0% found this document useful (0 votes)
43 views15 pages

Industrial Security 2.1

Notes by: Romel Magan

Uploaded by

Romel Magan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
43 views15 pages

Industrial Security 2.1

Notes by: Romel Magan

Uploaded by

Romel Magan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 15
nr re ETE TE rl MODULE 2 LESSON 2.1 PHYSICAL SECURITY concept PHYSICAL SECURITY as earlier discussed, is the broadest ranch of security which is actually a system of barriers placed etween potential intruders and the matters to be protected. It is oncerned with the physical measures adopted to prevent nauthorized access to equipment, facilities, materials, and ocuments, and to safeguard them against espionage, sabotage amage and theft. Physical security covers other types of ceurity to protect equipment, documents, facilities and \aterials against theft damage, sabotage or espionage. It also acompasses protection of personnel from any criminal act. + PRINCIPLES OF PHYSICAL SECURITY In every establishment, physical measures are needed to eny unauthorized access or intrusion because of the following: 1. Enemy Agents Must Access - Acquisition of information is the ultimate results, and the means and form in which the information is obtained. 2. There is No Impenetrable Barrier — For the unfriendly government or organization, they are willing to devote enough time, money, personnel, material, and imagination in passing barriers. So physical security attempts to build defense by using a certain barrier. 3. Defense in depth means barrier after barrier. In order that barrier could prevent unauthorized access and serve its purpose very well, there should be an | integration of all barriers adopted in the installation. 4. Surreptitious versus Non-Surreptitious Entry - The possibility of surreptitious entry is the greatest hazard from the standpoint of counterintelligence security because it is usually difficult to determine - that the information has been compromised. No action is taken to neutralize the act of espionage because surreptitious entry is not usually detected. Surreptitious entry means not observable while non- surreptitious entry is observable. Observable or not, intruders usually find the right place and right 31 opportunity to gain access. Physical security then! needed to detect or deny unauthorized entries. E 5. Each Installation is Different - Since cach installats is different, each will have different probiemsy overcome. The security procedures will not adequate for all installations. B. BARRIERS DEFINED Barriers refer to any physical structure whether natural man made capable of restricting, deterring, delaying _ preventing illegal and unauthorized access to an installation. Cc. TWO GENERAL TYPES OF PHYSICAL sECURT BARRIERS i 1. Natural Barriers — These are offered by nature which coy obstruct or delay the passage way of potential intrude These also refer to natural structures that serve deterrents or obstructions to intruders such as high d canyon, desert, or bodies of water. i 2. Man-made Barriers - These are structural construct like fences, walls, floors, roofs, grills, bars, roadblocks, other physical means to deter or impede penetration. D. SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS: 1. Natural Barriers include mountains, cliffs, canyé ravens, seas, marshes, deserts, Or terrain difficult) traverse. 2. Structural barriers are those features constructed by ® regardless of their original intent that tend to delay! intruder. Examples of these are: walls; ceilings; doors § fences. 3. Human Barriers include guards, charges of quart office and shop workers, who stand between the inthit and the matter to be protected. j 4.- Animal Barriers are usually shepherd dogs trained for8 used as guards. | 5. Energy Barriers are usually electrical and electro devices that could assist security personnel in detect intrusions. Examples are: protected lighting; and @ intrusion devises. 32 te OF PHYSICAL SECURITY also varies depending on fype and location of facility, and other factors needing urity. The levels of physical security could be any of the ollowing: 1. Minimum Security is a system designed to impede unauthorized external activity such as simple intrusion to armed attack. . 2. Low Level Security is a system designed to impede and detect some unauthorized external activity such as on small retail store, storage warehouses. 3. Medium Security is designed to impede, detect and assess most external activity and some unauthorized internal activity that range from simple shoplifting to conspiracy to commit sabotage. This includes the: a. Use of advance intrusion alarm system; b. Establishment of perimeter and perimeter barriers; and c. Use of an unarmed guard. 4. High Level Security is designed to impede, detect and assess most unauthorized external and internal activities of certain prisons, defense contractors, pharmaceutical companies and sophisticated electronic manufacturers. This includes the utilization of the following: . Close Circuit Television (CCTV); . Perimeter alarm system; High security lighting; Highly trained armed guards: Control designs; and Coordination with local law enforcement agencies. reap op 5. Maximum Security includes the application of the following: a. Sophisticated alarm system; and b. On-site response force. MODULE 2 L&SSON 2.2 PERIMLVER BARRIERS Concept A. CONCEPT OF PERIME?ZR BARRIERS Perimeter barrier ig a medium of structure which deff the physical limits of an installations or area to restrict impede access thereto, It is any physical barrier used supplement the protection of an inside or outside perimet Perimeter barrier also includes the utilization of secu personnel. B. LINE OF PHYSICAL DEFENSE Sccurity managers and security personnel also consi the various lines of defense that could help delay or © intruders. These are: 1. First Line includes all perimeter barriers; 2. Second Line includes the building exterior; and 3. Third Line includes those internal control measures C. PERIMETER BARRIER OPENINGS In determining the appropriate perimeter barriers, Secu" managers should not overlook the necessity of monitor perimeter openings that could be used by intruders. The openings are: 1. Gates and doors should also be guarded or locked — much as possible; 2. Windows and similar openings should also be guarded grills should be installed $0 ©8 not to be used by intr ude Whenever possible, windows and openings less than 18 above the ground, roofs, and ledges or less than 14 directly or diagonally opposite uncontrolled windows other walls, fire escapes, of other openings of 96 | inches or larger should be grilled or have steel t protections; — 7 _4 a / walks elevators are elevated parts of the land near the Aimeter barrier that provides access to areas within the _Perimeter barriers and should be locked and guarded; A. Utilities openings such as sewers, air intakes, exhaust tunnels which penetrate the barriers and which have cross-sectioned area of 96 sq. inches or more should be protected by bars, grills, etc.; .5. Clear Zone is an unobstructed area maintained on both sides of the perimeter barrier. A clear zone of 20 ft. or more is desirable. between the barrier and extension structures and natural covers which may provide concealment or assistance to a person secking unauthorized entry. Where it is impossible to have clear zones because of property lives or natural features, an increment in the height of the fencing, increased guard coverage more security lightings or the use of intrusion device in that portion of the perimeter barrier should be done. Whenever possible, clear zones should have the following specifications: a. A clear zone of 20 ft. or more should exist between the Perimeter barriers and exterior structures, parking areas and natural or man-made features. b. A clear zone of 50 ft. or more should exist between the perimeter barrier and structures within the protected areas except when a building wall constitutes part of the perimeter barrier. D. TYPES OF PERIMETER BARRIERS - Perimeter barriers include any of the following: 1. FENCES are independent structures designed to control physical and visual access between outside areas. Types of fences include Solid Fence and Full-View Fence. a Solid fence is made of opaque material in such a way that visual access through the fence structure is denied. Solid fences are constructed with heavy materials such as bricks, stone and concrete, and usually extended down into the ground to a point view below the frost line. 37 . / i / Advantages of Solid Fence 1) Denies visual ‘access of the installation to th intruder. {! 2) Denies the intruder the opportunity to become famits with the personnel, activities, and the schedule of th movement of the guards. “og “ Disadvantages of Solid Fence | : s 1) Prevents the guards from observing the area aroun, the installation. § 2) Creates shadow which may be used by the intrud, for cover and concealment. é b. Full-view fence is constructed in such a mann that visual access is permitted such as wire fend through the fence structure. It is designed pl to contro! physical access between two areas. Advantages of Full-view Fence iva eatin Hts 1) guards are able to keep the area surrounding! installation under observation : 2) does not create any shadow Disadvantages of Full-view Fence union - 1) Allows visual access to the installation. 2) Allows the intruder to get familiar with ® movements: and the time schedule of the gud, Patrols, + Wire fence is a type of fence made of chain-lin barbed wire concertina design with small opening "™ larger than 2 square inches and made of number! gauge wires or heavier, twisted and barbed salvage! top and bottom. . iii Specifications for Using Chain-link Fences i 1) It must be constructed of 7-feet material excluding)ts guard. 1 2) It must be 9 gauge or heavier. 38 7 / 8) Mesh openings are not to bé larger than 2 inches per side. 4) It should be twisted and barbed salvage at top bottom. 5) It should be security fastened to rigid metal or reinforced concrete. 6) It must reach below surface enough on soft grounds to compensate for shifting soilor sand. * 7) It must reach within 2 inches of hard ground or paving. Specifications for Using Barbed Wire 1) Standard barbed wire is twisted, double-stand 12 gauge wire with 4 point barbs spaced on equal distance apart. 2) Barbed wire fencing must be firmly affixed to posts high excluding top guard. 3) Barbed wire fencing should not be less than 7 ft. high excluding top guard. 4) The distance between strands will not exceed 6 inches and midway between parts. Using concertina wire fence — concertina fences are formed like accordions. 2. BUILDING WALLS include walls, floor, roofs or their .combinations serve also as barriers and they should be of such constructions ‘to provide uniform protection just like wire-fencing.. 3. BODIES OF WATER like river, lake, cataract, sea, pond or any bodies of water forming part of the wall, building or fencing should not be considered an adequate perimeter barrier. Additional security measures like wire fence, concrete walling, security patrolling and flood lighting at night may be necessary for the portions of the perimeter. |B. ADDITIONAL PROTECTIVE MEASURES 1. Top Guard is an additional overhang of barbed wire placed on vertical perimeter fences facing upward and outwar' ’ with a 45-degree angle with three to four strand: 39 barbed wires spaced 6-inches apart. This will increase oF protective height and prevent easy access e 2. Guard Control Stations are normally provided at me perimeter entrance to secure areas located out of door and manned by guards on a full-time basis. Sent stations should be near a perimeter for surveillance at U! entrance. 3. Towers or “Guard towers” are house-like structures abor the perimeter barriers. It gives a psychological effect © violators. 4. Signs and Notices or “Control signs” should be erect where necessary in the management of unauthonz® ingress, and preclude accidental entry. It includes enth,, ID, prohibited and exclusive areas signs. 2 F. PERIMETER GUARDS are also employed in augmenting existing perimeter security or perimeter barriers of @ certas establishment. The two (2) types of employing perimeter guar are: 1. Fixed Post - Security guards are assigned in a particule place of the compound to guard and watch the ore surrounding: and 2. Patrol (Roving) - In this system, the security guard # required to walk and go around regularly around w company premises. The most secured system of perimeter guard employment * at mutually supporting fixed posts. This system would requie each guard to be visible to each adjacent guard and wouk provide the possibility for the area between to be unde surveillance of either guard. However, this type of employment © expensive. A less expensive system is that of employing the guards & patrols. The security value of this type of employment © considerably reduced unless a sufficient number of frequenc patrols are used to create essentially the same as that of towe guards. In conducting patrols, the guards should be instructed & traverse an irregular route, providing different intervals betwee visual or actual contact with any given point on the fence 40 a / /prectice, there are observed disadvantages of roving it: Even regular routes, in time, tend to become regular in irregularity; 2. The use of irregular roving patrol is made for the onomy of personnel. The economy feature is usually Carried so far that even the irregular route patrol fails to serve the purpose; and 3. It is difficult for installation control personnel to determine that the roving patroi ‘s actually carrying out its functions. Note: A guard system that cannot be checked on is not a 2cured guard system. Double checking guards could be done by: a. Personal inspection - Security supervisors conduct on-the-spot and random inspection of posted guards; or b. Artificial inspection - This is done through bundy clocks strategically installed around the perimeter; and reporting through handheld two-way radio or similar communication gadget. \ 41 - MODULE 2 — LESSON 2.3 SECURITY LIGHTINGS OR PROTECTIVE LIGHTINGS oncept _ BASIC CONCEPTS OF SECURITY OR PROTECTIVE ‘(GHTING Protective lighting provides a means of continuing umination during hours of darkness, a degree of protection at is maintained during daylight hours. This safeguard also ts considerable value as a deterrent to thieves and vandals and ay make the job of the saboteur more difficult. It is an essential ment of an integrated physical security program. ' The system must be reliable and designed with erlapping illumination to avoid creating unprotected area in © event of individual light failure. It must be easy to maintain \d it must secure itself against attack. Poles should be within © barrier power lines and the switch box must be protected. BASIC REQUIREMENTS 1. Protective or security lighting needs at installations and facilities depend upon each situation and the areas to be protected. Each situation requires careful study to provide the best visibility practicable for such security duties as identification of badges and people at gates, inspection of vehicles, prevention of illegal entry, detection of intruders outside and inside buildings and other structures, and inspection of unusual or suspicious circumstances. 2. When such lighting provisions are impractical, additional security posts, patrols, sentry dog patrols, or other security means will be necessary. 3. Protective lighting should not be used as a psychological deterrent only. It should be used on a perimeter fence line only where the fence is under continuous or periodic observation. Protective lighting may be unnecessary where the perimeter fence is protected by a central alarm system. 4. Protective lighting maybe desirable for those sensitive areas or structures within the Perimeter, which are under specific observation. Such areas or structures include pier and dock areas, vital buildings, storage areas, and 45 vulnerable control points in communications, power, water distribution systems. In interior areas where Mi operations are conducted, adequate lighting of the ar facilitates detection of unauthorized persons approac! or attempting malicious acts within the area . CHARACTERISTICS OF PROTECTIVE LIGHTINGS Using protective lighting is expensive and is an additi cost to the company or establishment. Therefore, consider following in planning for protective lighting systems: 1. Protective lighting usually requires less intensity working light, except for identification and inspectio™ authorized portals and in emergencies. 2. Lightings needed may vary because each area of installation or facility presents its particular proO based on physical layout, terrain, atmospheric climatic conditions, and the protective requirements ] equipment which will assist in designing a lighting sy®' 3. The data available from the manufacturers of hight 1 Included in these data are: a. Descriptions, characteristics, and apeciicaon various incandescent, arc, and gaseous dis¢’ lamps.: ‘ b. Lighting patterns of the various luminaries. | c. Typical layouts showing the most efficient heig and spacing of equipment. | d. Minimum protective lighting intensities required \ various applications. D. PROTECTIVE LIGHTINGS’ SIGNIFICANCE TO secuntt FORCES When properly employed, protective lightings offers é following: 1. 2. Reduction of the need for security forces. Personal protection for forces by reducing the advantag of concealment and surprise for a determined intruder. 46 — —— A oe ‘eleved security forces could be used to better advantage elsewhere. PROTECTIVE LIGHTING PRINCIPLES OR TECHNIQUES 1. Security lighung should enable a guard to observe clearly the activities around and inside the premises within his jurisdiction. 2. In planning, high contrast between intruder and background should be provided. When contrast is poor increase the intensity which will improve guard's ability to See. Good contrast could be achieved by considering the following: a. With predominantly dark dirty surfaces or camouflage type painted surfaces, more light is needed to produce the same brightness around installauons and buildings than when clean concrete, light brick, and grass predominate. b. When the same amount of light falls on an object and its background, the observer must depend on contrasts in the amount of light reflected. The ability of the observer to distinguish poor contrasts is significantly improved by increasing the level of illumination c. When the intruder is darker than his background, the observer sees primarily the outline or silhouette. Intruders who depend on dark clothing and even darkened face and hands may be foiled by using light finishes on the lower parts of buildings and suructures. d_ Stripes on wails have also been used effectively, as they provide recognizable breaks in outlines or silhouettes. e. Providing broad lighted areas around and within the installation, against which intruders can be © seen, can also create g00d observation conditions. 3. Lighting boundaries and approaches, as well as the areas and structure, is useful t0 discourage unauthorized entries and reveal identity of persons. Good lighting should reveal well bordering areas, glaring to intruders and adequate for the guard to observe his Position 4. a7 S, Effective lighting should: deter or d ourage attempts ff enter the premises; and make detection mor likely if ent is attempted. : 6. If lighting at night cannot be Provided due impracticability other means of protection have to be mae like additional guard posts, toving patrols, and aninr guard: 7. Lightng should not be used alone. It should be used Wi other measures such as fixed security posts or patrol fences, and alarms. 8. In addition to seeing long distances, security forces mu be able to sce low contrasts, such as indistinct outlines silhouettes, and must be able to spot an intruder who be exposed to view for only a few seconds. Higher levels brightness improve all of these abilities. F. TYPES OF SECURITY LIGHTINGS 1. Stationary Luminary (Continuous) — most common ty consisting of services of fixed luminous to flood a giv area conunuously with overlap. It may cither be: a, Glareprojection type - the intensity is focused the intruder while the observer or guard remains the comparative darknes lighting is tower the approach, of an entrance to an installecio Lights with reflectors increase glare. I is a stor deterrent to a potential intruder because it makes difficult for him to see the inside of the area. I als protects the guard by keeping him in wntraers darkness and enabling him to observe intruders considerable distance beyond the perimeter. Gla! projection or other protective perimeter lighting ™ not be appropriate in some instances. In com tactical perimeter security considerations are giv! first priority over security against _ pilferé Generally, the tightening of tactical perimet security strengthens other physical security cfio1 A blending of tactical and physical securil principles is required—especially true with regal to perimeter lighting. Glare projecuon is 1 appropriate where security troop emplac emen| may be silhouetted or illuminated for the enemy see from the enemy's approach to the secured sitf Where glare projection is desired, security troop | \ 48 Nene Jf placed in front of the perimeter fence should be moved, but still be able to take up effective fields of fire for defense of the perimeter. If such blending of Protective lighting and tactical security cannot be accomplished, perimeter lighting should not be used. Floodlights that provide a band of light with great horizontal angular dispersal and which directs the glare at a possible intruder while restricting the downward beam, is preferred in this application b. Controlled lighting - the width of the lighted-atop can be controlled and adjusted to suit the security needs. The lighting is focused; sag, on a pile of items rather than on the background. Stand-by Lighting - similar to continuous lighting but in turned on manually or by special device or other automatic means, when there is suspicion of entry. + Movable Lighting - consists of stationary or portable, manually operated search lights which may be lighted continuously during hours of darkness or only as needed, and usually supplementary to either of the first 2 types. Emergency Lighting - a stand-by lighting which can be utilized in the event of electrical failure, either duc to local equipment or commercial power failure. G. GENERAL TYPES OF LIGHTING SOURCES 1. 2. Incandescent lights have low initial cost and provide good color rendition. Mercury Vapor lamps emit a purplish-white color caused by an electric current passing through a tube of conducting and luminous gas. Considered more efficient and is widespread in exterior lighting. - Metal Halide is similar in physical appearance to mercury vapor, but provides a light source of higher luminous €fficiency and better color rendition. Fluorescent Lamp provides good color rendition. However, it cannot project light over long distances; thus, it is not desirable as flood type lights. High-pressure Sodium Vapor is introduced in 1965; for exterior lighting of parking areas, roadways, buildings, and industrial and commercial installation. It) emits golden white to pink color. Low-pressure Sodium Vapor produces yellow color: Quartz Lamps produce very bright light. 49 ——_ H. TYPES OF LIGHTING EQUIPMENT lL Floodlights are used for outdoor Security lighting including | the illumination of boundaries, fences, and buildin Ss. | 2. Street lights produce diffused light rather than directional beam. They are widely used in parking areas 3. Searchlights are incandescent li i : ights that provide e of crime-related lighting system. P ame I. LIGHTING APPLICATIONS/LIGHTING SYSTEMS 1. Fenced Perimeter Lighting is used to illuminate the fence itself and the area beyond if (“the detection zone’). It objective is to reveal an intruder’s approach and produce) glare towards him, thus reducing his ability to see in tht site. However, it can be difficult to apply because it ™4y create nuisance or hazards. J 2. Area Lighting is used in a building face perimeters consist of faces of buildings on or within 20 ft. of the property area line to be protected and where the public may approach the building. Guards may be stationed inside 9 outside of the building. Doorways or other insets in Me building’s face should receive special attention for lighU§ to eliminate shadows. 3. Flood Lighting is used to cast a strong light on the wails o buildings so that intruders are visible either in silhouette (outline) or by the shadows which they cast. 4. Gate House Lighting is installed on active entrances ! pedestrians and vehicles to facilitate complete inspecUo of passengers, cars, trucks and freight cars as well ai their contents and passengers. 5. Topping-up Lighting is used to illuminate dark areas ™ adequately lit by area or flood lighting. Areas» structures within the installation property lines consist 0 yards, storage spaces, large open working areas, pier - docks, and other sensitive areas and structures. | for nr \

You might also like