudden, generally unexpected occurrence or set of
circumstances demanding immediate action.
Disaster Management Defined
Is the systematic management of disaster from the initial stage to its
termination using various tools to minimizes loss of lives, damage to property and
enhance rehabilitation.
Disaster Defined
Disaster is the unscheduled event that causes emergency. It upsets the performance of valued activities of the
community in two ways: there is a drastic increase in demand for certain services and there is reduction in the
capability to perform services.
Crisis Defined
Crisis is the turning point of a disaster or emergency, if not contained or controlled.
Types of Emergencies
1. Earthquake
2. Typhoon
3. Tsunamis
4. Volcanic eruption fire
5. Fire
6. Explosion (Bomb, flammable liquids, gases, etc.)
7. Building collapse
8. Leakage of gas or toxic fumes
9. Bomb threat
10. Strikes
11. Work accidents
Keys Steps in Emergency Planning
1. Get in touch with local civil authorities.
2. Visit neighboring plant/installation.
3. Survey the installation for possible hazard and take immediate action to lessen
or eliminate them.
4. Call an organization meeting of heads of services, employee representatives and
key personnel.
5. Establish an organization with specific task to function immediately before,
during and following a disaster
6. Define the disaster programs.
7. Establish a method for utilizing resources on hand and for obtaining additional
resources on the time of disaster or emergency.
8. Provide a recognizable means for moving from normal operation to the
emergency mode of operation.
Basic Considerations in Emergency Planning
1. Goals of the emergency plan.
2. Emergency plan should be in writing.
3. The plan should be precise and specific.
4. A separate plant should be prepared for each type of disaster, which has a
probability of occurring.
5. Key elements of plan: what to do who will do it.
6. General and individual awareness.
7. Checklist before formulating a detailed emergency plan.
Emergency Response Team
An Emergency Response Team must be established to become active during
increased threat levels or when an emergency situation occurs. Your special threat
plant describes the organization, training and function of the team. The ERT must
consider the following:
1. Who will make decisions and have final authority for the team as a whole.
2. Who will be members of the team and what are their responsibilities?
3. What will be the missions of the team?
4. The tasks of the other agencies or individuals.
5. The training needed to prepare team members to operate in stressful situations.
6. Contingency planning beyond that involved in normal day-to-day operations
against threats.
7. The unexpected - the incident will not take place as planned.
Responding to an emergency situation requires special capabilities and
considerations. First, the ERT must identify the kind of emergency. Then, the
operation plan (OPLAN) formulated for the said emergency must be put into effect
as quickly as possible.
Responding to Tactical Situation
1.Bombing-if the terrorist/adversary plant bombs, then you must assume other
bombs have been planted. Remove everyone from the scene to a safe area. Anyone
near the scene at the time of the explosion must be interviewed. Keep in mind that
the people being interviewed may, in fact, be the terrorist/ adversary who planted
anted the bomb. Explosive Ordinance Division (EOD) must further check suspected
devices.
2. Ambush/Attack-always assumes the terrorists/ adversary are still in the area. The
initial response force renders aid to the victims and establishes a defensive
perimeter. Clearing of the area is conducted before crime scene investigation
begins. All vehicles and exits from the area must be controlled and inspected.
3. Kidnapping- in most cases of kidnapping, you will not be aware that a kidnapping
has occurred until the terrorist has the victim safely secured elsewhere. The
immediate response is to dispatch teams to provide protection for other possible
targets, including members of the victim's family. Then, the Emergency Response
Team is activated. The team can materially aid the commander in dealing with the
kidnapping. They could recommend possible courses of action.
4. Hostage/ Barricade situation- the worst possible scenario you could be confronted
with is a prolonged hostage/ barricade situation. The initial response force secures
and isolates the incidents scene. No one must be allowed to enter or leave. Witness's
names are recoded, and the witnesses are directed to a safe location to wait for
further debriefing. The Emergency Response Team is then activated.
5. Arson terrorist/ adversary uses incendiary devices to commit arson. This is done
during and organized civil disturbances (throwing a firebomb) or against specifically
targeted building. They also use incendiary devices to destroy vehicles. As with
bombs, they often use time delay mechanisms to allow themselves time to leave the
area before the fire occurs.
Security Measures against Bombs and Bomb Threats
Although it is very hard to detect the attack of a terrorist or adversary, an establishment can possibly
minimize if not totally eliminate the occurrence of bombing incident within its premises. The following
measures are suggested.
1. Strictly implement the inspection procedures of all bags, knapsacks, boxes, merchandize etc. that will
enter the premises.
2. Suspicious locking package, paper bags, etc. left alone should be cautiously scrutinized as possible
bomb(s).
3. When suspected bombs are noted, security personnel/employees to immediately contact the authorities.
4. Be observant o people roaming around your area doing nothing. Vendors with tricycles, knapsacks/ bags
should be driven out. They may be used as couriers of bombs.
5. Security personnel must always observe people leaving behind bags/packages/boxes in the garbage
cans/bins in the premises.
6. Be observant of cars/motorcycles riding individually who are suspiciously observing constantly the
establishments.
7. Be cautious in opening envelopes and packages sent by unknown individual and return address.
8. The greatest safeguard against the effect of bomb threats is to prevent entry of unauthorized persons
into certain area, whenever possible.
9. Restricted entry and positive identification of staff and visitors can be significant in assessing the
Don'ts in Handling Suspected Bomb Packages
1. Don't attempt to open package.
2. Do not in water submerge in due to conductivity of reaction electrical
circuit and/or possible violent of chemical agent.
3. Do not indiscriminately shake or jar suspected package due to the
possibility of disturbing the rigger mechanism.
4. Do not cut the string or unwrapped package due to the possibility of
pressure release type device.
5. Do not puncture or cut the box with metallic object as the possibility
of electric power maybe employed.
6. Do not accept identifications markings on any suspected package as
legitimate. 7. Do not allow radio transmission within the
vicinity.
8. Do not switch on the lights or any electrical switches just to light up
dark room/areas.
9. Do not use sirens, megaphone or any loud noise- emitting device.
Responding to Bomb Threats
Each threat received through any means of communications should be
treated as real and must be forwarded immediately to the proper authorities.
Training is essential to deal with a bomb threat incident. Instruct all personnel,
especially those at the telephone switch board on what to do if a bomb threat is
received. The receiving party must remain calm and courteous. Try to obtain as
much information as possible from the caller. Take note of the following
procedures:
1. Get the identity of the caller.
2. Take note of the following characteristics; male or female voice; young middle
age, or old sounding voice; accent of voice; speech impediments or peculiar voice
characteristics; any background noise; does the voice sound familiar.
3 The exact words of the person placing the call.
4 Show no emotion on the phone.
5. Know the exact location of the bomb.
6. Ask for the description of the bomb/composition of the explosive.
7. Repeat the message to caller whenever possible and ask for confirmation.
8. The receiving part should remain calm and courteous. He should listen carefully and
write down accurately the information the caller provides.
9. If possible refer the caller to a supervisor in authority to extract more information.
10. Apply delaying tactics and engage the caller the caller in prolonged conversation
11. Take note of the exact time the caller hung up.
12. The person receiving the bomb threat should attempt to as to ask the caller certain
questions: When is the bomb going to explode? What type of bombs it is? What does
the bomb look like? What will cause the bomb to explode? Why did you place the
bomb?
13. Remember that the caller may not answer your question, but any additional
information that he may relate will be helpful.
14. It may be advisable to inform the caller that the building is occupied and the
detonation of a bomb could result in death or serious injury to many innocent people.
Handwritten or Typed Notes
Documents and other materials received should be carefully handled to preserve marks, fingerprints, etc.
for examination by competence authorities. These should be forwarded immediately to proper authorities for
analysis and evaluation. Written messages should never be ignored.
Person to Person or Direct Threat
1. Notify security supervisor immediately.
2. Keep the person making the threat or threat indicating knowledge of a threat under surveillance until relieved
by the superior.
3. Take note of the age, height, weight, sex, color of eyes/hair/skin, clothing, unusual characteristics such as
lameness or any peculiarities of the person under surveillance. Observe other personal behavior, in any.
4. If the person leaves the scene, take note of the make, model, color, plate number and marking of the vehicle
used.
5. Do not underestimate the size of the package like just a pack of cigarette or lighter, it could be a powerful
explosive.
6. Above all, DON'T PANIC.
What to do if a suspected bomb is located
1. Evacuate personnel at least 300 feet away from the bomb.
2. Turn off the electrical and gas units.
3. Do not touch or move unknown objects.
CHAPTER X
SECURITY INVESTIGATION
Learning Objectives:
At the end of this chapter the students will be able to:
1. Discuss Investigation the concept of Security
2. Write a comprehensive Investigation Report
Security Investigation is a planned and organized of facts concerning specific loss
determination of or damage of assets due to threats, hazards or unsecured conditions.
Elements of Investigation
1. Investigator
2. Purpose
3. Subject of Investigator
Tools of Investigation
1. Information - knowledge which the investigator gathers from other persons.
a. Acquired from regular sources conscientious and public-spirited citizens, company files, school
files or records file of other agencies.
b. Acquired from cultivated sources-paid informants, bartenders, cab drivers, acquaintances, etc.
2. Interrogation the skillful questioning of a person who is reluctant to divulge information
concerning the offense under investigation.
3. Interview - the simple questioning of a witness who has no personal reason to withhold
information.
4. Instrumentation - the application of instruments and methods of physical sciences to the
detection of crimes. In other words, the sum total of the detection application of all sciences, in
Three-Fold aims of Investigation
1. To identify the offender
2. To locate the offender
3. To provide evidence for his guilt
Date
Investigator
PREPARATION OF WRITTEN REPORTS
1. The Basics
• Always write in first-person.
• Aim to answer the 5 W's and 1 H.
• Be specific.
• Avoid subjectivity.
2. Take Notes
• Always bring a notepad and pen and take note of the happenings or observations during the shift.
3. Concise
• Do not include useless information.
• Use strong verbs and adjectives.
4. Facts
• The contents of the report should not contain any opinion.
5. Professional
• Avoid using abbreviations, except the most common ones.
• Observe proper punctuation and capitalization, as well as spelling and grammars.
CHAPTER XI
PRIVATE SECURITY AGENCY LAW ORGANIZATION
AND ADMINISTRATION OF SECURITY GUARD FORCE
Learning Objectives:
At the end of this chapter the students will be able to:
1. Understand the Private Security Agency Law
2. Explain the Organization and Administration of Security Guard Force
R.A No. 5487 - The act that regulates the organization and operation of private
detective, watchman and security guard agencies in the Philippines. This act was
approved on June 13, 1969. (Otherwise known as Private Security Agency Law)
RA No. 5487-Otherwise known as "The Private Security Agency Law" has been
amended by PD No. 100 dated January 17, 1973 in order to make more responsive
to the demands of the private security industry in the country.
RA No. 7461-An act amending article 287 of Presidential Decree No. 442 as
amended, otherwise known as the labor code of the Philippines, providing for
retirement pay to qualified private sector employees in the absence of any
retirement plan in the establishment.
- In the absence of a retirement plan or agreement providing for retirement
benefits of employees in the establishment, an employee upon reaching the age of
sixty (60) years or more, but not beyond sixty-five (65) years which hereby declared
the compulsory retirement age, who has served at least five years (5) in the said
the said establishment may retire and shall be entitled to retirement pay
equivalent to at least one-half (1/2) month salary for every year of service, a
REPUBLIC ACT NO. 11917 (July 30, 2022) - an act strengthening the regulation of the
private security service the industry, repealing for the purpose, republic act no. 5487,
entitled "ac act to regulate the organization and operation of private detective
watchmen or security guard agencies", as amended.
Be it enacted by the Senate and House of Representatives of the Philippines in
Congress assembled:
CHAPTER I
GENERAL PROVISIONS
Section 1. Short Title.- This Act shall be known as "The Private Security Services
Industry Act."
Section 2. Declaration of Policies. - The State recognizes the vital role of the private
sector in the protection of the people and safeguarding of property as well as
maintenance of peace and order in the country.
Towards this end, the State shall adopt measures to strengthen the regulation of the
private security services industry and establish quality standards to ensure competent
private security personnel and professionals that complement our law enforcement
Section 3. Definition of Terms. - As used in this Act:
(a) License to Exercise Security Profession
(LESP) refers to a permit issued by the Chief of the Philippine National Police (PNP) or the
duly authorized representative, recognizing a natural person to be qualified to perform
the duties as security professional or training personnel;
(b) License to Operate (LTO) refers to a permit issued by the Chief PNP or the duly
authorized representative certifying and authorizing a person to engage in employing and
deploying security guards, K9 teams, protection agents, private detectives and other
licensed specialized security personnel; or a juridical person to establish, engage, direct,
manage or operate a private detective agency or private security agency or company
guard force after payment of the prescribed dues or fair and reasonable fees and after
complying with all the requirements as provided by the rules and regulations
implementing this Act.
(c) Pre-requisite Training Programs- refer to licensing pre-licensing training programs that
include all training and academic programs and courses with the objective to indoctrinate
the individual with the basic skills and educational backgrounds necessary in the effective
exercise and performance of the security and detective profession. These include, but are
(d) Private Security Agency (PSA) refers to any person, natural or juridical, who
contracts, recruits, furnishes or posts any security guard, to perform its functions or
solicit individuals, businesses, firms, or private, public or government-owned or -
controlled corporations (GOCCs) to engage its service or those of its security guards,
for hire, commission or compensation through subscription or as a consultant/trainer
to any private or public corporation whose business or transactions involve national
security or interest like the operation and/or management of domestic or ocean
vessels, airplanes, helicopters, seaports, airports, heliports, landing strips among
others or as consultant on any security related matter, or to provide highly specialized
security, private escort, detective and investigation services like gangway security,
catering security, passenger profiling, baggage examination, providing security on
board vessels or aircraft, or other security needs that the PNP may approve;
(e) Private Security Industry refers to the industry that is engaged in providing security
consultancy, management, administration, operation, and provision of private or
company watchman, guarding, investigative work, security training, K9 security,
armored vehicle security services, alarm system monitoring services, closed-circuit
television (CCTV) suppliers and other providers of security hardware, security
hardware operation, personal protection services, or security consultant;
(f) Private Security Professional (PSP) refers to a person who is issued a valid LESP
of any classification or category, issued by the designated government agency after
satisfying all the qualifications and requirements set forth by this law and its
implementing rules and regulations. It includes security watchmen, security guards,
security officers, personal security escorts, private investigators, training officers
and directors, k9 handlers, K9 administrators, K9 evaluators, K9 trainers, kennel
masters and other certified or licensed security service providers rendering or
performing security, investigation, security escorting services, security hardware
planners and systems designers, security hardware operators, security managers,
security consultants whether employed by private security agencies, private
corporations, government agencies or independently practicing or providing
professional security services;
(g) Private Security Services refer to the act of providing or rendering security
services for compensation pursuant to mutually agreed terms of reference and
contract and shall include the act of providing or rendering services to watch an
establishment, whether public or private, building, compound/area or property, to
conduct access control/denial in any form whether physically, manually or
scientifically by electronic monitoring systems, for the purpose of securing such
area/property and at the same time ensuring safety and protection of persons
within such areas, to maintain peace and order within such areas, to conduct
private security training, and/or to conduct investigation. It shall also include the
act of contracting, recruiting, training, furnishing or posting any security guard, to
do its functions or solicit individuals, businesses, firms, or private, public or GOCCs
to engage its service or those of its security guards, for hire, commission or
compensation through subscription or as a consultant/trainer to any private or
public corporations;
(h) Private Security Training Agency (PSTA) refers to any person, natural or juridical,
who engages in the and courses duly approved and prescribed by the PNP business
and adopted by the Technical Education and Skills Development pre-licensing
requirements of individual security guards and other security professionals, the
periodic and non periodic in-services skill refreshers for such security personnel,
and other specialized, individual or group, private security personnel skills
development;
(i) Security Consultant refers to a security professional Authorized by law to provide
security services such as sign and formulation of design a security plan, threat and
vulnerability assessment, resiliency planning, security surveying, security auditing,
risk management, travel security training, event security planning and
management, emergency and incident planning and management, crisis
management, business continuity and other services related to the formulation of
security- related solutions other than providing guards and watchmen;
(j) Security Hardware refers to any mechanical or electrical device, which is
designed and used for the detection of an unauthorized entry into a facility, for
alerting others of the commission of an unlawful or unauthorized act within a
building, structure or facility, identification and screening, control, repel and
prevent entry of persons and vehicles of person and materials, recording and
documentation of activities and events, repel and prevent aggression to a person
or a facility; and
(k) Security Hardware and Systems Designers and Planners refer to the security
professionals who specialize in the design of security systems using a combination
of security software and hardware to address security requirements of a facility
and the training for their operation and maintenance.
CHAPTER II
REGISTRATION AND LICENSING OF PRIVATE
SECURITY AGENCY
Section 4. Private Security Agency (PSA).- Any Filipino citizen or juridical entity wholly
owned and controlled by Filipino citizens may organize a private that they shall not employ
more than two thousand (2000) private security professionals as defined in this Act.
Section 5. PSA Operator or Licensee. – No applicant shall be granted a license to operate a
PSA unless the applicant possesses the following qualifications:
(a) Must be at least twenty-five (25) years of age;
(b) Must hold a bachelor's degree;
(c) Must be a part owner of the company or in case of juridical entity, holder of at least one (1) share
of stock with voting rights;
(d) Must be of good moral character;
(e) Must not have been convicted of any crime or offense involving moral turpitude; and
(f) Must be physically and mentally fit, and passed the neuro-psychiatric test and drug test
administered by the PNP or other similar government centers and facilities:
Provided, that in case of juridical entity, the named operator or licensee shall be its
President or any of its directors complying with the above requirements and duly
Section 6. License to Operate.- A license to operate issued by the Chief PNP is required to
operate and manage a PSA and PSTA: Provided, That an LTO for PSTA shall be granted only to
a training school, institute, academy, or educational institution which offers courses
prescribed and approved by the PNP or training programs accredited by TESDA.
Section 7. Period of Validity of LTO. The LTO issued to PSA and PSTA shall be valid for a
maximum period of five (5) years, subject to renewal: Provided, that the Chief PNP may set a
shorter validity period for LTO with applicable fair and reasonable fees adjusted accordingly.
Section 8. Fees and Bond to be Paid.- Every application for LTO shall be accompanied by a
bond issued by competent or reputable surety, fidelity or insurance company duly
accredited by the Insurance Commission. The bond shall be used to answer to any and valid
and legal claim against the agency by its clients and or employees. The amount of bond to
be determined by the Chief PNP must be reasonable and should depend on the number of
PSPs employed.
Section 9. Administrative Fee of PSAs. The minimum administrative fee that may be charged
by PSAs to its clients shall not be less than twenty percent (20%) of the total contract cost,
subject to adjustment by the Department of Labor and Employment: Provided, that
additional fees shall be charged for the acquisition and maintenance of extraneous tools and
equipment used for security operation by the agency or required by the clients and for the
Section 10. Issuance of Firearms.- A PSA shall be entitled to possess firearms after
having successfully passed the requirements prescribed by the Chief PNP and in
accordance with Republic Act No. 10591 or the "Comprehensive Firearms and
Ammunition Regulation Act": Provided, That a PSA shall only be allowed to possess
small arms, not exceeding one (1) firearm for each PSP, to include single-post, in its
employ: Provided, further, That possession of firearms by PSPs shall only be
allowed during their tour of duty, in proper uniform, within the compound of the
establishment, except when they escort and secure large amounts of cash or
valuables, which firearms must be determined by the PNP: Provided, finally, That
inventory of firearms of PSAs shall be subject to periodic inspection by the PNP.
Section 11. Uniform. The uniform of PSPs shall be different from the uniform worn
and prescribed for members of the Armed Forces of the Philippines (AFP), the PNP
and other law enforcement authorities. The PNP, through the authorized
representative, shall prescribe the uniform, ornaments, equipment and
paraphernalia to be worn by the PSPs while on duty.
CHAPTER III
PRIVATE SECURITY
PROFESSIONALS
Section 12. License to Exercise Security Profession (LESP). – No applicant shall be granted license
to exercise private security profession unless the applicanant possesses the following
qualifications:
(a) Must be of legal age;
(b) Must be a Filipino citizen;
(c) Must be physically and mentally fit;
(d) Must be of good moral character; and
(e) Must not have been convicted of any crime or offense involving moral turpitude.
For purposes of securing an LESP, a letter of authority to conduct training must be issued
by the Supervisory Office for Security and Investigation Agency (SOSIA). Such training includes
the pre-licensing requirements of the individual PSPs, periodic and non-periodic in- service skill
refreshers for such security personnel, and other specialized, individual or group, PSP skills
development: Provided, That the Chief PNP shall provide for additional qualifications for security
Section 13. Period of Validity of LESP. - The LESP of duly qualified PSPs shall be valid
for a period of five (5) years from the date of its issuance.
Section 14. Pre-Licensing Training.- No person shall be granted an LESP without
undergoing the Pre-Licensing Training Program as defined in this Act: Provided,
That the PNP shall encourage opening of local and regional security training centers
to provide pre- licensing trainings to applicants.
Section 15. Ladderized Training and Education.- The PNP, in partnership with
private security training institutions or public institutions duly accredited by the
government to provide such training education to private security professionals,
shall develop ladderized training and education which include basic security guards
courses, specialized security guard courses, security officers training courses,
detective training courses, and candidate protection agent courses. It shall also
include enhancement trainings, such as but not limited to, supervisory trainings,
personal upliftment and other specialized trainings to place the security
professional a level up from his current position
CHAPTER IV
PENAL PROVISIONS
Section 16. Penalties.- Any violation of the provisions of this Act shall, after due notice and
hearing, be subject to the corresponding penalties herein provided:
(a) A license to operate of a PSA may be cancelled, revoked or suspended by the Chief PNP
when:
(1) It takes part in an armed conflict against the government;
(2) It uses force or the threat of force or those it represents in a national or local electoral
contest;
(3) It uses its authority to be involved in human rights violations;
(4) It is used as a privately owned and operated para- military organization operating outside of
the regulatory framework established by this law and the implementing rules and regulations
adopted by the PNP;
(5) It intentionally and maliciously makes use of electronic security devices or remote video
surveillance in a manner that violates the privacy of civilians;
(6) It acted with gross negligence in dealing with violations, or mistakes of its members, or
(7) Its named operator or licensee is convicted by final judgement of any crime or felony;
(8) It violates any provision of Presidential Decree No. 442, otherwise known as the “Labor Code of the Philippines”, as
amended, including its implementing rules and regulations; and
(9) It acted in a manner which renders the PSA a detriment to the maintenance of peace and order.
(b) Any PSA or any entity which operates without a valid LTO shall suffer the penalty of a fine of not less than One million
pesos (P1,000,000.00) and not more than Five million pesos (P5,000,000.00) at the discretion of the Chief PNP;
(c) Any PSA or any entity which operates with an expired LTO shall suffer the penalty of a fine of not less than Fifty
thousand pesos (P50,000.00) and not more than One hundred thousand pesos (P100,000.00) at the discretion of the
Chief PNP;
(d) Any person practicing private security profession without valid license or with only an expired license shall suffer the
penalty of a fine of not less than Fifty thousand pesos (P50,000.00) and not more than One hundred thousand pesos
(P100,000.00) at the discretion of the Chief PNP. The same penalty shall be imposed upon a PSA who shall deploy any
person practicing private security profession without a valid license or with only an expired license;
(e) Any person who offers to render or renders services to persons or places conducting illegal activities shall suffer the
penalty of imprisonment of not less than twelve (12) years and one (1) day to twenty (20) years, and a fine of One million
pesos (P1,000,000.00), ), at the discretion of the court, without prejudice to criminal prosecution under other laws; and
(f) Any person who violates any of the provisions of this Act not mentioned in the preceding subsections shall suffer the
penalty of imprisonment of not less than six (6) months and one (1) day to six (6) years, or a fine of One million pesos
(P1,000,000.00), or both, at the discretion of the court, and cancellation or suspension of its license with forfeiture of the
bond without prejudice to criminal prosecution under other laws.
If the offender is a juridical entity, the penalty shall be imposed upon the officer or officers of the juridical who
participated in the decision that led to the violation of any provision of this Act, without prejudice to the cancellation of
their license issued by the PNP.
CHAPTER V
MISCELLANEOUS PROVISIONS
Section 17. Implementing Rules and Regulations (IRR). - The PNP, in consultation with stakeholders
and other national private security associations, representatives of private security cooperatives
other stakeholders of the security industry, and subject to the provisions of existing laws, shall
promulgate the rules and regulations necessary to implement the provisions of this Act within ninety
(90) days from its effectivity. Furthermore, the Chief PNP shall consult with the said stakeholders
prior to the issuance of all regulations and issuances related to and affecting the private security
services industry. The PNP is mandated to review the IRR every three (3) years.
Section 18. Separability Clause. - If any part or provision of this Act is declared unconstitutional, the
remainder of this Act or any provisions not affected thereby shall remain in force and effect.
Section 19. Repealing Clause. - Republic Act No. 5487 is hereby repealed. All other laws, presidential
decrees or issuances, executive orders, letters of instruction, rules, regulations and administrative
orders inconsistent with the provisions of this Act are hereby repealed or modified accordingly.
Section 20. Effectivity. This Act shall take effect fifteen (15) days after its complete publication in the
Official Gazette or in a newspaper of general circulation.
Retail service and agriculture establishment or operations employing not more than ten (10)
employees or workers are exempted from the coverage of this provision.
- Approved December 9, 1992
PNPSAGSD- (Philippines National Police Security Agency, Guard and Supervision Division)
PNP SOSIA- (Philippine National Police Supervisory Officer for Security and Investigative Agencies)
- This is the unit under the Philippines National Police which is charged with the supervision,
direction and control of all security agencies in the Philippine.
Person - shall include not only natural but also juridical persons such as single proprietorship, corporations,
companies or association, duly organized and registered with the Security Exchange Commission and/or the
Department of Trade and Industry.
Private Security Service shall include the act of providing or rendering service to watch an establishment
whether public or private, building, conmpo8nd/ area or property, to conduct access control/denial in any
form whether physical, manually or scientifically by electronic monitoring system, for the purpose of
securing such property and at the same time ensuring safety and protection of person within such areas, to
maintain peace and order with in such areas. To conduct private security training, furnishing or posting any
security guard, to do its function or solicit individuals, businesses, firms, or private, public or government
owned or controlled corporation to engage his/its service or those of his/its security guard, for hire,
commission or compensation thru subscription or as a consultant/ trainer to any private or public
corporation.
Private Detective Services shall include among others the act of providing personal security protection,
inquiry and information gathering, pre-employment verification and individual background profiling,
providing assistance in civil liability and personal injury cases, insurance claims, and fraud, child custody and
protection cases, for the purpose of assisting in gathering information leading to determination and / or
prevention of criminal acts/ or resolutions of legal, financial and personal problems.
Private Security Industry- shall cover those in the legitimate business of providing private security and detective
services.
Security Guard guard- sometimes called private security or watchman shall include any person who offers or renders
personal service to watch or secure either a residence or business establishment or both for hire or compensation,
and with a license to exercise profession.
Private Detective- shall mean any person who does detective work for hire, reward or commission, other than
members of the AFP, Guard of the Bureau of Jail Management Penology, Municipal or city jail guards, and members of
the PNP or of any other Law Enforcement agency of the government.
Private Security Personnel - shall be natural persons which include private security guards, private detectives, security
consultant, security officers and others that may be classified later, rendering performing security and/or detective
services as employed by private security agencies and/or private firms.
Government Security Personnel- shall be natural persons which include government security guards, detective,
security consultant, security officers and others that may be classified later except those of the AFP, PNP, BJMP,
Municipal or City Jail guards rendering / performing security and/or detective services as employed by government
entities.
Private Security Agency (PSA) - shall mean any person association, partnership, film or private corporation, who
contracts, recruits, trains, furnishes or post any security guard, to perform its functions or solicits individuals,
business, firms, or private, public or government-owned or controlled corporation to engage his/its security guards,
for hire, commission or compensation thru subscription or as consultant/trainer to any private or public corporation
whose business or transaction involve national security or interest like the operation and/or management of
domestic or ocean vessels, airplanes, helicopters, seaports, airports, landing strips etc., or as consultant on any
security related matter. Or to provide highly specialized security, detective and investigation services like gangway
security, catering security, passenger profiling, baggage examination, providing security on board vessels or aircraft,
Private Detective Agency (PDA)- shall mean any person association, partnership, firm or
private corporation, who contracts, recruits, trains, furnishes or post any private detective, to
perform its functions or solicits individuals, firms, or private, public or government-owned or
Controlled corporation to engage his/its service or those of his/its detectives,
For hire, commission or compensation thru subscription or as consultant/trainers to any
private or public corporation or a or as consultant on any detective related matter, or to
provide highly specialized detective and investigation services, or other detective needs that
PNPSAGSD - CSG may approve.
License to Exercise Profession- shall mean any document issued by the chief PNP or his duly
authorized representative recognizing a person to be qualified to perform his duties as private
security or training personnel.
License to Operate (LTO)- is license Certificate document, issued by the C/PNP or his duly
authorized representative, authorizing a person to engage in employing security guard or
detective, or a juridical person to establish, engage, direct, manage or operate an individual or
a private detective agency or private security agency/company security force after payment of
the prescribed dues of fees as provided.
Company Guard Force (CGF)- a security force maintained and operated by any private
company/ corporation utilizing any of its employees to watch, secure or guard its business
Government Guard Unit (GGU)- a security unit maintained and operated by any government entity other than
military or police, which is established and maintained for the purpose of securing the office or compound
and/or extension of such government entity.
PNP - s used herein mean the Philippine National Police, which was organized pursuant to the provision of RA
6975 otherwise known as the National Police Act of 1991.
SAGSD- as issued herein shall refer to the current PNP Civil Security Group Security Agency and Guard
Supervision Division or any other PNP office that may be designated later as the primary office for supervision
of the implementation of these rules and regulations.
PADPAO- refers to the Philippines Association of Detective and Protective Agency Operators, Inc., Which is an
association of all licensed security agencies and company security forces.
-The one who are authorized to issue the implementing rules and regulations pertaining to R.A.NO.5487.
Duty Detail Order - is a written order/schedule issued by a superior officer usually the private security agency/
branch manager or operation officers assigning the performance or private security detective.
Security Guard Force- is a group of force selected men, trained or grouped into functional unit for the purpose
of protecting operational processes from those disruptions which impede efficiency or halt operation at a
particular plant, facility, installation or special activity.
A. Who may organize and maintain a PSA and PDA?
-Any Filipino citizen or corporation association, partnership, one hundred percent (100 %) of which is
owned and controlled by Filipino citizen.
B. Basic age requirements of an operator of manager of Agency?
C. New applicant for license to operate:
- Minimum capitalization of one million (1,000,000) with minimum bank deposit of five hundred thousand (P500,
000,000) pesos in order to start its business.
D. Membership:
- No regular license shall be granted to any private security agency unless it has minimum of two hundred (200)
licensed private security personnel under its employ.
- No regular license shall be granted to any company guards' force or private detective agency unless it has a
minimum of thirty (30) licensed private security personnel under its employ.
- The maximum number of private security personnel that a PSA/CGF/PDA may employ shall be one thousand
(1000)
- The validity of all LTO is two (2) years
E. Applicant of LTO.
- Files: Chief of the Philippine National Police (CPNP) through the PNP Security and Guard Supervision Division, Civil
Security Group (SACSD-CSG). Using license application form PNPSF1, the application shall contain the full name of
the applicant, his age, civil status, his residence and location of business.
New applicant- Applicant from NCR may file their application for license to exercise profession with the personnel
licensing section, SAGSD, Civil Security Group, Camp Crame, Quezon City. Applicants from the Province may file their
application with the Firearms, Explosives, Security Agencies and Guards Section (FESAGS), Regional Operation and
Plan Division (ROPD) of the Police Regional Office concerned.
F. Renewal of license to operate:
- all applications for renewal of license to operate shall filed at least sixty (60) days before expiry date of LTO subject
- in addition to other renewal requirements under provision of these rules and regulation, no
application shall be approved unless a certification is issued by FED-CSG to the effect that all licensed
firearms of the agency concerned are updated/renewed for at least one (1) year forthcoming during
the validity of the renewed LTO.
G. Payroll:
- Payroll shall be filed with the main office within fifteen (15) days after pay day.
H. Possession of Firearms
- Ratio: 1 firearm for every two (1:2) security guard in its employ.
- No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500 units.
1. Restriction to possess high powered firearms:
a. The firearm first be registered with the FED before issuance and shall not be used or transferred in
places other than those specially authorized by the Director, CSG.
b. The total number of high-powered firearms that an agency or security force/unit is authorized to
possess shall not exceed ten percent (10%) of the total number of security guards of watchmen in its
employ.
J. Stocking of ammunition:
PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
Individual issue to each security guard shall be limited to one half of such basic load or twenty-five
SECURITY GUARD FORCE
Is a group forces of men selected, trained or grouped into functional unit for the purpose of protecting operational process from
disruption which would impede efficiency of halt operations at a particular plant, facility, installations, or special activity.
TYPES OF SECURITY GUARD FORCE
1. Company guard force
2. Private security guard force
3. Government guard force
SECURITY PROCEDURES GUARD FUNCTIONS /GUARDING
Primarily Functions - Protecting of life and Property
a. Fixed Post
b. Patrol
c. Reserve
d. Administration work
e. Others/investigation and escorts
f. General Functions
QUALIFICATIONS OF PRIVATE DETECTIVES
Any person applying for employment as private detective-shall in addition to the qualifications of security guard, possess
any of the following qualifications.
a. Bachelor of Laws Degree
b. Graduate of B.S. Criminology
c. Graduate of a Criminal Investigation Course offered by the PNP, NBI, Police Training Center, and Private Detective Agency
d. Officers. Enlisted men and policemen honorably discharged from service not otherwise disqualified by the
R.A.NO.5487.
PERMIT- a document issued by CPNP of his duly authorized representative authorizing a person to engage in
the occupation calling or employment of watchman, security guard or private after payment dues of fees.
FIREARMS- possession of firearms by agency are entitled to possess firearms after satisfactory complying the
requirements as provided by law.
FIREARMS/WEAPONS AUTHORIZED FOR USED BY THE SECURITY GUARD WHILE ON DUTY
1. Handguns
2. Shotguns
3. Riot guns of prescribed caliber
JUSTIFICATION FOR A GUARD'S FIREARMS TO BE CONFISCATED
1. When firearm is to be used of being used in the commission of crime.
2. If carried while guard is not on tour of duty.
3. There is written court order.
4. Firearms is carried outside the property, compound or establishment serviced by the agency without
proper authority.
MISSION ORDER- is a written instructions issued by the agency to its guards to perform lawful activity at
specific time, place and date. It shall include the make, model and serial no. of the firearm issued to the
guard and the name of the operation officer or manager of the agency.
CHAPTER XII
INDUSTRIAL GUARD FORCE AND GUARDS
SYSTEM
Learning Objectives:
At the end of this chapter the students will be able to:
1. Explain the structure of Industrial Guard Force and Guard System
2. Know the basic requirements of Security Personnel
TYPICAL STRUCTURE OF SECURITY ORGANIZATION
The security force of any installation must be organized in accordance with the
principles of responsibility and authority. Each personnel must be assigned to a position
which correspond to his experience, skills, training and knowledge. This is to carry out
different functions efficiently and effectively and thus insures smooth flow of the
organization. The security positions may be classified into the following:
1. Office of the General Manager / Security Director
a. The office of the General Manager/Security Director is vested the authority and responsibility of
running the security force by authority of the President of the Company/ Corporation.
b. The General Manager/Security Director is directly responsible to the President of the
Company/Corporation in the operations and administration of the security force.
c. He is principal adviser to the President on matters involving security operations, administration of
the security force.
d. He is the overall head of both various staff departments and field units where he may delegate
corresponding authority commensurate to their assigned responsibility.
e. He implement policies promulgated by the policy making body and executed by the president.
f. He directs controls and supervises all offices and field units of the force in their respective assigned
task.
g. He performs other functions as directed by the President of the company/corporation.
2. Office of the Executive Secretary of the General Manager
a. He is the principal administrative assistant to the General Manager/Security
Director.
b. He prepares communications initiated by the General Manager/Security
Director.
c. He maintains records of scheduled conferences, appointments and other
engagements and advises the GM/SD of such activities.
d. He records and checks outgoing communications signed by the GM/SD as to
its completeness (attachments to be considered) as well as to ensure the
timely dispatch to the addressee through the administrative section.
e. To perform other duties as directed by the General Manger/Security Director.
3. Office of the Assistant General Manager/ Security Executive Director
a. The security Executive Director is the Assistant Manager of the Security
Force and takes the Operational and Administrative Management of the
security force in the absence of the GM/ SD.
b. He is directly responsible to the GM/SD.
c. He performs other duties as directed by GM/ SD.
4. Office of the Human Resources and Administrative Manager/Staff Director for
personnel and Administration
The principal staff assistant to the General Manager/ Security Director for planning
and supervising matters of activities pertaining to personnel management and
miscellaneous administrative function such as:
a. Personnel Strengths
b. Replacement
c. Discipline, Law and order
d. Morale and Personnel Service
e. Personnel Procedures
f. Interior Management
g. Personnel Adviser
5. Office of the Operations Manager/ Staff Director for Operations
This office is the principal staff on operations, training, intelligence and
6. Office of the Finance This office is principally concerned with budgeting, finance,
reports control and program review and analysis. Exercise supervision on over the
management engineering activities of the company and the accounting office.
Renders advice, assistance and guidance to GM/SD on financial management
Specific duties and functions of the Finance Office are:
a. Accounting
b. Credit and collection
c. Bookkeeping
d. Billing
e. Payroll
f. Disbursing
7. Office of the Logistic Manager
- This office is in charge with the following:
a. Coordinates plan and supervise the implementation of directive and guidance
determines divisional responsibility and evaluates in logistical planning and related
planning programs.
b. Develops, administer, and coordinates research and development on logistical
matters.
c. Collects computes and evaluates statistical data on logistical matters.
d. Recommends logistics budget policy including budget planning.
e. Prepares estimates and/or requirements to ensure that logistical plans support
for corporate plans.
f. Performs necessary program and fiscal administration.
g. Supervise all matters pertaining to supply.
h. Determine the organization, allocation of service personnel.
8. Office of the Inspectorate and Special Projects (special Staff)
- This office assists the General Manager in inquiring into, and reports upon matters
pertaining to the performance of the different staff, units, towards the attainment
of corporate objectives. It also inquires on the state of discipline, efficiency and
economy of the company. The Inspectorate Staff conducts inspections,
investigations and submits reports to the General Manager. In the performance of
its duties and functions, the General Manager is provided relevant information
pertaining to meritorious conduct and performance of a unit or individual. This
office is also tasked to conduct overt ad covert inspections and investigations and
other related services.
9. Office of the Communications Officer
The communications Officer who is a licensed radio operator is the principal
adviser of the General Manager on communication matters particularly radio
communication. He is responsible directly to the General Manager.
10. The Detachment Commands/ Officer-in-Charge
A Detachment Commander shall command and responsible for a certain detachment with
fifteen (15) or more security personnel under him. He is directly responsible to the Security manager
of the installation.
a. He prepares and executes the security plan of his Detachment in relation to the security
requirements of the establishments being guarded.
b. He is responsible for the enforcement and Implementation of rules and regulations/ policies.
c. He receives instructions from the Security Manager and implements the same as required.
d. He has full operational and administrative control of all his units to include his assistant and shift-
in-charge/ supervisor.
e. He conducts inspection of his units and institutes corrective measures on the spot on those
problems he may detect or brought to his attention. If not possible, he brings the problem to the
Security manager of the establishment.
11. Assistant Detachment Commander
Detachment with more than twenty (20) security personnel assigned may be provided with an
Assistant Detachment Commander who will be the principal assistant of the Detachment
Commander.
In the absence of the Detachment Commander, he performs the duties of the Detachment
12. Shift-in-Charge
a. The shift-in-charge shall be responsible to the detachment Commander as far as his shift is concerned.
b. He forms his men at least 30 minutes before posting times seeing to it that all are in proper uniform and
presentable.
c. He disseminates instructions coming from his Detachment Commander/OIC or those relayed to him by his
counter-part, counter-part, the outgoing SIC,
d. He inspects the post as often as he can to ensure that his men are on the alert and performing their duties
effectively.
e. He performs other duties as may be directed by the Detachment Commander or by the ADC.
13. Security Guard on Duty/Post
a. The Security Guard (SG) on Duty/ Post must always carry his license to practice his profession, photocopy
of the firearm's license assigned to him, and his duty detail order, authorizing him to carry his issued
firearm within his area of jurisdiction.
b. If the Security Guard is manning a fixed post especially entrance or exit points, he must maintain a guard's
logbook and enters in the same logbook all events/passages of VIP's vehicles and inspections or visits of
Security Manager/Director of the Client/Firm.
c. Guard must observe and apply religiously the provisions of the Code of Ethics, Code of Conduct, and the
General Orders of the Security Guard when on post.
d. He may perform special task as may be directed by his shift supervisor, DC and or ADC, like control of
visitors, inspections of bags of persons coming in and going out of the establishment, vehicle cargoes,
Security Guard's Professional Conduct and Ethics
1. Security Guard's Creed
As a Security Guard, my fundamental duty is to protect lives and properties and
maintain order within the vicinity or place of duty, protect the interest of my employer and
our clients and the security and stability of our government and country without compromise
and prejudice, honest in my action, words and thought, and do my best to uphold the
principle: MAKADIYOS, MAKABAYAN AT MAKATÃO.
2. Ethical Standard
As security guard/detective, his fundamental duty is to serve the interest or mission of
his agency in compliance with the contract entered into with the clients or customers of the
agency he is to serve thus,
1. He shall be honest in thoughts and deeds both in his official actuation, obeying the laws of
the land and the regulations prescribed by his agency and those establish by the company he
is supposed to serve.
2. He shall not reveal any confidential matter committed to him as a security guard and such
other matters imposed upon him by law.
3. He shall act all times with decorum and shall not permit personal feelings, prejudices and
4. He shall not compromise with criminal and other lawless elements to the prejudice of the
customers or clients and shall assist government relentless drive against lawlessness and
other forms of criminality.
5. He shall carry out his assigned duties as required by law to the best of his ability and shall
safeguard life and property of the establishment he is assigned to.
6. He shall wear his uniform, badge, patches and insignia properly as a symbol of public trust
and confidence as an honest and trustworthy security guard, watchman and private
detective.
7. He shall keep his allegiance first to the government he is assigned to serve with loyalty and
utmost dedication.
8. He shall diligently and progressively familiarize himself with the rules and regulations lay
down by his agency and those clients. of the customers or clients
9. He shall at all times be courteous, respectful and salute his superior officers, government
officials and officials of the establishment where her is assigned and the company he is
supposed to serve.
10. He shall report for duty always in proper uniform and neat in his appearance and
11. He shall learn at heart and strictly observe the laws and regulations governing the use of
3. Code of Conduct
1. He shall carry with him at all times during his tour of duty his license
identification card and duty detail order with an authority to carry firearms.
2. He shall not use his license and privileges to the prejudice of the public, the
client or customer and his agency.
3. He shall not engage in any unnecessary conversation with anybody except in the
discharge of his work and shall at all times keep himself alert during his tour of
duty.
4. He shall not read newspapers, magazines, books, etc, while actually performing
his duties.
5. He shall not drink any intoxicating liquor immediately before and during his tour
of duty.
6. He shall know the location of eh alarm box near his post and sound the alarm in
case of fire or disorder.
7. He shall know how to operate any fire extinguishers at his post.
8. He shall know the location of the telephone and/or telephone number of the police
precincts as well as the telephone number of the fire stations in the locality.
9. He shall immediately notify the police in case of any sign of of disorder, disorder,
strike, riot or any serious violations of the law.
10. He or his group or guards shall not participate or integrate any disorder, strike, riot or
any serious violations of the law.
11. He shall assist the police in the preservation and maintenance of peace and order
and in the protection of life, property/ having in mind that the nature of his
responsibilities is similar to that of the latter.
12. He shall familiarize himself with the Private Security Agency Law (RA 5487) as
amended, and the PNP SÅGSD implementing rules and regulations.
13. When issued a pass he should not lend his pass to anybody.
14. He shall always in proper uniform and shall always carry with him his basic
requirements, and equipment such as writing notebook, ball pen, nightstick (baton)
and/or radio. He shall endeavor at all times to merit and be worthy of the trust and
4. General Order
1. To take charge of this post and all companies property in view and protect/preserve the
same with utmost diligence.
2. To walk during tour of duty in military manner, keeping always in the alert and observing
everything that takes place within sight or hearing.
3. To report all violation of orders I am instructed to enforce.
4. To repeat all calls from post more distant from the guardhouse where I am station.
5. To quit my post only when properly relieved.
6. To receive, obey and pass out to the relieving guard all order from company officers or
officials, supervisors post in charge or shift leaders.
7. To talk to no one except in the line of duty.
8. To sound or call the alarm in case of fire or disorder.
9. To call the superior officer in any case not covered by instructions.
10. To salute all company officials, superiors in the agency, ranking public officials and
commission officers of the AFP and officers of the PNP.
11. To be especially watchful at night and during the time of challenging to challenge all
Selection of Guards
R.A 5487 and its implanting rules and regulations prescribed the minimum
requirements for guards to be able to secure a license to exercise profession as a
security guard, private detective, security officers and security consultant.
Who may organize and maintained a Private Security Agency and Private
Detective Agency - Any Filipino Citizen or corporation, association, partnership, one
hundred percent (100%) of which owned and controlled by Filipino citizens, may
organized and maintain a PSA and PDA.
Basic Qualifications of an Agency Operator/Manager Agency
a. The operator or manager of an agency including, managers of branch offices, must
be:
1. Filipino Citizen;
2. Not be less than 25 years of age;
3. College graduate and/or a Commissioned officer, inactive or retired service or retired from the
AFP or PNP.
4. Has taken a course/seminar on industrial Security Management and/or must have adequate
training or experience in the security business; and
b. New applicant for license to operate shall be required to obtained minimum capitalization of
one million pesos (P1,000,000) with a minimum bank deposit of five hundred thousand pesos
(P500,000) in order to start its business operation.
Basic qualification of a Security Consultant
1. Filipino Citizen;
2. Physically fit;
3. Holder of Master degree of Criminology, MPA, MNSA, Industrial Management of LL.B.
4. Must have at least ten (10) years' experience in the operation and management of security
business.
Basic Qualifications of a Security Officer
No person shall be licensed as a private detective unless possesses the following qualification:
1. Filipino Citizen;
2. Physically and mentally fit;
3. Holder of a baccalaureate degree preferably Bachelor of Law, BS Criminology.
4. Graduate of a criminal Investigation Course offered by the PNP or the NBI or any Police training
school, or detective training in any authorized/ recognized training center; and
Basic Qualifications of a Private Security Guard:
No person shall be licensed as security guard unless he possesses the following
qualification:
1. Filipino Citizen;
2. High school graduate;
3. Physically and mentally fit;
4. Not less than 18 years of age nor more than Not years old. (For new applicant and SGs in
supervisory position); and
5. Has undergone a pre-licensing training course or its equivalent
Desirable Qualities of Security Guards
1. Alertness- a good guard must be alert and observant. This can be attained by watchfulness,
dedication and diligence.
2. Judgment - sound and good judgment is more than the use of common sense. It is the arriving
at wise and timely decision.
3. Confidence - it is the state of being sure; a state of mind free from doubt or misgivings. This
attribute includes faith in oneself and in his abilities, which is attained by job knowledge.
4. Physical fitness - security work is strenuous and demanding. Physical conditioning is essential if
5. Tactfulness- ability of the guard to deal with others successfully without offending. In short, he
can be firm but pleasant.
6. Self-control- ability to take hold of oneself regardless of a provoking situation. With self-
control, the guard will do his work without being angry and the situation will be on hand.
7. Interest, loyalty, responsible and trustworthy, is also important attributes of a reliable guard.
License in the Security Profession
1. License to Operate- before a Private Security Agency (PSA) can operate, it has to secure a
License to Operate (LTO) categorized as either Temporary or Regular. A temporary license is
issued by the PNP thru Civil Security Group Directorate after the applicant/ license should have
complied with all the requirements while it has less than two hundred guards. A regular license
to operate is issued to the PSA once it is qualified of having two hundred or more license security
guard in its employ duly posted. Regular license is renewable every two years.
2. Security Guard License - before a security guard can practice his profession; he shall possess
valid security license. The use of expired license is not allowed. In case of doubt, license m may
be verified at the PNP SAGSD whether valid or fake.
3. Firearm's license- all firearms of the security agency should be covered with firearms license
issued by the PNP through its Firearms Explosive Division under the Civil Security Group,
renewable every two years. No duplication of two or more firearms with the same make and
Firearms and Weapons Authorized for Use of the Security Guard while on Duty
1. Handguns/Low-powered (cal. 22 and cal. 38) not exceeding one FÅ for every two
guards employed.
2. Shotguns (not bigger than 12 gauge)
3. High-powered when the agency is operating in areas where there is upsurge of
lawlessness and criminality as determined by the Chief PNP.
Handling Firearms
The Fundamentals of Firearm Safety
1. Always point the muzzle in a safe direction; never point a firearm at anyone or
anything you do not want to shoot.
2. Keep your finger off the trigger guard until you are ready to shoot.
3. Keep the action open and the gun unloaded until you are ready to use it.
Additional Specific Rules of Safe Gun Handling
1. Treat every firearm as if it were loaded.
2. Never pass a firearm to another person, or accept a firearm from another
person, until the cylinder or action is open and you have personally that the
weapon is completely unloaded.
3. Before handling any firearm, understand it’s operation
4. Never rely on any mechanical device for safety
5. Think before shooting.
6. Never joke around or engage in horseplay while handling or using firearms.
7. Be alert at all times: never shoot if you are tired. cold or impaired in any way. Do
not mix alcohol or drugs with shooting.
8. Do not sleep with a loaded firearm in your bedroom if you sleepwalk, have
nightmares, sleep restlessly or have other sleep problems.
9. Safeguard your sight, hearing, and health.
10. Speak up when you observe unsafe behavior.
11. Receive competent instruction from a qualified person.
Safety Rules Related to Your Target
1. Identify your target positively.
2. Note what is behind your target.
3. Never shoot at a hard surface, or at water.
4. Never shoot at glass bottles or other inappropriate targets.
5. Never shoot directly upwards or at high angle of elevation.
6. Never shoot across a highway.
7. Never use a road sign as a target.
8. Never poach a game animal out of season.
Guards' Uniforms, Equipment and Paraphernalia
1. Set of Uniforms for Security Personnel
a. Headgear - perching cap for men and 2 ply caps for women.
b. Service Bush Jacket - intended for Directorial and staff officers.
C Service Shirt
d. Service Trouser
e. Service Belt
f. Footwear
2. Color of Uniforms
a. Private Security Agency Navy blue (upper and lower)
b. Company Security Forces- light blue/ light gray for upper and navy blue for lower.
C. Government Security Forces - white for upper and navy blue for lower.
3. Ornaments and Patches
a. national badge
b. cap device
c. regulation buckle
d. collar device
e. name cloth
4. Equipment and Paraphernalia
a. Leather pistol belt with regulation buckle
b. Holster, black leather for pistol
c. Night stick with horizontal handle
d. Whistle with lanyard
e. Handheld radio
f. Pocket notebook and ball pen
Responding to Emergency Situations
1. Check Emergency Preparedness Plan
The factors to be considered in preparing emergency plans are the following:
Type of emergency
Physical layout of the installation
Observation, description, identification control
Security safety inspection
Communication flow/control
2. Check Emergency Alarm System
Definition Of Terms
ACCESS LIST - an authenticated list personnel given to security guard allowing entry installation or part
thereof.
ANNUCIATOR - is a visual or audible signing device which initiates conditions of associated circuits. The
primarily purpose of alarms is to alert security guards.
AUDIT- an official verification and examination of accounts and records.
BADGE SYSTEM - a system for personnel movement and control whereby badges or identification are issued
to personnel upon entering and an installation. Visitors are also issued temporary badges when entering
the installation.
COMBINATION LOCK- is a lock that requires manipulation of parts according to predetermined combination
code of numbers or letters.
CONTROLLING- the regulation of many different aspects of business activity, controls are needed to
standardized equality and performance, protect assets, measures performance, balance plans and
programs and motivate individuals.
CONTROLLED AREA- an area near the adjacent to limited or exclusive areas where entry is restricted.
COVERAGE FACTOR- The minimum number of directions from which each point in the area should be
lighted depending upon the use of the area.
DOPPLER EFFECT- a physical phenomenon that causes frequency shift if objects move in the area
DRY RUN- practical test or exercise of to test its validity, an operational readiness exercise
DURESS CODE- a type of code system so that security personnel when forced by armed men enter an
installation can give alarm by the use of a certain words in casual conversational with other personnel in the
installation
ELECTRICAL LOCK- type of lock that can be opened and closed remotely by electronic means
ENTRANCE CONFERENCE- a conference or dialogue between the survey team and management officials of a
plant before security survey is conducted .
EXIT CONFERENCE - a conference similar to entrance Conference done after the completion of the security
survey.
EXCLUSION AREA- a restricted area containing materials or operation of security interest.
FALL SAFE- a term applied to a device or system that in the event of failure of a component the incapacity will
be signaled.
INSPECTION - term use for succeeding surveys.
KEY CONTROL- the management of key is a plant of business organization to prevent unauthorized individuals
access to the keys.
LOCK-is defined as a mechanical, electrical, hydraulic, or electronic device to prevent entry to a building,
room, container or hiding place.
MASTER KEY- a special key capable of opening a series of lock.
MASTER KEYING SYSTEM - the system used in big installation whereby keys can open a group or group of
MAISON KEYING- the issue of key to open main entrance gate and office.
PADLOCK - is a portable and detachable look having a pivoted of sliding hasp which
passes through a staple ring which is made fast or secured.
PASS SYSTEM- a method used by security to screen visitors of person admitted into
building premises.
PETERMAN - a term used in England for lock pickers, safecracker and penetrators of
restricted rooms or areas.
PROTECTIVE ALARMS - is an aural signal given by the annunciator to security guard
when intruder actuates device in a protected area.
RESTRICTED AREA- any area access to which is subject to special restriction control.
SECURITY SURVEY - a fact finding probe and determine plans adequacy and
deficiency in all aspects of security, with the corresponding recommendations.
SEP- the exposure and teaching of employees on security and its relevance to their
work.
SURVEY - term to the first detailed "look see" conducted by a term.