Security Hand-Outs
Security Hand-Outs
LESSON 1
AREAS OF SECURITY
SECURITY
ETYMOLOGY: from Latin word Securitas – condition of being secured.
MEANING: Is a state or condition of being secured; freedom from fear, harm, danger, loss, destruction or damages.
Are those methods that promote a safe and protected environment so people can pursue their daily activities.
Is a state or condition of being secured; freedom from fear, harm, danger, loss, destruction or damages.
Types of Security
1. Industrial A type of security applied to business groups engaged in industries like manufacturing,
Security assembling, research and development, processing, warehousing and even agriculture.
2. Operational Deals with primarily with the protection of process, formulas, patents, and other operational
Security activities of an installation.
3. Communication The application of various measures which prevent or delay the enemy or unauthorized persons in
Security gaining information through the communication system. It includes transmission security and
crypto security.
4. Document It encompasses the protection of documents and other classified papers from loss, unauthorized
Security access and avoidance of disclosures.
5. Hotel Security a type of security applied to hotels where its properties are protected from pilferage, loss, damage
and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest
themselves. This type of security employs house detectives, uniforms guard and supervisor and
insures that hotel guests and their personal effects safeguarded.
6. Bank Security This type of security is concern with bank operations. Its main objective is the protection of bank
cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and
assets while in storage, in transit and during transactions.
7. Personal or VIP A type of security applied for the protection of top-ranking officials of the government or private
Security entity, visiting persons of illustrious standing and foreign dignitaries.
8. Crisis Security Specialized field which allied if not part of VIP security which involved in the kidnapping of VIP’s
such as political leaders and the like. Motives can be economic, political, emotional, nationalistic,
religious and their combinations.
9. School Security A type of security that is concern with the protection of students, faculty members, and school
properties. Security personnel are trained to protect the school property from theft, vandals,
handling campus riots and detecting the use of intoxicated drugs and alcohol by the students.
10. Supermarket or A type of security which is concern with the protection of the stores, warehouses, storage, its
Mall Security immediate premises and properties as well as the supermarket personnel and customers. Security
personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
2
LESSON 2
PHYSICAL SECURITY
Physical security are measures being used to define, protect, and monitor property rights and assets. These measures consist
of barriers that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to
safeguard them against espionage, sabotage, damage and theft.
Principles involved Physical Security
1. The type of access necessary depends upon the number of variable factors and therefore maybe achieved in number of ways.
2. There is no impenetrable barrier
3. Defense-in-depth is barrier after barrier.
4. Delay is provided against surreptitious and non-surreptitious entry.
5. Each installation is different.
Three Lines of Physical Defense
1. First line of defense perimeter barriers like fences
2. Second line of defense doors, floors, windows, walls, roofs and grills and other entries to the buildings
3. Third line of defense storage system like steel cabinets, safes, vaults and interior files
BARRIERS
Refers to any physical structure whether natural or man–made capable or restricting, deterring, delaying or preventing illegal
and unauthorized access to an installation.
Purpose of Barrier:
1. Outline the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards.
5. Facilitate and improve the control and vehicular traffic.
Two general types of Barriers:
1. Natural Barriers Such as rivers, cliffs, and ravines, etc. which delay or make more difficult the entry of
the intruder.
2. Man-made Barriers Structural construction like fences walls, floors, roofs, grills, bars, road blocks, or
other physical means to deter or impede penetration.
Types of Barriers
1. Natural It includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult
Barriers to traverse.
2. Structural These are features constructed by man regardless of their original intent that tends to delay the
barriers intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
3. Human Persons being used in providing a guarding system or by the nature of their employment and
barriers location, fulfill security functions. Examples are guards, office personnel, shop workers, etc.
4. Animal Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to
barriers serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys
could also be included.
5. Energy It is the employment of mechanical, electrical, electronic energy imposes a deterrent to entry by
barriers the potential intruder or to provide warning to guard personnel. These are protective lighting,
alarm system and any electronic devices used as barriers.
PERIMETER BARRIER
o A medium or structure which defines the physical limits of an installation or area to restrict or impede access thereto.
o It is any physical barrier used to supplement the protection of an inside or outside perimeter.
o The main purpose of perimeter barrier is to deny or impede access or exit of unauthorized person.
o It is the first line of defense of an Installation.
o The function and location of the facility itself usually determine the perimeter of the installation.
Types of Perimeter Barrier
1. Fences
2. Walls
3. Bodies of Water
Fences
3
Barriers that serves to enclose an area
Types of Fences
1. Solid fence Advantage of Solid fence
o Denies visual access of the installation to the intruders
o Denies the intruder the opportunity to become familiar with the personnel, activities, and
time scheduled of the movement of the guards on the installation.
Disadvantage of solid fence
o It prevents the installation guards from observing the area around the installation.
o A solid fence creates shadows which may be used by the intruder for cover and
concealment.
2. Full-View Advantage of Full-view fence:
Fence/ Open o Roving patrols and stationary guards are able to keep the area surrounding the installation
Fence under observation.
o It does not create shadows which would provide cover and concealment for the intruder.
Disadvantage of full-view fence:
o It’s allowing visual access to the installation, its personnel, its guards; and its activities.
o It allows the intruder to become familiar with the movements and the time schedule of the
guards patrol; there after allowing him to pick the time for attempting penetration which
would be most advantageous to him.
Building Walls
Walls, Floors, roof or their combination serve also as barriers and they should be of such construction to provide uniform protection
just like the wire fencing. Masonry walls as perimeter barrier should have the same heights as the chain link and surmounted by the
barbed wire top guards; if the height of the masonry is less than the prescribed, additional chain link as “topping”. Wall can be made
of stone slabs like adobe or hollow bound by concrete with post at regular intervals to prevent the wall from toppling due to wind, or
scouring facilities, security must sit down with design engineers so that area where sensitive activity will be done should be given
special emphasis in protective walls.
Bodies of Water
4
Bodies of water like river, lake, marsh, cataract, sea pond or any other bodies of water forming a part of the wall, building or fencing
should never be considered adequate natural perimeter barrier. Additional security measures like wire fence, concrete walling, security
patrolling and floodlighting at night may be necessary for the portions of the perimeter.
ALARMS
o Aural or visual signal given by the annunciator to security when intruder actuates device in a protected area.
o Designed to alert security personnel to consummated or attempted intrusions into an area, building or compound.
o It assists the security in detecting, impeding or deterring potential security threat in the installation.
o Intrusion alarms can be electrical, mechanical or electronics.
Three Basic Parts of Alarm System
1. Sensor or trigger device – sensitive part of an alarm system that detects motion, sound, vibrations, or any other changes in
the condition of the environment.
2. Transmission line – a circuit which transmit the message to the signaling apparatus.
3. Annunciator – activates the alarm; it is visual or audible signaling device.
Types of Protective Alarm System
1. Central Station System – a type of alarm where the control station is located outside the plant or installation. When the
alarm is sounded or actuated by subscriber, the central station notifies the police and other public safety agencies.
2. Proprietary system – centralized monitor of the proprietary alarm system is located in the industrial firm itself with a duty
operator. In case of alarm, the duty operator calls whatever is the primary need; firefighters, police, an ambulance or a
bomb disposal unit.
3. Local Alarm – this system consist of ringing up a visual or audible alarm near the object to be protected.
4. Auxiliary alarm – company-owned alarm systems with a unit in the nearest police station so that in case of need, direct call
is possible. The company maintains the equipment and lines both for the company and those in the police, fire and other
emergency agencies by special arrangement. The auxiliary system can be availed of by radio, landlines, or cell phones.
Kinds of Alarms
1. Audio Detection Device – it will detect any sound caused by attempted force entry. A supersonic microphone speaker
sensor is installed in walls, ceilings and floors of the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted force entry. A vibration sensitive sensor is
attached to walls, ceilings or floors of the protected area.
3. Metallic foil or wire – it will detect any action that moves that foil or wire. An electrically charge strips of tinfoil or wire is
used in the doors, windows or glass surfaces of the protected area.
4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a physical
object, an alarm is activated.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and when this is disturbed or when an intruder
break contact with the beam, it will activate the alarm.
6. Microwave Motion Detection Device – A pattern of radio waves is transmitted and partially reflected back to an antenna. If
they strike a moving object, they return at a different frequency which results in initiating an alarm signal. This has a good
coverage, and not affected by air currents noise sound.
7. Types of Protective Alarm System
Utilization of Alarm Devices
1. Nature of the area or installation
2. Critically of the area or complex
3. Vulnerability of the area or complex
4. Accessibility
5. Location of installation and areas to be protected
6. Constructions and types of buildings
7. Hours of normal operations
8. Availability of other types of protection
9. Initial and recurring cost of installed alarm system
10. Design and salvage value of desired equipment
11. Response time of the security force and local police
12. Savings in manpower and money for a period of time if alarm is used
Desirable Characteristics of Intrusion Alarm System
1. A detection unit should initiate the alarm upon intrusion of a human being in the area or vicinity upon intrusion of a human
being in the area or vicinity to the protected area or object.
2. Panel board central annunciator operating console – monitoring activities should be manned at all times.
3. An annunciator console indicating the audible and/or aural signal and the specific location of incident so that proper action
can be made by security and other units.
4. Fail-safe features which give alarm in the annunciator when something is wrong with the system.
5. System should be difficult to tamper or render ineffective by outsiders, competitors or saboteurs.
Summing up Protective Alarm Devices
1. Alarm devices are physical safeguards used to assist security but not a replacement in the protection of assets and lives in
the installation.
2. It assist the guards to extend their hearing and vision even in areas where they are not physically present.
3. The alarm system whether a local, a central, proprietary, or an auxiliary type are to inform the guard either visually or
aurally of an attempt or a break-in within the premises being protected.
4. Maintenance of alarm system must be regularly made, the signal line must be protected, and there must be alternate source
of power.
5. New and improve intrusion hardwires are being developed and placed in the market but again, the human guard is
irreplaceable in spite of computerization and the arrival of super sophisticated devices in security alarm systems.
7
LOCKS AND KEY CONTROL
Lock
A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container
or hiding place.
Peterman
A term in England for lock picker, safecracker, and penetrator of restricted areas or room.
Statutory Prohibition of Key:
ART. 304. Possession of Picklocks or similar tools
Any person who shall without lawful cause have in possession of picklocks or similar tools especially to the commission of the
crime or robbery , shall be punished by arresto mayor in its maximum period to prison correctional in its minimum period
The same penalty shall be imposed upon any person who shall make such tool. If the offender is a locksmith, shall suffer the
penalty of prison correctional in its medium and maximum period.
ART. 305. False Key: The term “False Key” shall be deemed to include:
1. The tool mentioned in the next proceeding articles.
2. Genuine keys stolen from the owner.
3. Any key other than those intended by the owner
Types of Locks
1. Key operated It uses some sort of arrangement of internal physical barriers (wards tumblers) which prevent the
mechanical lock lock from operating unless they are properly aligned.
The key is the device used to align these internal barriers so that the lock may be operated.
1. Disc tumbler lock – Designed for the use of the automobile industry and are in general use
in car doors today, because this lock is easy and cheap to be manufactured, its use has
expanded to other areas such as desk, files and padlocks. The delay afforded is
approximately ten minutes.
2. Pin tumbler lock - is a lock mechanism that uses pins of varying lengths to prevent the lock
from opening without the correct key.
3. Lever tumbler lock – uses a set of levers to prevent the bolt from moving in the lock. In the
simplest of these, lifting the tumbler above a certain height will allow the bolt to slide past.
These locks are used in safe deposit boxes and are for all practical purposes, pick proof. The
least of these locks are used in desk, lockers and cabinets and are generally less secure than
pin tumbler lock.
4. The warded lock – offer very little security, this type of lock must therefore be use only to
have privacy, but not to provide a degree of security.
2. Padlock A portable and detachable lock having a sliding hasp which passes through a staple ring and is
then made fasten or secured.
3. Combination lock Instead of using the key to align the tumblers, the combination mechanism uses numbers, letters
or other symbols as reference point which enables an operator to align them manually.
4. Code-operated A type of lock that can be opened by pressing a series of numbered button in the proper
lock sequence.
5. Electrical lock A type of lock that can be opened and closed remotely by electrical means.
6. Card-operated A type of lock operated by coded card.
lock
Type of Keys
1.
Change key – a specific key, which operates the lock and has a particular combination of cuts, or biting, which match the
arrangement of the tumblers in the lock.
2.
Sub-master Key – a key that will open all the lock within a particular area or grouping in a given facility.
3.
Master Key – a special key capable of opening a series of lock.
4.
Grand Master key – a key that will open everything in a system involving two or more master key groups.
Key Control
Once an effective key control has been installed, positive control of all keys must be gained and maintained. This can be
accomplished only if it is established in conjunction with the installation of new locking devices. The following methods can be used
to maintain effective key control;
1. Key Cabinet – a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient size to hold the
original key to every lock in the system. It should be secured at all times.
2. Key record – some administrative means must be set up to record code numbers and indicates to whom keys to specific
locks have been issued.
3. Inventories – periodic inventories will have to be made of all duplicate and original keys in the hands of eh employees
whom they have been issued.
4. Audits – in addition to periodic inventory, an unannounced audit should be made of all key control records and procedures
by a member of management.
5. Daily report – a daily report should be made to the person responsible for key control from the personnel department
indicating all persons who have left or will be leaving the company. In the event that a key has been issued, steps should be
initiated to insure that the key is recovered.
Principle of Key Control
1. A key depositor for securing keys during non-working should be centrally located, locked and kept under supervision of
security personnel.
2. Key issued on daily basis, or this issued for a specific on time purpose, should be accounted for daily.
3. Key should be counted and signed for by security supervisor at the beginning of each working day.
4. When the key is lost, the circumstances should be investigated and set forth in writing. In some instance, if the lost key
provides access to sensitive area, lock should be change.
8
5. All keys should be physically inspected periodically to ensure that they have not been lost though unreported as such.
6. Careful record should be kept of such instance. The list should be reviewed periodically to determine whether all those
authorized should continue to hold such key.
7. Master key should be in minimum. If possible, sub-master key should be used, and they should be issued only to limited list
of personnel especially selected by management.
8. Key should not be marked or should not identify doors of locks they open. Code should be made to this effect.
9. Master key should not be mark identifying them as a master key.
10. Key and locks should be change at least once in 12 months.
SECURITY CABINET
High security storage where papers, records, plans or cashable instrument, precious metals or other especially valuable assets are
protected.
Types of Security Cabinet
1. Safe A metallic container used for the safekeeping of documents or small items in an office or installation.
Safe can be classified as either robbery or burglary resistance depending upon the use and need.
1. At least 750 lbs.
2. Anchored if less than 750 lbs.
3. Its body should at least 1 inch thick steel or equal
4. Door is made of steel and at least 1 ½ thick.
2. Vault Heavily constructed fire and burglar resistance container usually a part of the building structure used to
keep and protect cash, documents and negotiable instruments.
Vaults are bigger than safe but smaller than a file room.
1.
6 inches, steel – door
2.
12 inches, reinforced concrete – walls, ceiling, floor
3.
1 ½ inches – diameter of electrical conduits
4.
4 inches – the elevation of its floor compared to the floor outside.
5.
5,000 cubic feet – its minimum dimension
6.
6 hours – fire resistance
7.
Vault should not be made part of the wall due to moisture and condensation caused by
temperature.
3. File room A cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate
limited people to work on the records inside.
1. 12 feet – height
2. 10,000 cubic feet – dimension
3. Ventilation is through the door.
4. Door must be watertight.
5. Door must also be fire proof for 1 hour.
6. The supporting structures such as the wall, floor and roofs should be fire proof as well
ACCESS CONTROL
Types of Personnel Identification
Personal Recognition Guards provide access to key personnel.
Unique Biometrics fingerprints, iris, face, voice etc.
Unique Possessions identification cards, passes, badges
Unique knowledge password, code
Types of Restricted Areas
1. Controlled Areas – portion of a restricted area usually near or surrounding a limited or exclusion area. Entry to the
controlled area is restricted to personnel with a need for access. Movement of authorized personnel within this area is not
necessarily controlled since mere entry to the area does not provide access to the security interest. The controlled area is
provided for administrative control, for safety, or as a buffer zone for in-depth security for the limited or exclusion area.
The commander establishes the control of movement.
1. Limited Areas – Restricted areas within close proximity of a security interest. Uncontrolled movement may permit access
to the item. Escorts and other internal restrictions may prevent access within limited areas.
2. Exclusion Areas – Restricted areas containing a security interest. Uncontrolled movement permits direct access to the item.
Are used only for handling and storage of high value cargo and classified documents. The number of people authorized
to enter this area should be strictly limited, and the area should be under surveillance at all times.
Pass System
Types of Pass System
1. Single pass system – the badge or pass coded for authorization to enter specific areas is issued to an employee who
keeps it in his possession until his authorization is terminates.
2. Pass exchange system – an exchange takes place at the entrance of each controlled area. Upon leaving the personnel
surrenders his badge or passes and retrieve back his basic identification. In this system the badge never leaves the
controlled area, thus reducing the possibility of switching, forging or alteration.
3. Multiple pass system – this provides an extra measure of security by requiring that an exchange take place at the entrance
of each restricted area.
Communication System
Communication – is the process of sending and receiving messages to achieve understanding.
Channel of Communication – refers to the equipment being used to transfer thoughts or ideas.
The following are the common equipment being used for communication:
1.
Local telephone exchange
2.
Commercial telephone service
3.
Intercommunication
4.
Two-way radios
5.
Paging and recall systems
6.
Bullhorns and megaphones
7.
Amplifier or loud speaker systems
8.
Cellular or mobile phones
K-9
K-9 Team
1. Handler – Certified by PNP SOSIA - Supervisory Office for Security and Investigation Agencies.
2. Dog - Has certification either on narcotics, explosive scent, patrol/ attack.
K – 9 skills
1. Narcotics detection dogs – to detect illegal drugs
2. Explosive detection dogs – to detect explosives and explosive components
3. Patrol/ Attack dogs – to subdue
Breeds:
1. German Shepherd
2. Belgian Sheep Dogs
3. Doberman Pinschers
4. Farm Collies
5. Giant Schnauzers
6. Akita Inu
SURVEILLANCE SYSTEM
Most Commonly Used Surveillance System
CCTV Also known as video surveillance.
Closed-Circuit Television The use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
IP Camera A type of digital video camera which can send and receive data via a computer network and
Internet Protocol Camera the Internet.
10
LESSON 3
PERSONNEL SECURITY
Of the three major aspects of security, personnel security is considered as the most important for the simple reason that
security involves people, both an assets to be protected and as source of security threats. It is an acknowledge fact that losses are
attributed mainly to negligence or active participation of employees, either through theft and sabotage. This emphasizes the need to
set up a system of hiring the people for the company.
Personnel Security (Definition from http://www.cpni.gov.uk/advice/Personnel-security1/#sthash.qHUuAbNU.dpuf)
Is a system of policies and procedures which seek to manage the risk of staff (permanent, temporary or contract staff) exploiting, or
intending to exploit, their legitimate access to an organization’s assets or premises for unauthorized purposes.
Security Education
Security Education is conducted to develop security awareness among employees of the company. It should cover all employees,
regardless of rank or position.
LESSON 4
Proprietary Information
Anything that an enterprise considers relevant to its status or operations and it is not meant to be disclosed publicly.
Types of Documents
13
Class I – Vital In this category these are records that are irreplaceable, records of which reproduction does
Documents not have the same value as the original; records needed to recover cash, to replace building,
equipment, raw materials, finished products, and work in process and records needed to avoid
delay in restoration of production, sales and services.
Class II – Important This includes records the reproduction of which will close considerable expense and labor, or
Documents considerable delay.
Class III – Useful This includes records whose loss might cause inconvenience but could be readily replaced
Documents and which would not in the meantime present an insurmountable obstacle to the prompt
restoration of the business.
Class IV – Non– This records are daily files, routine in nature even if lost or destroyed, will not affect
essential Documents: operation or administration. This class represent the bulk of records which should not be even
attempted to be protected in the event of disasters, They should, however, be kept in ordinary
files ready for reference, if needed, and usually discarded after some period of time.
Security Clearance
Refers to the administrative determination that an individual is eligible for access to classified matter.
Certificate of Destruction
A certificate issued by a witnessing officer that the classified matter described therein has been disposed in his presence.
Transmission Security
Security is applied in relaying a message.
Cryptographic Security
It is a form of security that converts a plain text to a coded, crypted or ciphered text.
Examples of Cryptograph Technique
1. Transposition – changing the sequence of the letters in the message
2. Substitution – use an alternate character or symbol for each letter in the message.
3. Concealment – directly hides the message in an innocent text
14
LESSON 5
SECURITY MANAGEMENT
SECURITY MANAGEMENT
The utilization of all available resources within a security organization in order to function and attain the organizational goals
and objectives. It is the managing of money, men, materials and methods with in security system.
SECURITY ASSESSMENT
An evaluation conducted in order to identify and address the weaknesses of the concerned facility and to equate its weakness with
mitigating system.
Objectives of Assessment
1. To establish a policy for the security of the facility or installation and assets.
2. Provide guidance and general procedures to enable security managers and directors the flexibility to address realistic
concerns for the protection of personnel, assets and facility from identified threats.
3. Minimize the loss, pilferage or diversion of company assets ensuring the company operations capability is maintained.
4. For any crisis contingency operations the facility security manager or director must provide for adequate protection of
employees and property.
Kinds of Assessment
1. Threat assessment
2. Vulnerability assessment
3. Physical security survey
Threat assessment
o Focuses on the dangers that may contribute to loss.
o Main goals:
1. Gather information that can help in perceiving the possible threats.
a. Threat from natural disasters
b. Threat from employees
c. Threat from criminals/outsiders
2. Evaluating the likelihood of their occurrence.
a. Historical data
b. Police record
3. For existing facilities, threat assessment must include identification and evaluation of existing security features.
4. For new facilities, threat assessment must be done prior to its construction in order to save money and resources.
5. For lease facilities, threat assessment should also include identification of security responsibilities of the occupant and
the owner.
Vulnerability Assessment
Focuses on the possible outcome of a successful attack from the identified threats/ calamity take place and how will the company be
affected by it.
1. Detect The security system should be able to alert an intrusion immediately when it happens.
2. Assessment The security system should be able to determine figures, location, and other facts about the intrusion.
3. Command and The security system should be able to provide a direct line of unobstructed communication among its
control personnel.
4. Delay The security system should be able to provide a longer period of delay.
5. Response The security system must have able personnel to be able to counter an intrusion and further apprehend the
perpetrators.
SECURITY INSPECTION
It is necessary to ensure the integrity of the overall security programs, is security inspection.
Security inspection is conducted for two reasons:
1. To check on the degree of compliance with the recommended countermeasures.
2. To determine the effectiveness and adequacy of the countermeasures which are in effect.
Types of Security Inspection
1. Continuous To keep pace with the constant changes in the organization, changes in our security terms of
Inspection attitudes, life-style and moral values, and the rapid advancement of technological modifications are
all around us, the inspection must be an on-going and never ending activity.
2. Formal or It is usually preceded by an announcement, and the unit under inspection “prepares” for events,
Informal including some extra housekeeping activities that would not otherwise happen at that point in time.
Informal Inspection is usually the result of a long and firmly entrenched inspection program,
understood by all and accepted as part of the organizational life. The inspection has been stripped of
16
all external trappings of importance, but their functional importance has not been lessening in any
manner. They are seriously and quietly executed in a spirit of understanding and cooperation.
3. Structured or Structured Inspection is one that moves systematically from one area to the next and so on. There is
Unstructured a format or logical sequence to the process. For instance, the audit may start with the first line of
Inspection defense, then the second line, then the third line, etc.
SECURITY INVESTIGATION
A planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards or unsecured
conditions.
RISK ANALYSIS
Includes the examination of the vulnerability, probability and criticality of potential threat.
Asset Any information, facility, material or activity which has a positive value to its owner whether it is an
individual, private or government entity.
Risk The likelihood that something bad will happen that causes harm to an asset.
Vulnerability Is a weakness that can be used to endanger or cause harm to an asset.
Threat Is anything, man-made or act of nature, that has the potential to cause harm.
Probability It is the chance or likelihood that a loss will take place.
Criticality It is the impact of a loss as measured in financial terms.
Risk Management
It is the process of identifying vulnerabilities and threats from resources used by an organization in achieving business objectives, and
deciding what countermeasure to take in reducing risk to an acceptable level.
LESSON 6
SECURITY HAZARD
SECURITY HAZARD
Any act or condition which may result in the compromise of information, loss of life, loss or destruction of property or disruption of
the objective of the installation.
Types of Hazards
1. Natural Hazards – these are hazards which arise from natural phenomena. The following are types of natural hazards or
disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Storms (typhoons, cyclones, tornado and hurricane)
d. Lighting storms
e. Extreme temperature and humidity
2. Man-made Hazards – These are hazards which are the result of a state of mind, attitude, weaknesses or character traits of
one or more persons. They can be acts of commission or omission, both overt and covert, which can disrupt operation of a plant
or installation. The following are types of human or man-made hazards:
a. Sabotage
b. Espionage
c. Subversive activities
d. Pilferage
SABOTAGE
Description of a Saboteur
1. He is the most dangerous for whom security will have to deal with while planning and implementing security measures
and techniques.
2. He is an ordinary looking as the next guy but in his mind, he has the training in deception, knowledgeable in
incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.
Possible Targets of Saboteur
1. Armed Forces Installation
2. Natural resources – mines, forests, farms and farm products
3. Industries – buildings, power sources, machinery, fuel, etc.
4. Warehouses depots, communications, public utilities, etc.
Countermeasures against Sabotage
1. Use of an efficient, alert and trained guard force.
2. Use of Physical security aids like barriers, personnel and vehicular control, intrusion devices, communication systems, and
electric aids.
3. Proper screening of personnel.
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination.
10. Good housekeeping methods.
11. Effective and compatible emergency planning.
12. Regular audit.
13. Continuing background checks.
ESPIONAGE
Description of an Espionage Agent
1. He is very dangerous adversary and his skills in deception ad his cunning should never be under estimated.
2. He is usually a person of extensive training and will be highly effective in gaining the confidence of people and of extracting
information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like the saboteur and he can be defeated in his own
game if proper methods and techniques are undertaken.
Some methods Employed by Espionage Agent
1. Stealing or information from employees.
2. Stealing information from records or others sources.
3. Using various methods of reproducing documents products, equipment or working models.
18
4. Using “front” as commercial concerns, travel agencies, associations, business groups and other organizations to obtain
confidential information or data.
5. Using various form or threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning an individual or organization.
7. Picking or securing information in social and other gatherings.
8. Penetration and operational tactics.
Countermeasures against Industrial Espionage
1. Careful and complete pre-employment measures designed to control threats of industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive positions even already employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.
SUBVERSIVE ACTIVITY
The lending of aid, comfort, and moral support to individuals, groups, or organizations that advocate the overthrow of incumbent
governments by force and violence.
All willful acts that are intended to be detrimental to the best interests of the government and that do not fall into the categories of
treason, sedition, sabotage, or espionage are placed in the category of subversive activity.
Refers to an attempt to transform the established social order and its structures of power, authority, and hierarchy.
Threats of Subversive Activity
1. It can be local or national in nature and their mission is to undermine the authority weaken the organization, and eventually
take over. This can be in business or any activity.
2. This can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist attitudes, and other
emotional approaches.
3. It is an activity not easy to detect.
PILFERAGE
Is the theft of part of the contents of a package.
It may also include theft of the contents but leaving the package, perhaps resealed with bogus contents.
Small packages can be pilfered from a larger package such as a shipping container.
Broader and related aspects of theft may include taking the entire package, pallet load, truck load, shoplifting, etc.
Types of Pilferers
1. Casual Pilferer – one who steals due to his inability to resist the unexpected opportunity and has little fear of detection is no
plan or premeditation and he is usually a “loner” on the job. The temptation to pick up the article is basically due to poor
security measure. The implication of causal pilfering is the big cumulative cost if it remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away any or all types of items or supplies for
economic gain. Pilferers of this kind can be employees or outsiders of the establishment.
LESSON 7
VIP SECURITY
Principal
The VIP or person being protected.
AA (Advance Agent) – Guides the detail into the site thru radio communication; work covers planning and establishment of security
measures on site.
Bullet – catcher – The close-in protection of the VIP, such individual must be willing bullet catcher.
Driver-Bodyguard – in charge with the vehicle used by the VIP
Close-Protection Officer – the same as AA
Ancillary Unit – provides support such as IED detection, electronic "bug" detection, counter-sniper monitoring, pre-searches facilities,
and background-checks people who will have contact with the client.
Coverage
360 degrees – the coverage of 1 close – in security escort.
Wedge – Three-agent formation in VIP security, 1 agent at the front, 1 at the back and 1 at the side of VIP.
LESSON 8
EMERGENCY AND DISASTER MANAGEMENT
Emergency Disaster
22
Emergency is defined as an unforeseen combination of Disaster is defined as a sudden calamitous event bringing
circumstances or the resulting state that calls for immediate great damage, loss, or destruction; a sudden or great misfortune
action; an urgent need for assistance or relief. or failure.
An emergency can turn into a disaster but not all bad results of Disaster is inherently an emergency situation, if noticed ahead
an emergency will reach the level of disaster. An emergency is of time. A disaster does not have to be preceded by an
a situation that requires immediate attention, a situation that emergency. A disaster may come on quickly and without
could lead to disaster if left alone or unattended. warning.
A disaster is a done deal, in that the damage is done, while it
An emergency is a situation which may be an impending crisis, may leave behind countless emergencies as the damage unfolds
and is always something that requires quick or immediate into subordinate events which may themselves last for a long
attention. time until they are cleared up or written off.
Example:
Example:
You are at work and rioting has broken out in the streets outside A solar flare / CME event unleashes an EMP (electro-magnetic-
from an angry mob who smashing storefront windows and pulse) which takes down the electrical power grid of 2/3 the
lighting cars on fire in protest. United States.
You are awakened in the middle of the night as an intruder has
just invaded your home in search of valuables, or worse. Your
heart is pounding as you realize what is happening, and you The Hayward Fault in California rips a magnitude 7.5
reach for your firearm. earthquake which destroys tens of thousands of homes, injures
thousands, and kills hundreds in a highly populated area outside
of San Francisco. The electrical power, natural gas, and water
utilities are all damaged and offline in the region. A major
regional disaster affecting millions.
Crisis
Crisis is the turning point of a disaster or emergency, if not contained or controlled.
LESSON 9
SECURITY ORGANIZATION AND MANAGEMENT
PADPAO, Inc.
Philippine Association of Detective and Protective Agency Operators, Incorporated
The umbrella organization for Private Detective Agencies (PDA) and Private Security Agency.
SAGSD
Security Agencies Guards Supervision Division
The government agency involved in the personal supervision of the internal affairs of the Private Detective Agencies (PDA), Private
Security Agency (PSA) and Government Security (GSU).
25
R.A. 5487 Private Security Agency Law
An act to regulate the organization, operation of Private Detectives, Watchman and Security Guard Agencies
June 13, 1969 – date approved
June 21, 1969 – date enacted
P.D. 11 Amending certain provisions of R.A. 5487
Oct. 3, 1972 – date created
P.D. 100 Amending certain provisions of R.A. 5487
Jan. 17, 1973
P.D. 1919 Amending certain provisions of R.A. 5487
April 28,1984
March 31, 1985 – date of effectivity of Rules and Regulations Implementing R.A. 5487as amended by P.D.
1919 (IRR)
Definition of Terms
Watchman/ Any person who offers or renders personal service to watch or secure either residential or business
Security Guard establishment, or both or any building, compound or area, including, but not limited to, lodging
concessions, agricultural, mining or pasture lands, for hire or compensation, or as an employee thereof,
(P.D. 100) including any employee of the local or national governments or any agency or instrumentality thereof
and of government-owned or controlled firms or corporations, who is employed to watch or secure
government buildings, compounds, premises and other properties, other than members of the AFP,
Guards of the Bureau of Prisons, Provincial and City Jail Guards, and members of city and municipal
police forces.
Watchman/ Referred specifically as Private Security Guard, Company Guard, and Government Guard when
Security Guard employed by Private Security Agencies, Company Guard Forces of Private Firms and Government
Entities.
(P.D. 1919)
Private Security Agency Company Security Force Government Security Unit
Private Security Guard Company Guard Force Government Guard Unit
Private Any person who is not a member of the AFP or PNP but involved in detective work.
Detective
(R.A. 5487)
Issuance of Firearms
o Not higher than 45 caliber in a number
o Not exceeding one firearm for every two watchmen.
o Shall be carried by the watchman or security guard only during his tour of duty in proper uniform within the compound of
the establishment except when he escorts big amounts of cash or valuables in and out of said compound.
o Must have Duty Detail Order
The Use of High Powered Firearms by Security Guards (not allowed, except)
o Upsurge of lawlessness and criminality
o Will not exceed 10% of the Guard’s population
Documents that Security Guards Must Carry during His Tour of duty
1. Private security Guards license (PSGL)
2. Identification Card
3. DUTY Detail Order
4. Firearms License
27
5. His/ Her AGENCIES' LTO ( license to operate)
6. COMELEC- GUN BAN EXEMPTION – during elections
CODE OF ETHICS
1. As a security agent, his fundamental duty is to serve the interest or mission of his agency in compliance with the contract
entered into with the clients of the agency he is supposed to serve.
2. He shall be honest in thoughts and deeds both in his personal and official actuations, obeying the law of the land and the
regulations prescribed by his agency and those established by the company he is supposed to protect.
3. He shall not reveal any confidential matter that is confided to him as security guard and such other matters imposed upon
him by law.
4. He shall act at all times with decorum and shall not permit personal feelings, prejudices and undue friendship to influence
his actuation in the performance of his official functions.
5. He shall not compromise with criminals and other lawless elements to the prejudice of the customer or his client but assist
government in its relentless drive against lawlessness and other forms of criminality.
6. He must carry his assigned duties as security guard or watchman as required by law to the best of his ability and safeguard
life and property to the establishment he is assigned.
7. He shall wear his uniform, badge, patches and insignia properly as a symbol of public trust and confidence as an honest and
trustworthy security guard, watchman and private detective.
8. He must keep his allegiance first to the government, to the agency he is and to the establishment he is assigned to serve with
loyalty and dedicated service.
9. He shall diligently and progressively familiarize himself with the rules and regulations laid down by his agency and that of
the customer or clients.
10. He shall at all times be courteous, respectful and salute to his superior officers, government officials and officials of the
establishment where he is assigned and the company he is supposed to serve.
11. He shall report to perform his duties always in proper uniform and neat in his appearance.
12. He shall learn at heart or memorize and strictly observe the laws and regulations governing the use of firearms.
CODE OF CONDUCT
a. To carry with him at all times during his tour of duty his license and identification card and duty detail order with an
authority to carry firearms.
b. He shall not use his license and privileges to the prejudice of the public, clients or customers and his agency.
c. He shall not engage in any unnecessary conversation with anybody except in discharge of his duties or sit down unless
required by the nature of his work and at all times keep himself alert during his tour of duty.
d. He shall not read newspapers, magazines, books, etc. while actually performing his duties.
e. He shall not drink intoxicating liquor immediately during or before his tour of duty.
f. He shall know the location of the alarm box near his post and to sound the alarm in case of fire or disorder.
g. He shall know to operate the fire extinguisher at his post.
28
h. He shall know the location of the telephone / and the telephone number of the police precincts as well as the telephone
number of the fire stations in the locality.
i. He shall immediately notify the police in case of any sign of disorder, strikes, riot, or any serious violation of the life and
property.
j. He or his group of guards shall not participate or integrate in any disorder, strike, riot, or any serious violations of the law.
k. He shall assist the police in the preservation and maintenance of peace and order and in the protection of life and property
having in mind that the nature of his responsibilities is similar to that of the latter.
l. He shall familiarize himself with the Private Security Agency Law (RA No.5487) and the implementing rules and
regulations.
m. When issued a FA, he shall not lend his FA to anybody.
n. He shall always be in proper uniform and shall always carry with him his basic requirements, and equipment such as writing
notebook, ballpen, night stick (baton) and radio.
o. He shall endeavor at all time to merit and be worthy of the rust and confidence of the agency he represents and the client he
serve.