0 ratings0% found this document useful (0 votes) 43 views15 pagesIndustrial Security 2.1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
nr re ETE TE rl
MODULE 2
LESSON 2.1
PHYSICAL SECURITY
concept
PHYSICAL SECURITY as earlier discussed, is the broadest
ranch of security which is actually a system of barriers placed
etween potential intruders and the matters to be protected. It is
oncerned with the physical measures adopted to prevent
nauthorized access to equipment, facilities, materials, and
ocuments, and to safeguard them against espionage, sabotage
amage and theft. Physical security covers other types of
ceurity to protect equipment, documents, facilities and
\aterials against theft damage, sabotage or espionage. It also
acompasses protection of personnel from any criminal act.
+ PRINCIPLES OF PHYSICAL SECURITY
In every establishment, physical measures are needed to
eny unauthorized access or intrusion because of the following:
1. Enemy Agents Must Access - Acquisition of
information is the ultimate results, and the means
and form in which the information is obtained.
2. There is No Impenetrable Barrier — For the unfriendly
government or organization, they are willing to devote
enough time, money, personnel, material, and
imagination in passing barriers. So physical security
attempts to build defense by using a certain barrier.
3. Defense in depth means barrier after barrier. In order
that barrier could prevent unauthorized access and
serve its purpose very well, there should be an
| integration of all barriers adopted in the installation.
4. Surreptitious versus Non-Surreptitious Entry - The
possibility of surreptitious entry is the greatest
hazard from the standpoint of counterintelligence
security because it is usually difficult to determine -
that the information has been compromised. No
action is taken to neutralize the act of espionage
because surreptitious entry is not usually detected.
Surreptitious entry means not observable while non-
surreptitious entry is observable. Observable or not,
intruders usually find the right place and right
31opportunity to gain access. Physical security then!
needed to detect or deny unauthorized entries. E
5. Each Installation is Different - Since cach installats
is different, each will have different probiemsy
overcome. The security procedures will not
adequate for all installations.
B. BARRIERS DEFINED
Barriers refer to any physical structure whether natural
man made capable of restricting, deterring, delaying
_ preventing illegal and unauthorized access to an installation.
Cc. TWO GENERAL TYPES OF PHYSICAL sECURT
BARRIERS i
1. Natural Barriers — These are offered by nature which coy
obstruct or delay the passage way of potential intrude
These also refer to natural structures that serve
deterrents or obstructions to intruders such as high d
canyon, desert, or bodies of water. i
2. Man-made Barriers - These are structural construct
like fences, walls, floors, roofs, grills, bars, roadblocks,
other physical means to deter or impede penetration.
D. SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS:
1. Natural Barriers include mountains, cliffs, canyé
ravens, seas, marshes, deserts, Or terrain difficult)
traverse.
2. Structural barriers are those features constructed by ®
regardless of their original intent that tend to delay!
intruder. Examples of these are: walls; ceilings; doors §
fences.
3. Human Barriers include guards, charges of quart
office and shop workers, who stand between the inthit
and the matter to be protected. j
4.- Animal Barriers are usually shepherd dogs trained for8
used as guards. |
5. Energy Barriers are usually electrical and electro
devices that could assist security personnel in detect
intrusions. Examples are: protected lighting; and @
intrusion devises.
32te OF PHYSICAL SECURITY also varies depending on
fype and location of facility, and other factors needing
urity. The levels of physical security could be any of the
ollowing:
1. Minimum Security is a system designed to impede
unauthorized external activity such as simple intrusion to
armed attack. .
2. Low Level Security is a system designed to impede and
detect some unauthorized external activity such as on
small retail store, storage warehouses.
3. Medium Security is designed to impede, detect and assess
most external activity and some unauthorized internal
activity that range from simple shoplifting to conspiracy to
commit sabotage. This includes the:
a. Use of advance intrusion alarm system;
b. Establishment of perimeter and perimeter barriers;
and
c. Use of an unarmed guard.
4. High Level Security is designed to impede, detect and
assess most unauthorized external and internal activities
of certain prisons, defense contractors, pharmaceutical
companies and sophisticated electronic manufacturers.
This includes the utilization of the following:
. Close Circuit Television (CCTV);
. Perimeter alarm system;
High security lighting;
Highly trained armed guards:
Control designs; and
Coordination with local law enforcement agencies.
reap op
5. Maximum Security includes the application of the
following:
a. Sophisticated alarm system; and
b. On-site response force.MODULE 2
L&SSON 2.2
PERIMLVER BARRIERS
Concept
A. CONCEPT OF PERIME?ZR BARRIERS
Perimeter barrier ig a medium of structure which deff
the physical limits of an installations or area to restrict
impede access thereto, It is any physical barrier used
supplement the protection of an inside or outside perimet
Perimeter barrier also includes the utilization of secu
personnel.
B. LINE OF PHYSICAL DEFENSE
Sccurity managers and security personnel also consi
the various lines of defense that could help delay or ©
intruders. These are:
1. First Line includes all perimeter barriers;
2. Second Line includes the building exterior; and
3. Third Line includes those internal control measures
C. PERIMETER BARRIER OPENINGS
In determining the appropriate perimeter barriers, Secu"
managers should not overlook the necessity of monitor
perimeter openings that could be used by intruders. The
openings are:
1. Gates and doors should also be guarded or locked —
much as possible;
2. Windows and similar openings should also be guarded
grills should be installed $0 ©8 not to be used by intr ude
Whenever possible, windows and openings less than 18
above the ground, roofs, and ledges or less than 14
directly or diagonally opposite uncontrolled windows
other walls, fire escapes, of other openings of 96 |
inches or larger should be grilled or have steel t
protections;
— 7 _4a
/
walks elevators are elevated parts of the land near the
Aimeter barrier that provides access to areas within the
_Perimeter barriers and should be locked and guarded;
A. Utilities openings such as sewers, air intakes, exhaust
tunnels which penetrate the barriers and which have
cross-sectioned area of 96 sq. inches or more should be
protected by bars, grills, etc.;
.5. Clear Zone is an unobstructed area maintained on both
sides of the perimeter barrier. A clear zone of 20 ft. or
more is desirable. between the barrier and extension
structures and natural covers which may provide
concealment or assistance to a person secking
unauthorized entry. Where it is impossible to have clear
zones because of property lives or natural features, an
increment in the height of the fencing, increased guard
coverage more security lightings or the use of intrusion
device in that portion of the perimeter barrier should be
done. Whenever possible, clear zones should have the
following specifications:
a. A clear zone of 20 ft. or more should exist between the
Perimeter barriers and exterior structures, parking
areas and natural or man-made features.
b. A clear zone of 50 ft. or more should exist between the
perimeter barrier and structures within the protected
areas except when a building wall constitutes part of
the perimeter barrier.
D. TYPES OF PERIMETER BARRIERS - Perimeter barriers
include any of the following:
1. FENCES are independent structures designed to control
physical and visual access between outside areas. Types of
fences include Solid Fence and Full-View Fence.
a Solid fence is made of opaque material in such a
way that visual access through the fence structure
is denied. Solid fences are constructed with heavy
materials such as bricks, stone and concrete, and
usually extended down into the ground to a point
view below the frost line.
37 ./
i
/ Advantages of Solid Fence
1) Denies visual ‘access of the installation to th
intruder. {!
2) Denies the intruder the opportunity to become famits
with the personnel, activities, and the schedule of th
movement of the guards. “og “
Disadvantages of Solid Fence |
: s
1) Prevents the guards from observing the area aroun,
the installation. §
2) Creates shadow which may be used by the intrud,
for cover and concealment. é
b. Full-view fence is constructed in such a mann
that visual access is permitted such as wire fend
through the fence structure. It is designed pl
to contro! physical access between two areas.
Advantages of Full-view Fence
iva eatin Hts
1) guards are able to keep the area surrounding!
installation under observation :
2) does not create any shadow
Disadvantages of Full-view Fence
union
- 1) Allows visual access to the installation.
2) Allows the intruder to get familiar with ®
movements: and the time schedule of the gud,
Patrols, +
Wire fence is a type of fence made of chain-lin
barbed wire concertina design with small opening "™
larger than 2 square inches and made of number!
gauge wires or heavier, twisted and barbed salvage!
top and bottom. .
iii
Specifications for Using Chain-link Fences
i
1) It must be constructed of 7-feet material excluding)ts
guard. 1
2) It must be 9 gauge or heavier.
38 7/
8) Mesh openings are not to bé larger than 2 inches per
side.
4) It should be twisted and barbed salvage at top
bottom.
5) It should be security fastened to rigid metal or
reinforced concrete.
6) It must reach below surface enough on soft grounds
to compensate for shifting soilor sand. *
7) It must reach within 2 inches of hard ground or
paving.
Specifications for Using Barbed Wire
1) Standard barbed wire is twisted, double-stand 12
gauge wire with 4 point barbs spaced on equal
distance apart.
2) Barbed wire fencing must be firmly affixed to posts
high excluding top guard.
3) Barbed wire fencing should not be less than 7 ft. high
excluding top guard.
4) The distance between strands will not exceed 6
inches and midway between parts.
Using concertina wire fence — concertina fences are formed
like accordions.
2. BUILDING WALLS include walls, floor, roofs or their
.combinations serve also as barriers and they should be of
such constructions ‘to provide uniform protection just like
wire-fencing..
3. BODIES OF WATER like river, lake, cataract, sea, pond or
any bodies of water forming part of the wall, building or
fencing should not be considered an adequate perimeter
barrier. Additional security measures like wire fence,
concrete walling, security patrolling and flood lighting at
night may be necessary for the portions of the perimeter.
|B. ADDITIONAL PROTECTIVE MEASURES
1. Top Guard is an additional overhang of barbed wire placed
on vertical perimeter fences facing upward and outwar'
’ with a 45-degree angle with three to four strand:
39barbed wires spaced 6-inches apart. This will increase oF
protective height and prevent easy access e
2. Guard Control Stations are normally provided at me
perimeter entrance to secure areas located out of door
and manned by guards on a full-time basis. Sent
stations should be near a perimeter for surveillance at U!
entrance.
3. Towers or “Guard towers” are house-like structures abor
the perimeter barriers. It gives a psychological effect ©
violators.
4. Signs and Notices or “Control signs” should be erect
where necessary in the management of unauthonz®
ingress, and preclude accidental entry. It includes enth,,
ID, prohibited and exclusive areas signs. 2
F. PERIMETER GUARDS are also employed in augmenting
existing perimeter security or perimeter barriers of @ certas
establishment. The two (2) types of employing perimeter guar
are:
1. Fixed Post - Security guards are assigned in a particule
place of the compound to guard and watch the ore
surrounding: and
2. Patrol (Roving) - In this system, the security guard #
required to walk and go around regularly around w
company premises.
The most secured system of perimeter guard employment *
at mutually supporting fixed posts. This system would requie
each guard to be visible to each adjacent guard and wouk
provide the possibility for the area between to be unde
surveillance of either guard. However, this type of employment ©
expensive.
A less expensive system is that of employing the guards &
patrols. The security value of this type of employment ©
considerably reduced unless a sufficient number of frequenc
patrols are used to create essentially the same as that of towe
guards.
In conducting patrols, the guards should be instructed &
traverse an irregular route, providing different intervals betwee
visual or actual contact with any given point on the fence
40a
/
/prectice, there are observed disadvantages of roving
it:
Even regular routes, in time, tend to become regular in
irregularity;
2. The use of irregular roving patrol is made for the
onomy of personnel. The economy feature is usually
Carried so far that even the irregular route patrol fails to serve
the purpose; and
3. It is difficult for installation control personnel to
determine that the roving patroi ‘s actually carrying out its
functions.
Note: A guard system that cannot be checked on is not a
2cured guard system.
Double checking guards could be done by:
a. Personal inspection - Security supervisors conduct
on-the-spot and random inspection of posted
guards; or
b. Artificial inspection - This is done through bundy
clocks strategically installed around the perimeter;
and reporting through handheld two-way radio or
similar communication gadget.
\
41- MODULE 2
— LESSON 2.3
SECURITY LIGHTINGS OR PROTECTIVE LIGHTINGS
oncept
_ BASIC CONCEPTS OF SECURITY OR PROTECTIVE
‘(GHTING
Protective lighting provides a means of continuing
umination during hours of darkness, a degree of protection
at is maintained during daylight hours. This safeguard also
ts considerable value as a deterrent to thieves and vandals and
ay make the job of the saboteur more difficult. It is an essential
ment of an integrated physical security program. '
The system must be reliable and designed with
erlapping illumination to avoid creating unprotected area in
© event of individual light failure. It must be easy to maintain
\d it must secure itself against attack. Poles should be within
© barrier power lines and the switch box must be protected.
BASIC REQUIREMENTS
1. Protective or security lighting needs at installations and
facilities depend upon each situation and the areas to be
protected. Each situation requires careful study to provide
the best visibility practicable for such security duties as
identification of badges and people at gates, inspection of
vehicles, prevention of illegal entry, detection of intruders
outside and inside buildings and other structures, and
inspection of unusual or suspicious circumstances.
2. When such lighting provisions are impractical, additional
security posts, patrols, sentry dog patrols, or other
security means will be necessary.
3. Protective lighting should not be used as a psychological
deterrent only. It should be used on a perimeter fence line
only where the fence is under continuous or periodic
observation. Protective lighting may be unnecessary where
the perimeter fence is protected by a central alarm system.
4. Protective lighting maybe desirable for those sensitive
areas or structures within the Perimeter, which are under
specific observation. Such areas or structures include pier
and dock areas, vital buildings, storage areas, and
45vulnerable control points in communications, power,
water distribution systems. In interior areas where Mi
operations are conducted, adequate lighting of the ar
facilitates detection of unauthorized persons approac!
or attempting malicious acts within the area
. CHARACTERISTICS OF PROTECTIVE LIGHTINGS
Using protective lighting is expensive and is an additi
cost to the company or establishment. Therefore, consider
following in planning for protective lighting systems:
1. Protective lighting usually requires less intensity
working light, except for identification and inspectio™
authorized portals and in emergencies.
2. Lightings needed may vary because each area of
installation or facility presents its particular proO
based on physical layout, terrain, atmospheric
climatic conditions, and the protective requirements
]
equipment which will assist in designing a lighting sy®'
3. The data available from the manufacturers of hight
1
Included in these data are:
a. Descriptions, characteristics, and apeciicaon
various incandescent, arc, and gaseous dis¢’
lamps.: ‘
b. Lighting patterns of the various luminaries. |
c. Typical layouts showing the most efficient heig
and spacing of equipment. |
d. Minimum protective lighting intensities required \
various applications.
D. PROTECTIVE LIGHTINGS’ SIGNIFICANCE TO secuntt
FORCES
When properly employed, protective lightings offers é
following:
1.
2.
Reduction of the need for security forces.
Personal protection for forces by reducing the advantag
of concealment and surprise for a determined intruder.
46
— —— A
oe‘eleved security forces could be used to better advantage
elsewhere.
PROTECTIVE LIGHTING PRINCIPLES OR TECHNIQUES
1. Security lighung should enable a guard to observe clearly
the activities around and inside the premises within his
jurisdiction.
2. In planning, high contrast between intruder and
background should be provided. When contrast is poor
increase the intensity which will improve guard's ability to
See. Good contrast could be achieved by considering the
following:
a. With predominantly dark dirty surfaces or
camouflage type painted surfaces, more light is
needed to produce the same brightness around
installauons and buildings than when clean
concrete, light brick, and grass predominate.
b. When the same amount of light falls on an object
and its background, the observer must depend on
contrasts in the amount of light reflected. The
ability of the observer to distinguish poor contrasts
is significantly improved by increasing the level of
illumination
c. When the intruder is darker than his background,
the observer sees primarily the outline or silhouette.
Intruders who depend on dark clothing and even
darkened face and hands may be foiled by using
light finishes on the lower parts of buildings and
suructures.
d_ Stripes on wails have also been used effectively, as
they provide recognizable breaks in outlines or
silhouettes.
e. Providing broad lighted areas around and within
the installation, against which intruders can be
© seen, can also create g00d observation conditions.
3. Lighting boundaries and approaches, as well as the areas
and structure, is useful t0 discourage unauthorized
entries and reveal identity of persons.
Good lighting should reveal well bordering areas, glaring to
intruders and adequate for the guard to observe his
Position
4.
a7S, Effective lighting should: deter or d ourage attempts ff
enter the premises; and make detection mor likely if ent
is attempted. :
6. If lighting at night cannot be Provided due
impracticability other means of protection have to be mae
like additional guard posts, toving patrols, and aninr
guard:
7. Lightng should not be used alone. It should be used Wi
other measures such as fixed security posts or patrol
fences, and alarms.
8. In addition to seeing long distances, security forces mu
be able to sce low contrasts, such as indistinct outlines
silhouettes, and must be able to spot an intruder who
be exposed to view for only a few seconds. Higher levels
brightness improve all of these abilities.
F. TYPES OF SECURITY LIGHTINGS
1. Stationary Luminary (Continuous) — most common ty
consisting of services of fixed luminous to flood a giv
area conunuously with overlap. It may cither be:
a, Glareprojection type - the intensity is focused
the intruder while the observer or guard remains
the comparative darknes lighting is tower
the approach, of an entrance to an installecio
Lights with reflectors increase glare. I is a stor
deterrent to a potential intruder because it makes
difficult for him to see the inside of the area. I als
protects the guard by keeping him in wntraers
darkness and enabling him to observe intruders
considerable distance beyond the perimeter. Gla!
projection or other protective perimeter lighting ™
not be appropriate in some instances. In com
tactical perimeter security considerations are giv!
first priority over security against _ pilferé
Generally, the tightening of tactical perimet
security strengthens other physical security cfio1
A blending of tactical and physical securil
principles is required—especially true with regal
to perimeter lighting. Glare projecuon is 1
appropriate where security troop emplac emen|
may be silhouetted or illuminated for the enemy
see from the enemy's approach to the secured sitf
Where glare projection is desired, security troop
|
\
48Nene
Jf placed in front of the perimeter fence should be
moved, but still be able to take up effective fields of
fire for defense of the perimeter. If such blending of
Protective lighting and tactical security cannot be
accomplished, perimeter lighting should not be
used. Floodlights that provide a band of light with
great horizontal angular dispersal and which directs
the glare at a possible intruder while restricting the
downward beam, is preferred in this application
b. Controlled lighting - the width of the lighted-atop
can be controlled and adjusted to suit the security
needs. The lighting is focused; sag, on a pile of
items rather than on the background.
Stand-by Lighting - similar to continuous lighting but in
turned on manually or by special device or other
automatic means, when there is suspicion of entry.
+ Movable Lighting - consists of stationary or portable,
manually operated search lights which may be lighted
continuously during hours of darkness or only as needed,
and usually supplementary to either of the first 2 types.
Emergency Lighting - a stand-by lighting which can be
utilized in the event of electrical failure, either duc to local
equipment or commercial power failure.
G. GENERAL TYPES OF LIGHTING SOURCES
1.
2.
Incandescent lights have low initial cost and provide good
color rendition.
Mercury Vapor lamps emit a purplish-white color caused
by an electric current passing through a tube of
conducting and luminous gas. Considered more efficient
and is widespread in exterior lighting.
- Metal Halide is similar in physical appearance to mercury
vapor, but provides a light source of higher luminous
€fficiency and better color rendition.
Fluorescent Lamp provides good color rendition. However,
it cannot project light over long distances; thus, it is not
desirable as flood type lights.
High-pressure Sodium Vapor is introduced in 1965; for
exterior lighting of parking areas, roadways, buildings,
and industrial and commercial installation. It) emits
golden white to pink color.
Low-pressure Sodium Vapor produces yellow color:
Quartz Lamps produce very bright light.
49——_
H. TYPES OF LIGHTING EQUIPMENT
lL Floodlights are used for outdoor Security lighting including |
the illumination of boundaries, fences, and buildin Ss. |
2. Street lights produce diffused light rather than directional
beam. They are widely used in parking areas
3. Searchlights are incandescent li i
: ights that provide e of
crime-related lighting system. P ame
I. LIGHTING APPLICATIONS/LIGHTING SYSTEMS
1. Fenced Perimeter Lighting is used to illuminate the fence
itself and the area beyond if (“the detection zone’). It
objective is to reveal an intruder’s approach and produce)
glare towards him, thus reducing his ability to see in tht
site. However, it can be difficult to apply because it ™4y
create nuisance or hazards. J
2. Area Lighting is used in a building face perimeters consist
of faces of buildings on or within 20 ft. of the property
area line to be protected and where the public may
approach the building. Guards may be stationed inside 9
outside of the building. Doorways or other insets in Me
building’s face should receive special attention for lighU§
to eliminate shadows.
3. Flood Lighting is used to cast a strong light on the wails o
buildings so that intruders are visible either in silhouette
(outline) or by the shadows which they cast.
4. Gate House Lighting is installed on active entrances !
pedestrians and vehicles to facilitate complete inspecUo
of passengers, cars, trucks and freight cars as well ai
their contents and passengers.
5. Topping-up Lighting is used to illuminate dark areas ™
adequately lit by area or flood lighting. Areas»
structures within the installation property lines consist 0
yards, storage spaces, large open working areas, pier
- docks, and other sensitive areas and structures.
|
for
nr \