Notes Industrial Security Concepts

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 40

Republic of the Philippines

ISABELA STATE UNIVERSITY


Angadanan, Isabela

COLLEGE OF CRIMINAL JUSTICE EDUCATION


CRIM PROF 227: INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS

INTODUCTION TO SECURITY

DEVELOPMENT AND EVOLUTION OF SECURITY


What is Security?
It refers to the state or condition of being secured from potential harm, freedom from fear, danger, lost, destruction or damages of one’s
life or property.

Etymology
The word 'secure' entered the English language in the 16th century. It is derived from Latin securus, meaning freedom from
anxiety: se (without) + cura (care, anxiety).

Security Management (sometimes also Corporate Security) is a management field that focuses on the safety of assets (resources) in
the organization, i.e. both physical safety, human security to include digital security.

Security management is closely related to risk management and it is aimed at creating through various methods, procedures,
guidelines and standards a permanent secure solution to such conditions, which will help prevent or reduce identified risks in particular.

Industrial Security is a branch of security which aimed at keeping large structures such as factories, schools, hospitals, hotels and
others that may consider as industrial in nature.

Security manager  is responsible for managing security in large and medium organizations, The owner, statutory authority and top
management.

The Active and Passive Measures


ACTIVE MEASURES are the physical barriers, security lighting use of vaults, locks and others while PASSIVE MEASURES are those
that will dates man from committing such acts for fear of being caught, charged in court, or get dismissed; security education programs,
investigation, fire prevention seminars; personal security checks.

Cyber security refers to the protection of devices, networks, data and apps including utilities, financial institutions and government
agencies.

Brief Historical Background;


 The Ancient Egyptian Pharaohs who hired private security guards for personal protection. Or to Ancient Rome where
emperors had security guards for personal, family and property security.
 Ancient Egypt is accredited with creating encryption (to disguise or protect sensitive information).
 The Spartans used the transposition cipher, which involved changing the positions of the letters within documents. Julius
Caesar is noted as being the first person to use encryption for military purposes, sending documents by shifting the letters in
the alphabet by three.
 Thomas Jefferson in 1795 created the Jefferson disk or wheel cypher - something which seen the Da Vinci Code in
appearance to the cryptex cylinder used to hide the location of the holy grail.
 The first enigma messages were broken in January 1940 and continued to be broken during the course of the war.
 The Enigma device is a machine resembling a typewriter that used interchangeable rotors and a plug board with 159 million
million million possible settings, which the Germans believed was unbreakable but it was encrypted.
 In 1850, Allan Pinkerton Cooper from Scotland and the Chicago Police Department’s, first detective established one of the
oldest and still the largest private security operations in the United States
 The Shotgun Riders, In 1852 Henry Wells and William Fargo partners in the America Express Co. chartered established their
own detective and security personnel known as Shotgun Riders.
1
 The sole investigating agency for the American Bankers association was the William J. Burns Detective Agency in 1909
established the William J. Burns
 Dr. Norman Bottom and Professor John Kostanoski – have applied a system approach to the problem of assets protection.
Formulated as a new way of considering security and loss prevention and called “WAECUP” (an acronym for waste,
accidents, and error, crime, and unethical practices).

Brief History of Industrial Security and National Security in the Philippines;


 Commonwealth Act No. 1 is the original policy basis of the national security program of the Republic of the Philippines. That
act mandated the establishment of a Council of National Defense to advise with the President on all matters of national
defense policy, with membership consisting of the President, all living former Presidents, the Vice President, the head of each
executive department, the Chief of Staff, and six other members to be designated by the President.
 The 1987 Constitution mandates civilian control of the military and establishes the president as commander in chief of the
armed forces. The President also heads the National Security Council, ostensibly the policy-making and advisory body for
matters connected with national defense.
 Responsibility for national security was vested in the Department of National Defense. The principal functions of the
department in 1991 were to defend the state against internal and external threats and, through the Philippine National Police,
to maintain law and order.
 National Security Advisor (NSA) and Director-General serve as Chief of Staff and adviser for Special Concerns in National
Security to the President. The NSA has a Cabinet rank in the government. The current Director-General and National Security
Adviser is Sec. Hermogenes Esperon.
 Private security business in the Philippines began on March 1, 1933 when the City Council of Manila passed City Ordinance
No. 2162 granting license and recognition to the “Special Watchman Agency” owned by the brothers Juan and Pedro
Jimenez. The agency will later be renamed “Jimenez Security Agency”.
 On 30 May 1958, the Philippine Association of Detective and Protective Agency Operators (PADPAO) was formally organized.
 On 1 June 1969, Republic Act No, 5487 was passed directing the Chief of the Philippine Constabulary (PC) to create a unit
with the specific purpose of monitoring and regulating private security businesses
 On 3 October 1972 Presidential Decree (PD) No. 11 of former President Ferdinand Marcos was passed in order to
encompass and defined all forms of contracted private security services within the entire Philippine Archipelago
 With the abolition of the PC/INP and the creation of the Philippine National Police, the PC/INP SUSIA was renamed the
Security Agencies and Guards Supervision Division or SAGSD

RELEVANT LAWS IN SECURITY

REPUBLIC ACT # 5487


An Act to Regulate the Organization and Operation of Private Detective, Watchman and Security Guard Agencies, Otherwise known as
the “Private Security Agency Law (PSA) Law”

This law governs the operation, administration of security agency, and activities, qualifications, duties and licensing od security guards,
watchmen and private detectives. In short, it is the intention of this law to professionalize the sucurity services in order to upgrade the
level of security protection.

Republic Act # 6975 as amended


This act created the Civil Security Group under the PNP to provide administrative services and general supervision over the
organization, operation and activities of all organized private detectives, watchmen, security guard agencies and company guard
forces.

The differences between the Public Police and Private Security office:
1. Private security officer is clientele oriented while Public Police Officer is community oriented.
2. The public police have substantially greater power than security personnel in their power to arrest, detention, search and
interrogation. Because security officer are as a rule, limited to the premises of their employer. Public police operate through a
much wider jurisdiction.
3. Private Security officer /agency has a limited authority of a security force by licensing statutes directed at a security activities,
operating contracts between employers and security firms may also specify limits on the activities of the contractual
personnel.
2
4. Private guards differ from Public Police both in their legal status and in that they perform in areas where the public Police
cannot legally or practically operate. The Public police have no authority to enforce private regulations, nor have they the
obligation to investigate the unsubstantiated possibility of crime (such as employee theft) on private property.

THE IRR OF REPUBLIC ACT 5487, THE SECURITY AGENCY LAW


The protection of individual and his property is one of the oldest tasks in the history. The pattern of development in private security is
what commonly known as law enforcement, however, differs to a considerable degree in many aspects. Thus, the Implementing Rules
and Regulation of Republic Act 5487 is the main objective of this chapter

The primary and fundamental duties of the security guard are to protect lives and properties of the client he is supposed to serve in
accordance with the agreement of his agency and its client, but these duties are not limited to inspecting/monitoring, bodily
checks/searches individuals and/or baggage’s and other forms of security inspection, physically manually, or aided with scientifically
based electronic systems.

License is necessary in the following;


a. Engage in the business of or private detective agency or training agency.
b. Any person operating, managing, directing or conducting a licensed private security/detective/training agency.
c. Any person having any participation in the management or operation thereof except those employed solely for clerical or
manual work, shall also secure a license.

Who may issue the License?


 The Chief of the Philippine National Police will issue as prerequisite in obtaining a license certificate.

No License certificate shall be granted to any applicant for license to operate or license to exercise security profession with the
following disqualifications:
a. having previous record of any conviction of any crime
b. having previous record of any conviction of any offense involving moral turpitude
c. having been dishonorably discharged or separated from employment or service
d. being a mental incompetent
e. being a user/addicted to the use of prohibited drugs or narcotics
f. being a habitual drunkard
g. dummy of a foreigner

Qualifications of a Private Security Guard


No person shall be licensed as security guard unless he possesses the following qualifications:
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. Not less than eighteen (18) years of age nor more than fifty (50) years of age (for new applicants and SGs in non-supervisory
position); and
e. Has undergone a pre-licensing training course or its equivalent.

Desirable Qualities of Security Guards:


1. Alertness
2. Judgment
3. Confidence
4. Physical Fitness
5. Tactfulness
6. Self-Control
7. Interest, Loyalty, Responsible and Trustworthy

Basic requirements of private security personnel -


a. Filipino citizen;
b. Not be less than eighteen (18) years of age.

3
c. Must have taken a private security course/seminar and/or must have adequate training or experience in security business or
rendering security/detective services;
d. Of good moral character and must not have been convicted of any crime or violation of these rules and regulations carrying a
penalty of prohibition to be licensed; and
e. Must be physically and mentally fit.

Qualifications for Security Officer


a. Filipino citizen;
b. Holder of a Baccalaureate Degree;
c. Physically and mentally fit; and
d. Has graduated from a Security Officer Training Course or its equivalent.

Qualifications of a private detective


a. Filipino citizen;
b. Physical and mentally fit;
c. Holder of a baccalaureate degree preferably Bachelor of laws or Bachelor of Science in Criminology;
d. Graduate of a Criminal Investigation Course offered by the Philippine National Police or the National Bureau of Investigation or
any police training school, or a detective training in any authorized/recognized training center;
e. Advance ROTC/CMT graduate or its equivalent.

Exemptions from Basic Pre-Licensing Training


1. Veterans and retired military/police personnel or Those honorably discharged military/police personnel but shall not however
be exempted from taking the refresher training courses or its equivalent.
2. Graduates of ROTC advance/CHDF (or its equivalent in the PNP) Training graduates shall be exempted from the required
Basic-licensing Training/Seminar.

Types of License
a. Temporary License – initial and conditional issuance while awaiting issuance of regular license identification cards.
b. Regular License – generated Private Security Personnel License Card, duration or validity of which shall be for two (2) years.

Renewal of License
a. Deadline for Filing and Late Filing.
The deadline for filing of applications for renewal of License to Exercise Profession shall be sixty (60) days prior to the month
of the expiry date. Applications filed/accepted thereafter shall be penalized for late filing.
b. Failure to file for renewal.
The Licenses to Exercise Profession of those who fail to file renewal applications SHALL AUTOMATICALLY BE CANCELLED
upon expiry.
c. Renewal of license to exercise profession shall also be filed with SAGSD, CSG, Camp Crame, Quezon City or through the
Firearms, Explosives, Security Agencies and Guards Section (FESAGS), Regional Operation and Plans Division (ROPD) of
the Police Regional Office.

The Requirements for renewal of licenseare as follows:


1. Application for Social Security ID (E-6 Rev 11-2000 Form);
2. Application for License of Private Security Guard (PNPSF-01 Revised 2000);
3. General Knowledge Examination Result (PASSED);
4. Proof of Training;
5. Neuro-Psychiatric Test Clearance;
6. Drug Test Result/Clearance;
7. PNP Intelligence Clearance (DI) or NBI Clearance

All licensed security personnel must undergo in-service re-training at least once in every two (2) years preferably two months before
his/her birth month. The certificate of in-service training shall be a prerequisite among others, for the renewal of license to exercise
profession.

4
DEFINITION OF TERMS
For purposes of and when used, the Following terms shall be construed;
Person – shall include not only natural but also juridical persons such as single proprietorships, partnerships, corporations, companies
or associations, duly organized and registered with the Securities and Exchange Commission and/or the Department of Trade and
Industry.
Private Security Industry – shall cover those in the legitimate business of providing private security and detective services.
Private Security Services – shall include the act of providing or rendering services to watch an establishment whether public or private,
building, compound/area or property, to conduct access control/denial in any form whether physically, manually or scientifically by
electronic monitoring systems, for the purpose of securing such area/property and at the same time ensuring safety and protection of
persons within such areas, to maintain peace and order within such areas, to conduct private security training, and/or to conduct
investigation. It shall also include the act of contracting, recruiting, training, furnishing or posting any security guard, to do its functions
or solicit individuals, businesses, firms, or private, public or government-owned or controlled corporations to engage his/its service or
those of his/its security guards, for hire, commission or compensation thru subscription or as a consultant/trainer to any private or public
corporation.
Private Detective Services – shall include among others the act of providing personal security protection, inquiry and information
gathering, pre-employment verification and individual background profiling, providing assistance in civil liability and personal injury
cases, insurance claims and fraud, child custody and protection cases, for the purpose of assisting in gathering information leading to
determination and/or prevention of criminal acts and/or resolution of legal, financial and personal problems.
Private Security Guard (SG) – sometimes called private security guard or watchman shall include any person who offers or renders
personal service to watch or secure either a residence, business establishment, or buildings, compounds, areas, or property,
inspects/monitors bodily checks/searches individuals and/or baggage and other forms of security inspection, physically/ manually or
scientifically electronic, including but not limited to, logging concessions and agricultural, mining or pasture lands, transportation, for
hire or compensation , or as an employee thereof, including any employee of the national or local governments or agencies or
instrumentality’s thereof and or government owned or controlled firm or corporations who is employed to watch or secure government
buildings, compounds, premises and other properties, other than members of the Armed Forces of the Philippines, guards of the
Bureau of Jail management and Penology, Municipal or City jail guards, and members of the Philippine National Police or of any other
law enforcement agency of the Government.
Private Detective (PD) – shall mean any person who does detective work for hire, reward or commission, other than members of the
Armed Forces of the Philippines, guards of the Bureau of Jail Management and Penology, municipal or city jail guards, and members of
the Philippine National Police or of any other law enforcement agency of the government.
Private Security Personnel – shall be natural persons which include private security guards, private detectives, security consultants,
security officers and others that may be classified later, rendering/performing security and/or detective services as employed by private
security agencies and/or private firms.
Government Security Personnel – shall be natural persons which include government Security guards, detectives, security consultants,
security officers and others that may be classified later, except those of the Armed Forces of the Philippines, Philippine National Police,
Bureau of Jail Management and Penology, Municipal or City Jail guards rendering/performing security and/or detective services as
employed by government entities.
Private Security Agency (PSA) – shall mean any person association, partnership, firm or private corporation, who contracts, recruits,
trains, furnishes or posts any security guard, to perform its functions or solicit individuals, businesses, firms, or private, public or
government-owned or controlled corporations to engage his/its service or those of his/its security guards, for hire, commission or
compensation thru subscription or as a consultant/trainer to any private or public corporation whose business or transactions involve
national security or interest like the operation and/or management of domestic or ocean vessels, airplanes, helicopters, seaports,
airports heliports, landing strips etc., or as consultant on any security related matter, or to provide highly specialized security, detective
and investigation services like gangway security, catering security, passenger profiling, baggage examination, providing security on
board vessels or aircraft, or other security needs that PNP SAGSD may approve.
Private Detective Agency (PDA) – shall mean any person association, partnership, firm or private corporation, who contracts, recruits,
trains, furnishes or posts any private detective, to perform its functions or solicit individuals, businesses, firms, or private, public or
government-owned or controlled corporations to engage his/its service or those of his/its detectives, for hire, commission or
compensation thru subscription or as a consultant/trainer to any private or public corporation or as consultant on any detective related
matter, or to provide highly specialized detective and investigation services, or other detective needs that SAGSD-CSG may approve.
License to Exercise Profession – shall mean any document issued by the Chief, Philippine National Police or his duly authorized
representative recognizing a person to be qualified to perform his duties as private security or training personnel.
License to Operate (LTO) – is a License Certificate document, issued by the Chief, Philippine National Police or his duly authorized
representative, authorizing a person to engage in employing security guard or detective, or a juridical person to establish, engage,

5
direct, manage or operate an individual or a private detective agency or private security agency/company security force after payment
of the prescribed dues or fees as provided in these Rules and Regulations.
Company Guard Force (CGF) – a security force maintained and operated by any private company/corporation utilizing any of its
employees to watch, secure or guard its business establishment premises, compound or properties.
Government Guard Unit (GGU) – a security unit maintained and operated by any government entity other than military or police, which
is established and maintained for the purpose of securing the office or compound and/or extension of such government entity.
SAGSD as used herein shall refer to the current PNP Civil Security Group Security Agency and Guard Supervision Division or any
other PNP Office that may be designated later as the primary office for supervision of the implementation of these rules and
regulations.
PADPAO refers to the Philippines Association of Detective and Protective Agency Operators, Inc., which is an association of all
licensed security agencies and company security forces.
Duty Detail Order is a written order/schedule issued by a superior officer usually the private security agency/branch manager or
operations officer assigning the performance of private security/detective services duties.

Who may organize and maintain a Private Security Agency and Private Detective Agency.
Any Filipino citizen or corporation, association, partnership, one hundred percent (100%) of which is owned and controlled by Filipino
citizens, may organize and maintain a Private Security Agency or Private Detective Agency.

Basic requirement of an operator or manager of agency


A. The operator or manager of an agency including, managers of branch offices, must be:
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from the Armed Forces of the Philippines
or the Philippine National police;
4. Has taken a course/seminar on Industrial Security Management and/or must have adequate training or experience in
security business; and,
5. Good moral character

B. New applicants for license to operate shall be required to obtain a minimum capitalization of one million pesos (P1,
000,000.00) with a minimum bank deposit of five hundred thousand (P500, 000.00) pesos in order to start its business
operation.

Limitations, Disqualifications and Prohibitions.


a. No person shall organize or have an interest in more than one agency.
b. Elective or appointive government employees who may be called upon on account of the functions of their respective offices
any person related to such government employee by affinity or consanguinity in the third civil degree, shall not hold an
interest, directly or indirectly, in any security or watchman agency.
c. No agency shall offer, render or accept services in gambling dens or other illegal business establishments or enterprises.
d. The extent of the security guard service being furnished by the security agency shall not go beyond the compound and/or
property of the person or establishment contracting the security service except when the security guards is escorting big
amount of money or valuables.

Prohibition on “KABIT SYSTEM” operators.


No licensed security agency shall operate, promote and enter into an agreement of “merger“ (kabit system) except when Merger of
security and detective agencies is approved by the Securities and Exchange Commission.

Any of the following circumstances or a combination thereof shall be considered prima-facie evidence of the existence of “Kabit
System”.
a. Maintaining a separate branch, unit or subsidiary office aside from the main office of the agency situated within the same
locality;
b. Receiving direct payments from the agency’s clientele and issuing officials receipt of their own distinct from that issued by the
agency concerned;
c. Remitting directly Social Security System premiums, Medicare contributions and other premium for other policy insurance
benefits by the aforementioned branch, unit or subsidiary office;

6
d. Existence of an agreement between the licensee and a branch manager thereof, whereby the latter obligates himself to pay a
certain percentage of his income to the former on the condition that the control and supervision of the guards posted by said
branch shall course on the manager thereof and that the licensee shall be exempt from liabilities/ obligations attendant to the
operation of said branch.
e. Keeping/maintaining separate payrolls for the branch employees signed and/or approved by the branch manager only;
f. Absence of record of monthly income remittances to the main office when said branch is authorized to make collections from
the clients of the licensee; and
g. All other similar acts tending to show separate and distinct relationship/ personality/ ownership/ management.

Guard/Personnel Requirements;
a. No regular license shall be granted to any private security agency unless it has a minimum of two hundred (200) licensed
private security personnel under its employ.
b. No regular license shall be granted to any company guard force or private detective agency unless it has a minimum of thirty
(30) licensed private security personnel under its employ.
c. The maximum number of private security personnel that a PSA/CGF/PDA may employ shall be one thousand (1000).

TYPES OF SECURITY GUARDS


1. Company guard forces – A security guard recruited and employed by the company.
2. Security Agency service – A guard hired by company belonging privately license security.
3. Government Guard forces – A security guard recruited and employed by the government.

Status and Validity of License to Operate. The status of license certificate in Section 7 above shall be issued in conformity with the
following:
a. Regular LTO – issued, after complying with licensing requirements, to private security agencies having obtained and
maintained in its employ at least two hundred (200) security personnel, and to company guard forces and private detective
agencies having obtained and maintained in its employ at least thirty (30) security personnel and private detectives
respectively. Such license may be renewed following conformity with renewal requirements prescribed in a Standard
Operating Procedure (SOP).
b. Temporary LTO – initial and conditional issuance to new private security agencies and to PSAs holding regular LTO not able
to maintain the minimum number of security personnel or conform to standards, for them to be able to attain the 200 minimum
number of security personnel or comply with licensing standards, prior to issuance/re-issuance of regular LTO. Such issuance
shall not be renewable nor be extendible.

Unless sooner cancelled or revoked and provisions hereof modified, all licenses to operate shall have a validity of two (2) years.
Temporary LTOs upon expiration are automatically cancelled.

Security Personnel-Employee Benefits. The employer Private Security/Training/Detective Agency, Company Guard Force, Government
Guard Unit shall be responsible and held accountable for the compensation of the following benefits due their respective security
personnel as required by law:
a. salary and wage prescribed in the minimum wage law;
b. health, medical and insurance benefits;
b. separation and retirement pay and benefits;
c. Pag-ibig benefits
d. others as may be prescribed later

Possession of Firearms by Private Security Agency /Private Detective


Agency/ Company Security Force/ Government Security Unit.
 Private Security Agency/Private Detective Agency/ Company Security Force/Government Security Unit shall be entitled to
possess firearms
 The number of firearms shall not exceed one (1) firearm for every two (2) security guard in its employ.
 No private security agency/private detective agency/company security force/government security unit shall be allowed to
possess firearms in excess of 500 units.

Restriction to possess high-powered firearms.


7
 A private detective agency/private security agency/ company security services/ government security unit is not allowed to
possess high caliber firearms considered as military-type weapons such as;
1. M16
2. M14
3. cal .30 carbine
4. M1 Garand, and
5. other rifles and special weapons with bores bigger than cal .22, to include pistols and revolvers with bores bigger
than cal .38 such as cal .40, cal .41, cal .44, cal .45, cal .50, except cal .22 centerfire magnum and cal .357 and other
pistols with bores smaller than cal .38 but with firing characteristics of full automatic burst and three-round burst.

However, when such entities are operating in areas where there is an upsurge of lawlessness and criminality as determined by the
Chief, PNP, Police Regional Office Regional Director or their authorized representative, they may be allowed to acquire, possess and
use high-powered firearms under conditions.

Duty Detail Order (DDO)


 Private security agency/private detective agency / company security services/ government guard unit detailing their security
personnel or while escorting big amount of cash or valuable outside its jurisdiction or area of operation, under the following
conditions:
a. DDOs for the purpose of transporting agency licensed firearms from agency vault/office to post and back for posting, for
routine rotation, replacement of firearms or for conduction service duties, shall be issued for not more than a duration of
twenty-four (24) hours;
b. DDOs for the purpose of post duties not requiring transport of firearms outside of the physical compound or property of a
client or client establishment/firm shall be issued for not more than a thirty (30) day duration;

Transport of firearm shall require the appropriate transport permit issued by the Firearms and Explosives Division or Police Regional,
Provincial or City Office nearest the place of origin;

The issuance of DDOs for private detective personal protection service duties shall be prescribed in an SOP to be issued by NHPNP in
consideration of Rule XII of these rules and regulations; and

All DDOs shall indicate the following:


1. Name, address and telephone number of agency
2. Issue serial number and date of DDO
3. Complete name and designation of grantee
4. Purpose
2. Inclusive dates of detail
3. Firearms description and license number
4. Authorized uniform to be used
5. Other specific instructions/remarks
6. Signature and designation of issuing officer

Justification for confiscation of firearms.


a. When the firearm is about to be used in the commission of a crime;
b. When the firearm is actually being used in the commission of crime;
b. When the firearm has just been used in the commission of a crime;
c. When the firearm being carried by the security guard is unlicensed or a firearm not authorized by law and regulation for his
use;
d. When the confiscation of the firearm is directed by the order of the court;
e. When the firearm is used or carried outside the property, compound or establishment serviced by the agency without proper
authority; or
f. When a security guard does not possess any license to exercise his profession.

In all the above cases, the confiscating officer shall inform immediately the agency concerned.

8
Disposition of confiscated firearms
Any law enforcement officer authorized by law effecting the confiscation of firearm under any of the circumstances mentioned in the
preceding section shall inform the Chief, Philippine National Police thru the CSG within twenty-four (24) hours after such confiscation.
The firearm shall be turned over immediately to the nearest Philippine National Police unit/station which shall be responsible for the
conveyance of same to the FED, CSG, except when charges have been filed against the suspect, in which case, the firearm shall be
turned over to the concerned court.

Revocation of license. License to possess firearm may be revoked under any of the following instances:
a. Failure to submit any issued firearm for verification as required.
b. Carrying of firearms by security personnel without appropriate Duty Detail Order (DDO).
b. When the firearm serial number has been duplicated on another firearm or using one firearms license for more than one
firearm other than those stipulated in the license.
c. Carrying of firearms outside of the place stated in the permit or in places prohibited under the law; or
d. Conviction of the operator or manager of the agency of any crime.
e. When the firearm was reported lost.

Stocking of ammunition.
 Stocks of ammunition shall not exceed a basic load of fifty (50) rounds of ammunition per unit of duly licensed firearms.
 Individual issue to each security guard shall be limited to one half of such basic load or twenty five (25) rounds for every
security guard.

UNIFORM, EQUIPMENT AND PARAPHERNALIA


The uniform of private security guard/either from the private security agency/company security force/ government security unit shall
consist of the following;
1. Headgear
2. service shirt
3. service trousers
4. service belt and
5. footwear as herein prescribed.

Color of the uniform


 Fast navy blue thick fabric for the trouser for daily security officers wear and for service shirts of field or perimeter guards
 Light blue and/or white service shirts for internal guards for a private security agency;
 light gray for company security force; and
 white for government security unit.

Service Bush jacket shall be worn only by the Directorial and Staff Officers of agency

Gala Uniform. - It shall be worn for ceremonial purposes only and at the expense of the establishment conducting the ceremonies.

Necktie. - It shall conform to the color of the blouse five (5) centimeters wide.

Service Trouser. - Fast Navy blue color, straight cut, slanted pockets and two back pockets without over flaps.

Service Belt. – Of leather material which shall be used as pistol belt measuring four and a half (4-1/2 centimeters in with.

Footwear. –
a. Service shoes. - Black leather shoes with rubber heels and soles, plain top low-cut and black shoelace to be worn with plain
black socks.
b. Rubber rain boots. - Optional as the nature of the post requires.

BASIC EQUIPMENT
The following shall comprise of the Basic Equipment of a security guard which shall be made mandatory and ready for his/her use while
performing post, conduction, armored service duties and the like:
9
1. Prescribed Basic Uniform
2. Nightstick/baton
3. Whistle
4. Timepiece (synchronized)
5. Writing pen
2. Notebook and duty checklist (electronic or not)
3. Flashlight
4. First Aid Kit
5. Service Firearms (as required)

The security agency shall have the responsibility of ensuring the availability and issuance of the basic equipment to its posted guards.

Security Guards shall be responsible for inspecting operability of basic equipment issued to him, and be responsible for keeping himself
acquainted with the proper use of these.

Other Equipment.
Apart from the mandatory basic equipment, other equipment may be issued to the security guard as determined necessary following
client contract requirement, provided that the security guard shall have acquired the prior training/knowledge on the proper use of the
same but not limited to the following:
1. Handcuffs
2. Metal detectors
3. Communications Radio
4. Stun devices
5. Armor vests
2. canine (k-9) units

SECURITY TRAINING AND SKILLS DEVELOPMENT

Categories of Private Security Training


The following are the general categories of Private Security Training:
a. Pre-Licensing Training Programs. As a matter of licensing prerequisite, Pre- Licensing Training Programs include all training
and/or academic programs and courses whose objective is to indoctrinate the individual with the basic skills and educational
backgrounds, It includes but is not limited to the Basic Security Guard Course, the Security Officers Training Course, Private
Security Agency Operators Training/Seminar, Private Security Training Trainors’ Course.
b. Refresher Training Programs. This shall refer to periodic and non-periodic training programs and courses designed with the
objective of reinvigorating and/or developing basic skills and knowledge gained previously or gained while in the exercise of
his/her profession as a matter of experience, to enhance current in-service and future individual and/or collective exercise of
profession.
c. Specialized Training Programs. This shall refer to training program and courses other than those described in the preceding
categories designed at developing previously-gained skills and knowledge, designed at augmenting or expanding current skills
and knowledge, and/or designed at developing current skills and knowledge to suit identified future applications. It includes but
is not limited to such courses as the Intelligence/Investigator Training Course, Basic Crises Management Course,
Personal/VIP Security Training Course, Armoured Car Crew Training Course, Bomb Disposal Training Course, Bank Security
Training Course, and Basic Aviation Security Specialist Course.

Categories of Private Security Training Institutions


a. Private Security Training Systems. Government or duly registered private training establishments, associations, firms,
partnerships, corporations and the like, which provide the physical facilities and installations, and the appropriate
management, administrative, and instruction/training staff necessary and for the purpose of conducting Private Security
Training:
1. Private Security Training Centers – Private Security Training Systems whose primary purpose is to provide private
security training and training services, may be qualified to offer and conduct Private Security Training Programs in all
categories provided that, it has secured Regular accreditation from the SAGSD upon compliance and conformity with the
latter’s application and approval requirements, and prior TESDA registration/accreditation.

10
2. Other Juridical Entities - Private Security Training Systems whose primary purpose is not to provide private security
training and training services, may be qualified, on interim basis, to offer and conduct Private Security Training for a
specific course/class and duration under Refresher and Specialized programs only, provided that, it has secured prior
Interim Accreditation from the SAGSD upon compliance and conformity the latter’s application and approval
requirements. Such Interim Accreditation is also issued to those with Regular Accreditation but which cannot comply with
the renewal requirements.
3. Watchman/Security and/or Detective Agencies defined under RA 5487 as amended, which shall not be required prior
accreditation to operate, by virtue of their License to Operate as Private Security Agency, Company Security Force or
Government Security Force, may be authorized to conduct only in-house refresher or specialized training for its own
security personnel, upon compliance and conformity with application and approval requirements of SAGSD.
4. Police Offices/Units assigned/designated to conduct Private Security Training, which shall not be required TESDA
registration but shall require prior official authority of SAGSD, may conduct training in all categories but subject to
requirements of Rule XI of these rules and regulations or as may be prescribed by SAGSD.
5. Police Supervisory Office (presently the SAGSD) as having the primary responsibility of the conduct, supervision, and
control of all private security training and training services.

b. Training Instructor. Any person who renders personal and/or professional trainor, instructor, and/or teacher services relative to
private security training by virtue of his profession, expertise, knowledge, and/or experience in a particular field of knowledge.
Training Instructor includes but is not limited to currently or retired licensed or accredited private security training instructors,
professional educators, and/or field/practicing experts.

INSPECTIONS
a. Post to Post Inspection – Inspection conducted on detailed/posted security guards to determine proper compliance of
regulations related to uniforms, general physical appearance, documentation and other requirements in the actual service of
duty. This may also be an inspection conducted as an aid to investigation.
b. Administrative Inspection (Office, Files and Records Inspection) – Inspection conducted to determine compliance with records,
files and other administrative requirements for operating a security agency and/or exercising security profession.

THEORIES, CONCEPTS, PHILOSOPHY OF SECURITY AND SAFETY

CONCEPT OF INDUSTRIAL SECURITY MANAGEMENT


Security is every bodies concern. All employees including non – security personnel should be aware to their specific role in security in
day to day basis.

Basic Principles of Security:


1. Security is everybody’s concern.
2. Security is good only as far as its weakest link.
3. No single security system or element can stand alone.
4. High relative security can be achieved in depth.

Three (3) Areas of Security:


1. Physical Security – this concern when the physical measures adopted to prevent unauthorized access to equipment, facilities,
materials, and document and to safeguard against espionage, sabotage, damage, loss and theft.
2. Personnel Security – this is important as physical security. Personnel security starts even before the hiring of employee and
remains to be maintained for as long as the person employed.
3. Document and Information Security - this involves the protection of documents and classified papers from loss, access of
unauthorized person, damage, theft and compromise through disclosure.

PROTECTIVE SECURITY SYSTEM


 Those measures taken by an installation or unit to protect itself against sabotage, espionage, or subversion and at the same
time provide freedom of action in order to provide the installation of unit with the necessary flexibility to accomplish its mission.

Aspects of Protective Security

11
Physical Security – describes measures that are designed to deny access to unauthorized personnel (including attackers or even
accidental intruders) from physically accessing a building, facility, resource, or stored information; and guidance on how to design
structures to resist potentially hostile acts.

Physical security involves the use of multiple layers of interdependent systems which include the following; 
 CCTV surveillance
 Security guard
 Protective barriers
 Locks
 access control protocols and many other techniques.

PHYSICAL SECURITY
This refers to the broadest branch of security which deals on the system of barriers and devices placed between the matters protected
and measures to prevent unauthorized access to facilities, plants, and equipment and safeguard them against man-made and natural
hazards.

Principles of Physical Security


1. The type of access necessary will defend upon the number of variable factors therefore may achieved in a number of ways.
2. Delays provided against surreptitious and non-surreptitious entry.
3. There is no impenetrable barrier.
4. Defense in depth- barriers after barriers.
5. Each installation is different.

Factors that bring about unsecured conditions


1. Threats – an activity that could lead to a loss
2. Hazards – a condition that could lead to a loss
3. Vulnerability – a weakness that can be used to gain access to an asset
4. Risk – a potential loss or damage to an asset

Three (3) Lines of Physical Defense


1. First Line of Defense (Perimeter Barriers) – located at the outer edge of the property, like fence, doors and windows, this
includes protective barriers, perimeter fences or guards at the gate.
2. Second Line of Defense (Exterior Barriers) – like exterior walls, ceilings, and roofs as building itself to include such as doors,
floors, windows, walls, roofs, grills, locks and keys and other entries to a building
3. Storage System/3rd Line of defense or Last Line of Defense (Interior Barriers) – these are the interior areas within the building
like vaults, safety cabinet and protected rooms intended to keep top secret files and other things that will keep confidentially.

PROTECTIVE BARRIER
Barrier – any structure or physical device capable of restricting, deterring, delaying illegal access to installation. They maybe referred to
as Perimeter barrier.

Perimeter Barrier Opening


1. Gates and Doors – When not in use and controlled by guards, gates and doors in the perimeter should be locked and
frequently inspected by guards. Locks should be charge from time to time and should be covered under protective locks and
key control.
2. Side- walk- elevators – These provide access to areas within the perimeter barrier and should be locked and guarded.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and which have
cross sectional areas of 96 square or more should be protected by bars, grills, water field traps or other structural means
providing equivalent protection to that portion of the perimeter barriers.
4. Clear Zones – an abstracted area or a “clear zone” should be maintained on both sides of the perimeter barrier. A clear zone
of 20 feet or more desirable between the barriers and exterior structures and natural covers that may provides concealment
for assistance to a person seeking unauthorized entry.

Specification on clear zones:


12
a. Clear zones of 20 feet or more should exist between the perimeter barriers and exterior structures, parking areas and natural
and man- made features.
b. A clear zone of 50 feet or more should exist between the perimeter barrier and structure within the protected areas except
when a building was constitutes parts of the perimeter barrier.

Security Specification for windows or opening:


Windows or opening less than 18 feet above ground, roof, ledges, etc. or less than 14 feet directly or diagonally, opposite uncontrolled
windows in order walls, fire, escapes or other opening of 96 square inches or larger should be grilled or have steel bar protections.

Purpose of Barrier
The purpose of protective barriers in safeguarding the areas, building and proper utilization of lightning at night have contributed to
modern man’s attempt to discourage intruder, pilfer and other entrants devious intent.
Two (2) General types of Physical Barrier
1. Natural Barrier – such as rivers, cliffs, and ravines etc. which the delay or make more difficult the entry of the intruder.
2. Man-made Barrier – are structural construction like fences , walls, floors, roofs, etc. means to impede to deter penetration

Five (5) Categories of Protective Barriers


1. Structural Barriers – barriers which are constructed or structured like walls, doors, fences, locks and other barriers which are
not moving and structured.
2. Human Barriers – barriers which are being played by the human or person itself which are authorized like guards, office, and
shop employee aligned to protect certain establishment.
3. Animal Barriers – barriers which uses animals as served as barriers like dogs, geese, and other animals that create sounds
as a sign of force entry.
4. Natural Barriers – geographical barriers like rivers, cliffs, ravine and deserts.
5. Energy Barriers – electronic devices and hardware like alarm system and other devices which electronically.

Three Basic function of barriers:


1. Delay
2. Psychological Deterrent
3. Supplement and/or compliment the on-site security personnel needs

Perimeter Barrier – a medium or structure which defines the physical limits of an installation or area to restrict or impede access
thereto. Any physical barrier used to supplement the protection of an inside or outside perimeter.

Classification
Solid Fence – constructed in such away the visual access through the fence is denied.
- Its advantage is that it denies the opportunity for intruder.

Advantage of Solid Fence:


a. Denies visual access.
b. Denies opportunity.

Disadvantages of Solid Fence:


a. It prevents the installation guards from observing the area.
b. A solid fence creates shadows which maybe used the intruder.

Full-View - constructed to permit visual access but primarily designed for control or physical access into a facility.

Advantages of Full-View Fence:


a. Roving patrol and stationary guards are able to keep the are under observation.
b. It does not create shadows which provide cover and concealment for the intruder.

Disadvantages of Full-View Fence:


a. Allow visual access to the installation.

13
b. It allows the intruder to become familiar with movements and schedule of guard patrols.

Types of Perimeter Barriers:


A. Wire fences - is built on a wood frame or on metal posts. Is an independent structure designed to control physical and/or
visual access between outside areas.

Classification:
1. Chain-link - is a type of wovenfence usually made from galvanized or coated steel wire. The wires run vertically and are bent
into a zig-zag pattern so that each "zig" hooks with the wire immediately on one side and each "zag" with the wire immediately
on the other. This forms the characteristic diamond pattern seen in this type of fence.
 It must be constructed of 7 feet material excluding top guard.It must be of 9 gauges or heavier.The mesh openings are
not to be larger than 2 inches per side.
 It should be twisted and barbed salvage at top and bottom.
 It must be securely fastened to rigid metal or reinforced concrete.
 It must reach within 2 inches of hard ground or paving.
 On soft ground, it must reach below surface deep enough to compensate for shifting sand.
2. Barbed wire - is a type of fencing wire constructed with sharp edges or points arranged at intervals along the strand(s).
 Standard barbed wire is twisted, double strand, 12 gauge, with 4 point barb spaces on equal distance apart.
 Barbed wire fencing should not be less than 7 feet high excluding top guard.
 Barbed wire fencing must be firmly affixed to post high excluding top guard.
 The distance between strands will not exceed 6 inches and midway between parts.
3. Concertina Wire - Standard concertina barbed wire is commercially manufactured wire coil of high strength steel barbed
clipped together at intervals to form a cylinder.
 Opened of concertina 50 feet long and 3 feet in diameter.

B. Building Wall - is a vertical structure, usually solid, that defines and sometimes protects an area. Building walls have one main
purpose: to support roofs and ceilings.
C. Bodies of Water - These are natural barriers such as streams, creeks, rivers, marsh, pond or any other bodies of water.

Additional Protective Barriers:


1. Top Guard – is an additional overhang of barbed wire placed on vertical perimeter fence facing upward with a 45 degree angle
with three to four strands.
 Supporting arms will permanently affixed to the top of fence posts to increase the overall height of fence at least 1 foot.
 Three strands of barbed wire, spaced 6 inches apart installed.
2. Towers/Guard Tower – are house like structure above the perimeter barrier. It gives a psychological effects to violators.
3. Guard Control Station System – provided at the main perimeter entrance to secure the area of guard AOR.
4. Signs/Control signs – should be erected where it is necessary by preventing and authorizing personnel.
5. Barrier Maintenance – this means of inspecting all barrier within AOR.

Minimum Requirements for Fence used as Security Barrier


1. Height – eight feet at minimum.
2. Slack at the bottom – not exceed two inches, if the fence is not taut then it should extend even closer to the ground.
3. Wooden Fence Post – minimum horizontal dimension of four inches by four inches.
4. Steel Fence Post – the round type should at least two inches in diameter and the H-beam must measurable no less than 2
inches at the smallest diameter.
5. Fence Posts – fence post should be set in concrete or in firm soil using commercial drive anchors, to a depth of three feet;
maximum distance between posts is ten feet.
6. Fence Top – there should be something on the top of the fence to deter persons attempting to go over the fence good
example would be the use of barbed wire overhang had a 45 degree in direction.
7. Fence Area – the area surrounding the fence should be clear of trees and vegetation and debris or other materials which
would offer concealment to the intruder or would aid him in scaling.
8. Fence Gate – gates should be limited to the number necessary for efficient and safe operation of installation.
9. Fence Opening – all opening in the fence in excess of 96 inches must be barred or screened.

14
10. Multiple Fence – if, used multiple fence should be at least ten feet apart and the overhang on the top of the inner fences
should point inward rather than away from the installation which does not exceed 150 feet.

Two (2) types of Protective Barriers


1. Active Barriers – a type of barrier designed normally at the entrances of building against the threat vehicle or car bomb.
- This requires some action either people or equipment to be raised and lowered or move aside to permit vehicle ingress and
egress.
2. Passive Barriers – a system barrier designed against threat vehicle or car bomb and normally installed permanently at the
perimeter of the facility.
- it has no moving parts.

Types of Perimeter Barrier Opening:


1. Doors and gates – fire exit door, required by building codes are undesirable for security but necessary safety.
2. Side-walk-elevators – these provides access to areas within the perimeter barrier and should be locked and guarded.
3. Utility Openings – interim manhole covers 10 inches or more in diameter must be secured to prevent unauthorized opening.
4. Clear Zones – 20 feet more should exists between the perimeter barrier and exterior structures, parking area and natural man
made features.

PERIMETER GUARD - Employed in augmenting the existing perimeter security or perimeter barrier.
TWO TYPES;
1. Fixed post – assigned in a particular place of the compound to guard and watch the area surrounding.
2. Roving Guard/Patrol – is required to walk and go around regularly around the company premises.

A Guard System that cannot be checked on is not a secured guard system; this could be done;
1. Personal Inspection – Security supervisors conduct on the spot and random inspection of posted guards.
2. Artificial Inspection – this is doe through communication method.

Restricted Areas
It is any area in which personnel or vehicles are controlled for reasons of security.

Types of Restricted areas;


1. Exclusion Area – It contains a security interest of Top Secret importance, hence it requires highest degree of protection.
2. Limited Area Control – A lesser degree is required, however if security interest would be compromised by uncontrolled
movement.

PROTECTIVE ALARMS / INTRUSION DETECTION SYSTEM;


The use of intrusion detection systems dates back to 390BC during the Roman Empire when squawking geese alerted the Romans to
surprise attack by the Gaul’s.

Intrusion detection systems are inherent element of corporate and industrial security and play an important part in the total protection
efforts of companies; its activities, information, equipment and material assets.

Basically, these are designed to alert security personnel to consummated or attempted intrusion into an area, building or compound. It
can be electrical, mechanical or electronics.

Remember, however, that these systems can tell you only that an intrusion into a protected area occurred. It cannot do anything about
it. Whatever system you choose depends on your capability to react positively to the alarm.

Purposes of intrusion detection alarm system are:


1. To economize
2. To substitute in place of other security measures.
3. To supplement providing additional controls.

Basic Principles:

15
1. Breaking electrical current.
2. Interrupting a light beam.
3. Detecting sound.
4. Detecting vibration.
5. Detecting a change in the capacitance due to penetration of an electrostatic filed.

ALARM – is synonymous to warning of imminent danger. Defined in to ways;


A. A security device fitted to property, especially a house or a car.
B. Sound of security or warning device.

PROTECTIVE ALARM
It is an aural and visual signal given by the enunciator when intruder actuates device in a protected area.

Three Basic Parts of Alarm System:


1. Sensor or Trigger Device – it emits the aural or visual signal or both.
2. Transmission line - Controls or Circuits which carries message to the signaling apparatus
3. Annunciator - Signaling System

ANNUNCIATOR/ENUNCIATOR – is a visual or audible signaling devise which initiates conditions of associated circuits.

TYPES OF ALARM SYSTEM;


1. Metallic foil or wire – any action that will move the foil or wire break the circuit and activate the alarm. Metallic foil or wire is
used in a window and door.
Advantages:
1. Consistent trouble free service.
2. Causes few nuisance alarms.

Disadvantages:
1. Costly to install where there are many entry points.
2. Easily compromised when improperly applied.
3. May be defeated by bridging the circuits.
4. Unprotected soft walls or ceilings may be penetrated without disturbing the alarm system.
5. Has little salvage value.
6. Will not detect “stay behinds”

2. Photoelectric or electric eye - is a device used to detect the distance, absence, or presence of an object by using a light
transmitter, often infrared, and a photoelectric receiver. They are used extensively in industrial manufacturing.
Advantages:
1. Affords effective and reliable notice of intrusion.
2. Useful in open portals or driveways.
3. Can detect “stay behinds”
4. Has high salvage value.
5. May be used to actuate other security devices such as cameras.
6. May detect fires through smoke interruption of the beam.

Disadvantages:
1. If improperly installed, may be defeated by crawling or climbing over it.
2. Requires some type of permanent installation.
3. Fog, smoke or dust may cause interruption of the light beam.
4. Requires frequent inspection.
5. Requires ground beneath the light beam free of tall grass and other elements.

3. Audio detection device – supersensitive microphone speaker sensor are installed in walls, ceilings and floors of the protected
area of any sound cause by attempted force entry inspected by the sensor.

16
Advantages:
1. Economical and easily installed.
2. Has high salvage value.

Disadvantages:
1. Can be used only in enclosed areas where a minimum of outside sound exists.
2. Unsatisfactory for use where high noise level are encountered.

4. Vibration detection device – the sensor detect any vibration caused by attempted forced entry.
Advantages:
1. Economical and easily installed
2. Has high salvage value
3. Has flexible application.

Disadvantage:
1. Does not perform satisfactory when high vibrations are encountered.

5. ULTRASONIC MOTION DETECTION DEVICE


Consists of trans receiver, amplifier and control unit. Any motion within the protected area causes an activation alarm signal. It is
very effective for the protection of interior areas.

Advantages:
1. Provides effective security against intruders concealed within the premises.
2. Has high salvage value.
3. Difficult for an intruder to compromise the system.

Disadvantages:
1. May require reduced sensitivity to overcome possible disturbance factors such as phones.
2. Can be set off by loud external sounds.

6. CAPACITANCE OR ELECTROSTATIC DETECTION DEVICE


The body capacitance of any intruder who enters the field unbalances the electrostatic energy of the field which in turn activates
the alarm system. It can be installed on a safe, wall, or openings in a protected area to establish an electrostatic field around the
object to be protected.

Advantages:
1. Very flexible in that it is used to protect safes, file cabinets, windows, doors, etc.
2. Simple to install and operate.
3. Provides an invisible protective field.
4. High salvage value.
5. Compact equipment size.
6. High grade protection

Disadvantages:
1. Can be applied only to ungrounded equipment.
2. Accidental alarms can occur if persons such as cleaning personnel carelessly approach the protected area.

7. Smoke Detector Devise - is a device that detects smoke, typically as an indicator of fire. Commercial, industrial, and mass
residential devices issue a signal to a fire alarm system, while household detectors, known as smoke alarms, generally issue a
local audible or visual alarm from the detector itself.

Other types of protective alarm (commonly used by Banks)


1. Foot Rail Activation – engage the activation bar place on the floor in such a position that tellers may activate the alarm by
means of foot.

17
2. Bill Traps - A device for detecting the removal of the last bill in a stack of paper currency for signaling or alarm purposes
consisting of a magnet assembly.
2. Knee or Thigh Buttons – activated by knee usually by the teller. They are commonly found in location where personnel
usually perform their duties from a seated position.
3. DOUBLE SQUEEZE BUTTONS This type of alarm requires pressure on both of its side therefore reducing the probability
of accidental alarm.

TYPES OF ALARM DETECTION SYSTEM;


1. Central Station System – A type of protective alarm system where the alarm is located outside the installation.
2. Central-stations use special telephone lines, computers, software and trained staff to monitor their customers' security
systems and call the appropriate authorities in the event an alarm signal is received.
3. Propriety System – same way as the central system operated by the operator/subscriber, the difference is the alarm is
located within the facility.
4. Auxiliary System – alarm are lead to the local police station or fire department by lease telephone lines usually by special
arrangement.
5. Local Alarm System – consist of rigging up a visual or audible alarm near the object to be protected.
6. Local Alarm-by-Chance System – this is a local alarm system in which a bell or siren is sounded with no predictable response.
7. Dial Alarm System – this system is set to dial a predestined number when alarm is activated. The number selected might be
the police or others.

Other Sensors
Penetration Sensors – sensor on windows, doors etc. sensor consists of magnetic switches and grid wires.
Duress Sensors – it is used to call assistance of other personnel.

The most common causes of False Alarm are:


1. Use negligence.
2. Poor installation or servicing.
3. Faulty Equipment

PROTECTIVE LIGHTING
Designed to emphasize the illumination of the perimeter barrier and the outside approaches to it, or to concentrate on the area and the
building within the perimeter.

Purposes of Protective Lighting:


1. To provide sufficient illumination to the areas during hours of darkness.
2. Lighting can help improve visibility so that intruder can be seen and identified and if possible, apprehended.
3. Lighting also gives that psychological fear and that serve as a deterrent to thieves, pilferer, trespassers and saboteurs.

Importance of Protective Lighting:


1. Serve as deterrent to violators.
2. Assisting Security Force
3. Serves as an essential element of an integrated physical security program.

Types of Security Lighting:


1. Stationary Luminary/Continuous lighting – the most familiar type of out door lighting. Two types;
a. Glare-Projection type – The intensity is focused to a potential intruder. Intruder makes him or her very visible while
Guards are protected by being kept in comparative darkness while being able to observe intruders at a considerable
distance.
b. Controlled lighting - is best when there are limits to the lighted area outside the perimeter, such as along highways. In
controlled lighting, the width of the lighted strip is controlled and adjusted to fit the particular need.
2. Standby Lighting - has a layout similar to continuous lighting; however, the lights are not continuously lit, but are either
automatically or manually turned on when suspicious activity is detected or suspected by security personnel or alarm
systems.

18
3. Movable Lighting - consists of manually operated, movable searchlights that may be lit during hours of darkness or as
needed. The system normally is used to supplement continuous or standby lighting.
4. Emergency Lighting - is a backup power system of lighting that may duplicate any or all of the above systems. Its use is
limited to times of power failure or other emergencies that render the normal system inoperative.

General Types of Lighting Sources;


1. Incandescent Lamp – have low initial cost and provide good color rendition.
2. Fluorescent Lamp - useful light more efficiently than an incandescent lamp and it has a Lower energy cost.
3. Mercury Vapor Lamp - is a gas discharge lamp that uses an electric arc through vaporized mercury to produce light. Emits
purplish-white color, considered more efficient and is widespread in exterior lighting
4. Metal Halide – developed in 1960, is an electric light that produces light by an electric arc through a gaseous mixture of
vaporized mercury and metal halides. Similar to mercury vapor lamps, but contain additional metal compounds in the arc
tube, which improve the efficiency and color rendition (whiteness) of the light.

Metal-halide lamps have high luminous efficacy of around 75 - 100 lumens per watt, about twice the efficiency of mercury vapor lights
and 3 to 5 times that of incandescent lights.

5. High Pressure Sodium Vapor – introduced in 1965. is a gas discharge lamp that uses sodium in an excited state to produce
light, such as parking areas, road way, building, industrial and commercial installation.
6. Flood lights - is an artificial light providing even illumination across a wide area.

Protective Locks and Keys:


Securing one's property has long been a concern of people throughout the world. Beyond hiding the objects or constantly guarding
them the most frequently used option is to secure them with a device.

Pilferage - one of the most annoying and common human hazards which security has to deal with. It is the theft of part of the contents
of a package. It may also include theft of the contents but leaving the package,

Types of Pilferer:
1. Casual Pilferer – is one who steal due to his inability to resist the unexpected opportunity and has little fear of detection.
2. Systematic Pilferer – who steal with plan, purposed is for economic gain.

Lock – a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container or hiding place
and to prevent the removal of items without the consent of the owner.
They may be operated by turning some form of removable key, by keying or dialling in a combination which directly or via
electromechanical means operates the lock, with some form of magnetic or other card reader, or by moving a part on a safety lock
intended to prevent accidental operation rather than to prevent unauthorized access.

Padlock – a portable and detachable lock having sliding hasp which passes through a staple ring or the like and is then made fast or
secured.

Peterman – a term used in England for lock picker, safecrackers and penetrators of restricted areas or rooms.

TYPES OF LOCK;
1. Warded Locks – (is one of the most ancient lock designs still in modern use.) is a type of lock that uses a set of obstructions,
or wards, to prevent the lock from opening unless the correct key is inserted. The correct key has notches or slots
corresponding to the obstructions in the lock, allowing it to rotate freely inside the lock.
2. Disc Tumbler Locks - is a lock composed of slotted rotating detainer discs. A specially cut key rotates these discs like the
tumblers of a safe to align the slots, allowing the sidebar to drop into the slots, thus opening the lock.
3. Lever Locks - is a type of lock that uses a set of levers to prevent the bolt from moving in the lock. In the simplest of these,
lifting the tumbler above a certain height will allow the bolt to slide past.
4. Combination Locks - is a type of lock in which a sequence (permutation) of numbers or symbols is used to open the lock.
5. Code-Operated Locks – a type of lock that no key is used. Pressing the series of numbered button in the proper sequence
open the lock.

19
6. Electromagnetic Locks - is a locking device which operates by means of electric current. Electric locks are sometimes stand-
alone with an electronic control assembly mounted directly to the lock.
7. Card-Operated Locks – these are frequently fitted with a recording device, which registers time of use and the identity of the
user.

Key control;
A device used to open a lock or door.

TYPES OF KEY;
1. Change Key - is a key on the lowest level of a master keying system. Which operate the lock and has a particular
combination of cuts.
2. Sub-master key - A key that activates the locks in more than one but not all doors to spaces assigned to a specific area.
3. Master key - A key that activates all door locks in a building for spaces assigned to a specific area.
4. Grand master key - A key that activates all door locks in a building. The final line of defense at any facility is in the high
security storage area where papers, records, plans or cashable instrument, precious metals or other especially valuables
assets arte protected, these security cabinets will be of a size and quantity which the nature of the business dictates

Types of Security Cabinets;


1. Safe - is a secure lockable box used for securing valuable objects against theft or damage. a metallic container used for
safekeeping of documents or small items in an office or installation.
 its weight at least 750 lbs.
 should be anchored to a building.
 its body should at least one thick steel.
2. Vault(bank vault) - is a secure space where money, valuables, records, and documents can be stored. It is intended to protect
their contents from theft, unauthorized use, fire, natural disasters, and other threats, just like a safe. Heavily constructed fire
and burglar resistance container usually a part of the building structure used keep and protect cash and documents.
 door steel at least 6 inc. thick.
 ceiling, walls, floors 12 inc. thick.
 resistive up to 6 hours.

3. File room – it is a cubicle in a building constructed a little lighter than a vault but bigger size to accommodate limited people to
work on the records inside.
 room should at most be 12 feet high.
 it must have the water tight door and at least fire proof for 1 hour.

Use of Pass System


1. Single pass system- the badge or pass coded for authorization to enter specific areas is issued to an employee who keeps it
in his possession until his authorization is terminates.
2. Pass exchange system- an exchange takes place at the entrance of each controlled area. Upon leaving the personnel
surrenders his badge or passes and retrieve back his basic identification.
3. Multiple pass system- this provides an extra measure of security by requiring that an exchange take place at the entrance of
each restricted area.

TYPES OF SECURITY

SCHOOL, BANK & HOTEL SECURITY


School Security – this refers to the security implemented by the school in order to protect students, teachers or personnel, parents, to
include visitors and property.

20 Tips to Guarantee School Security


1. Install CCTV in all Nooks and Crannies of the School Premises-: It is needful that the school catches all the activities that
happen on camera. This is so that nothing is left un-captured should there be a fishy movement towards anyone in the school.
2. The School Compound Should Be Fenced and Gated-: It is pertinent that the school fences and gates the school premises.
This way the numbers of people who come and go out are checkmated.
20
3. There Should Be Security Personal Stationed at the School Gate
On no account should the school gate be without being manned by a security guard. Therefore, a guard needs to be
employed for this singular reason so as to keep tabs on who comes in and goes out.
4. Clearance Should Be Given To Any Visitor before Entering the School Premises-: Let anyone who wants to go into the school
premises be cleared. This is so that the numbers of people who go into the school are properly screened for safety.
5. Students and Workers Should Always Be In Possession of Their ID card-: The ID card, as well as other modes of identification
should be issued by the school authority to the student. This is so that the school members are properly accounted for.
6. Proper Security Check Must Be Conducted Before Employing Teachers and Other Employees
There is no sentiment here; if you want to hire anyone, then you have to double check to be sure that you are about to employ
a person who doesn’t pose a security threat. Be sure to ask plenty of questions so as to be cock sure you are employing the
one who fits the job.
7. Students Should Be Trained On Security Related Subjects
The student in question has got to be trained on the importance of being security conscious. Imbibe in the students a
consciousness that would cause them to be alert at all times.
8. A Security Club Should Be Formed in the School-: With the news of terrorism all over the world, these days, it is needful to
form a security club in the school. A club; where ideas and discussions on security will be the focus.
9. Only the Parents of Students or Someone Duly Assigned Should Be Allowed to Pickup Students from the School
The school management should give a standing order saying that only the parents or the person the parents have pointed out
should be the ones to pick up the students at school. This way you can checkmate any strange moves.
10. Central Security Alarm Should Be Installing in the School Premises-: It is appropriate that the school should install a central
unit alarm system. This is so that all students and employees can converge of run for their lives when it goes off.
11. Students Bags Should Be Searched from Time to Time to Prevent Them from Bringing in Dangerous Weapons into the School
The school would be doing more good than harm when they put in place measures to always search the bags of students.
This is so that they do not bring in dangerous weapons that can endanger the lives of students.
12. Students Activities should be strictly monitored to avoid them from Joining Secret Cults
Students should never be left alone without monitoring the various activities they engage in during school hours. This is so
that wrong and shady moves can be easily detected for safety.
13. Students Should Be Encouraged To Report any Suspicious Moves or Person within the School Premises to the School
Management-: The school management has got to train students on the importance of reporting any malicious moves within
and even without the school premises.
14. Students Should Only Be Allowed To Leave the School Premises Only When They Have a Pass from the Security Post-: It is
pertinent for the school to create exit passes for the students. This is so that they do not leave the school compound without
the knowledge of the school.
15. People Should Be Discouraged from Loitering or Parking Their Cars outside the School fence- There should be a strict law
restricting people from parking and loitering outside of the school fence. This is so that you are able to keep track on the
activities that go on.
16. If it is a High School / Secondary School or Primary School, Students Should Not Be Allowed to Make Use of Mobile Phones
within the School Premises
The school should ban parents from allowing their wards come to the school environment with phones. This is so that they are
not discouraged. Also, so that stranger with bad intentions does not capitalize on that.
17. Students Should Be Issued Access Cards
We talked about exit cards earlier; now let us talk about access cards. This simply means that bonafide students of the school
should be issued access cards so that they can gain entry into the school. This way unwanted people would not gain entrance
into the school.
18. Security Panel Community should be Setup in Schools to Review Security Policies from Time to Time.-: A security panel
should be put up in schools and then the findings and solutions that are come up with should be reviewed from time to time.
19. Kids Should Be Taught Not To Talk To Strangers-: It is important that the students are taught on the importance of not talking
to strangers. This is so that strangers who have evil intentions do not kidnap the pupils and students.
20. Teach teachers To Be Vigilant-: It is pertinent that teachers are taught on the importance of alerting the school authority when
they spot a shady move by an outsider towards any or student of the school.

Bank Security – a specialized type of physical security protecting the assets, personnel and operation of the bank.
Hotel Security - would be the department within the hotel that would be responsible for the safety and security of the hotel.

21
Thing that this department might do include preventing employee theft, keeping trespassers out of the hotel, preventing thefts in the
parking lots, and investigating thefts and other security incidents.

In larger hotels, the security department works closely with the police to keep the hotel from being used for criminal activities, such as
prostitution and drug dealing.

SPECIAL TYPES OF SECURITY


VIP Security – Means a protection of a person of great importance or influence, especially a dignitary who commands special
treatment.

Document Security – this means protecting very important documents that if divulge it will affect the organization also includes
protecting a customer's privacy in accordance with the law, and gaining an advantage over competitors by not sharing trade secrets.

Operational Security – deals primarily with the protection of processes, formula, patents and other industrial and manufacturing
activities.

Communication Security - is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible
form, while still delivering content to the intended recipients.

Crises Security – means protection from any event that is, or expected to lead to, an unstable and dangerous situation affecting an
individual, group, community or whole society.

Computer security, also known as cyber security or IT security, refers to the security of computing devices such as computers and
smart phones, as well as computer networks such as private and public networks, and the Internet. The field has growing importance
due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people,
and also the procedures by which systems are accessed. The means of computer security include the physical security of systems
and security of information held on them.

Corporate security refers to the resilience of corporations against espionage, theft, damage, and other threats. The security of
corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly
distributed across several countries, including environments that are, or may rapidly become, hostile to them.

Ecological security, also known as environmental security, refers to the integrity of ecosystems and the biosphere, particularly in
relation to their capacity to sustain a diversity of life-forms (including human life). The security of ecosystems has attracted greater
attention as the impact of ecological damage by humans has grown.

Food security refers to the ready supply of, and access to, safe and nutritious food.[11] Food security is gaining in importance as the
world's population has grown and productive land has diminished through overuse and climate change.

Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm
systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms activated, windows closed etc.)

Human security is the name of an emerging paradigm which, in response to traditional emphasis on the right of nation states to protect
themselves, has focused on the primacy of the security of people (individuals and communities).The concept is supported by the United
Nations General Assembly, which has stressed "the right of people to live in freedom and dignity" and recognized "that all individuals,
in particular vulnerable people, are entitled to freedom from fear and freedom from want".

National security refers to the security of a nation state, including its people, economy, and institutions. In practice, state governments
rely on a wide range of means, including diplomacy, economic power, and military capabilities.

The following are security concerns in the Philippines of which you should be aware: 
 Theft, robbery, and mugging 
 Crimes related to illegal drugs 
 Natural disasters such as volcanic eruptions, typhoons, and earthquakes 

22
 Transportation-related accidents such as capsized boats and vehicle and bicycle accidents

Other Special Types of Security (Physical Security)


a. Air Cargo Security – is one of many Aviation Security activities; this means protection and screening security like baggage
screening, non-passenger screening, and airport access control, being put in place to mitigate risks to civil aviation.
b. School Security – This means protection of an school institution; the establishment/property, students, teachers ect.
c. Supermarket Security – this applied in different areas within market place;
d. Personnel Security – refers to the background investigation or check of all employees, applicants, contractors, and others

COMPUTER SECURITY, BOMB AND EXPLOSIVE SECURITY


Computer security, also known as cyber security, is the protection of information systems from theft or damage to the hardware, the
software, and to the information on them, as well as from disruption or misdirection of the services they provide.

It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and
code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from
secure procedures.

The two(2) categories of threats to computer security


1. Deliberate threats involve acts intentionally taken to breach computer security.
2. Non-deliberate threats involve situations when computer security is threatened by non-human forces, or by human actions that
are not intended to breach security but have that unintended effect.

What are the concerns of computer security?


Computer Security is concerned with four main areas:
1. Confidentiality:- Only authorized users can access the data resources and information.
2. Integrity:- Only authorized users should be able to modify the data when needed.
3. Availability:- is concerned with ensuring a computer or computer system can be operated and used by authorized persons
when they need it. Data should be available to users when needed.
4. Authentication:- is concerned with controlling access to information to protect it from unauthorized persons.

Why is computer security important?


Prevention of data theft such as bank account numbers, credit card information, passwords, work related documents or sheets, etc. is
essential in today’s communications since many of our day to day actions depend on the security of the data paths.

Data present in a computer can also be misused by unauthorized intrusions. An intruder can modify and change the program source
codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading
and offensive social accounts.

Malicious intents can also be a factor in computer security. Intruders often use your computers for attacking other computers or
websites or networks for creating havoc. Vengeful hackers might crash someone’s computer system to create data loss. DDOS attacks
can be made to prevent access to websites by crashing the server.

Above factors imply that your data should remain safe and confidential. Therefore, it is necessary to protect your computer and hence
the need for Computer Security arises.

What is firewall?
A firewall is a security-conscious piece of hardware or soft-ware that sits between the Internet and your network with a single-minded
task: preventing them from getting to us. The firewall acts as a security guard between the Internet and your local area network (LAN).
All network traffic into and out of the LAN must pass through the firewall, which prevents unauthorized access to the network.

The types of firewalls


1. Packet-filtering firewall examines each packet that crosses the firewall and tests the packet according to a set of rules that you
set up. If the packet passes the test, it’s allowed to pass. If the packet doesn’t pass, it’s rejected. Packet filters are the least
expensive type of firewall. As a result, packet-filtering firewalls are very common.

23
2. Stateful packet inspection (SPI) is a step up in intelligence from simple packet filtering . A firewall with stateful packet
inspection looks at packets in groups rather than individually. It keeps track of which packets have passed through the firewall
and can detect patterns that indicate unauthorized access.
3. Deep packet inspection (DPI) is the actual content of the packets is inspected so viruses, spam, and other harmful content can
be blocked.DPI also allows practices, such as data mining, eavesdropping, and content censorship, which make its use a
controversial subject.

Why is Computer Security Important?


 Enabling people to carry out their jobs, education, and research activities
 Supporting critical business processes.
 Protecting personal and sensitive information

Why do we need to learn about Computer Security? Isn't this just an IT problem?
Good Security Standards follow the "90 / 10" Rule:
 90% of security safeguards rely on an individual ("YOU") to adhere to good computing practices
 10% of security safeguards are technical.

Example: The lock on the door is the 10%. You remembering to lock the lock, checking to see if the door is closed, ensuring others do
not prop the door open, keeping control of the keys, etc. is the 90%. You need both parts for effective security.

What Does This Mean for Me?


 This means that everyone who uses a computer or mobile device needs to understand how to keep their computer, device
and data secure.
 Information Technology Security is everyone's responsibility!

Guard your information in your computer by observing the following;


1. Set computer password, this is the most widely used method to prevent unauthorized access.
2. Click wisely, beware of scams, click on links you trust
3. Physical security, secure your computer in proper place
4. Back it up, always make a ways to back it up important files and data
5. Encryption, is widely used in system like e-commerce and internet banking where the database contain very sensitive
information

Republic Act No. 10175, This Act shall be known as the “Cybercrime Prevention Act of 2012″
Important terms;
1. Access refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any
resources of a computer system or communication network.
2. Alteration refers to the modification or change, in form or substance, of an existing computer data or program.
3. Computer refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or
grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any
storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such
device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart
phones, computer networks and other devices connected to the internet.
4. Computer data refers to any representation of facts, information, or concepts in a form suitable for processing in a computer
system including a program suitable to cause a computer system to perform a function and includes electronic documents
and/or electronic data messages whether stored in local computer systems or online.
5. Computer program refers to a set of instructions executed by the computer to achieve intended results.
6. Computer system refers to any device or group of interconnected or related devices, one or more of which, pursuant to a
program, performs automated processing of data. It covers any type of device with data processing capabilities including, but
not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and
storage components which may stand alone or be connected in a network or other similar devices. It also includes computer
data storage devices or media.
7. Cyber refers to a computer or a computer network, the electronic medium in which online communication takes place.

24
8. Cybersecurity refers to the collection of tools, policies, risk management approaches, actions, training, best practices,
assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
9. Database refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared,
processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a
computer system.

Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act:
a. Offenses against the confidentiality, integrity and availability of computer data and systems:
1. Illegal Access. – The access to the whole or any part of a computer system without right.
2. Illegal Interception. – The interception made by technical means without right of any non-public transmission of computer
data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such
computer data.
3. Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data,
electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
4. System Interference. — The intentional alteration or reckless hindering or interference with the functioning of a computer
or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or
program, electronic document, or electronic data message, without right or authority, including the introduction or
transmission of viruses.
5. Misuse of Devices.
a. The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
i. A device, including a computer program, designed or adapted primarily for the purpose of committing any of the
offenses under this Act; or
ii. A computer password, access code, or similar data by which the whole or any part of a computer system is
capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this
Act.
b. The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent to use said devices for the
purpose of committing any of the offenses under this section.

6. Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation,
and deprive others from registering the same, if such a domain name is:
a. Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency
at the time of the domain name registration:
b. Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and
c. Acquired without right or with intellectual property interests in it.

b. Computer-related Offenses:
1. Computer-related Forgery. —
a. The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it
be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly
readable and intelligible; or
b. The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the
purpose of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud. — The unauthorized input, alteration, or deletion of computer data or program or interference in
the functioning of a computer system, causing damage thereby with fraudulent intent: Provided, That if no damage has
yet been caused, the penalty imposable shall be one (1) degree lower.
3. Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of
identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has
yet been caused, the penalty imposable shall be one (1) degree lower.

c. Content-related Offenses:
1. Cybersex. — The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition
of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

25
2. Child Pornography. — The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child
Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1)
one degree higher than that provided for in Republic Act No. 9775.
3. Unsolicited Commercial Communications. — The transmission of commercial electronic communication with the use of
computer system which seek to advertise, sell, or offer for sale products and services are prohibited unless:
a. There is prior affirmative consent from the recipient; or
b. The primary intent of the communication is for service and/or administrative announcements from the sender to its
existing users, subscribers or customers; or
c. The following conditions are present:
i. The commercial electronic communication contains a simple, valid, and reliable way for the recipient to reject.
receipt of further commercial electronic messages (opt-out) from the same source;
ii. The commercial electronic communication does not purposely disguise the source of the electronic message;
and
iii. The commercial electronic communication does not purposely include misleading information in any part of the
message in order to induce the recipients to read the message.
4. Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended,
committed through a computer system or any other similar means which may be devised in the future.

Bomb and Explosive Security


The Massive Ordnance Air Blast (MOAB) bomb produced in the United States is the second most powerful conventional bomb in the
world.

A bomb threat is defined as a threat to detonate an explosive or incendiary device to cause property damage, death, or injuries,
whether or not such a device actually exists. All bomb threats are to be taken seriously.

Bomb threats are delivered in a variety of ways. The majority of threats are called in to the target. Occasionally these calls are through
a third party. Sometimes a threat is communicated in writing or by a recording.

Two logical explanations for reporting a bomb threat are:


1. The caller has definite knowledge or believes that an explosive or incendiary bomb has been or will be placed and he/she
wants to minimize personal injury or property damage. The caller may be the person who placed the device or someone who
has become aware of such information.
2. The caller wants to create an atmosphere of anxiety and panic which will, in turn, result in a disruption of the normal activities
at the facility where the device is purportedly placed.

Whatever the reason for the report, there will certainly be a reaction to it. Through proper planning, the wide variety of potentially
uncontrollable reactions can be greatly reduced.

The Physical Security Plan and a Bomb Incident Plan


In preparing to cope with a bomb incident, it is necessary to develop two separate but interdependent plans, namely a physical security
plan and a bomb incident plan.

Physical security provides for the protection of property, personnel, facilities, and material against unauthorized entry, trespass,
damage, sabotage, or other illegal or criminal acts. The physical security plan deals with prevention and control of access to the
building. In most instances, some form of physical security may be already in existence, although not necessarily intended to prevent a
bomb attack.

The bomb incident plan provides detailed procedures to be implemented when a bombing attack is executed or threatened. In planning
for the bomb incident, a definite chain of command or line of authority must be established only by using an established organization
and procedures can the bomb incident be handled with the least risk to all concerned. A clearly defined line of authority will instill
confidence and avoid panic.

Establishing a chain of command is easy if there is a simple office structure, one business, one building. However, if a complex
situation exists, a multi-occupant building for example, a representative from each occupant entity should attend the planning

26
conference. A leader should be appointed and a clear line of succession delineated. This chain of command should be printed and
circulated to all concerned parties.

The Command Center


In planning, you should designate a command center to be located in the switchboard room or other focal point of telephone or radio
communications. The management personnel assigned to operate the center should have the authority to decide whatever action
should be taken during the threat. Only those with assigned duties should be permitted in the center. Make some provision for
alternates in the event someone is absent when a threat is received. Obtain an updated blueprint or floor plan of your building and
maintain it in the command center.

Contact the police department, fire department, or local government agencies to determine if any assistance is available to you for
developing your physical security plan or bomb incident plan. If possible, have police and/or fire department representatives and
members of your staff inspect the building for areas where explosives are likely to be concealed. (Make a checklist of these areas for
inclusion in command center materials.) Determine whether there is a bomb disposal unit available, how to contact the unit, and under
what conditions it is activated. In developing your bomb incident plan, you must also ascertain whether the bomb disposal unit, in
addition to disarming and removing the explosives, will assist in searching the building in the event of a threat.

Training is essential to deal properly with a bomb threat incident. Instruct all personnel, especially those at the telephone switchboard,
in what to do if a bomb threat is received. Be absolutely certain that all personnel assigned to the command center are aware of their
duties. The positive aspects of planning will be lost if the leadership is not apparent. It is also very important to organize and train an
evacuation unit which will be responsive to the command center and has a clear understanding of the importance of its role.

The command center be located near the switchboard or focal point of communications. It is critical that lines of communication be
established between the command center and the search or evacuation teams- The center must have the flexibility to keep up with the
search team progress. In a large facility, if the teams go beyond the communications network, the command center must have the
mobility to maintain contact and track search or evacuation efforts.

Security Against Bomb Incidents


Most commercial structures and individual residences already have some security in place, planned or unplanned, realized or not.
Locks on windows and doors, outside lights, etc., are all designed and installed to contribute toward the security of a facility and the
protection of its occupants.

In considering measures to increase security for your building or office, it is highly recommended that you contact your local police
department for guidance regarding a specific plan for your facility. There is no single security plan that is adaptable to all situations. The
following recommendations are offered because they may contribute to reducing your vulnerability to bomb attacks.

The exterior configuration of a building or facility is very important. Unfortunately, in most instances, the architect has given little or no
consideration to security, particularly toward thwarting or discouraging a bomb attack. However, by the addition of fencing and lighting,
and by controlling access, the vulnerability of a facility to a bomb attack can be reduced significantly.

Bombs being delivered by car or left in a car are a grave reality. Parking should be restricted, if possible, to 300 feet from your building
or any building in a complex. If restricted parking is not feasible, properly identified employee vehicles should be parked closest to your
facility and visitor vehicles parked at a distance.

Heavy shrubs and vines should be kept close to the ground to reduce their potential to conceal criminals or bombs. Window boxes and
planters are perfect receptacles for the bomber. Unless there is an absolute requirement for such ornamentation, window boxes and
planters are better removed. If they must remain, a security patrol should be employed to check them regularly.

A highly visible security patrol can be a significant deterrent. Even if this ''patrol'' is only one security guard/night guard, he/she is
optimally utilized outside the building. If an interior guard is utilized, consider the installation of closed-circuit television cameras that
cover exterior building perimeters.

Have an adequate burglar alarm system installed by a reputable company that can service and properly maintain the equipment. Post
signs indicating that such a system is in place.

27
Entrance/exit doors with hinges and hinge pins on the inside to prevent removal should be installed. Solid wood or sheet metal faced
doors provide extra integrity that a hollow-core wooden door cannot provide. A steel door frame that properly fits the door is as
important as the construction of the door.

The ideal security situation is a building with no windows. However, bars, grates, heavy mesh screens, or steel shutters over windows
offer good protection from otherwise unwanted entry. It is important that the openings in the protective coverings are not too large.
Otherwise, a bomb may be introduced into the building while the bomber remains outside. Floor vents, transoms, and skylights should
also be covered. Please note that fire safety considerations preclude the use of certain window coverings. Municipal ordinances should
be researched and safety considered before any of these renovations are undertaken.

Controls should be established for positively identifying personnel who are authorized access to critical areas and for denying access to
unauthorized personnel. These controls should extend to the inspection of all packages and materials being taken into critical areas.

Security and maintenance personnel should be alert for people who act in a suspicious manner, as well as objects, items, or parcels
which look out of place or suspicious. Surveillance should be established to include potential hiding places (e.g., stairwells, rest rooms,
and any vacant office space) for unwanted individuals.

Doors or access ways to such areas as boiler rooms, mail rooms, computer areas, switchboards, and elevator control rooms should
remain locked when not in use. It is important to establish a procedure for the accountability of keys. If keys cannot be accounted for,
locks should be changed.

Good housekeeping is also vital. Trash or dumpsite areas should remain free of debris. A bomb or device can easily be concealed in
the trash. Combustible materials should be properly disposed of, or protected if further use is anticipated.

Install detection devices at all entrances and closed-circuit television in those areas previously identified as likely places where a bomb
may be placed. This, coupled with the posting of signs indicating such measures are in place, is a good deterrent.

The threatened use of explosives necessitates that in the interest of safety and security, some inconvenience may have to be imposed
on visitors to public buildings. The public is becoming more accustomed to routine security checks and will readily accept these minor
inconveniences.

Perhaps entrances and exits can be modified with a minimal expenditure to channel all visitors through someone at a reception desk.
Individuals entering the building would be required to sign a register indicating the name and room number of the person whom they
wish to visit. Employees at these reception desks could contact the person to be visited and advise him/her that a visitor, by name, is in
the lobby. The person to be visited may decide to come to the lobby to ascertain that the purpose of the visit is valid. A system for
signing out when the individual departs could be integrated into this procedure.

Such a procedure may result in complaints from the public. If the reception desk clerk explains to the visitor that these procedures were
implemented in his/her best interest and safety, the complaints would be reduced. The placement of a sign at the reception desk
informing visitors of the need for safety is another option.

Responding to Bomb Threats


Instruct all personnel, especially those at the telephone switchboard, in what to do if a bomb threat call is received.

It is always desirable that more than one person listen in on the call. To do this, a covert signaling system should be implemented,
perhaps by using a coded buzzer signal to a second reception point.

A calm response to the bomb threat caller could result in obtaining additional information. This is especially true if the caller wishes to
avoid injuries or deaths. If told that the building is occupied or cannot be evacuated in time, the bomber may be willing to give more
specific information on the bomb's location, components, or method of initiation.

The bomb threat caller is the best source of information about the bomb. When a bomb threat is called in:
 Keep the caller on the line as long as possible. Ask him/her to repeat the message. Record every word spoken by the person.

28
 If the caller does not indicate the location of the bomb or the time of possible detonation, ask him/her for this information.
 Inform the caller that the building is occupied and the detonation of a bomb could result in death or serious injury to many
innocent people.
 Pay particular attention to background noises, such as motors running, music playing, and any other noise which may give a
clue as to the location of the caller.
 Listen closely to the voice (male, female), voice quality (calm, excited), accents, and speech impediments. Immediately after
the caller hangs up, report the threat to the person designated by management to receive such information.
 Report the information immediately to the police department, fire department, and other appropriate agencies. The sequence
of notification should be established in the bomb incident plan.
 Remain available, as law enforcement personnel will want to interview you.

When a written threat is received, save all materials, including any envelope or container. Once the message is recognized as a bomb
threat, further unnecessary handling should be avoided. Every possible effort must be made to retain evidence such as fingerprints,
handwriting or typewriting, paper, and postal marks. These will prove essential in tracing the threat and identifying the writer.

While written messages are usually associated with generalized threats and extortion attempts, a written warning of a specific device
may occasionally be received. It should never be ignored.

Decision Time
The most serious of all decisions to be made by management in the event of a bomb threat is whether to evacuate the building. In
many cases, this decision may have already been made during the development of the bomb incident plan. Management may
pronounce a policy that, in the event of a bomb threat, total evacuation will be effective immediately. This decision circumvents the
calculated risk and demonstrates a deep concern for the safety of personnel in the building. However, such a decision can result in
costly loss of time.

Essentially, there are three alternatives when faced with a bomb threat:
1. Ignore the threat.
2. Evacuate immediately.
3. Search and evacuate warranted.

Ignoring the threat completely can result in some problems. While a statistical argument can be made that very few bomb threats are
real, it cannot be overlooked that bombs have been located in connection with threats. If employees learn that bomb threats have been
received and ignored, it could result in morale problems and have a long-term adverse effect on your business. Also, there is the
possibility that if the bomb threat caller feels that he/she is being ignored, he/she may go beyond the threat and actually plant a bomb.

Evacuating immediately on every bomb threat is an alternative that on face value appears to be the preferred approach. However, the
negative factors inherent in this approach must be considered. The obvious result of immediate evacuation is the disruptive effect on
your business. If the bomb threat caller knows that your policy is to evacuate each time a call is made, he/she can continually call and
force your business to a standstill. An employee, knowing that the policy is to evacuate immediately, may make a threat in order to get
out of work. A student may use a bomb threat to avoid a class or miss a test. Also, a bomber wishing to cause personal injuries could
place a bomb near an exit normally used to evacuate and then call in the threat.

Initiating a search after a threat is received and evacuating a building after a suspicious package or device is found is the third, and
perhaps most desired, approach. It is certainly not as disruptive as an immediate evacuation and will satisfy the requirement to do
something when a threat is received. If a device is found, the evacuation can be accomplished expeditiously while at if the same time
avoiding the potential danger areas of the bomb.

Evacuation
An evacuation unit consisting of management personnel should be organized and trained. The organization and training of this unit
should be coordinated with the development of the bomb incident plan, as well as with all tenants of a building.

When police officers or firefighters arrive at the building, the contents and the floor plan will be unfamiliar to them if they have not
previously reconnoitered the facility. Thus, it is extremely important that the evacuation or search unit be thoroughly trained and familiar

29
with the floor plan of the building and immediate outside areas. When a room or particular area is searched, it should be marked or
sealed with a piece of tape and reported to the supervisor of that area.

The evacuation or search unit should be trained only in evacuation and search techniques and not in the techniques of neutralizing,
removing or otherwise having contact with the device. If a device is located, it should not be disturbed. However, its location should be
well marked and a route back to the device noted.

Search Teams
It is advisable to use more than one individual to search any area or room, no matter how small. Searches can be conducted by
supervisory personnel, area occupants or trained explosive search teams. There are advantages and disadvantages to each method of
staffing the search teams.

Using supervisory personnel to search is a rapid approach and causes little disturbance. There will be little loss of employee working
time, but a morale problem may develop if it is discovered that a bomb threat has been received and workers were left unaware. Using
a supervisor to search will usually not be as thorough because of his/her unfamiliarity with many areas and his/her desire to get on with
business.

Best method for rapid search;


1. Using area occupants to search their own areas is the best method for a rapid search.
2. The occupants' concern for their own safety will contribute toward a more thorough search.
3. The personnel conducting the search are familiar with what does or does not belong in a particular area.
4. Using occupants to search will result in a shorter loss of work time than if all were evacuated prior to search by trained teams.
5. Using the occupants to search can have a positive effect on morale, given a good training program to develop confidence.

The search conducted by a trained team is the best for safety, morale and thoroughness, though it does take the most time. Using a
trained team will result in a significant loss of production time. It is a slow operation that requires comprehensive training and practice.

The decision as to who should conduct searches lies with management, and should be considered and incorporated into the bomb
incident plan.

Search Technique
The following room search technique is based on the use of a two-person searching team. There are many minor variations possible in
searching a room. The following contains only the basic techniques.
1. When the two-person search they should first move to various parts of the room and stand quietly with their eyes closed and
listen for a clockwork device.
2. Frequently, a clockwork mechanism can be quickly detected without use of special equipment. Even if no clockwork
mechanism is detected, the team is now aware of the background noise level within the room itself.
3. Background noise or transferred sound is always disturbing during a building search.
4. Background noise may also include outside traffic sounds, rain, and wind.

The individual in charge of the room searching team should look around the room and determine how the room is to be divided for
searching and to what height the first searching sweep should extend. The first searching sweep will cover all items resting on the floor
up to the selected height.

You should divide the room into two virtually equal parts. This equal division should be based on the number and type of objects in the
room to be searched and not on the size of the room. An imaginary line is then drawn between two objects in the room; e.g., the edge
of the window on the north wall to the floor lamp on the south wall.

First Room-Searching Sweep


Look at the furniture or objects in the room and determine the average height of the majority of items resting on the floor. In an average
room, this height usually includes table or desk tops and chair backs. The first searching height usually covers the items in the room up
to hip height.

30
After the room has been divided and a searching height has been selected, both individuals go to one end of the room division line and
start from a back-to-back position. This is the starting point and the same point will be used on each successive searching sweep- Each
person now starts searching his/her way around the room, working toward the other person, checking all items resting on the floor
around the wall area of the room. When the two individuals meet, they will have completed a "wall sweep." They should then work
together and check all items in the middle of the room up to the selected hip height, including the floor under the rugs. This first
searching sweep should also include those items which may be mounted on or in the walls, such as air-conditioning ducts, baseboard
heaters, and built-in wall cupboards, if these fixtures are below hip height.

The first searching sweep usually consumes the most time and effort. During all the searching sweeps, use the electronic or medical
stethoscope on walls, furniture items, and floors.

Second Room-Searching Sweep


The individual in charge again looks at the furniture or objects in the room and determines the height of the second searching sweep.
This height is usually from the hip to the chin or top of the head. The two persons return to the starting point and repeat the searching
technique at the second selected searching height. This sweep usually covers pictures hanging on the walls, built-in bookcases, and
tall table lamps.

Third Room-Searching Sweep


When the second searching sweep is completed, the person in charge again determines the next searching height, usually from the
chin or the top of the head up to the ceiling. The third sweep is then made. This sweep usually covers high mounted air-conditioning
ducts and hanging light fixtures.

Fourth Room-Searching Sweep


If the room has a false or suspended ceiling. the fourth sweep involves investigation of this area. Check flush or ceiling-mounted light
fixtures, air-conditioning or ventilation duds, sound or speaker systems, electrical wiring, and structural frame members.

Have a sign or marker indicating "Search Completed" conspicuously posted in the area. Place a piece of colored Scotch tape across
the door and door jamb approximately 2 feet above floor level if the use of signs is not practical.
The room searching technique can be expanded. The same basic technique can be applied to search any enclosed area. Encourage
the use of common sense or logic in searching. If a guest speaker at a convention has been threatened, common sense would indicate
searching the speakers platform and microphones first, but always return to the searching technique. Do not rely on random or spot
checking of only logical target areas. The bomber may not be a logical person.

In conclusion, the following steps should be taken in order to search a room:


1. Divide the area and select a search height.
2. 2- Start from the bottom and work up.
3. Start back-to-back and work toward each other.
4. Go around the walls and proceed toward the center of the room.

Suspicious Object Located


It is imperative that personnel involved in a search be instructed that their only mission is to search for and report suspicious objects.
Under no circumstances should anyone move, jar or touch a suspicious object or anything attached to it. The removal or disarming of a
bomb must be left to the professionals in explosive ordnance disposal. When a suspicious object is discovered, the following
procedures are recommended.
1. Report the location and an accurate description of the object to the appropriate warden. This information should be relayed
immediately to the command center, which will notify the police and fire departments, and rescue squad. These officers should
be met and escorted to the scene.
2. If absolutely necessary, place sandbags or mattresses, never metal shields, around the suspicious object. Do not attempt to
cover the object.
3. Identify the danger area, and block it off with a clear zone of at least 300 feet, including floors below and above the object.
4. Check to see that all doors and windows are open to minimize primary damage from blast and secondary damage from
fragmentation.
2. Evacuate the building.

31
3. Do not permit re-entry into the building until the device has been removed/disarmed, and the building declared safe for re-
entry.

Handling of the News Media


It is of paramount importance that all inquiries from the news media be directed to one individual appointed as spokesperson. All other
persons should be instructed not to discuss the situation with outsiders, especially the news media.

The purpose of this provision is to furnish the news media with accurate information and to see that additional bomb threat calls are rot
precipitated by irresponsible statements from uninformed sources.

Bomb Incident Plan


1. Designate a chain of command.
2. Establish a command center.
3. Decide what primary and alternate communications will be used.
4. Establish clearly how and by whom a bomb threat will be evaluated.
5. Decide what procedures will be followed when a bomb threat is received or device discovered.
6. Determine to what extent the available bomb squad will assist and at what point the squad will respond.
7. Provide an evacuation plan with enough flexibility to avoid a suspected danger area.
8. Designate search teams.
9. Designate areas to be searched.
10. Establish techniques to be utilized during search.
11. Establish a procedure to report and track progress of the search and a method to lead qualified bomb technicians to a
suspicious package.
12. Have a contingency plan available if a bomb should go off.
13. Establish a simple-to-follow procedure for the person receiving the bomb threat.
14. Review your physical security plan in conjunction with the development of your bomb incident plan.

Command Center
1. Designate a primary location and an alternate location.
2. Assign personnel and designate decision making authority.
3. Establish a method for tracking search teams.
4. Maintain a list of likely target areas.
2. Maintain a blueprint of floor diagrams in the center.
3. Establish primary and secondary methods of communication. (Caution-the use of two-way radios during a search can cause
premature detonation of an electric blasting cap.)
4. Formulate a plan for establishing a command center, if a threat is received after normal work hours.
5. Maintain a roster of all necessary telephone numbers.

Below is a list of five different types of bombs based on the fundamental explosive mechanism they employ.
1. Compressed gas, Relatively small explosions can be produced by pressurizing a container until catastrophic failure such as
with a dry ice bomb.
2. Low explosive, The simplest and oldest bombs store energy in the form of a low explosive. Black powder is an example of a
low explosive. therefore, must generally be used in large quantities or confined in a container with a high burst pressure to be
useful as a bomb.
3. High explosive, A high explosive bomb is one that employs a process called "detonation" to rapidly go from an initially high
energy molecule to a very low energy molecule. Detonation is distinct from deflagration in that the chemical reaction
propagates faster than the speed of sound (often many times faster) in an intense shock wave.
4. Thermobaric, A thermobaric bomb is a type of explosive that utilizes oxygen from the surrounding air to generate an intense,
high-temperature explosion, and in practice the blast wave typically produced by such a weapon is of a significantly longer
duration than that produced by a conventional condensed explosive. The fuel-air bomb is one of the best-known types of
thermobaric weapons.
5. Nuclear fission, Nuclear fission type atomic bombs utilize the energy present in very heavy atomic nuclei, such as U-235 or
Pu-239.

32
6. Nuclear fusion, A thermonuclear weapon is a type of nuclear bomb that releases energy through the combination of fission
and fusion of the light atomic nuclei of deuterium and tritium. With this type of bomb, a thermonuclear detonation is triggered
by the detonation of a fission type nuclear bomb contained within a material containing high concentrations of deuterium and
tritium.
7. Weapon yield is typically increased with a tamper that increases the duration and intensity of the reaction through inertial
confinement and neutron reflection. Nuclear fusion bombs can have arbitrarily high yields making them hundreds or thousands
of times more powerful than nuclear fission.

PERSONNEL SECURITY
Includes all the security measures designed to prevent individuals of doubtful loyalty, character, integrity from gaining access to
classified matters and sensitive facilities. It is composed of conducting personnel security investigation and security education
programs.

Personnel Security Investigation - is an inquiry into the reputation, character, integrity, discretion moral and loyalty of an individual in
order to determine a person’s suitability for appointment or access to classified matters.

Purpose of Personnel Security:


1. To insure that a firm hires those employees best suited for the firm.
2. Once hired, to assist the providing the necessary security to these employees while they are carrying out them functions.

Basic elements in Personnel Security:


1. It involves all measures instituted to safeguard company’s employees and those coming to the place of business reasons or
as guest.
2. Access control in relation to physical security system can further perform in controlling function and out specific premises.
3. Personnel control involves the use of various identification card system, passes, permits and clearances used by a particular
installation.
4. Executive protection and background investigations are probably the most classified and prominent aspect in personnel
security.
5. Due diligence is the rule of thumb when it comes to protecting people and corporate asset.

Security Chain – personnel security is the weakest link in the security chain. This weakness can be the best minimized or eliminated by
making init personnel security through good training program.

Types of National Agency Check (NAC):


1. National Bureau of Investigation Clearance
2. PNP Directorate for Intelligence Clearance.

TYPES OF PSI 
1. National Agency Check – this is an investigation of an Individual made upon the basis of written information supplied by him in
response to official inquiry and reference to national agencies as such;
a. NBI - is an agency of the Philippine government under the Department of Justice, responsible for handling and
solving major high profile cases that are in the interest of the nation.
b. NICA - is the primary intelligence gathering and analysis arm of the Philippine government, in charge of carrying out
overt, covert, and clandestine intelligence.
c. PNP Directorate for Intelligence Clearance.

2. Local Agency Check(LAC) – investigation from the local government agencies, work, school attended, residence. It also
includes all local clearances.

Types of Local Agency Check (LAC):


1. Barangay Clearance
2. City and Municipal Clearance
3. Local Police Clearance
4. Court Clearance

33
General Techniques of PSI:
A. BACKGROUND INVESTIGATION – is called as the comprehensive investigation other than the NAC and LAC, to verify
information on the application and to obtain pertinent information.

Factors to consider in conducting a BI


1. Loyalty - refers to a faithfulness of a person to company/organization.
2. Character – refers to the attitude of a person on things that is favorable or unfavorable to him.
3. Integrity - is a concept of consistency of actions, values, or principles.
4. Reputation - overall quality or character as seen or judged by people in general.
5. Discretion
6. Morals - used by authority figures as a generic value judgment of the willpower, obedience and self-discipline.  

Components of Complete BI:


 Applicant’s Name
 Date of birth
 Present residence
 Personal history
 Marital history
 Credit Cards

B. Positive Vetting – is the process of inspecting or examining through interview.


C. Prowling – the process whereby a subject asked critical questions that are predicted to test or observe his behavior.
D. Deception Detection Techniques – the process of using devices in detecting deception.
E. Financial and Lifestyle Inquiry – this type of investigation is gather information on income and mode of living of the applicant.
F. Undercover Investigation – this type of technique is to identify the true identity in order to obtain criminal prosecution.

PASS OR BADGE SYSTEM


All personnel entering and leaving any area of a facility should be identified and checked for their authorization to be there. Each
personnel should be identified by a badge or pass, using one of several systems:
1. SINGLE PASS SYSTEM. Wherein the badge or pass is coded for authorization to enter a specific area is issued to an
employee who keeps it in his possession until his authorization is change or until he is terminated.
2. PASS EXCHANGE SYSTEM. The holder of a pass exchanges a one-color coded pass at the entrance to a controlled area for
another which carries a different color specifying the limitations of the holder’s authorization. Upon leaving the holder
surrenders the controlled area pass/badge in exchange for his basic authorization identification.
NOTE: In this system the second badge never leaves the controlled area, thus reducing the possibility of switching, forging or
alteration.
3. MULTIPLE PASS SYSTEM. This system provides an extra measure of security by requiring that an exchange pass/badge
take place at the entrance to each restricted area within a controlled area.

BADGE AND PASS CONTROL


 The system should have a complete record of all badges and identification cards issued, returned, mutilated or lost by serial
number and cross-indexed alphabetically
 The list of passes and badges should be checked by a supervisor from time to time for its accuracy and authenticity.
 Passes and badges reported lost should be invalidated and security guards at entrances be informed through conspicuous
posting.

PERSONNEL IDENTIFICATION
The most practical and generally accepted system in personnel identification is the use of badges and identification cards. Generally
speaking, this system designates when and where and how passes should be displayed, and to whom; what is to be done in case of
loss of the pass; procedures for taking a pass from terminated employees; and a system in cancellation and re-issue of all passes;
either as a security review or when a significant number of badges have been reported stolen or lost. To be effective;
 Badges must be tamper-resistant, which means that they should be printed or embossed on a distinctive stock which work
with a series of design difficult to reproduce.
34
 They should contain a clear and recent photograph of the bearer, preferably in color.
 The photograph appearing in the badge/pass should be at least one inch square and should be updated every two or three
years or when there is any significant change in facial appearance of the bearer.
 It should additionally contain vital statistics, such as date of birth, height, weight, color of hair and eyes, sex and thumbprints.

TYPES OF CONTROLLED AREAS


1. CONTROLLED AREAS
These are areas whose access is restricted as to entrance and movement to all but authorized personnel and vehicles. It should be
additionally marked by a fence or other barrier, and access to it should be limited to as few guest as possible.
2. LIMITED AREAS
These are areas within the controlled area where a greater degree of security is required.
3. EXCLUSION AREAS
These areas are only used for handling and storage of high value cargo and classified documents. The number of people authorized to
enter this area should be strictly limited, and this area should be under surveillance at all time.

Document Security
It is the branch of security involved in the protection of documents and classified papers from loss, access by unauthorized person,
theft, damage and compromise through disclosure.

The term document in security matters, covers any form of recorded information either printed, written, drawn, painted, sound
recording, films, maps, etc. The object is to secure and control the sensitive information contained therein so as not to prejudice the
firm, company or agency.
a. Policy – Security of document and information is the responsibility of all concerned.
b. Regulation – Anybody found guilty violating document and information security shall be dealt with accordingly.
c. Doctrine – Access to information is based on the Need to Know* and not by position.
d. Practice – Authority to have access to classified information is not permanent but can be withdrawn by the originating
authority.
* Need to Know – Is the principle whereby access to classified matter may only be given to those persons to whom it is necessary for
the fulfillment of their duty. Persons are not entitled to have access to classified matter solely by virtue of their status or office. *

Identity document (also called a piece of identification or ID) is any document which may be used to prove a person's identity.

Some countries issue formal identity documents, as national identification cards which may be compulsory or non-compulsory, while
others may require identity verification using regional identification or informal documents. When the identity document incorporates a
person's photograph, it may be called photo ID.

In the absence of a formal identity document, the following may be presented for identification;
 A driver's license 
 Passport
 National Identification card if available

The identity document is used to connect a person to information about the person, often in a database. The photo and the possession
of it is used to connect the person with the document. The connection between the identity document and information database is
based on personal information present on the document, such as the bearer's full name, age, birth date, address, an identification
number, card number, gender, citizenship and more. A unique national identification number is the most secure way, but some
countries lack such numbers or don't mention them on identity documents.

Two (2) kinds of Documents:


1. Personal – letters, diary, and notebooks.
2. Official Document – orders, manuals, letters and overlays.

Document/Information Cycle:
1. Creation
2. Classification
35
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition

Categories of Document:
1. Category A. Contains reportable time, it is critical information, forwarded delay, critical to friendly operation and requires
immediate action.
2. Category B. Contains communications, cryptographic documents and be classified secret and special handling.
3. Category C. It has an intelligence value, contains exploitable information regardless of its contents.
4. Category D. No value, yet lower level will never classify documents and no decision made.

Classification of documents:
Class I - Vital/company confidential/secret documents
Class II - Important/Private confidential documents.
Class III - Useful documents
Class IV - Non-essential documents

Types of Classified Matters:


1. Top Secret (green) – information the unauthorized disclosure it would cause exceptional grave damage, politically,
economically and military operation.
2. Secret (red) – information would endanger national security and serious injury an advantage of foreign nation.
3. Confidential(blue) – it would be prejudicial to the interest and prestige of national government agency and embarrassment of
unwanted injury.
4. Restricted (white or no color) – which requires protection other than those determines secret, top secret, and confidential.

Rules in Classifying Information:


1. Classified according to their content.
2. Classification should classify in group physically connected.
3. Transmittal documents and endorsements should be shall include automatic downgrading.
4. Classified matters obtain from other department should retain.

INFORMATION SECURITY
Security Hazard – any act or condition which may result in the compromise of information, loss of life, and destruction of property or
disruption of the activity of the installation.

Types of Hazards:
1. Natural Hazards – hazards which arise from natural phenomena.
2. Human/man made hazard – result on the state of mind, attitude, weakness, or character traits of one and more persons.

Sabotage – he is the most dangerous which deal of planning and implementing security, experiential and he can work alone in several
places.
Espionage – and very dangerous and underestimate with extensive training and highly effective information and he can defeat his own
game if proper techniques are undertaken.
Subversive activity – their activity is to know the weaknesses of organization in form of propaganda, morale and etc.
VIP Security – aims to protect people from physical violence, whether external states from violence, sub state actors and domestic
abuse from predatory adults.

VIP SECURITY
VIP – Very Important Person.
Escort – one and more person accompanying to give protection or to pay honor.
Bodyguard – a person or group of person responsible to protect one of more specific person.

36
Organization of VIP Security:
1. Area Security – covers and prophylactic (neutralize) the surrounding areas of engagement.
2. Perimeter Security – uniformed men secures the immediate areas surrounding the engagement.
3. Advance Security - sanitize and at the place before the arrival of the VIP.
4. Close-In security – accompanies the VIP wherever it goes and maximum 4 persons.
5. Reserve Security – on standby or possible back-up or reinforcement.
6. Routine Security – neutralize the possible route of the VIP party.

Importance of VIP or Dignitary Security


1. To ensure protection of the very important person of dignitary
2. To clear the routine routes
3. To avoid assassination plot and or ambuscade to visiting VIP
4. To establish coordinate efforts with foreign and local agencies

Four (4) Common Elements in all Assassination:


1. Victim
2. Assassin
3. Modus operandi (Mode of Operation)
4. Opportunity

CRISIS MANAGEMENT
Crisis – is a decisive points of a condition, improper handling in which immediately places under threat or danger of one’s life, limbs,
freedom and property.
Crisis Management – is the totality of action of handling or responding to a given crisis situation.
Crisis Management Plan – is a complete and comprehensive plan of actions designed to protect life, limbs, freedom and property,
before and during any given situation.

Two Kinds of Crisis according to Origin:


1. Natural Crisis – events caused by force of nature.
2. Man-made Crisis – events caused through instrumentality of men.

Work Stoppage – is a condition of an enterprise whereby normal work operation is stopped as a result of strike or lockout.

Two major causes of Work Stoppage:


1. Strike – is a temporary stoppage of work because of labor industrial dispute.
2. Lockout – is the temporary refusal of any employer to furnish work.

Risk is associated with almost every activity especially in the business world. Risk is a potential loss or damage to an asset. It is a
financial loss to an enterprise, business or organization.

Risk Analysis is a management tool, the standards for which are determined by whatever management decides it wants to accept in
terms of actual loss.

BASIC INDUSTRIAL SECURITY CONCEPTS OF SECURITY SURVEY; SECURITY PLAN; SECURITY TEST AND EVALUATION;
PERSONNEL CHECK; TECHNICAL SURVEILLANCE AND SECURITY; AND SECURITY MANAGEMENT.

Security Survey and Inspection


The basic instrument for determining security vulnerability is the security survey.
Critical on site examination and analysis of properties to determine what protection is needed and improved and also what
recommendation should develop.

Security Planning
Planning is a corporate and extensive responsibility. This is a decision making in order to answer the precepts of knowing where we
are, where we are going, and determining the best way to get there.

37
Security Survey
A critical on-site examination and analysis of an industrial plant, business, home or public private institution done to ascertain the
facility’s current security status, to identify deficiencies or excesses in current practices, to determine what protection is needed, and to
make recommendations for improving the over-all level of security at that location.

Objective of Security Survey


1. To determine existing conditions of physical security of corporate property.
2. To measure the compliance of employees to security.

Planning of Security Survey:


1. Verify the need.
2. Obtain organizational support.
3. State the survey’s executives
4. Determine how data will be gathered
5. Develop alternatives
6. Prepare schedule of activities.

Security Inspection
Inspection is one of the most important parts of security management process which insure that risks are recognized and covered in
security programs, and that programs are necessary and cost-effective. The assessment of what is happening from a security point of
view is made through an inspection program.

Types of Security Inspection:


1. Continuous Inspection – constant changes in the organization, in terms of attitudes life style, moral and values and
advancement of technological modifications.
2. Formal or Informal – hired a new security administrator or initiated by a security department or program.

Formal inspections are planned in advance to highlight specific aspects of the workplace and scrutinize them for inconsistencies with
formal standards. This allows employers to see whether all precautions are in place and discover what resources they may need for the
future. As such, planned inspections are often performed with a written checklist of guidelines and carried out regularly by a designated
team. This way, they can ensure that nothing gets missed.

Informal Inspections
Also known as on-the-spot inspections, informal inspections are done by a company’s management to assess the general knowledge
of their employees. Performing these inspections helps them diagnose any weak spots in their employee training and supplies them
with the tools to make training better in the future. These quizzes or forms, filled out by the workforce, usually cover topics such as
project procedures, workplace safety standards, and general work-flow expectations.

3. Structured or Unstructured Inspection Structured inspection – the inspector moves systematically from one area to another
while Unstructured inspection means to conduct inspection in random manner.

Dr. Norman Bottom and Professor John Kostanoski – have applied a system approach to the problem of assets protection. Formulated
as a new way of considering security and loss prevention and called “WAECUP” (an acronym for waste, accidents, and error, crime,
and unethical practices).

The Purposes of Plants/Establishment Security and Protection:


1. To protect the establishment in order to facilitate the operation of facilities, equipment and machineries.
2. To protect the factories its utilities and facilities against activities that would slowdown, interfere with or halt its production.
3. To protect the establishment against activities which would stop machineries, equipment, facilities and personnel performing
their intended function.

Security Education

38
The basic goal of security education is to acquaint all the employees the rationale behind the security measures and to ensure their
cooperation at all times.

Phase of security Education;


1. Initial interview - it is the first contact with security and should be formally conducted. Its purpose is to impart security concern,
its importance to the company and the penalties that would result to violation of company rules, regulation and security
measures.
2. Training conference- it is normally held in the training period. Conducted for at least a period of hours, its concern is to
reiterate to employees that security is an additional burden imposed on them as part of the company.
3. Refresher reminders- it reminds individuals of their job responsibility. It is also serves a forum to resolve security problem and
explain new rules and regulations.
4. Security reminders- it is commonly manifested in office memorandum, announcement, posters place at strategic areas within
the company.

Security promotion- it is a positive effort to sell security or make the employees more involved in the implementation of security
measures.

5. Special interviews- it is conducted with the aide of senior company officials to facilitate compliance by means of example.
6. Debriefing- serves to place the person on special notice of his continuing responsibility to protect classified information which
he has knowledge of.

Security Audit – it is essentially an assessment and efficiency of the implementation and enforcement of the organization’s security
policy.

Newel Andrews
W – wearing of the uniform properly with sense of pride which includes passion and commitment.
O – observing and reporting incidents through person, object, place or event (POPE).
R – responding to emergencies
K – know your post, specific duties and responsibilities as a part of the established standard.

Best Practices in the Conduct of Security Assessment:


1. Interview the police
2. Drive the neighborhood.
3. Inspect the property.
4. Look for graffiti.
5. Visit the merchants or tenants.
6. Assistance from non-security personnel.
7. Review prior security reports.
8. Evaluate the security needs.
9. Update the emergency procedures.
10. Discuss audit findings with top management.

Security Investigation – is a planned and organized determination of facts concerning specific loss or damage of assets due to threats,
hazards or unsecured conditions.

Objectives of Security Investigation:


1. To determine the circumstances of an event that caused loss, harm, or damage of person or properties.
2. To determine who are responsible in the incident.
3. To determine who are liable for loss, harm, or damage as a result of the incident.
4. To recover or find restitution for the loss or damage.
5. To find ways and means to prevent the incident from recurring.

Guidelines for a Successful Security Investigation:

39
1. Review the incident report – this is the process of determining the veracity and authenticity of the source and stated
information.
2. Prepare Investigative Plan – there must be a prudent chronological steps in the execution of the investigation.
3. Prepare of Investigative File – use a standard size of folder with case number and label upon the conclusion of the case it
should be kept and secured according to the policy of the company in keeping records cases.

Systematic Approach to Investigation:


1. Define the Investigative Problem
2. Collection of Relevant Data
3. Methods and Sources to be used
4. Analysis and Verification of Information Gathered
5. Verification Methods
6. Drawing the Conclusion

Difficulties in Investigation:
1. Absence of eyewitness/witnesses.
2. Motive unknown
3. Lack of physical clues (evidence)

Qualities of Effective Investigation:


1. Objective – all facts are discussed as perceived without any distortion and the manner of presentation is free from
unwarranted opinion.
2. Thorough – full detail, exhaust all available means, factual to arrive in a sound and convincing conclusion.
2. Relevant – significant and demonstrated its relation to one another.
3. Accurate – free from error.
4. Current – terminology is generally accepted.

40

You might also like