Lea 3

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 39

NORTHWESTERN UNIVERSITY,INC

Laoag City, Ilocos Norte

LEA 3 - INTRODUCTION
INDUSTRIAL SECURITY AND
CONCEPTS

INTRODUCTION

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 1 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

Security is safety from harm, a term that has different dimensions in psychology, public safety,
defense and military matters, and information access. In finance, a security is a document representing
an investment. Security, in its semantic and philosophical sense, implies a stable, relatively predictable
environment in which an individual or group may pursue its end without disruption or harm, and without
fear of such disturbance or injury. The concept of security is an organizational sense as a means by which
safety and stability can civilization, shaped by wide variety of institutional and cultural. Security is a
state or quality, condition of being secured, freedom from fear, harm, danger, loss, destruction or
damages, to secure is to make safe or be protected.

This module is intended to provide the student the concept of security, the history of security,
personnel Security, physical Security and document Security. It will also discuss the Security Agency
Management with regards to management and planning; implementation, problem solving, decision;
guard force administration and the general order of code of ethics and conducts.

It will also discuss the technical security management, security investigation and the legal
context of Industrial Security under Republic Act No. 5487 (Private Security Agency Law); and at the
same time on how to help law enforcers in the implementation of the laws on: Women and Children’s
Rights (R.A. 9262), Comprehensive Firearms and Ammunition Regulation Act (RA 10591) and
Comprehensive dangerous Drug Act of 2002 (R.A. 9165).

CONCEPTS OF SECURITY
LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS
Page 2 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

After finishing this module, you should be able


to discuss and familiarize the whole concept of
security, the history of security,
To familiarize on personnel security,
physical security and document
security.

THE CONCEPTS OF SECURITY


Security is safety from harm, a term that has different dimensions in psychology, public safety, defense and
military matters, and information access.
The concept of security is an organizational sense as a means by which safety and stability can civilization,
shaped by wide variety of institutional and cultural. Security is a state or quality, condition of being secured, freedom
from fear, harm, danger, loss, destruction or damages, to secure is to make safe or be protected.

Purpose of Security:
1. To protect the establishment from any form of losses as a result of theft, robbery, pilferage, sabotage, espionage,
accident, fire and subversive activities.

Legal Bases

1. Act 3815 - Otherwise known as the Revised Penal Code of the Philippines.
- The law which defines and penalizes crime against property, persons, public order, national security etc.
2. RA 9372 - Otherwise known as the Human Security Act of 2007.
3. Republic Act 6975 - The law that created the public safety agencies.
4. Republic Act 5487 – is an act that regulates the organization and operation of the private detective, watchmen or
security guard agencies.

Brief Historical Background of Industrial Security in the Philippines

Before R.A. 5487 there is no law, what they need is only a permit from the city or municipal mayor to hire a
security guard. PCSUSIA (Philippine Constabulary Supervisory Unit for Security and Investigation Agencies) was
formed as a result of the approval of R.A. 5487, which directs the Chief PC to issue rules and regulations concerning
the implementation of R.A. 5487. Later was change to PNPSOSIA-PNP Supervisory Office for Security and
Investigation Agencies- (when the Philippine Constabulary was dissolved) and the personnel were merged to the
PNP. The PNPSOSIA is responsible for the issuance of implementing orders regarding the rules and regulations
affecting security agencies operation.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 3 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

At present PNPSAG/SD – PNP Security Agency Guards/ Supervision Division is responsible for national while
PNP FE/SAGS – PNP Firearm and Explosives/ Security Agency Guard Services is responsible for local. It directs the
Chief of PNP to issue rules and regulations concerning the implementing rules of R.A. 5487 within the effectivity date
on Oct. 3, 1972 and Jan. 17, 1975 and as amended by P. D. # 11 and 11A and was again amended in 2003 with Title
2003 Revised Rules and Regulations Implementing R.A. 5487 as amended.

PADPAO
 It stands for the Philippine Association of Detective and Protective Agency Operators. It is a non-stock private
organization, and it was formed in May 1958.

R.A. 5487
• is an act that regulates the organization and operation of the private detective, watchmen or security guard
agencies.
• it is known as Private Security agency Law.

TYPES OF SECURITY

1. INDUSTRIAL SECURTY
A type of security applied to business groups engaged in industries like manufacturing, assembling,
research and development, processing, warehousing and even agriculture

2. HOTEL SEURITY

A type of security applied to hotels where its properties are protected from pilferage, loss, damage, and
the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves.

This type of security employs house detectives, uniform guards and supervisor and insures that hotel
guests and their personal effects are safeguarded.

3. BANK SECURITY
This type of security is concerned with bank operations. Its main objective is the protection of bank cash
and assets, its personnel and clientele
4. VIP SECURITY
A type of security applied for the protection of top-ranking officials of the government or private entity,
visiting persons of illustrious standing and foreign dignitaries.

5. SCHOOL SECURITY
It is a type of security that is concern with the protection of students, faculty members, and school
property.

6. SUPERMARKET OR MALL SECURITY


A type of security which concern with the protection of the stores, warehouses, storage, its immediate

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 4 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

premises and properties as well as the supermarket personnel and customers.

7. PHYSICAL SECURITY
A part of security concerned with the physical measures designed to safeguard personnel and to
prevent
unauthorized access to equipment, facilities, materials and the documents and to protects them from espionage
sabotage, damages or theft. This if the broadest type of security.

8. DOCUMENT SECURITY
Protection of documents, classified papers and vital record from loss, access to unauthorized persons,
damages, theft and compromise through proper storage and procedures.

9. OPERATIONAL SECURITY
This involves the protection of process, formula and patents, industrial and manufacturing activities
from
espionage, infiltration, loss, compromise or photocopying.

10. COMMUNICATION SECURITY


The protection resulting from the application of various measures which prevents or delay the enemy or
unauthorized person in gaining information through communication. This includes transmission, cryptographic and
physical security.

I. PHYSICAL SECURITY

• These are used to define, protect and monitor property rights and objects.
• It helps to combat the crime-related threats that both employees and outsiders pose to the
organization (for example: robbery, burglary, arson, assault, rape, theft and vandalism).

A. BARRIERS
 Any structure or physical device capable of restricting, deterring, delaying illegal access to an
installation.
 It defines the physical limits of an area.
 It creates a physical and psychological deterrent to unauthorized entry.

Purpose of Barriers
• define the physical limits of an area
• create a physical and psychological deterrent to unauthorized entry
• prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders
• assist in more efficient and economical employment of guards

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 5 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

• facilitate and improve the control of vehicular traffic

TYPES OF BARRIERS
1. Natural barrier
• It refers to a physical feature that protects or hinders travel through or
over.
• It includes bodies of waters, mountains, marshes, ravines, deserts or other
terrain that are difficult to traverse.

2. Human barrier
 Persons being used in providing a guarding system or by the nature of their
employment and location, fulfill security functions. Examples are guards,
office personnel, shop workers, etc.

3. Animal barrier
 Animals are used in partially providing a guarding system. Dogs are usually
trained and utilized to serve as guard dogs. German shepherds are best
suited for security functions. Goose and turkeys could also be included.

4. Energy barrier
 It is the employment of mechanical, electrical, electronic energy imposes a
deterrent to entry by the potential intruder or to protective lighting, alarm
system and any electronic.
B. THREE LINES OF PHYSICAL DEFENSE

1. First line of defense


 This includes perimeter fences, bodies of
water or building walls.

2. Second line of defense


 This includes doors, floors, windows,
walls, roofs and grills and other entries
to the buildings.

3. Third line of defense


 This includes storage system like steel
cabinets, safes, vaults and interior
files.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 6 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

C. PERIMETER BARRIERS

• It is the first line of defense of an installation.


• This maybe in the form of fences, walls or even bodies of water.  Used to
deny or impede access or exit of unauthorized person.

1.Inside Perimeter
 A line protection adjacent to protected area and passing through
points of possible entry into the area such as doors, windows,
skylights or other points of access.

2. Outside Perimeter
 A line of protection surrounding but somewhat removed from a
protected area, such as a fence.

D. TYPES OF PERIMETER BARRIERS


1. Fences
2. Walls
3. Bodies of water

A FENCE is a freestanding structure designed to restrict or prevent movement across a


boundary. It is generally distinguished from a wall by the lightness of its construction: a wall is
usually restricted to such barriers made from solid brick or concrete, blocking vision as well as
passage.

TYPE OF FENCES

1. Solid fence
• Prevents familiarity of the place.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 7 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

• Usually made up of concrete materials like wood, cement, bricks.

2. Full view fence


• Fences that allows visual access to the organization.
• It allows familiarity of the place.

Types of full view fence

a. Chain Link Fence


 This is considered as permanent fencing.
 It must be constructed of 7 feet material excluding top guard.
 It must be of 9-gauge or heavier
 The mesh openings are not to be larger than 2 inches per side.
 It should be twisted and barbed selvage at top and bottom.
 It must be securely fastened to rigid metal or reinforced
concrete.
 It must reach within 2 inches of hard ground or paving.
 On soft ground, it must reach below surface deep enough to compensate for
shifting soil or sand.
b. Barbed wire fence
 Semi permanent fencing.
 Usually used as top guard.
 Standard barbed wire is twisted, double-strand, 12-gauge wire with
4 point barbs spaces in an equal distance apart.
 Barbed wire fencing should not be less than 7 feet high excluding
top guard.
 Barbed wire fencing must be firmly affixed to posts not more than 6
feet apart.

The distance between strands must not exceed 6 inches at least one wire will be interlaced vertically
and midway between posts.

c. Concertina wire fence


 Temporary fencing
 Standard concertina barbed wire is commercially manufactured wire coil of high
strength steel barbed wire clipped together at intervals to form a cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 8 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

PERIMETER BARRIER OPENINGS


1. Gates and Doors – When not in use and controlled by
guards, gates and doors in the perimeter should be locked
and frequently inspected by guards. Locks should be
changed from time to time and should be covered under
protective locks and key control.

2. Utilities opening – sewers, air intakes, exhaust tunnels and


other utility openings which penetrate the barrier and
which have cross sectional areas o 96 square inches or
more should be protected by bars, grills, water filled traps
or other structural means providing equivalent protection
to that portion of the perimeter barriers.

3. Sidewalk Elevator – these provide access to areas within


the perimeter barrier and should be locked.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 9 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

4. Clear zones - This is an unobstructed area


maintained on both sides of the perimeter barrier. A20 feet
clear zone is suggested.

ADDITIONAL PROTECTIVE MEASURES

1. Top Guard - An additional overhang of barbed wire placed on


vertical perimeter fences facing upward and outward with a 45-
degree angle with three to four strands of barbed wires spaced 6-
inches apart.

2. Guard control stations - Normally provided at main perimeter and


entrance to secure areas located out of doors, and manned by
guards on a full-time basis.

3. Towers or tower guard - House-like structures above the


perimeter barriers. It gives a psychological effect to violators.

PROTECTIVE LIGHTING
• It provides sufficient illumination to the areas during hours of darkness.
• Lighting can help improve visibility so that intruder can be seen and identified and, if
possible, apprehended.
• It serves as deterrent to would-be thieves.

Types of Protective Lighting


1. Continuous lighting
• It is otherwise called as stationary luminary.
• It consists of a series of fixed luminaries at range to flood a given
area continuously during hours of darkness.
• This is designed to provide two specific results: glare projection or
controlled lighting.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 10 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

a. Glare projection type - The intensity is focused to the intruder while the observer or
guard remains in the comparative darkness.
It is being used in prisons and correctional institutions to illuminate walls and outside
barriers.

b. Controlled lighting - It is gene rally employed where, due to


surrounding property owners, nearby highways or other
limitations, it is necessary for the light to be more precisely
focused.

c. Standby lighting - It is designed for reserve or standby use or


to supplement continuous systems.
It can be most useful to selectively light a particular area
in an occasional basis.

d. Movable or portable lighting - This system is manually


operated and is usually made up of movable search or
floodlights that can be located in selected or special locations
which will require lighting only for short period of time.

e. Emergency lighting - This system is used in times of power


failure or other emergencies when other systems are
inoperative.

GENERAL TYPES OF LIGHTING SOURCES

1. Incandescent lamp - It is the least expensive in terms of energy


consumed and has the advantage of providing instant illumination
when the switch is on.

2. Mercury vapor lamp - It is considered more efficient than the


incandescent and used widespread in exterior lighting.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 11 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

It emits purplish-white color caused by an electric current passing through a tube of


conducting and luminous gas.

3. Metal halide - It has similar physical appearance to mercury vapor but


provides a light source of higher luminous efficiency and better color
rendition.

4. Fluorescent lamp - This provides good color rendition, high lamp efficiency
as well as long life.
It cannot project light over long distance and thus are not desirable
as flood type lights.

5. High pressure sodium vapor lamp - This has gained acceptance for exterior
lighting of parking areas, roadways, buildings and commercial interior
installations.
Requires 2 to 5 minutes to light when cold and longer periods to
relight when hot.

AREAS TO BE LIGHTED
• Perimeter fence
• Building face perimeter
• Pedestrian and vehicle entrance
• Parking area
• Storage, large opened working areas, piers, docks, and other sensitive areas.

TYPES OF LIGHTING EQUIPMENT

1. Floodlights
 These can be used to accommodate most outdoor security
lighting needs, including the illumination of boundaries,
fences and buildings and for the emphasis of vital areas or
particular buildings.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 12 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

2. Street Lights
 This lighting equipment received the most widespread notoriety for its value in reducing
crime.

3. Search Lights
 These are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.

4. Fresnel Lights
 These are wide beam units, primarily used to extend the
illumination in long horizontal strips to protect the
approaches to the perimeter barrier. It projects a narrow
horizontal beam that is approximately 1580 degrees in the
horizontal and from 15 to 30 degrees in the vertical plane.

E. PROTECTIVE ALARMS
• It assists the security in detecting, or deterring potential security threat in the installation.
• Its function is to alert the security personnel for any attempt of intrusion into a protected area, building or
compound.

Operational Zoning
 Building being protected has a segmented alarm system, whereby the alarm can be turned on and off within
particular zones depending on usage. Parts of an Alarm System

1. Sensor or Trigger Device

 It emits the aural or visual signal or both.

2. Transmission Line

 A circuit which transmits the message to the signalingapparatus.


3. Annunciator

 Signaling system that activates thealarm.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 13 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

TYPES OF ALARM SYSTEM

1. Central Station System


• It is located outside the installation.
• It can be located in installation is one of the subscribers.
• When alarm is sounded, central station notifies police and other
agency.

2. Proprietary System
This function in the same way as central system except that it is owned
by, operated and located in the facility. Response to all alarms is by
facility’s own security or fire personnel.
3. Local Alarm System
 In this case, the sensor activates the circuit, which in turn
activates a horn or siren or even flashing light located in the immediate
vicinity of the alarmed area.

4. Auxiliary Alarm System


 In this system installation circuits are led into local police or fire
department by lease telephone lines.

5. Local Alarm By Chance


• This is a local alarm system in which a bell or siren is sounded with no
predictable response.
• Used in residence or small retail establishments.
• The hope is that a neighbor or passing will reach to the alarm and call
for police assistance, but such a call is purely a matter of chance.

6. Dial Alarm System


• This system is set to dial a predestined number when the alarm is
activated.
• The number selected might be the police or the subscriber’s home
number, or both.
• When the phone is answered, a recording states that an intrusion is in progress at the location so alarmed.

KINDS OF ALARM

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 14 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

1. Audio Detection Device


• Supersensitive microphone speaker sensor is installed in walls; ceiling
and floors of the protected area of any sound caused by attempted
forced entry inspected by the sensor.
• It will detect any sound cause by attempted force entry.
• A supersonic microphone speaker is installed in walls, ceiling and floors
of the protected area.

2. Vibration Detection Device


 The vibration sensitive sensor is attached to walls, ceiling or floors of
the protected areas. The sensor detects any vibration caused by
attempted forced entry.

3. Motion Detector
 It is an electrical device that utilizes a sensor to detect nearby
motion.

4. Metallic Foil or Wire


• In building or compound, all point of using electrically charge strips of
tinfoil wire.
• Any actions that will break the circuit and activate an alarm.  Metallic
foil or wire is used in windows or glass surfaces.

5. Laser Beam Alarm


• A laser emitter floods a wall or fencing with a beam so that when this
beam is disturbed by a physical object, an alarm is activated.
6. Photoelectric Eye Device
• A light beam is transmitted at a frequency of several thousand per
second.
• It is connected by a wire to a control station and when an intruder
crosses the beam he makes contact with the photo electronic col which thus
activates the alarm.
• An invisible or visible beam is emitted and when this is disturbed or when an
intruder breaks contact with the beam, it will activate the alarm.

7. Foot Rail Activator


 It is activated by placing the front of their foot to engage the activation bar placed
on the floor in such a position that tellers may activate the alarm.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 15 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

8. Bill Traps
• It is usually placed in the teller’s cash drawer and connected to the alarm system using a wire
connector. When currency is removed from the devices, the alarm is activated.
• The advantage of these devices is that the robbers frequently remove the currency and
activate the alarm.

Knee or Thigh Button
• Installed inside the desk or teller station so they can be activated by knee or thigh pressure. It
is commonly found in location where personnel usually perform their duties from seated
position.

9. Foot Button
 It permits alarm activation safely while both hands remain clear in view of the robber.

10. Double Squeeze Buttons


• Pressure is required on both side of the device and therefore the probability of
accidental alarm is reduced.

FIRE ALARM SYSTEM


• Devices installed to help detect fires or detect anything that causes fire such as smoke or unusual
rising of temperature.
TYPES OF FIRE PROTECTION SYSTEM
1. Automatic Sprinkler System
 An integrated network of hydraulically designed piping installed in a
building, structure or area with outlets arranged in a systematic
pattern which automatically discharges water when activated by
heat or combustion products from a fire.

2. Fire Pumps
• Mechanical device of supplying water which can be manual or
motor-driven.
• These pumps are ideal when natural supplies of water are readily
available like a river, lake or stream.

3. Stand Pipes
 Galvanized iron steel or plastic pipes located inside a building from the
lowest to the top floor with water under pressure for use in case of
fire.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 16 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

4. Fire Hydrant
 Mechanical device strategically located in an installation or street where
fire hose is connected so that water with pressure will be available to
extinguish a fire.

5. Portable Hand Extinguishers


 A firefighting equipment which can be portable or in a cart that is used
to put out fire depending on the contents to extinguish certain types
of fire.

6. Alarm System
• Buildings may also be equipped with detection systems that will transmit an alarm.
• Some detectors are designed to respond to smoke and others to heat.
7. Smoke Alarm
• Sounds an alarm upon the detection of smoke caused by fire.
Types:
• a. Photoelectric – sees the smoke
• b. Ionization – feels the smoke

PROTECTIVE LOCK AND KEY


1. Lock
 A mechanical, electrical, hydraulic or electronic
device to prevent entry into a building, room,
container or hiding place and to prevent the
removal of items without the consent of the
owner.

2. Padlock
 A portable and detachable lock having a sliding hasp
which passes through a staple ring or the like and
is then made fast or secured.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 17 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

3. Key
 Instrument for locking and unlocking. A metal bar with notches or grooves
that, when inserted into a lock and turned it operates the lock’s
mechanism.
4. Peterman
 An English term used to describe a lock picker.

5. Warded Lock
• Offers very little security.
• This type of lock must therefore be used only to have privacy but not to provide a high
degree of security.

6. Disc Tumbler Lock


• Designed for the use of automobile industry and are in general used in car doors today.
• Because this lock is easy and cheap to be manufactured, its use has expanded to other areas
such as desk, files and padlocks. The delay afforded is approximately ten minutes.

7. Lever Tumbler Lock


 These are difficult to define in terms of security since they vary greatly in their
effectiveness. They are used in safe deposit boxes and are for all practical
purposes, pick proof.

8. Combination Lock
• Most of these locks have three dials, which must be aligned in the proper order
before the lock will open.
• These are combination-type locks and that no key is used.
• Pressing the series of numbered button in the proper sequence opens them.
• Some of them are equipped to alarm if wrong sequence is pressed.
• These are high security locking device.

9. Card Operated Lock


 These are electronically or more usually magnetic. Coded card notched,
embossed or containing an embedded pattern of copper locks are used to
operate such locks. These are frequently fitted with recording device, which
registers time of use and the identity of the user

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 18 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

KEYS
1. Change Key
• A key to singe lock within a master key system
2. Sub-Master Key
• A key which will open all the locks within a particular area in a facility.

3. Master Key
• A key which will open all the locks when two or more sub master systems exist.

4. Grand Master Key


• A key that will open everything in a system involving two or more master key

groups. Protective Cabinets

1. Safe
• Small metallic container used to safeguard small items like documents, money and jewelries.

• Categories:
a. Fire safe
b. Burglary and robbery resistive

2. Vault – heavily constructed fire and burglar resistance container usually a part of the building structure used
to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller
than a file room.
• The vault door should be made of steel at least 6 inches in thickness.
• Vault wall, ceiling, floor reinforce concrete at least 12 inches in
thickness.
• Electrical conduits into the vaults should not exceed 1 ½ in diameter.
• Vault floor should be higher by four inches with the surrounding
floors and if in level with floor buttons, storage container should be
raised at least 4 inches above the floor.
• Vault should not be made part of the wall due to moisture and
condensation caused by temperature.
• Standard vaults, to reduce destroying of too much record, should not be more than 5000 cubic
feet.
• The vault must be resistive up to 6 hours.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 19 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

3. File Room – a cubicle in a building constructed a lithe lighter than a vault but of bigger size to accommodate
limited people to work on the records inside.

• The file room should at most be 12 feet high.


• The interior cubage should not more than 10000 cubic feet.
• The ventilation should be through the door.
• It must have a watertight door and at least fire proof for one hour.
• The supporting structure, the walls, floor and roof should be made
fire-proof.

SAFECRACKING METHODS
1. Drilling or Punching
• Accomplished by knocking off combination dial and drilling hole to expose locking device.

2. Burring
• The process of using high temperature oxyacetylene torches or “burning bars” to cut an opening in
the wall or door of the safe.

3. Peeling
• It is the process of attacking the seams of metal plates with pry bars and other tools to peel back
layers of metal and thus exposing either locking mechanism or interior.
4. Ripping
• Similar to peeling except ripping can be accomplished against a solid, metal walled container with a
thin wall.

5. X-Ray
• Utilized to reveal the position of the combination and mechanism necessary to open the safe.

6. Explosives
• Nitro-glycerine and plastic explosives are still used but not as much as in the past.

7. Power Tools
• It involves the use of power drills, hydraulic tools and rotary devices.

8. Manipulation
• Very few safe crackers have skill to use this technique.

PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL

In every installation, the use of protective barriers, security lighting, communication and electronic hardware
provides physical safeguards but these are insufficient to maximize the effort of the guard force. A control point
must be established for positive personnel identification and check system. This is to insure that only those persons
who have the right and authority will be given the necessary access to the area.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 20 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

The most practical and generally acceptable system of personnel identification is the use of identification
cards badges or passes. Generally speaking, this system designates when and where and how identification cards
should be displayed, and to whom. this helps security personnel eliminate the risk of allowing the access of
unauthorized personnel within the establishments.

Types of Personnel Identification


1. Personal recognition
2. Artificial recognition – identification cards, passes, passwords, etc.

Use of the Pass system


1. Single Pass system – the badge or pass coded for authorization to enter specific areas is issued to an
employee who keeps it in his possession until his authorization is terminates.
2. Pass exchange system – an exchange takes place at the entrance of each controlled area. Upon leaving the
personnel surrenders his badge or passes and retrieve back his basic identification.
3. Multiple pass system – this provide an extra measure of security by requiring that an exchange take place at
the entrance of each restricted area.

Badge and Pass Control


1. The system should have a complete record of all badges and identification cards issued, return, mutilated or
lost by serial number and cross-indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check the lists.
3. Passes and badges reported lost should be validated and security at entrance be informed through
conspicuous posting.

Types of controlled area

1. Controlled Area – are those areas where access is restricted as to entrance or movement by all authorized
personnel and vehicles. It should additionally marked by a fence or other barrier, and access to it should
limited to as few as possible;
2. Limited Area – are those within the controlled area where a greater degree of security is required.
3. Exclusion Area – are used only for handling and storage of high value cargo and classified documents. The
number of people authorized to enter this area should be strictly limited, and the area should be under
surveillance at all times.

Traffic Control system:

Controlling traffic in and out within a facility is essential to its security program. Perimeter barrier, locked
doors and screened windows prevent or deter the entry of authorized visitors, but since some traffic essential to
every operation, no matter how highly, classified it maybe, provision must be made for the control of this
movement.
Specific solution will depend upon the nature of the business, obviously retail establishment, which
encourage high volume traffic and which regularly handle a great deal of merchandise in and out, have a problem of
a different dimension from the industrial operation working on a highly classified government project. Both,

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 21 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

however, must work from the same general principles towards providing the greatest possible security within the
efficient and effective operation of the job at hand. Traffic controlling includes.

1. Identification of employees and visitor and directing and limiting their movements;
2. Control of all incoming and outgoing packages; and
3. Control of trucks and private vehicles.

Personnel Identification:

The most practical and generally accepted system is the used of badges and identification cards. Generally
speaking, this system designates when and where and how passes should be displayed, and to whom, what is to be
done in case of loss of the pass; procedure for taking a pass from terminating employees; and a system in
cancellation and re-issue of all passes; either as a security review or when a significant number of badge have
reported lost or stolen. To be effective:
1. Badge must be tamper-resistant, which mean that they should be printed or embossed on a distinctive stock
with a series of design difficult to reproduce;
2. They should contain a clear and recent photograph of the bearer, preferably in the color;
3. Should additionally contain vital statistic such as date of birth, height, weight, color of hair and eyes, sex and
thumbprints.

Visitors Movement Control

Security should establish proper methods of establishing the authority for admission of visitors as well as the
limitation thereat. This security measure would depend of the sensibility of the installation, but could include the
following;
1. Visitor’s logbook – all visitors to any facility should be required to identify them and should be given a
visitor’s ID by the security. Visitor’s logbook should be filled up with the name of visitors, nature and
duration of visit.
2. Photograph – taking a photograph should also be considered. Extreme caution must be exercised in areas
where classified information is displayed to preclude unauthorized taking of picture, said camera would be
left in the care of security with corresponding receipt.
3. Escort – if possible visitors should be escorted by security to monitor their activity within the establishment
and guide them where to go.
4. Visitor entrances – separate access for visitors and employees of the establishment should be provided.
5. Time traveled – if there is a long delay or time lapse between the departure and arrival, the visitors may be
required to show cause for the delay.

Package Movement Control


Every facility must establish a system for the control of package entering or leaving the premises. However,
desirable it might seem it is simply unrealistic to suppose that a blanket rule

Forbidding packages wither in or out would be workable. Such a rule would be damaging to the employee morale
and, in May cases, would actually work against the efficient operation in the facility. Therefore, since the

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 22 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

transporting of packages through the portals is a fact of life, they must be dealt with in order to prevent theft and
misappropriation of company properties. Thus;
1. No packages shall be authorized to be brought inside the industrial installation, offices and work area
without proper authority. This basic precept help reduce if not eliminate pilferage, industrial espionage or
sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles should also be
checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
3. Any personnel/Visitor entering the installation with a package should deposit the same to the security and in
return receives a numbered tag, which he/she will use in claiming his/her package upon departing.

Vehicle Movement Control and Identification


Vehicular traffic within the boundaries of any facility must a carefully controlled for safety as well as to
control the transporting of pilfered goods from the premises. Thus;

1. Privately owned vehicle of personnel/visitor should be registered and are subject to the identification and
admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicle should provide the security as to the complete details of their duration of stay,
person to be visited, and other information.
4. All vehicles of visitors should be given a sign/sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the visitors in their destination as
well to provide them with the necessary safety precautions while they are inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent spot searches of vehicles
found there.

Building Access Control

At any physical barrier, a security system must posses the ability to distinguish among authorized persons,
unauthorized visitor, and other unauthorized persons. This is to assist the security personnel protects sensitive are
and information within the installation.
Appropriate warning signs should be posted at the building perimeter. Especial restricted entry facilities to
the public access should be provided. This will be dependent on the degree of security needed for the protection of
property, activity and other processes within the building.
The access to the restricted area shall be limited to authorized personnel who have the direct involvement
with the installation, construction and operation and maintenance of the equipment and systems and/or use of the
materials contained within the restricted area. A clear-cut policy on the access control should be disseminated to all
personnel of the installation.
II. PERSONNEL SECURITY

• Most important because security involves people, both as assets to be protected and as
source of security threats.
• It emphasizes the need to set-up a system of hiring the people for the company.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 23 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

• Once hired, to assist in providing the necessary security to these employees while they are
carrying out their functions.

PERSONNEL SECURITY
Personnel security is considered as the most important aspect of security. The reason is that security
involves people, both an asset to be protected and at the same time a source of threat.

What is Personnel Security?


Personnel security refers to those practices, technologies and/or services used to ensure that
personnel security safeguards are applied. Personnel security safeguards take into account:
1) Granting or withdrawing physical and system access privileges upon: hiring an employee,
transferring an employee to another entity or agency, terminating an employee, or when an
employee resigns or changes job duties within an entity or agency.
2) System access will be granted, modified and revoked via a formal and auditable process
3) Security training to reinforce existing standards
4) Non-disclosure agreements will be signed by all individuals who need access to
“sensitive/confidential” information, prior to granting access to that information
5) Background checks of personnel may be required depending on the sensitivity/confidentiality of
information accessible to that position.

The term Auditable Process refers to specific documentation which can be a manual or an automated
process that provides sufficient evidence that will allow one to trace the events of an action that has taken
place.
Sensitive Data/Information refers to critical information for which the unauthorized access, loss,
misuse, modification, or improper disclosure could negatively impact the ability of the entity or agency to
provide services and benefits to its customers.

Confidential Data/Information refers to information that involves the privacy to which individuals are
entitled by law. This information may only be disclosed to those individuals that are authorized and have a
need to review the data or information.

Purposes of Personnel Security


1. To insure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees while they are
carrying out their functions.

Key functions of Personnel Security


1. It serves as a screening device in hiring suitable employees.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 24 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

2. It provides background investigation services of both potential and present employees, for
possible assignment to sensitive position.
3. It handles investigation of employees suspected of wrongdoing.
4. It develops security awareness among employees.
5. It attempts to ensure the protection of employees from discriminatory hiring or
terminating procedures as well as unfounded allegations of illegal or unethical activities
and conduct.

PERSONNEL SECURITY INVESTIGATION


Personnel Security Investigation (PSI) is a process of inquiry into the character, reputation, discretion,
integrity, morals and loyalty of an individual to determine the suitability for appointment or access to classified
matter.

General Techniques of PSI

1. Background Investigation (BI) – this technique is very expensive but necessary in personnel security. It serves
to verify information on the application form and to obtain other information pertinent to the decision to
employ.

Factor to consider in the conduct of BI

a. Loyalty
b. Integrity
c. Discretion
d. Morals
e. Character
f. Reputation
Components of complete BI

a. Applicants name
b. Date of birth
c. Present resident address
d. Personal history
e. Marital history
f. Residence history
g. Citizenship
h. Physical data
i. Educational history
j. Organization membership
k. Neighborhood investigation
l. Character reference
m. Employment history

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 25 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

n. Military history
o. Foreign travel history
p. Criminal record
q. Credit records
r. Applicant’s signature
s. Date of application

Types of Local Agency Check (LAC)

a. Barangay clearance
b. City of Municipal Clearance
c. Court Clearance

Types of National Agency Check (NAC)

a. National Bureau of Investigation (NBI) Clearance


b. PNP Directorate Intelligence (DI) Clearance
c. Intelligence Service, AFP (ISAFP) Clearance

2. Positive Vetting – is the process of inspecting or examining with careful thoroughness. The essence of
vetting is a personal interview conducted under stress. It is based on information previously given by the
applicant. Other information issued during the interview, such as those discovered in the BI, which confirms
or denies which given by the applicant.
3. Prowling – is the process whereby a subject’s reaction in a future critical situation is predicted by observing
his behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test.
The Reid report is an example of honesty test.
4. Deception Detection Techniques – this process of using devices in detecting deception during the interview
stage. This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer
5. Financial and Lifestyle Inquiry – this type of investigation seeks to gather information on income and mode
of living, sometimes referred to as the earning-to-depth ratio.
6. Undercover investigation – this is the placement of an agent in a role in which the agent’s true identified
and role remains unknown, in order to obtain information for criminal prosecution or for recovery or
limitation of asset losses.
7. Exit interview – this is a valuable tool because it gives departing employees an opportunity to list grievances.
It offers security managers an opportunity to learn of problems not previously known.

SECURITY EDUCATION
Security education is conducted to develop security awareness among employees in the company. It should
cover all employees, regardless of rank or position.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 26 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

SECURITY EDUCATION PROGRAM

The basic goal of security education program is to acquaint all the employees the rationale behind the
security measures and to insure cooperation at all times.

Objectives of Security Education

1. Guidance for all supervisory and executive levels of the organization.


2. A mandatory indoctrination on security for all new personnel before their assignment to their respective jobs
3. Development of a high degree of security consciousness among the selected supervisors and other key
personnel in a program that should be continuing and supported by top management.
4. A down-the-line security program aimed at instilling consciousness and dedication through demonstration,
lectures, motivations and suggestions.
5. To let all employee forced be informed that they all belong to the organization and that non-awareness to
the security program is tantamount to disloyalty.
6. That the program is also to develop discipline, loyalty and belongingness.

Phases of Security Education Program

1. Initial interview – it is the first contact of the perspective employee wherein the interviewer determines the
suitability of the applicant for employment through his given answers on the different type of questions
being conducted. It is in this stage where, the interviewer may start providing the necessary information as
to the overview of company security policies and at the same on the employee accountability and
corresponding penalties that could result from violation there from.
2. Orientation and training – it is in this stage where new employees received detailed presentation of
personnel security policy. Usually handouts or employees manual are being distributed for reference. New
employees also requested to sign acknowledgement that they have been aware of the existing company
policies and will abide the same.
3. Refresher conference – it is design to remind employees of the company about their responsibilities, review
the guidelines and policies, introduction of new policies and regulations and a movement of getting
employees feedback about the company policies that is being implemented.
4. Security reminders – this employed as an indirect approach of educating the employees, such as posting
security posters and distributing fliers.
5. Security promotion – it is the act of emphasizing the importance and role of achieving the company goals
and objectives. It involves security employee cooperation and support.
L. Security Survey – a fact finding probe to determine a plant’s adequacy and deficiency in all aspects of security,
with the consequent recommendations.
Security Inspections or follow-up surveys – the term used for succeeding surveys after the initial survey. The
detailed check where physical examination is conducted to determine compliance with establish security
policies and procedures as a result of security survey.

SECURITY EDUCATION- the exposure and teaching of employees on security and its relevance to their work.
Plant security is everyone’s concern, and to be effective employees cooperation and participation are
required.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 27 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

M. Security Education – the exposure and teaching of employees on security and its relevance to their work. Plant
security is everyone’s concern, and to be effective, employees cooperation and participation are required.

N. Important Terms:
1.Access List – an authenticated list of personnel given to security allowing entry to a compound or installation
or part thereof.
2.Controlled Area – an area near or adjacent to limited or exclusive areas where entry is restricted.
3.Doppler Effect – a physical phenomenon that causes frequency shift if an object moves in an area permeated
by radio frequency signals.
4.Dry Run – practical test or exercise of a plan or any activity to test its validity; an operational readiness
exercises.
5.Duress Code – a type of code system so that security personnel when forced by armed men intending to
enter an installation can give alarm by the use of certain words in casual conservation with other
personnel in the installation.
6.Exclusion Area – a restricted area containing materials or operation of security interest.
7.Peterman – a term used in England for lock pickers safecrackers and penetrators of restricted rooms or
areas.
8.Restricted Area – any area access to which is subject to special restriction control.
9.Victimology – a special study concerned with what makes a individual a victim of crime.

III. DOCUMENT AND INFORMATION SECURITY


In every installation, document and information are indispensable for their daily operations and activities, be
it in the form of a paper, film, and magnetic media or in the computer system. Once there is a leakage in the
contents of a company’s document and information, the business operational stability is at stake. It may be a start of
bankruptcy that would lead to its total disclosure. The leakage of document and information cost government,
business and industry alike, billion of pesos. A rival company or an enemy agent might use an illegally obtain
document and information security program is very essential to the installation in order to focus freely on the
attainment of its goals and objectives.
Protection of document and information entails a mammoth task on the part of the executives and the staff
of installation. There should be a clear understanding on all the types of documents and information of organization.
Security measures in the classification, handling, care and proper disposition of classified documents and
information must be a primary concern in order to preserve the confidentiality and integrity of document and
information through out all phases of its existence.

Purpose of Protecting Classified Materials

1. Deter and impede potential spy


2. Assist in security investigation by keeping accurate records of the moments of classified materials.
3. Enforce the use of “Need to Know” principle.
Two (2) Kinds of Document

1. Personal – letters, diary and notebooks. These should be treated usually the same with official document.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 28 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

2. Official – orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of
command.
DOCUMENT / INFORMATION CYCLE
Each document or information has a life cycle in the sense that is usefulness has beginning and an end. It
passes various stages from the time it is created until it is finally disposed. This cycle consist of the following:
1. Creation 5. Retention/Purging
2. Classification 6. Transfer
3. Storage 7. Disposition
4. Retrieval
Categories of Document

1. Category A
• Information which contains reportable time sensitive, order of battle and significant
information.  It should be given priority because it is critical information.
• It must be forwarded without delay.
• It is critical to friendly operations.  It requires immediate action.

2. Category B
• Anything that contains communications, cryptographic documents, or system that should be classified a
secret and requires special handling.
• Higher authorities should declassify it.

3. Category C
• Other information, which contains something that, could be an intelligence value.
• Contains exploitable information regardless of its contents.
• Unscreened materials/documents should be categorized as Category C.

4. Category D
• No value, yet lower level will never classify documents as Category D.
• No decision must be made at the lower echelon that document has no value. It is the responsibility of
the higher headquarters.

Three (3) Security Concepts

1. Personnel are the weakest link in the security chain.


2. Training is important to make security personnel conscious and realize the value of document.
3. Training is necessary for the practice of “Need to Know” principle.

Four (4) Types of Classified Matter

1. TOP SECRET (green color code) – is any information and materials the unauthorized disclosure of it would
cause exceptionally grave damage to the nation, politically, economically and military operation.
2. SECRET (red color) – is any information and material, the unauthorized disclosure of it would endanger
national security cause serious injury to the interest of prestige of the nation or any governmental activity or
advantage to a foreign nation.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 29 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

3. CONFIDENTIAL (blue color code) – is any information or material, the unauthorized disclosure of it would be
prejudicial to the interest and prestige of the national or governmental activity or would cause
administrative embarrassment or unwanted injury to and be of advantage to and be of advantage to a
foreign country.
4. RESTRICTED (white or no color) – is any information and material which requires special protection other
than those determines confidential, secret and top secret.

Rules of Classification of Documents

1. Documents shall be classified according to their content.


2. The overall classification of a file or of a group of physically connected therein. Pages, paragraphs, sections or
components thereof may bear different classifications. Documents separated from file or group shall be
handled in accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain classified information or which contain
information classified lower than that of the preceding element or enclosure shall include a notation for
automatic downgrading.
4. Correspondence, indexes, receipts, reports or possession transfer or destruction, catalogs or accession list
shall not be classify if any reference to classified matter does not disclosed classified information.
5. Classified matter obtained from other department shall retain the same original classification.

PROTECTION OF SENSITIVE INFORMATION

Proprietary information is information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership. In the business community, proprietary information
relates to the structure, products or business methods of the organization. It is usually protected in some way
against causal or general disclosure.
All proprietary information is confidential, bur not all confidential information is proprietary. For example,
confidential personnel data in employee files is not considered as proprietary although the company treats it as
confidential.

Types of Document

Class I – Vital Documents:


In this category these are records that are irreplaceable, records of which reproduction does not have the
same value as the original; record needed to recover cash, to replace building, equipment, raw materials, finished
products, and work in process and records needed to avoid delay in restoration of production, sales and services.

Class II – Important Documents:


This includes records the reproduction of which will close considerable expense and labor, or considerable
delay.

Class III – Useful Documents:


This includes records whose loss might cause inconvenience but could be readily replaced and which would
not in the meantime present an insurmountable obstacle to the prompt restoration of the business.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 30 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

Class IV – Non-essential Documents:


This records are daily files, routine in nature even if lost or destroyed, will not affect operation or
administration. This class represents the bulk of records which should not be even attempted to be protected in the
event of disasters. They should, however, be kept in ordinary files ready for reference, if needed, and usually
discarded after some period of time.

Basic Consideration in Document and Information Security


1. Security of information is based on the premise that the government has the right and the duty to protect
official papers from unwarranted and indiscriminate disclosure;
2. The authority and responsibility for the preparation and classification of classified matters rest exclusively
with the originating office;
3. Classified matter shall be classified according to their contents and not to the classification of files in which
they are held or another document to which they are referred;
4. classification shall made as soon as possible by placing appropriate marks on the matter to be classified; and
5. Each individual whose duties allow access to classified matter or each individual who posses knowledge of
classifies matter while it is in his position shall insure that dissemination of such classified matter is on the
“need to know” basis and property cleared persons only.

Types of Proprietary Information


1. Trade Secrets – this consist of any formula, patter, device or compilation of information which is used one’s
business and which gives him an opportunity to gain an advantage over competitors who do not know or use
it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving
materials, a pattern for machine or device, or a list of costumers. It differs from other secret information as
to single or ephemeral events. A trade secret is a process or device for continuous use in the protection of
the business.
2. Patents – this is a grant made by the government to an inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for term of years.

Primary Distinctions between Patents and Trade Secrets

1. Requirements for obtaining a patent the invention must be more than novel and useful. It must represent a
positive contribution beyond the skill of the average person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive right to
patent protection expires after 17 years.

Proprietary Information Protection Program

Realizing that the most serious threat to trade secrets is the employee, a measure of protection is often
realized through the use of employee agreements which restrict the employee’s ability to disclose information
without specific authorization to the company. The following countermeasures may be adopted:

1. Policy and procedure statements regarding all sensitive information.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 31 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

2. Pre and post-employment screening and review.


3. Non-disclosure agreements from employees, vendors, contractors and visitors.
4. Non-competitive agreements with selected employees.
5. Awareness programs.
6. Physical security measures.
7. Informed monitoring of routine activities.
SECURITY HAZARD

Any act or condition which may result in the compromise of information, loss of life, and loss of destruction
of property or disruption of the activity of the installation.

The extent and degree of risk to security will dependent:

a. Relative criticality of operation – is the importance of the firm with reference to the natural economy and
security.
b. Relatively vulnerability – is the susceptibility of the plant or establishment to damage loss or disruption of
operation due to various hazards.

Types of Hazards

1. Natural Hazards – these are hazards which arise from natural phenomena. The following are types of natural
hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Storms (typhoons, cyclones, tornado and hurricane)
d. Lighting storms
e. Extreme temperature and humidity

2. Human-man made Hazard – these are hazards which are the results of a state of mind, attitude, weaknesses
or character traits of one or more persons. They can be acts of commissions or omission, both overt and
covert, which can disrupt operation of a plant or installation. The following are types of human or man made
hazards:

a. Carelessness – accidents and dissatisfaction


b. Disloyalty – subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism, etc.

SABOTAGE AS A SECURITY HAZARD

Description of a Saboteur

1. He is the most dangerous for whom security will have deal with while planning and implementing security
measures and techniques.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 32 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

2. He is an ordinary looking as next guy but in his mind, he has training in deceptions, knowledgeable in
incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.

Possible Target of Saboteur

1. Armed Forces installation


2. Natural resources – mines, forest, farms, and farm products
3. Industries – buildings, power sources, machinery, fuel, etc.
4. Warehouses depots, communications, public utilities, etc.
Countermeasure against Sabotage

1. Use of an efficient, alert and trained guard force.


2. Use of physical security aids like barriers, personnel and vehicular control, intrusion devices, communications
system, and electric aids.
3. Proper screening of personnel
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination
10. Good housekeeping methods.
11. Effective and compatible emergency planning
12. Regular audit
13. Continuing background checks.

ESPIONAGE AS A SECURITY HAZARD

Description of an Espionage Agent

1. He is very dangerous adversary and his skills in deception ad his cunning should never be under estimated.
2. He is usually a person of extensive training and will be highly effective in gaining the confidence of people
and of extracting information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like the saboteur and he can be
defeated in his own game if proper methods and techniques are undertaken.

Some methods Employed by Espionage Agent

1. Stealing of information from employees.


2. Stealing information from records or others sources.
3. Using various methods of reproducing documents products, equipment or working models.
4. Using “Front” as commercial concerns, travel agencies, associations, business groups and other organizations
to obtain confidential information or data.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 33 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

5. Using various form or threats to obtain information.


6. Using blackmail techniques by exposing intimate and personal details concerning an individual or
organization.
7. Picking or securing information in social and other gatherings.
8. Penetration and operational tactics.

Countermeasure against Industrial Espionage

1. Careful and complete pre-employment measures designed to control threats of industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive positions even already
employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.

SUBVERSIVE ACTIVITY AS A SECURITY HAZARD

Threats of Subversive Activity

1. It can be local or international in nature in their mission is to undermine the authority weaken the
organization, and eventually take over. This can be in business or any activity.
2. This can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist
attitudes, and other emotional approaches.
3. It is an activity not easy to detect.

Countermeasure to Subversive Activity

1. The spreading of rumors, written materials, slogan or any other devices to confuse the work population and
discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and “slow downs” can be called to disrupt
the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing movements for peace,
anticolonials, anti-trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations” should reported this activity
to security.
5. Other methods of subversion like untied fronts, mob action, terrorism and sabotage will do to gain the
subversive ends.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 34 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

Pilferage as a Business Hazard

1. Pilferage is one of the annoying and common human hazards which security has to deal with. This activity if
uncontrolled can.
2. Become financial drain if not a menace to smooth and orderly operation.
3. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may labeled as
pilferage.

Pilferage:
This is one of the most annoying and common human hazards which security has to deal with. This activity if
uncontrolled can become a financial drain if not a menace to smooth and orderly operation. Due to this, security
force has to concentrate large number men to check this nefarious and disconnecting activity. Petty pilferage is
frequent, hard to detect, difficult to prove and win conviction but definitely dangerous to ignore.

Types of Pilferer

1. Casual Pilferer – one who steals due to his inability to resist the unexpected opportunity and has little fear of
detection is no plan or premeditation and he is usually a “loner” on the job. The temptation to pick up the
article is basically due to poor security measure. The implication of causal pilfering is the big cumulative cost
if it remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away any or all types of items or
supplies for economic gain. Pilferers of this kind can be employees or outsiders of the establishment.

Anatomy of Pilferage

1. Where need or desire exists and opportunity is present, theft is almost sure to result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when supplies or goods are transported or
transferred from one place to another.

Factors considered by a Pilferer to be Successful on his Act

1. Location of items to be pilfered – the systematic pilferer surveys shopping and store areas, or through
contracts from the firms.
2. Access to the items – techniques can be from fake documents, bribing of guards, outsmarting security,
creating disturbance and other methods to divert attention while pilferage goes on.
3. Removal of item – this can be done as wearing the stolen shoes or shorts, concealment in body or vehicles,
use of false documents, etc. driver may conceal pilfered items in his vehicle.
4. Disposal of items – there is a need for “fences” “brokers” or “clearing houses” for these “hot” items.

Countermeasures for Casual Pilferage

1. “Spot” check on outgoing vehicles and persons.


2. An aggressive security education and indoctrination program with emphasis that “crime does not pay”.
3. Superiors should set example of integrity and desirable moral climate for employees in the establishment.
4. All employees must be enjoined to report or nay loss to security.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 35 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

5. Inventory and control methods should be done especially to pilfer able items.
6. Control of tools equipment and sets.

Countermeasures for Systematic Pilferage

1. Guards and electronic surveillance on all exits.


2. Package and material control system.
3. Parking area outside perimeter fence of establishment.
4. Careful screening and background checks on applicants to weed out potential thieves.
5. Investigation of all losses quickly and efficiently to determine “modus operandi” or obtain clues.
6. Alert all patrols to check areas and buildings for possible concealment of stolen properties.
7. Install mechanical, electrical, electronic detection and alarm devices where needed and applicable.
8. Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking areas for vehicles and persons.
10. Store bulk quantities of pilfer able items in enclosed security areas and distribute them to using section in
limited quantities.
11. Establish accurate inventory and accounting methods for procurement, use and disposal.
12. Establish close liaison with governmental law enforcement and intelligence agencies.

Activity 1: Read the following Activity and answer it with your own opinion.
Look at the picture below and make a short essay on what it represents. (Essay must be at least 80 words)

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 36 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

“Barriers are thing that prevents passage or approach, obstruction to any facility or place.”
1. Referring to the definition of barriers, list some example(s) of the 3 different types of barriers
below. a. Natural barriers.
b. Perimeter barriers.
c. Animal barriers.

Activity 1: Enumerate at least 5 importance of having the following:

a. Fire Alarm System


b. Alarm System
c. Vault
d. File Room
e. Protective Lighting
f. Protective Lock and Key

Read the given activity and answer it with your own understanding.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 37 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

Activity 1: Do you think the different types of barrier and protective lighting used is enough to protect your
property from intruders? Defend your answer in essay form. (Essay must be at least 100 words.)

Activity 1: In your own observation, which type of fence do you think is most reliable? Why? Write your
answer in an essay form with a minimum of 50 words.

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 38 of 39
NORTHWESTERN UNIVERSITY,INC
Laoag City, Ilocos Norte

LEA 3 – INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


Page 39 of 39

You might also like