Lea 3
Lea 3
Lea 3
LEA 3 - INTRODUCTION
INDUSTRIAL SECURITY AND
CONCEPTS
INTRODUCTION
Security is safety from harm, a term that has different dimensions in psychology, public safety,
defense and military matters, and information access. In finance, a security is a document representing
an investment. Security, in its semantic and philosophical sense, implies a stable, relatively predictable
environment in which an individual or group may pursue its end without disruption or harm, and without
fear of such disturbance or injury. The concept of security is an organizational sense as a means by which
safety and stability can civilization, shaped by wide variety of institutional and cultural. Security is a
state or quality, condition of being secured, freedom from fear, harm, danger, loss, destruction or
damages, to secure is to make safe or be protected.
This module is intended to provide the student the concept of security, the history of security,
personnel Security, physical Security and document Security. It will also discuss the Security Agency
Management with regards to management and planning; implementation, problem solving, decision;
guard force administration and the general order of code of ethics and conducts.
It will also discuss the technical security management, security investigation and the legal
context of Industrial Security under Republic Act No. 5487 (Private Security Agency Law); and at the
same time on how to help law enforcers in the implementation of the laws on: Women and Children’s
Rights (R.A. 9262), Comprehensive Firearms and Ammunition Regulation Act (RA 10591) and
Comprehensive dangerous Drug Act of 2002 (R.A. 9165).
CONCEPTS OF SECURITY
LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS
Page 2 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte
Purpose of Security:
1. To protect the establishment from any form of losses as a result of theft, robbery, pilferage, sabotage, espionage,
accident, fire and subversive activities.
Legal Bases
1. Act 3815 - Otherwise known as the Revised Penal Code of the Philippines.
- The law which defines and penalizes crime against property, persons, public order, national security etc.
2. RA 9372 - Otherwise known as the Human Security Act of 2007.
3. Republic Act 6975 - The law that created the public safety agencies.
4. Republic Act 5487 – is an act that regulates the organization and operation of the private detective, watchmen or
security guard agencies.
Before R.A. 5487 there is no law, what they need is only a permit from the city or municipal mayor to hire a
security guard. PCSUSIA (Philippine Constabulary Supervisory Unit for Security and Investigation Agencies) was
formed as a result of the approval of R.A. 5487, which directs the Chief PC to issue rules and regulations concerning
the implementation of R.A. 5487. Later was change to PNPSOSIA-PNP Supervisory Office for Security and
Investigation Agencies- (when the Philippine Constabulary was dissolved) and the personnel were merged to the
PNP. The PNPSOSIA is responsible for the issuance of implementing orders regarding the rules and regulations
affecting security agencies operation.
At present PNPSAG/SD – PNP Security Agency Guards/ Supervision Division is responsible for national while
PNP FE/SAGS – PNP Firearm and Explosives/ Security Agency Guard Services is responsible for local. It directs the
Chief of PNP to issue rules and regulations concerning the implementing rules of R.A. 5487 within the effectivity date
on Oct. 3, 1972 and Jan. 17, 1975 and as amended by P. D. # 11 and 11A and was again amended in 2003 with Title
2003 Revised Rules and Regulations Implementing R.A. 5487 as amended.
PADPAO
It stands for the Philippine Association of Detective and Protective Agency Operators. It is a non-stock private
organization, and it was formed in May 1958.
R.A. 5487
• is an act that regulates the organization and operation of the private detective, watchmen or security guard
agencies.
• it is known as Private Security agency Law.
TYPES OF SECURITY
1. INDUSTRIAL SECURTY
A type of security applied to business groups engaged in industries like manufacturing, assembling,
research and development, processing, warehousing and even agriculture
2. HOTEL SEURITY
A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and
the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves.
This type of security employs house detectives, uniform guards and supervisor and insures that hotel
guests and their personal effects are safeguarded.
3. BANK SECURITY
This type of security is concerned with bank operations. Its main objective is the protection of bank cash
and assets, its personnel and clientele
4. VIP SECURITY
A type of security applied for the protection of top-ranking officials of the government or private entity,
visiting persons of illustrious standing and foreign dignitaries.
5. SCHOOL SECURITY
It is a type of security that is concern with the protection of students, faculty members, and school
property.
7. PHYSICAL SECURITY
A part of security concerned with the physical measures designed to safeguard personnel and to
prevent
unauthorized access to equipment, facilities, materials and the documents and to protects them from espionage
sabotage, damages or theft. This if the broadest type of security.
8. DOCUMENT SECURITY
Protection of documents, classified papers and vital record from loss, access to unauthorized persons,
damages, theft and compromise through proper storage and procedures.
9. OPERATIONAL SECURITY
This involves the protection of process, formula and patents, industrial and manufacturing activities
from
espionage, infiltration, loss, compromise or photocopying.
I. PHYSICAL SECURITY
• These are used to define, protect and monitor property rights and objects.
• It helps to combat the crime-related threats that both employees and outsiders pose to the
organization (for example: robbery, burglary, arson, assault, rape, theft and vandalism).
A. BARRIERS
Any structure or physical device capable of restricting, deterring, delaying illegal access to an
installation.
It defines the physical limits of an area.
It creates a physical and psychological deterrent to unauthorized entry.
Purpose of Barriers
• define the physical limits of an area
• create a physical and psychological deterrent to unauthorized entry
• prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders
• assist in more efficient and economical employment of guards
TYPES OF BARRIERS
1. Natural barrier
• It refers to a physical feature that protects or hinders travel through or
over.
• It includes bodies of waters, mountains, marshes, ravines, deserts or other
terrain that are difficult to traverse.
2. Human barrier
Persons being used in providing a guarding system or by the nature of their
employment and location, fulfill security functions. Examples are guards,
office personnel, shop workers, etc.
3. Animal barrier
Animals are used in partially providing a guarding system. Dogs are usually
trained and utilized to serve as guard dogs. German shepherds are best
suited for security functions. Goose and turkeys could also be included.
4. Energy barrier
It is the employment of mechanical, electrical, electronic energy imposes a
deterrent to entry by the potential intruder or to protective lighting, alarm
system and any electronic.
B. THREE LINES OF PHYSICAL DEFENSE
C. PERIMETER BARRIERS
1.Inside Perimeter
A line protection adjacent to protected area and passing through
points of possible entry into the area such as doors, windows,
skylights or other points of access.
2. Outside Perimeter
A line of protection surrounding but somewhat removed from a
protected area, such as a fence.
TYPE OF FENCES
1. Solid fence
• Prevents familiarity of the place.
The distance between strands must not exceed 6 inches at least one wire will be interlaced vertically
and midway between posts.
PROTECTIVE LIGHTING
• It provides sufficient illumination to the areas during hours of darkness.
• Lighting can help improve visibility so that intruder can be seen and identified and, if
possible, apprehended.
• It serves as deterrent to would-be thieves.
a. Glare projection type - The intensity is focused to the intruder while the observer or
guard remains in the comparative darkness.
It is being used in prisons and correctional institutions to illuminate walls and outside
barriers.
4. Fluorescent lamp - This provides good color rendition, high lamp efficiency
as well as long life.
It cannot project light over long distance and thus are not desirable
as flood type lights.
5. High pressure sodium vapor lamp - This has gained acceptance for exterior
lighting of parking areas, roadways, buildings and commercial interior
installations.
Requires 2 to 5 minutes to light when cold and longer periods to
relight when hot.
AREAS TO BE LIGHTED
• Perimeter fence
• Building face perimeter
• Pedestrian and vehicle entrance
• Parking area
• Storage, large opened working areas, piers, docks, and other sensitive areas.
1. Floodlights
These can be used to accommodate most outdoor security
lighting needs, including the illumination of boundaries,
fences and buildings and for the emphasis of vital areas or
particular buildings.
2. Street Lights
This lighting equipment received the most widespread notoriety for its value in reducing
crime.
3. Search Lights
These are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
4. Fresnel Lights
These are wide beam units, primarily used to extend the
illumination in long horizontal strips to protect the
approaches to the perimeter barrier. It projects a narrow
horizontal beam that is approximately 1580 degrees in the
horizontal and from 15 to 30 degrees in the vertical plane.
E. PROTECTIVE ALARMS
• It assists the security in detecting, or deterring potential security threat in the installation.
• Its function is to alert the security personnel for any attempt of intrusion into a protected area, building or
compound.
Operational Zoning
Building being protected has a segmented alarm system, whereby the alarm can be turned on and off within
particular zones depending on usage. Parts of an Alarm System
2. Transmission Line
2. Proprietary System
This function in the same way as central system except that it is owned
by, operated and located in the facility. Response to all alarms is by
facility’s own security or fire personnel.
3. Local Alarm System
In this case, the sensor activates the circuit, which in turn
activates a horn or siren or even flashing light located in the immediate
vicinity of the alarmed area.
KINDS OF ALARM
3. Motion Detector
It is an electrical device that utilizes a sensor to detect nearby
motion.
8. Bill Traps
• It is usually placed in the teller’s cash drawer and connected to the alarm system using a wire
connector. When currency is removed from the devices, the alarm is activated.
• The advantage of these devices is that the robbers frequently remove the currency and
activate the alarm.
Knee or Thigh Button
• Installed inside the desk or teller station so they can be activated by knee or thigh pressure. It
is commonly found in location where personnel usually perform their duties from seated
position.
9. Foot Button
It permits alarm activation safely while both hands remain clear in view of the robber.
2. Fire Pumps
• Mechanical device of supplying water which can be manual or
motor-driven.
• These pumps are ideal when natural supplies of water are readily
available like a river, lake or stream.
3. Stand Pipes
Galvanized iron steel or plastic pipes located inside a building from the
lowest to the top floor with water under pressure for use in case of
fire.
4. Fire Hydrant
Mechanical device strategically located in an installation or street where
fire hose is connected so that water with pressure will be available to
extinguish a fire.
6. Alarm System
• Buildings may also be equipped with detection systems that will transmit an alarm.
• Some detectors are designed to respond to smoke and others to heat.
7. Smoke Alarm
• Sounds an alarm upon the detection of smoke caused by fire.
Types:
• a. Photoelectric – sees the smoke
• b. Ionization – feels the smoke
3. Key
Instrument for locking and unlocking. A metal bar with notches or grooves
that, when inserted into a lock and turned it operates the lock’s
mechanism.
4. Peterman
An English term used to describe a lock picker.
5. Warded Lock
• Offers very little security.
• This type of lock must therefore be used only to have privacy but not to provide a high
degree of security.
8. Combination Lock
• Most of these locks have three dials, which must be aligned in the proper order
before the lock will open.
• These are combination-type locks and that no key is used.
• Pressing the series of numbered button in the proper sequence opens them.
• Some of them are equipped to alarm if wrong sequence is pressed.
• These are high security locking device.
KEYS
1. Change Key
• A key to singe lock within a master key system
2. Sub-Master Key
• A key which will open all the locks within a particular area in a facility.
3. Master Key
• A key which will open all the locks when two or more sub master systems exist.
1. Safe
• Small metallic container used to safeguard small items like documents, money and jewelries.
• Categories:
a. Fire safe
b. Burglary and robbery resistive
2. Vault – heavily constructed fire and burglar resistance container usually a part of the building structure used
to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller
than a file room.
• The vault door should be made of steel at least 6 inches in thickness.
• Vault wall, ceiling, floor reinforce concrete at least 12 inches in
thickness.
• Electrical conduits into the vaults should not exceed 1 ½ in diameter.
• Vault floor should be higher by four inches with the surrounding
floors and if in level with floor buttons, storage container should be
raised at least 4 inches above the floor.
• Vault should not be made part of the wall due to moisture and
condensation caused by temperature.
• Standard vaults, to reduce destroying of too much record, should not be more than 5000 cubic
feet.
• The vault must be resistive up to 6 hours.
3. File Room – a cubicle in a building constructed a lithe lighter than a vault but of bigger size to accommodate
limited people to work on the records inside.
SAFECRACKING METHODS
1. Drilling or Punching
• Accomplished by knocking off combination dial and drilling hole to expose locking device.
2. Burring
• The process of using high temperature oxyacetylene torches or “burning bars” to cut an opening in
the wall or door of the safe.
3. Peeling
• It is the process of attacking the seams of metal plates with pry bars and other tools to peel back
layers of metal and thus exposing either locking mechanism or interior.
4. Ripping
• Similar to peeling except ripping can be accomplished against a solid, metal walled container with a
thin wall.
5. X-Ray
• Utilized to reveal the position of the combination and mechanism necessary to open the safe.
6. Explosives
• Nitro-glycerine and plastic explosives are still used but not as much as in the past.
7. Power Tools
• It involves the use of power drills, hydraulic tools and rotary devices.
8. Manipulation
• Very few safe crackers have skill to use this technique.
In every installation, the use of protective barriers, security lighting, communication and electronic hardware
provides physical safeguards but these are insufficient to maximize the effort of the guard force. A control point
must be established for positive personnel identification and check system. This is to insure that only those persons
who have the right and authority will be given the necessary access to the area.
The most practical and generally acceptable system of personnel identification is the use of identification
cards badges or passes. Generally speaking, this system designates when and where and how identification cards
should be displayed, and to whom. this helps security personnel eliminate the risk of allowing the access of
unauthorized personnel within the establishments.
1. Controlled Area – are those areas where access is restricted as to entrance or movement by all authorized
personnel and vehicles. It should additionally marked by a fence or other barrier, and access to it should
limited to as few as possible;
2. Limited Area – are those within the controlled area where a greater degree of security is required.
3. Exclusion Area – are used only for handling and storage of high value cargo and classified documents. The
number of people authorized to enter this area should be strictly limited, and the area should be under
surveillance at all times.
Controlling traffic in and out within a facility is essential to its security program. Perimeter barrier, locked
doors and screened windows prevent or deter the entry of authorized visitors, but since some traffic essential to
every operation, no matter how highly, classified it maybe, provision must be made for the control of this
movement.
Specific solution will depend upon the nature of the business, obviously retail establishment, which
encourage high volume traffic and which regularly handle a great deal of merchandise in and out, have a problem of
a different dimension from the industrial operation working on a highly classified government project. Both,
however, must work from the same general principles towards providing the greatest possible security within the
efficient and effective operation of the job at hand. Traffic controlling includes.
1. Identification of employees and visitor and directing and limiting their movements;
2. Control of all incoming and outgoing packages; and
3. Control of trucks and private vehicles.
Personnel Identification:
The most practical and generally accepted system is the used of badges and identification cards. Generally
speaking, this system designates when and where and how passes should be displayed, and to whom, what is to be
done in case of loss of the pass; procedure for taking a pass from terminating employees; and a system in
cancellation and re-issue of all passes; either as a security review or when a significant number of badge have
reported lost or stolen. To be effective:
1. Badge must be tamper-resistant, which mean that they should be printed or embossed on a distinctive stock
with a series of design difficult to reproduce;
2. They should contain a clear and recent photograph of the bearer, preferably in the color;
3. Should additionally contain vital statistic such as date of birth, height, weight, color of hair and eyes, sex and
thumbprints.
Security should establish proper methods of establishing the authority for admission of visitors as well as the
limitation thereat. This security measure would depend of the sensibility of the installation, but could include the
following;
1. Visitor’s logbook – all visitors to any facility should be required to identify them and should be given a
visitor’s ID by the security. Visitor’s logbook should be filled up with the name of visitors, nature and
duration of visit.
2. Photograph – taking a photograph should also be considered. Extreme caution must be exercised in areas
where classified information is displayed to preclude unauthorized taking of picture, said camera would be
left in the care of security with corresponding receipt.
3. Escort – if possible visitors should be escorted by security to monitor their activity within the establishment
and guide them where to go.
4. Visitor entrances – separate access for visitors and employees of the establishment should be provided.
5. Time traveled – if there is a long delay or time lapse between the departure and arrival, the visitors may be
required to show cause for the delay.
Forbidding packages wither in or out would be workable. Such a rule would be damaging to the employee morale
and, in May cases, would actually work against the efficient operation in the facility. Therefore, since the
transporting of packages through the portals is a fact of life, they must be dealt with in order to prevent theft and
misappropriation of company properties. Thus;
1. No packages shall be authorized to be brought inside the industrial installation, offices and work area
without proper authority. This basic precept help reduce if not eliminate pilferage, industrial espionage or
sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles should also be
checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
3. Any personnel/Visitor entering the installation with a package should deposit the same to the security and in
return receives a numbered tag, which he/she will use in claiming his/her package upon departing.
1. Privately owned vehicle of personnel/visitor should be registered and are subject to the identification and
admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicle should provide the security as to the complete details of their duration of stay,
person to be visited, and other information.
4. All vehicles of visitors should be given a sign/sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the visitors in their destination as
well to provide them with the necessary safety precautions while they are inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent spot searches of vehicles
found there.
At any physical barrier, a security system must posses the ability to distinguish among authorized persons,
unauthorized visitor, and other unauthorized persons. This is to assist the security personnel protects sensitive are
and information within the installation.
Appropriate warning signs should be posted at the building perimeter. Especial restricted entry facilities to
the public access should be provided. This will be dependent on the degree of security needed for the protection of
property, activity and other processes within the building.
The access to the restricted area shall be limited to authorized personnel who have the direct involvement
with the installation, construction and operation and maintenance of the equipment and systems and/or use of the
materials contained within the restricted area. A clear-cut policy on the access control should be disseminated to all
personnel of the installation.
II. PERSONNEL SECURITY
• Most important because security involves people, both as assets to be protected and as
source of security threats.
• It emphasizes the need to set-up a system of hiring the people for the company.
• Once hired, to assist in providing the necessary security to these employees while they are
carrying out their functions.
PERSONNEL SECURITY
Personnel security is considered as the most important aspect of security. The reason is that security
involves people, both an asset to be protected and at the same time a source of threat.
The term Auditable Process refers to specific documentation which can be a manual or an automated
process that provides sufficient evidence that will allow one to trace the events of an action that has taken
place.
Sensitive Data/Information refers to critical information for which the unauthorized access, loss,
misuse, modification, or improper disclosure could negatively impact the ability of the entity or agency to
provide services and benefits to its customers.
Confidential Data/Information refers to information that involves the privacy to which individuals are
entitled by law. This information may only be disclosed to those individuals that are authorized and have a
need to review the data or information.
2. It provides background investigation services of both potential and present employees, for
possible assignment to sensitive position.
3. It handles investigation of employees suspected of wrongdoing.
4. It develops security awareness among employees.
5. It attempts to ensure the protection of employees from discriminatory hiring or
terminating procedures as well as unfounded allegations of illegal or unethical activities
and conduct.
1. Background Investigation (BI) – this technique is very expensive but necessary in personnel security. It serves
to verify information on the application form and to obtain other information pertinent to the decision to
employ.
a. Loyalty
b. Integrity
c. Discretion
d. Morals
e. Character
f. Reputation
Components of complete BI
a. Applicants name
b. Date of birth
c. Present resident address
d. Personal history
e. Marital history
f. Residence history
g. Citizenship
h. Physical data
i. Educational history
j. Organization membership
k. Neighborhood investigation
l. Character reference
m. Employment history
n. Military history
o. Foreign travel history
p. Criminal record
q. Credit records
r. Applicant’s signature
s. Date of application
a. Barangay clearance
b. City of Municipal Clearance
c. Court Clearance
2. Positive Vetting – is the process of inspecting or examining with careful thoroughness. The essence of
vetting is a personal interview conducted under stress. It is based on information previously given by the
applicant. Other information issued during the interview, such as those discovered in the BI, which confirms
or denies which given by the applicant.
3. Prowling – is the process whereby a subject’s reaction in a future critical situation is predicted by observing
his behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test.
The Reid report is an example of honesty test.
4. Deception Detection Techniques – this process of using devices in detecting deception during the interview
stage. This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer
5. Financial and Lifestyle Inquiry – this type of investigation seeks to gather information on income and mode
of living, sometimes referred to as the earning-to-depth ratio.
6. Undercover investigation – this is the placement of an agent in a role in which the agent’s true identified
and role remains unknown, in order to obtain information for criminal prosecution or for recovery or
limitation of asset losses.
7. Exit interview – this is a valuable tool because it gives departing employees an opportunity to list grievances.
It offers security managers an opportunity to learn of problems not previously known.
SECURITY EDUCATION
Security education is conducted to develop security awareness among employees in the company. It should
cover all employees, regardless of rank or position.
The basic goal of security education program is to acquaint all the employees the rationale behind the
security measures and to insure cooperation at all times.
1. Initial interview – it is the first contact of the perspective employee wherein the interviewer determines the
suitability of the applicant for employment through his given answers on the different type of questions
being conducted. It is in this stage where, the interviewer may start providing the necessary information as
to the overview of company security policies and at the same on the employee accountability and
corresponding penalties that could result from violation there from.
2. Orientation and training – it is in this stage where new employees received detailed presentation of
personnel security policy. Usually handouts or employees manual are being distributed for reference. New
employees also requested to sign acknowledgement that they have been aware of the existing company
policies and will abide the same.
3. Refresher conference – it is design to remind employees of the company about their responsibilities, review
the guidelines and policies, introduction of new policies and regulations and a movement of getting
employees feedback about the company policies that is being implemented.
4. Security reminders – this employed as an indirect approach of educating the employees, such as posting
security posters and distributing fliers.
5. Security promotion – it is the act of emphasizing the importance and role of achieving the company goals
and objectives. It involves security employee cooperation and support.
L. Security Survey – a fact finding probe to determine a plant’s adequacy and deficiency in all aspects of security,
with the consequent recommendations.
Security Inspections or follow-up surveys – the term used for succeeding surveys after the initial survey. The
detailed check where physical examination is conducted to determine compliance with establish security
policies and procedures as a result of security survey.
SECURITY EDUCATION- the exposure and teaching of employees on security and its relevance to their work.
Plant security is everyone’s concern, and to be effective employees cooperation and participation are
required.
M. Security Education – the exposure and teaching of employees on security and its relevance to their work. Plant
security is everyone’s concern, and to be effective, employees cooperation and participation are required.
N. Important Terms:
1.Access List – an authenticated list of personnel given to security allowing entry to a compound or installation
or part thereof.
2.Controlled Area – an area near or adjacent to limited or exclusive areas where entry is restricted.
3.Doppler Effect – a physical phenomenon that causes frequency shift if an object moves in an area permeated
by radio frequency signals.
4.Dry Run – practical test or exercise of a plan or any activity to test its validity; an operational readiness
exercises.
5.Duress Code – a type of code system so that security personnel when forced by armed men intending to
enter an installation can give alarm by the use of certain words in casual conservation with other
personnel in the installation.
6.Exclusion Area – a restricted area containing materials or operation of security interest.
7.Peterman – a term used in England for lock pickers safecrackers and penetrators of restricted rooms or
areas.
8.Restricted Area – any area access to which is subject to special restriction control.
9.Victimology – a special study concerned with what makes a individual a victim of crime.
1. Personal – letters, diary and notebooks. These should be treated usually the same with official document.
2. Official – orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of
command.
DOCUMENT / INFORMATION CYCLE
Each document or information has a life cycle in the sense that is usefulness has beginning and an end. It
passes various stages from the time it is created until it is finally disposed. This cycle consist of the following:
1. Creation 5. Retention/Purging
2. Classification 6. Transfer
3. Storage 7. Disposition
4. Retrieval
Categories of Document
1. Category A
• Information which contains reportable time sensitive, order of battle and significant
information. It should be given priority because it is critical information.
• It must be forwarded without delay.
• It is critical to friendly operations. It requires immediate action.
2. Category B
• Anything that contains communications, cryptographic documents, or system that should be classified a
secret and requires special handling.
• Higher authorities should declassify it.
3. Category C
• Other information, which contains something that, could be an intelligence value.
• Contains exploitable information regardless of its contents.
• Unscreened materials/documents should be categorized as Category C.
4. Category D
• No value, yet lower level will never classify documents as Category D.
• No decision must be made at the lower echelon that document has no value. It is the responsibility of
the higher headquarters.
1. TOP SECRET (green color code) – is any information and materials the unauthorized disclosure of it would
cause exceptionally grave damage to the nation, politically, economically and military operation.
2. SECRET (red color) – is any information and material, the unauthorized disclosure of it would endanger
national security cause serious injury to the interest of prestige of the nation or any governmental activity or
advantage to a foreign nation.
3. CONFIDENTIAL (blue color code) – is any information or material, the unauthorized disclosure of it would be
prejudicial to the interest and prestige of the national or governmental activity or would cause
administrative embarrassment or unwanted injury to and be of advantage to and be of advantage to a
foreign country.
4. RESTRICTED (white or no color) – is any information and material which requires special protection other
than those determines confidential, secret and top secret.
Proprietary information is information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership. In the business community, proprietary information
relates to the structure, products or business methods of the organization. It is usually protected in some way
against causal or general disclosure.
All proprietary information is confidential, bur not all confidential information is proprietary. For example,
confidential personnel data in employee files is not considered as proprietary although the company treats it as
confidential.
Types of Document
1. Requirements for obtaining a patent the invention must be more than novel and useful. It must represent a
positive contribution beyond the skill of the average person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive right to
patent protection expires after 17 years.
Realizing that the most serious threat to trade secrets is the employee, a measure of protection is often
realized through the use of employee agreements which restrict the employee’s ability to disclose information
without specific authorization to the company. The following countermeasures may be adopted:
Any act or condition which may result in the compromise of information, loss of life, and loss of destruction
of property or disruption of the activity of the installation.
a. Relative criticality of operation – is the importance of the firm with reference to the natural economy and
security.
b. Relatively vulnerability – is the susceptibility of the plant or establishment to damage loss or disruption of
operation due to various hazards.
Types of Hazards
1. Natural Hazards – these are hazards which arise from natural phenomena. The following are types of natural
hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Storms (typhoons, cyclones, tornado and hurricane)
d. Lighting storms
e. Extreme temperature and humidity
2. Human-man made Hazard – these are hazards which are the results of a state of mind, attitude, weaknesses
or character traits of one or more persons. They can be acts of commissions or omission, both overt and
covert, which can disrupt operation of a plant or installation. The following are types of human or man made
hazards:
Description of a Saboteur
1. He is the most dangerous for whom security will have deal with while planning and implementing security
measures and techniques.
2. He is an ordinary looking as next guy but in his mind, he has training in deceptions, knowledgeable in
incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.
1. He is very dangerous adversary and his skills in deception ad his cunning should never be under estimated.
2. He is usually a person of extensive training and will be highly effective in gaining the confidence of people
and of extracting information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like the saboteur and he can be
defeated in his own game if proper methods and techniques are undertaken.
1. Careful and complete pre-employment measures designed to control threats of industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive positions even already
employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.
1. It can be local or international in nature in their mission is to undermine the authority weaken the
organization, and eventually take over. This can be in business or any activity.
2. This can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist
attitudes, and other emotional approaches.
3. It is an activity not easy to detect.
1. The spreading of rumors, written materials, slogan or any other devices to confuse the work population and
discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and “slow downs” can be called to disrupt
the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing movements for peace,
anticolonials, anti-trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations” should reported this activity
to security.
5. Other methods of subversion like untied fronts, mob action, terrorism and sabotage will do to gain the
subversive ends.
1. Pilferage is one of the annoying and common human hazards which security has to deal with. This activity if
uncontrolled can.
2. Become financial drain if not a menace to smooth and orderly operation.
3. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may labeled as
pilferage.
Pilferage:
This is one of the most annoying and common human hazards which security has to deal with. This activity if
uncontrolled can become a financial drain if not a menace to smooth and orderly operation. Due to this, security
force has to concentrate large number men to check this nefarious and disconnecting activity. Petty pilferage is
frequent, hard to detect, difficult to prove and win conviction but definitely dangerous to ignore.
Types of Pilferer
1. Casual Pilferer – one who steals due to his inability to resist the unexpected opportunity and has little fear of
detection is no plan or premeditation and he is usually a “loner” on the job. The temptation to pick up the
article is basically due to poor security measure. The implication of causal pilfering is the big cumulative cost
if it remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away any or all types of items or
supplies for economic gain. Pilferers of this kind can be employees or outsiders of the establishment.
Anatomy of Pilferage
1. Where need or desire exists and opportunity is present, theft is almost sure to result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when supplies or goods are transported or
transferred from one place to another.
1. Location of items to be pilfered – the systematic pilferer surveys shopping and store areas, or through
contracts from the firms.
2. Access to the items – techniques can be from fake documents, bribing of guards, outsmarting security,
creating disturbance and other methods to divert attention while pilferage goes on.
3. Removal of item – this can be done as wearing the stolen shoes or shorts, concealment in body or vehicles,
use of false documents, etc. driver may conceal pilfered items in his vehicle.
4. Disposal of items – there is a need for “fences” “brokers” or “clearing houses” for these “hot” items.
5. Inventory and control methods should be done especially to pilfer able items.
6. Control of tools equipment and sets.
Activity 1: Read the following Activity and answer it with your own opinion.
Look at the picture below and make a short essay on what it represents. (Essay must be at least 80 words)
“Barriers are thing that prevents passage or approach, obstruction to any facility or place.”
1. Referring to the definition of barriers, list some example(s) of the 3 different types of barriers
below. a. Natural barriers.
b. Perimeter barriers.
c. Animal barriers.
Read the given activity and answer it with your own understanding.
Activity 1: Do you think the different types of barrier and protective lighting used is enough to protect your
property from intruders? Defend your answer in essay form. (Essay must be at least 100 words.)
Activity 1: In your own observation, which type of fence do you think is most reliable? Why? Write your
answer in an essay form with a minimum of 50 words.