Notes Industrial Security Concepts
Notes Industrial Security Concepts
Notes Industrial Security Concepts
INTODUCTION TO SECURITY
Etymology
The word 'secure' entered the English language in the 16th century. It is derived from Latin securus, meaning freedom from
anxiety: se (without) + cura (care, anxiety).
Security Management (sometimes also Corporate Security) is a management field that focuses on the safety of assets (resources) in
the organization, i.e. both physical safety, human security to include digital security.
Security management is closely related to risk management and it is aimed at creating through various methods, procedures,
guidelines and standards a permanent secure solution to such conditions, which will help prevent or reduce identified risks in particular.
Industrial Security is a branch of security which aimed at keeping large structures such as factories, schools, hospitals, hotels and
others that may consider as industrial in nature.
Security manager is responsible for managing security in large and medium organizations, The owner, statutory authority and top
management.
Cyber security refers to the protection of devices, networks, data and apps including utilities, financial institutions and government
agencies.
This law governs the operation, administration of security agency, and activities, qualifications, duties and licensing od security guards,
watchmen and private detectives. In short, it is the intention of this law to professionalize the sucurity services in order to upgrade the
level of security protection.
The differences between the Public Police and Private Security office:
1. Private security officer is clientele oriented while Public Police Officer is community oriented.
2. The public police have substantially greater power than security personnel in their power to arrest, detention, search and
interrogation. Because security officer are as a rule, limited to the premises of their employer. Public police operate through a
much wider jurisdiction.
3. Private Security officer /agency has a limited authority of a security force by licensing statutes directed at a security activities,
operating contracts between employers and security firms may also specify limits on the activities of the contractual
personnel.
2
4. Private guards differ from Public Police both in their legal status and in that they perform in areas where the public Police
cannot legally or practically operate. The Public police have no authority to enforce private regulations, nor have they the
obligation to investigate the unsubstantiated possibility of crime (such as employee theft) on private property.
The primary and fundamental duties of the security guard are to protect lives and properties of the client he is supposed to serve in
accordance with the agreement of his agency and its client, but these duties are not limited to inspecting/monitoring, bodily
checks/searches individuals and/or baggage’s and other forms of security inspection, physically manually, or aided with scientifically
based electronic systems.
No License certificate shall be granted to any applicant for license to operate or license to exercise security profession with the
following disqualifications:
a. having previous record of any conviction of any crime
b. having previous record of any conviction of any offense involving moral turpitude
c. having been dishonorably discharged or separated from employment or service
d. being a mental incompetent
e. being a user/addicted to the use of prohibited drugs or narcotics
f. being a habitual drunkard
g. dummy of a foreigner
3
c. Must have taken a private security course/seminar and/or must have adequate training or experience in security business or
rendering security/detective services;
d. Of good moral character and must not have been convicted of any crime or violation of these rules and regulations carrying a
penalty of prohibition to be licensed; and
e. Must be physically and mentally fit.
Types of License
a. Temporary License – initial and conditional issuance while awaiting issuance of regular license identification cards.
b. Regular License – generated Private Security Personnel License Card, duration or validity of which shall be for two (2) years.
Renewal of License
a. Deadline for Filing and Late Filing.
The deadline for filing of applications for renewal of License to Exercise Profession shall be sixty (60) days prior to the month
of the expiry date. Applications filed/accepted thereafter shall be penalized for late filing.
b. Failure to file for renewal.
The Licenses to Exercise Profession of those who fail to file renewal applications SHALL AUTOMATICALLY BE CANCELLED
upon expiry.
c. Renewal of license to exercise profession shall also be filed with SAGSD, CSG, Camp Crame, Quezon City or through the
Firearms, Explosives, Security Agencies and Guards Section (FESAGS), Regional Operation and Plans Division (ROPD) of
the Police Regional Office.
All licensed security personnel must undergo in-service re-training at least once in every two (2) years preferably two months before
his/her birth month. The certificate of in-service training shall be a prerequisite among others, for the renewal of license to exercise
profession.
4
DEFINITION OF TERMS
For purposes of and when used, the Following terms shall be construed;
Person – shall include not only natural but also juridical persons such as single proprietorships, partnerships, corporations, companies
or associations, duly organized and registered with the Securities and Exchange Commission and/or the Department of Trade and
Industry.
Private Security Industry – shall cover those in the legitimate business of providing private security and detective services.
Private Security Services – shall include the act of providing or rendering services to watch an establishment whether public or private,
building, compound/area or property, to conduct access control/denial in any form whether physically, manually or scientifically by
electronic monitoring systems, for the purpose of securing such area/property and at the same time ensuring safety and protection of
persons within such areas, to maintain peace and order within such areas, to conduct private security training, and/or to conduct
investigation. It shall also include the act of contracting, recruiting, training, furnishing or posting any security guard, to do its functions
or solicit individuals, businesses, firms, or private, public or government-owned or controlled corporations to engage his/its service or
those of his/its security guards, for hire, commission or compensation thru subscription or as a consultant/trainer to any private or public
corporation.
Private Detective Services – shall include among others the act of providing personal security protection, inquiry and information
gathering, pre-employment verification and individual background profiling, providing assistance in civil liability and personal injury
cases, insurance claims and fraud, child custody and protection cases, for the purpose of assisting in gathering information leading to
determination and/or prevention of criminal acts and/or resolution of legal, financial and personal problems.
Private Security Guard (SG) – sometimes called private security guard or watchman shall include any person who offers or renders
personal service to watch or secure either a residence, business establishment, or buildings, compounds, areas, or property,
inspects/monitors bodily checks/searches individuals and/or baggage and other forms of security inspection, physically/ manually or
scientifically electronic, including but not limited to, logging concessions and agricultural, mining or pasture lands, transportation, for
hire or compensation , or as an employee thereof, including any employee of the national or local governments or agencies or
instrumentality’s thereof and or government owned or controlled firm or corporations who is employed to watch or secure government
buildings, compounds, premises and other properties, other than members of the Armed Forces of the Philippines, guards of the
Bureau of Jail management and Penology, Municipal or City jail guards, and members of the Philippine National Police or of any other
law enforcement agency of the Government.
Private Detective (PD) – shall mean any person who does detective work for hire, reward or commission, other than members of the
Armed Forces of the Philippines, guards of the Bureau of Jail Management and Penology, municipal or city jail guards, and members of
the Philippine National Police or of any other law enforcement agency of the government.
Private Security Personnel – shall be natural persons which include private security guards, private detectives, security consultants,
security officers and others that may be classified later, rendering/performing security and/or detective services as employed by private
security agencies and/or private firms.
Government Security Personnel – shall be natural persons which include government Security guards, detectives, security consultants,
security officers and others that may be classified later, except those of the Armed Forces of the Philippines, Philippine National Police,
Bureau of Jail Management and Penology, Municipal or City Jail guards rendering/performing security and/or detective services as
employed by government entities.
Private Security Agency (PSA) – shall mean any person association, partnership, firm or private corporation, who contracts, recruits,
trains, furnishes or posts any security guard, to perform its functions or solicit individuals, businesses, firms, or private, public or
government-owned or controlled corporations to engage his/its service or those of his/its security guards, for hire, commission or
compensation thru subscription or as a consultant/trainer to any private or public corporation whose business or transactions involve
national security or interest like the operation and/or management of domestic or ocean vessels, airplanes, helicopters, seaports,
airports heliports, landing strips etc., or as consultant on any security related matter, or to provide highly specialized security, detective
and investigation services like gangway security, catering security, passenger profiling, baggage examination, providing security on
board vessels or aircraft, or other security needs that PNP SAGSD may approve.
Private Detective Agency (PDA) – shall mean any person association, partnership, firm or private corporation, who contracts, recruits,
trains, furnishes or posts any private detective, to perform its functions or solicit individuals, businesses, firms, or private, public or
government-owned or controlled corporations to engage his/its service or those of his/its detectives, for hire, commission or
compensation thru subscription or as a consultant/trainer to any private or public corporation or as consultant on any detective related
matter, or to provide highly specialized detective and investigation services, or other detective needs that SAGSD-CSG may approve.
License to Exercise Profession – shall mean any document issued by the Chief, Philippine National Police or his duly authorized
representative recognizing a person to be qualified to perform his duties as private security or training personnel.
License to Operate (LTO) – is a License Certificate document, issued by the Chief, Philippine National Police or his duly authorized
representative, authorizing a person to engage in employing security guard or detective, or a juridical person to establish, engage,
5
direct, manage or operate an individual or a private detective agency or private security agency/company security force after payment
of the prescribed dues or fees as provided in these Rules and Regulations.
Company Guard Force (CGF) – a security force maintained and operated by any private company/corporation utilizing any of its
employees to watch, secure or guard its business establishment premises, compound or properties.
Government Guard Unit (GGU) – a security unit maintained and operated by any government entity other than military or police, which
is established and maintained for the purpose of securing the office or compound and/or extension of such government entity.
SAGSD as used herein shall refer to the current PNP Civil Security Group Security Agency and Guard Supervision Division or any
other PNP Office that may be designated later as the primary office for supervision of the implementation of these rules and
regulations.
PADPAO refers to the Philippines Association of Detective and Protective Agency Operators, Inc., which is an association of all
licensed security agencies and company security forces.
Duty Detail Order is a written order/schedule issued by a superior officer usually the private security agency/branch manager or
operations officer assigning the performance of private security/detective services duties.
Who may organize and maintain a Private Security Agency and Private Detective Agency.
Any Filipino citizen or corporation, association, partnership, one hundred percent (100%) of which is owned and controlled by Filipino
citizens, may organize and maintain a Private Security Agency or Private Detective Agency.
B. New applicants for license to operate shall be required to obtain a minimum capitalization of one million pesos (P1,
000,000.00) with a minimum bank deposit of five hundred thousand (P500, 000.00) pesos in order to start its business
operation.
Any of the following circumstances or a combination thereof shall be considered prima-facie evidence of the existence of “Kabit
System”.
a. Maintaining a separate branch, unit or subsidiary office aside from the main office of the agency situated within the same
locality;
b. Receiving direct payments from the agency’s clientele and issuing officials receipt of their own distinct from that issued by the
agency concerned;
c. Remitting directly Social Security System premiums, Medicare contributions and other premium for other policy insurance
benefits by the aforementioned branch, unit or subsidiary office;
6
d. Existence of an agreement between the licensee and a branch manager thereof, whereby the latter obligates himself to pay a
certain percentage of his income to the former on the condition that the control and supervision of the guards posted by said
branch shall course on the manager thereof and that the licensee shall be exempt from liabilities/ obligations attendant to the
operation of said branch.
e. Keeping/maintaining separate payrolls for the branch employees signed and/or approved by the branch manager only;
f. Absence of record of monthly income remittances to the main office when said branch is authorized to make collections from
the clients of the licensee; and
g. All other similar acts tending to show separate and distinct relationship/ personality/ ownership/ management.
Guard/Personnel Requirements;
a. No regular license shall be granted to any private security agency unless it has a minimum of two hundred (200) licensed
private security personnel under its employ.
b. No regular license shall be granted to any company guard force or private detective agency unless it has a minimum of thirty
(30) licensed private security personnel under its employ.
c. The maximum number of private security personnel that a PSA/CGF/PDA may employ shall be one thousand (1000).
Status and Validity of License to Operate. The status of license certificate in Section 7 above shall be issued in conformity with the
following:
a. Regular LTO – issued, after complying with licensing requirements, to private security agencies having obtained and
maintained in its employ at least two hundred (200) security personnel, and to company guard forces and private detective
agencies having obtained and maintained in its employ at least thirty (30) security personnel and private detectives
respectively. Such license may be renewed following conformity with renewal requirements prescribed in a Standard
Operating Procedure (SOP).
b. Temporary LTO – initial and conditional issuance to new private security agencies and to PSAs holding regular LTO not able
to maintain the minimum number of security personnel or conform to standards, for them to be able to attain the 200 minimum
number of security personnel or comply with licensing standards, prior to issuance/re-issuance of regular LTO. Such issuance
shall not be renewable nor be extendible.
Unless sooner cancelled or revoked and provisions hereof modified, all licenses to operate shall have a validity of two (2) years.
Temporary LTOs upon expiration are automatically cancelled.
Security Personnel-Employee Benefits. The employer Private Security/Training/Detective Agency, Company Guard Force, Government
Guard Unit shall be responsible and held accountable for the compensation of the following benefits due their respective security
personnel as required by law:
a. salary and wage prescribed in the minimum wage law;
b. health, medical and insurance benefits;
b. separation and retirement pay and benefits;
c. Pag-ibig benefits
d. others as may be prescribed later
However, when such entities are operating in areas where there is an upsurge of lawlessness and criminality as determined by the
Chief, PNP, Police Regional Office Regional Director or their authorized representative, they may be allowed to acquire, possess and
use high-powered firearms under conditions.
Transport of firearm shall require the appropriate transport permit issued by the Firearms and Explosives Division or Police Regional,
Provincial or City Office nearest the place of origin;
The issuance of DDOs for private detective personal protection service duties shall be prescribed in an SOP to be issued by NHPNP in
consideration of Rule XII of these rules and regulations; and
In all the above cases, the confiscating officer shall inform immediately the agency concerned.
8
Disposition of confiscated firearms
Any law enforcement officer authorized by law effecting the confiscation of firearm under any of the circumstances mentioned in the
preceding section shall inform the Chief, Philippine National Police thru the CSG within twenty-four (24) hours after such confiscation.
The firearm shall be turned over immediately to the nearest Philippine National Police unit/station which shall be responsible for the
conveyance of same to the FED, CSG, except when charges have been filed against the suspect, in which case, the firearm shall be
turned over to the concerned court.
Revocation of license. License to possess firearm may be revoked under any of the following instances:
a. Failure to submit any issued firearm for verification as required.
b. Carrying of firearms by security personnel without appropriate Duty Detail Order (DDO).
b. When the firearm serial number has been duplicated on another firearm or using one firearms license for more than one
firearm other than those stipulated in the license.
c. Carrying of firearms outside of the place stated in the permit or in places prohibited under the law; or
d. Conviction of the operator or manager of the agency of any crime.
e. When the firearm was reported lost.
Stocking of ammunition.
Stocks of ammunition shall not exceed a basic load of fifty (50) rounds of ammunition per unit of duly licensed firearms.
Individual issue to each security guard shall be limited to one half of such basic load or twenty five (25) rounds for every
security guard.
Service Bush jacket shall be worn only by the Directorial and Staff Officers of agency
Gala Uniform. - It shall be worn for ceremonial purposes only and at the expense of the establishment conducting the ceremonies.
Necktie. - It shall conform to the color of the blouse five (5) centimeters wide.
Service Trouser. - Fast Navy blue color, straight cut, slanted pockets and two back pockets without over flaps.
Service Belt. – Of leather material which shall be used as pistol belt measuring four and a half (4-1/2 centimeters in with.
Footwear. –
a. Service shoes. - Black leather shoes with rubber heels and soles, plain top low-cut and black shoelace to be worn with plain
black socks.
b. Rubber rain boots. - Optional as the nature of the post requires.
BASIC EQUIPMENT
The following shall comprise of the Basic Equipment of a security guard which shall be made mandatory and ready for his/her use while
performing post, conduction, armored service duties and the like:
9
1. Prescribed Basic Uniform
2. Nightstick/baton
3. Whistle
4. Timepiece (synchronized)
5. Writing pen
2. Notebook and duty checklist (electronic or not)
3. Flashlight
4. First Aid Kit
5. Service Firearms (as required)
The security agency shall have the responsibility of ensuring the availability and issuance of the basic equipment to its posted guards.
Security Guards shall be responsible for inspecting operability of basic equipment issued to him, and be responsible for keeping himself
acquainted with the proper use of these.
Other Equipment.
Apart from the mandatory basic equipment, other equipment may be issued to the security guard as determined necessary following
client contract requirement, provided that the security guard shall have acquired the prior training/knowledge on the proper use of the
same but not limited to the following:
1. Handcuffs
2. Metal detectors
3. Communications Radio
4. Stun devices
5. Armor vests
2. canine (k-9) units
10
2. Other Juridical Entities - Private Security Training Systems whose primary purpose is not to provide private security
training and training services, may be qualified, on interim basis, to offer and conduct Private Security Training for a
specific course/class and duration under Refresher and Specialized programs only, provided that, it has secured prior
Interim Accreditation from the SAGSD upon compliance and conformity the latter’s application and approval
requirements. Such Interim Accreditation is also issued to those with Regular Accreditation but which cannot comply with
the renewal requirements.
3. Watchman/Security and/or Detective Agencies defined under RA 5487 as amended, which shall not be required prior
accreditation to operate, by virtue of their License to Operate as Private Security Agency, Company Security Force or
Government Security Force, may be authorized to conduct only in-house refresher or specialized training for its own
security personnel, upon compliance and conformity with application and approval requirements of SAGSD.
4. Police Offices/Units assigned/designated to conduct Private Security Training, which shall not be required TESDA
registration but shall require prior official authority of SAGSD, may conduct training in all categories but subject to
requirements of Rule XI of these rules and regulations or as may be prescribed by SAGSD.
5. Police Supervisory Office (presently the SAGSD) as having the primary responsibility of the conduct, supervision, and
control of all private security training and training services.
b. Training Instructor. Any person who renders personal and/or professional trainor, instructor, and/or teacher services relative to
private security training by virtue of his profession, expertise, knowledge, and/or experience in a particular field of knowledge.
Training Instructor includes but is not limited to currently or retired licensed or accredited private security training instructors,
professional educators, and/or field/practicing experts.
INSPECTIONS
a. Post to Post Inspection – Inspection conducted on detailed/posted security guards to determine proper compliance of
regulations related to uniforms, general physical appearance, documentation and other requirements in the actual service of
duty. This may also be an inspection conducted as an aid to investigation.
b. Administrative Inspection (Office, Files and Records Inspection) – Inspection conducted to determine compliance with records,
files and other administrative requirements for operating a security agency and/or exercising security profession.
11
Physical Security – describes measures that are designed to deny access to unauthorized personnel (including attackers or even
accidental intruders) from physically accessing a building, facility, resource, or stored information; and guidance on how to design
structures to resist potentially hostile acts.
Physical security involves the use of multiple layers of interdependent systems which include the following;
CCTV surveillance
Security guard
Protective barriers
Locks
access control protocols and many other techniques.
PHYSICAL SECURITY
This refers to the broadest branch of security which deals on the system of barriers and devices placed between the matters protected
and measures to prevent unauthorized access to facilities, plants, and equipment and safeguard them against man-made and natural
hazards.
PROTECTIVE BARRIER
Barrier – any structure or physical device capable of restricting, deterring, delaying illegal access to installation. They maybe referred to
as Perimeter barrier.
Purpose of Barrier
The purpose of protective barriers in safeguarding the areas, building and proper utilization of lightning at night have contributed to
modern man’s attempt to discourage intruder, pilfer and other entrants devious intent.
Two (2) General types of Physical Barrier
1. Natural Barrier – such as rivers, cliffs, and ravines etc. which the delay or make more difficult the entry of the intruder.
2. Man-made Barrier – are structural construction like fences , walls, floors, roofs, etc. means to impede to deter penetration
Perimeter Barrier – a medium or structure which defines the physical limits of an installation or area to restrict or impede access
thereto. Any physical barrier used to supplement the protection of an inside or outside perimeter.
Classification
Solid Fence – constructed in such away the visual access through the fence is denied.
- Its advantage is that it denies the opportunity for intruder.
Full-View - constructed to permit visual access but primarily designed for control or physical access into a facility.
13
b. It allows the intruder to become familiar with movements and schedule of guard patrols.
Classification:
1. Chain-link - is a type of wovenfence usually made from galvanized or coated steel wire. The wires run vertically and are bent
into a zig-zag pattern so that each "zig" hooks with the wire immediately on one side and each "zag" with the wire immediately
on the other. This forms the characteristic diamond pattern seen in this type of fence.
It must be constructed of 7 feet material excluding top guard.It must be of 9 gauges or heavier.The mesh openings are
not to be larger than 2 inches per side.
It should be twisted and barbed salvage at top and bottom.
It must be securely fastened to rigid metal or reinforced concrete.
It must reach within 2 inches of hard ground or paving.
On soft ground, it must reach below surface deep enough to compensate for shifting sand.
2. Barbed wire - is a type of fencing wire constructed with sharp edges or points arranged at intervals along the strand(s).
Standard barbed wire is twisted, double strand, 12 gauge, with 4 point barb spaces on equal distance apart.
Barbed wire fencing should not be less than 7 feet high excluding top guard.
Barbed wire fencing must be firmly affixed to post high excluding top guard.
The distance between strands will not exceed 6 inches and midway between parts.
3. Concertina Wire - Standard concertina barbed wire is commercially manufactured wire coil of high strength steel barbed
clipped together at intervals to form a cylinder.
Opened of concertina 50 feet long and 3 feet in diameter.
B. Building Wall - is a vertical structure, usually solid, that defines and sometimes protects an area. Building walls have one main
purpose: to support roofs and ceilings.
C. Bodies of Water - These are natural barriers such as streams, creeks, rivers, marsh, pond or any other bodies of water.
14
10. Multiple Fence – if, used multiple fence should be at least ten feet apart and the overhang on the top of the inner fences
should point inward rather than away from the installation which does not exceed 150 feet.
PERIMETER GUARD - Employed in augmenting the existing perimeter security or perimeter barrier.
TWO TYPES;
1. Fixed post – assigned in a particular place of the compound to guard and watch the area surrounding.
2. Roving Guard/Patrol – is required to walk and go around regularly around the company premises.
A Guard System that cannot be checked on is not a secured guard system; this could be done;
1. Personal Inspection – Security supervisors conduct on the spot and random inspection of posted guards.
2. Artificial Inspection – this is doe through communication method.
Restricted Areas
It is any area in which personnel or vehicles are controlled for reasons of security.
Intrusion detection systems are inherent element of corporate and industrial security and play an important part in the total protection
efforts of companies; its activities, information, equipment and material assets.
Basically, these are designed to alert security personnel to consummated or attempted intrusion into an area, building or compound. It
can be electrical, mechanical or electronics.
Remember, however, that these systems can tell you only that an intrusion into a protected area occurred. It cannot do anything about
it. Whatever system you choose depends on your capability to react positively to the alarm.
Basic Principles:
15
1. Breaking electrical current.
2. Interrupting a light beam.
3. Detecting sound.
4. Detecting vibration.
5. Detecting a change in the capacitance due to penetration of an electrostatic filed.
PROTECTIVE ALARM
It is an aural and visual signal given by the enunciator when intruder actuates device in a protected area.
ANNUNCIATOR/ENUNCIATOR – is a visual or audible signaling devise which initiates conditions of associated circuits.
Disadvantages:
1. Costly to install where there are many entry points.
2. Easily compromised when improperly applied.
3. May be defeated by bridging the circuits.
4. Unprotected soft walls or ceilings may be penetrated without disturbing the alarm system.
5. Has little salvage value.
6. Will not detect “stay behinds”
2. Photoelectric or electric eye - is a device used to detect the distance, absence, or presence of an object by using a light
transmitter, often infrared, and a photoelectric receiver. They are used extensively in industrial manufacturing.
Advantages:
1. Affords effective and reliable notice of intrusion.
2. Useful in open portals or driveways.
3. Can detect “stay behinds”
4. Has high salvage value.
5. May be used to actuate other security devices such as cameras.
6. May detect fires through smoke interruption of the beam.
Disadvantages:
1. If improperly installed, may be defeated by crawling or climbing over it.
2. Requires some type of permanent installation.
3. Fog, smoke or dust may cause interruption of the light beam.
4. Requires frequent inspection.
5. Requires ground beneath the light beam free of tall grass and other elements.
3. Audio detection device – supersensitive microphone speaker sensor are installed in walls, ceilings and floors of the protected
area of any sound cause by attempted force entry inspected by the sensor.
16
Advantages:
1. Economical and easily installed.
2. Has high salvage value.
Disadvantages:
1. Can be used only in enclosed areas where a minimum of outside sound exists.
2. Unsatisfactory for use where high noise level are encountered.
4. Vibration detection device – the sensor detect any vibration caused by attempted forced entry.
Advantages:
1. Economical and easily installed
2. Has high salvage value
3. Has flexible application.
Disadvantage:
1. Does not perform satisfactory when high vibrations are encountered.
Advantages:
1. Provides effective security against intruders concealed within the premises.
2. Has high salvage value.
3. Difficult for an intruder to compromise the system.
Disadvantages:
1. May require reduced sensitivity to overcome possible disturbance factors such as phones.
2. Can be set off by loud external sounds.
Advantages:
1. Very flexible in that it is used to protect safes, file cabinets, windows, doors, etc.
2. Simple to install and operate.
3. Provides an invisible protective field.
4. High salvage value.
5. Compact equipment size.
6. High grade protection
Disadvantages:
1. Can be applied only to ungrounded equipment.
2. Accidental alarms can occur if persons such as cleaning personnel carelessly approach the protected area.
7. Smoke Detector Devise - is a device that detects smoke, typically as an indicator of fire. Commercial, industrial, and mass
residential devices issue a signal to a fire alarm system, while household detectors, known as smoke alarms, generally issue a
local audible or visual alarm from the detector itself.
17
2. Bill Traps - A device for detecting the removal of the last bill in a stack of paper currency for signaling or alarm purposes
consisting of a magnet assembly.
2. Knee or Thigh Buttons – activated by knee usually by the teller. They are commonly found in location where personnel
usually perform their duties from a seated position.
3. DOUBLE SQUEEZE BUTTONS This type of alarm requires pressure on both of its side therefore reducing the probability
of accidental alarm.
Other Sensors
Penetration Sensors – sensor on windows, doors etc. sensor consists of magnetic switches and grid wires.
Duress Sensors – it is used to call assistance of other personnel.
PROTECTIVE LIGHTING
Designed to emphasize the illumination of the perimeter barrier and the outside approaches to it, or to concentrate on the area and the
building within the perimeter.
18
3. Movable Lighting - consists of manually operated, movable searchlights that may be lit during hours of darkness or as
needed. The system normally is used to supplement continuous or standby lighting.
4. Emergency Lighting - is a backup power system of lighting that may duplicate any or all of the above systems. Its use is
limited to times of power failure or other emergencies that render the normal system inoperative.
Metal-halide lamps have high luminous efficacy of around 75 - 100 lumens per watt, about twice the efficiency of mercury vapor lights
and 3 to 5 times that of incandescent lights.
5. High Pressure Sodium Vapor – introduced in 1965. is a gas discharge lamp that uses sodium in an excited state to produce
light, such as parking areas, road way, building, industrial and commercial installation.
6. Flood lights - is an artificial light providing even illumination across a wide area.
Pilferage - one of the most annoying and common human hazards which security has to deal with. It is the theft of part of the contents
of a package. It may also include theft of the contents but leaving the package,
Types of Pilferer:
1. Casual Pilferer – is one who steal due to his inability to resist the unexpected opportunity and has little fear of detection.
2. Systematic Pilferer – who steal with plan, purposed is for economic gain.
Lock – a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container or hiding place
and to prevent the removal of items without the consent of the owner.
They may be operated by turning some form of removable key, by keying or dialling in a combination which directly or via
electromechanical means operates the lock, with some form of magnetic or other card reader, or by moving a part on a safety lock
intended to prevent accidental operation rather than to prevent unauthorized access.
Padlock – a portable and detachable lock having sliding hasp which passes through a staple ring or the like and is then made fast or
secured.
Peterman – a term used in England for lock picker, safecrackers and penetrators of restricted areas or rooms.
TYPES OF LOCK;
1. Warded Locks – (is one of the most ancient lock designs still in modern use.) is a type of lock that uses a set of obstructions,
or wards, to prevent the lock from opening unless the correct key is inserted. The correct key has notches or slots
corresponding to the obstructions in the lock, allowing it to rotate freely inside the lock.
2. Disc Tumbler Locks - is a lock composed of slotted rotating detainer discs. A specially cut key rotates these discs like the
tumblers of a safe to align the slots, allowing the sidebar to drop into the slots, thus opening the lock.
3. Lever Locks - is a type of lock that uses a set of levers to prevent the bolt from moving in the lock. In the simplest of these,
lifting the tumbler above a certain height will allow the bolt to slide past.
4. Combination Locks - is a type of lock in which a sequence (permutation) of numbers or symbols is used to open the lock.
5. Code-Operated Locks – a type of lock that no key is used. Pressing the series of numbered button in the proper sequence
open the lock.
19
6. Electromagnetic Locks - is a locking device which operates by means of electric current. Electric locks are sometimes stand-
alone with an electronic control assembly mounted directly to the lock.
7. Card-Operated Locks – these are frequently fitted with a recording device, which registers time of use and the identity of the
user.
Key control;
A device used to open a lock or door.
TYPES OF KEY;
1. Change Key - is a key on the lowest level of a master keying system. Which operate the lock and has a particular
combination of cuts.
2. Sub-master key - A key that activates the locks in more than one but not all doors to spaces assigned to a specific area.
3. Master key - A key that activates all door locks in a building for spaces assigned to a specific area.
4. Grand master key - A key that activates all door locks in a building. The final line of defense at any facility is in the high
security storage area where papers, records, plans or cashable instrument, precious metals or other especially valuables
assets arte protected, these security cabinets will be of a size and quantity which the nature of the business dictates
3. File room – it is a cubicle in a building constructed a little lighter than a vault but bigger size to accommodate limited people to
work on the records inside.
room should at most be 12 feet high.
it must have the water tight door and at least fire proof for 1 hour.
TYPES OF SECURITY
Bank Security – a specialized type of physical security protecting the assets, personnel and operation of the bank.
Hotel Security - would be the department within the hotel that would be responsible for the safety and security of the hotel.
21
Thing that this department might do include preventing employee theft, keeping trespassers out of the hotel, preventing thefts in the
parking lots, and investigating thefts and other security incidents.
In larger hotels, the security department works closely with the police to keep the hotel from being used for criminal activities, such as
prostitution and drug dealing.
Document Security – this means protecting very important documents that if divulge it will affect the organization also includes
protecting a customer's privacy in accordance with the law, and gaining an advantage over competitors by not sharing trade secrets.
Operational Security – deals primarily with the protection of processes, formula, patents and other industrial and manufacturing
activities.
Communication Security - is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible
form, while still delivering content to the intended recipients.
Crises Security – means protection from any event that is, or expected to lead to, an unstable and dangerous situation affecting an
individual, group, community or whole society.
Computer security, also known as cyber security or IT security, refers to the security of computing devices such as computers and
smart phones, as well as computer networks such as private and public networks, and the Internet. The field has growing importance
due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people,
and also the procedures by which systems are accessed. The means of computer security include the physical security of systems
and security of information held on them.
Corporate security refers to the resilience of corporations against espionage, theft, damage, and other threats. The security of
corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly
distributed across several countries, including environments that are, or may rapidly become, hostile to them.
Ecological security, also known as environmental security, refers to the integrity of ecosystems and the biosphere, particularly in
relation to their capacity to sustain a diversity of life-forms (including human life). The security of ecosystems has attracted greater
attention as the impact of ecological damage by humans has grown.
Food security refers to the ready supply of, and access to, safe and nutritious food.[11] Food security is gaining in importance as the
world's population has grown and productive land has diminished through overuse and climate change.
Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm
systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms activated, windows closed etc.)
Human security is the name of an emerging paradigm which, in response to traditional emphasis on the right of nation states to protect
themselves, has focused on the primacy of the security of people (individuals and communities).The concept is supported by the United
Nations General Assembly, which has stressed "the right of people to live in freedom and dignity" and recognized "that all individuals,
in particular vulnerable people, are entitled to freedom from fear and freedom from want".
National security refers to the security of a nation state, including its people, economy, and institutions. In practice, state governments
rely on a wide range of means, including diplomacy, economic power, and military capabilities.
The following are security concerns in the Philippines of which you should be aware:
Theft, robbery, and mugging
Crimes related to illegal drugs
Natural disasters such as volcanic eruptions, typhoons, and earthquakes
22
Transportation-related accidents such as capsized boats and vehicle and bicycle accidents
It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and
code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from
secure procedures.
Data present in a computer can also be misused by unauthorized intrusions. An intruder can modify and change the program source
codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading
and offensive social accounts.
Malicious intents can also be a factor in computer security. Intruders often use your computers for attacking other computers or
websites or networks for creating havoc. Vengeful hackers might crash someone’s computer system to create data loss. DDOS attacks
can be made to prevent access to websites by crashing the server.
Above factors imply that your data should remain safe and confidential. Therefore, it is necessary to protect your computer and hence
the need for Computer Security arises.
What is firewall?
A firewall is a security-conscious piece of hardware or soft-ware that sits between the Internet and your network with a single-minded
task: preventing them from getting to us. The firewall acts as a security guard between the Internet and your local area network (LAN).
All network traffic into and out of the LAN must pass through the firewall, which prevents unauthorized access to the network.
23
2. Stateful packet inspection (SPI) is a step up in intelligence from simple packet filtering . A firewall with stateful packet
inspection looks at packets in groups rather than individually. It keeps track of which packets have passed through the firewall
and can detect patterns that indicate unauthorized access.
3. Deep packet inspection (DPI) is the actual content of the packets is inspected so viruses, spam, and other harmful content can
be blocked.DPI also allows practices, such as data mining, eavesdropping, and content censorship, which make its use a
controversial subject.
Why do we need to learn about Computer Security? Isn't this just an IT problem?
Good Security Standards follow the "90 / 10" Rule:
90% of security safeguards rely on an individual ("YOU") to adhere to good computing practices
10% of security safeguards are technical.
Example: The lock on the door is the 10%. You remembering to lock the lock, checking to see if the door is closed, ensuring others do
not prop the door open, keeping control of the keys, etc. is the 90%. You need both parts for effective security.
Republic Act No. 10175, This Act shall be known as the “Cybercrime Prevention Act of 2012″
Important terms;
1. Access refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any
resources of a computer system or communication network.
2. Alteration refers to the modification or change, in form or substance, of an existing computer data or program.
3. Computer refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or
grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any
storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such
device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart
phones, computer networks and other devices connected to the internet.
4. Computer data refers to any representation of facts, information, or concepts in a form suitable for processing in a computer
system including a program suitable to cause a computer system to perform a function and includes electronic documents
and/or electronic data messages whether stored in local computer systems or online.
5. Computer program refers to a set of instructions executed by the computer to achieve intended results.
6. Computer system refers to any device or group of interconnected or related devices, one or more of which, pursuant to a
program, performs automated processing of data. It covers any type of device with data processing capabilities including, but
not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and
storage components which may stand alone or be connected in a network or other similar devices. It also includes computer
data storage devices or media.
7. Cyber refers to a computer or a computer network, the electronic medium in which online communication takes place.
24
8. Cybersecurity refers to the collection of tools, policies, risk management approaches, actions, training, best practices,
assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
9. Database refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared,
processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a
computer system.
Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act:
a. Offenses against the confidentiality, integrity and availability of computer data and systems:
1. Illegal Access. – The access to the whole or any part of a computer system without right.
2. Illegal Interception. – The interception made by technical means without right of any non-public transmission of computer
data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such
computer data.
3. Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data,
electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
4. System Interference. — The intentional alteration or reckless hindering or interference with the functioning of a computer
or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or
program, electronic document, or electronic data message, without right or authority, including the introduction or
transmission of viruses.
5. Misuse of Devices.
a. The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
i. A device, including a computer program, designed or adapted primarily for the purpose of committing any of the
offenses under this Act; or
ii. A computer password, access code, or similar data by which the whole or any part of a computer system is
capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this
Act.
b. The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent to use said devices for the
purpose of committing any of the offenses under this section.
6. Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation,
and deprive others from registering the same, if such a domain name is:
a. Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency
at the time of the domain name registration:
b. Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and
c. Acquired without right or with intellectual property interests in it.
b. Computer-related Offenses:
1. Computer-related Forgery. —
a. The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it
be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly
readable and intelligible; or
b. The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the
purpose of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud. — The unauthorized input, alteration, or deletion of computer data or program or interference in
the functioning of a computer system, causing damage thereby with fraudulent intent: Provided, That if no damage has
yet been caused, the penalty imposable shall be one (1) degree lower.
3. Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of
identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has
yet been caused, the penalty imposable shall be one (1) degree lower.
c. Content-related Offenses:
1. Cybersex. — The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition
of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
25
2. Child Pornography. — The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child
Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1)
one degree higher than that provided for in Republic Act No. 9775.
3. Unsolicited Commercial Communications. — The transmission of commercial electronic communication with the use of
computer system which seek to advertise, sell, or offer for sale products and services are prohibited unless:
a. There is prior affirmative consent from the recipient; or
b. The primary intent of the communication is for service and/or administrative announcements from the sender to its
existing users, subscribers or customers; or
c. The following conditions are present:
i. The commercial electronic communication contains a simple, valid, and reliable way for the recipient to reject.
receipt of further commercial electronic messages (opt-out) from the same source;
ii. The commercial electronic communication does not purposely disguise the source of the electronic message;
and
iii. The commercial electronic communication does not purposely include misleading information in any part of the
message in order to induce the recipients to read the message.
4. Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended,
committed through a computer system or any other similar means which may be devised in the future.
A bomb threat is defined as a threat to detonate an explosive or incendiary device to cause property damage, death, or injuries,
whether or not such a device actually exists. All bomb threats are to be taken seriously.
Bomb threats are delivered in a variety of ways. The majority of threats are called in to the target. Occasionally these calls are through
a third party. Sometimes a threat is communicated in writing or by a recording.
Whatever the reason for the report, there will certainly be a reaction to it. Through proper planning, the wide variety of potentially
uncontrollable reactions can be greatly reduced.
Physical security provides for the protection of property, personnel, facilities, and material against unauthorized entry, trespass,
damage, sabotage, or other illegal or criminal acts. The physical security plan deals with prevention and control of access to the
building. In most instances, some form of physical security may be already in existence, although not necessarily intended to prevent a
bomb attack.
The bomb incident plan provides detailed procedures to be implemented when a bombing attack is executed or threatened. In planning
for the bomb incident, a definite chain of command or line of authority must be established only by using an established organization
and procedures can the bomb incident be handled with the least risk to all concerned. A clearly defined line of authority will instill
confidence and avoid panic.
Establishing a chain of command is easy if there is a simple office structure, one business, one building. However, if a complex
situation exists, a multi-occupant building for example, a representative from each occupant entity should attend the planning
26
conference. A leader should be appointed and a clear line of succession delineated. This chain of command should be printed and
circulated to all concerned parties.
Contact the police department, fire department, or local government agencies to determine if any assistance is available to you for
developing your physical security plan or bomb incident plan. If possible, have police and/or fire department representatives and
members of your staff inspect the building for areas where explosives are likely to be concealed. (Make a checklist of these areas for
inclusion in command center materials.) Determine whether there is a bomb disposal unit available, how to contact the unit, and under
what conditions it is activated. In developing your bomb incident plan, you must also ascertain whether the bomb disposal unit, in
addition to disarming and removing the explosives, will assist in searching the building in the event of a threat.
Training is essential to deal properly with a bomb threat incident. Instruct all personnel, especially those at the telephone switchboard,
in what to do if a bomb threat is received. Be absolutely certain that all personnel assigned to the command center are aware of their
duties. The positive aspects of planning will be lost if the leadership is not apparent. It is also very important to organize and train an
evacuation unit which will be responsive to the command center and has a clear understanding of the importance of its role.
The command center be located near the switchboard or focal point of communications. It is critical that lines of communication be
established between the command center and the search or evacuation teams- The center must have the flexibility to keep up with the
search team progress. In a large facility, if the teams go beyond the communications network, the command center must have the
mobility to maintain contact and track search or evacuation efforts.
In considering measures to increase security for your building or office, it is highly recommended that you contact your local police
department for guidance regarding a specific plan for your facility. There is no single security plan that is adaptable to all situations. The
following recommendations are offered because they may contribute to reducing your vulnerability to bomb attacks.
The exterior configuration of a building or facility is very important. Unfortunately, in most instances, the architect has given little or no
consideration to security, particularly toward thwarting or discouraging a bomb attack. However, by the addition of fencing and lighting,
and by controlling access, the vulnerability of a facility to a bomb attack can be reduced significantly.
Bombs being delivered by car or left in a car are a grave reality. Parking should be restricted, if possible, to 300 feet from your building
or any building in a complex. If restricted parking is not feasible, properly identified employee vehicles should be parked closest to your
facility and visitor vehicles parked at a distance.
Heavy shrubs and vines should be kept close to the ground to reduce their potential to conceal criminals or bombs. Window boxes and
planters are perfect receptacles for the bomber. Unless there is an absolute requirement for such ornamentation, window boxes and
planters are better removed. If they must remain, a security patrol should be employed to check them regularly.
A highly visible security patrol can be a significant deterrent. Even if this ''patrol'' is only one security guard/night guard, he/she is
optimally utilized outside the building. If an interior guard is utilized, consider the installation of closed-circuit television cameras that
cover exterior building perimeters.
Have an adequate burglar alarm system installed by a reputable company that can service and properly maintain the equipment. Post
signs indicating that such a system is in place.
27
Entrance/exit doors with hinges and hinge pins on the inside to prevent removal should be installed. Solid wood or sheet metal faced
doors provide extra integrity that a hollow-core wooden door cannot provide. A steel door frame that properly fits the door is as
important as the construction of the door.
The ideal security situation is a building with no windows. However, bars, grates, heavy mesh screens, or steel shutters over windows
offer good protection from otherwise unwanted entry. It is important that the openings in the protective coverings are not too large.
Otherwise, a bomb may be introduced into the building while the bomber remains outside. Floor vents, transoms, and skylights should
also be covered. Please note that fire safety considerations preclude the use of certain window coverings. Municipal ordinances should
be researched and safety considered before any of these renovations are undertaken.
Controls should be established for positively identifying personnel who are authorized access to critical areas and for denying access to
unauthorized personnel. These controls should extend to the inspection of all packages and materials being taken into critical areas.
Security and maintenance personnel should be alert for people who act in a suspicious manner, as well as objects, items, or parcels
which look out of place or suspicious. Surveillance should be established to include potential hiding places (e.g., stairwells, rest rooms,
and any vacant office space) for unwanted individuals.
Doors or access ways to such areas as boiler rooms, mail rooms, computer areas, switchboards, and elevator control rooms should
remain locked when not in use. It is important to establish a procedure for the accountability of keys. If keys cannot be accounted for,
locks should be changed.
Good housekeeping is also vital. Trash or dumpsite areas should remain free of debris. A bomb or device can easily be concealed in
the trash. Combustible materials should be properly disposed of, or protected if further use is anticipated.
Install detection devices at all entrances and closed-circuit television in those areas previously identified as likely places where a bomb
may be placed. This, coupled with the posting of signs indicating such measures are in place, is a good deterrent.
The threatened use of explosives necessitates that in the interest of safety and security, some inconvenience may have to be imposed
on visitors to public buildings. The public is becoming more accustomed to routine security checks and will readily accept these minor
inconveniences.
Perhaps entrances and exits can be modified with a minimal expenditure to channel all visitors through someone at a reception desk.
Individuals entering the building would be required to sign a register indicating the name and room number of the person whom they
wish to visit. Employees at these reception desks could contact the person to be visited and advise him/her that a visitor, by name, is in
the lobby. The person to be visited may decide to come to the lobby to ascertain that the purpose of the visit is valid. A system for
signing out when the individual departs could be integrated into this procedure.
Such a procedure may result in complaints from the public. If the reception desk clerk explains to the visitor that these procedures were
implemented in his/her best interest and safety, the complaints would be reduced. The placement of a sign at the reception desk
informing visitors of the need for safety is another option.
It is always desirable that more than one person listen in on the call. To do this, a covert signaling system should be implemented,
perhaps by using a coded buzzer signal to a second reception point.
A calm response to the bomb threat caller could result in obtaining additional information. This is especially true if the caller wishes to
avoid injuries or deaths. If told that the building is occupied or cannot be evacuated in time, the bomber may be willing to give more
specific information on the bomb's location, components, or method of initiation.
The bomb threat caller is the best source of information about the bomb. When a bomb threat is called in:
Keep the caller on the line as long as possible. Ask him/her to repeat the message. Record every word spoken by the person.
28
If the caller does not indicate the location of the bomb or the time of possible detonation, ask him/her for this information.
Inform the caller that the building is occupied and the detonation of a bomb could result in death or serious injury to many
innocent people.
Pay particular attention to background noises, such as motors running, music playing, and any other noise which may give a
clue as to the location of the caller.
Listen closely to the voice (male, female), voice quality (calm, excited), accents, and speech impediments. Immediately after
the caller hangs up, report the threat to the person designated by management to receive such information.
Report the information immediately to the police department, fire department, and other appropriate agencies. The sequence
of notification should be established in the bomb incident plan.
Remain available, as law enforcement personnel will want to interview you.
When a written threat is received, save all materials, including any envelope or container. Once the message is recognized as a bomb
threat, further unnecessary handling should be avoided. Every possible effort must be made to retain evidence such as fingerprints,
handwriting or typewriting, paper, and postal marks. These will prove essential in tracing the threat and identifying the writer.
While written messages are usually associated with generalized threats and extortion attempts, a written warning of a specific device
may occasionally be received. It should never be ignored.
Decision Time
The most serious of all decisions to be made by management in the event of a bomb threat is whether to evacuate the building. In
many cases, this decision may have already been made during the development of the bomb incident plan. Management may
pronounce a policy that, in the event of a bomb threat, total evacuation will be effective immediately. This decision circumvents the
calculated risk and demonstrates a deep concern for the safety of personnel in the building. However, such a decision can result in
costly loss of time.
Essentially, there are three alternatives when faced with a bomb threat:
1. Ignore the threat.
2. Evacuate immediately.
3. Search and evacuate warranted.
Ignoring the threat completely can result in some problems. While a statistical argument can be made that very few bomb threats are
real, it cannot be overlooked that bombs have been located in connection with threats. If employees learn that bomb threats have been
received and ignored, it could result in morale problems and have a long-term adverse effect on your business. Also, there is the
possibility that if the bomb threat caller feels that he/she is being ignored, he/she may go beyond the threat and actually plant a bomb.
Evacuating immediately on every bomb threat is an alternative that on face value appears to be the preferred approach. However, the
negative factors inherent in this approach must be considered. The obvious result of immediate evacuation is the disruptive effect on
your business. If the bomb threat caller knows that your policy is to evacuate each time a call is made, he/she can continually call and
force your business to a standstill. An employee, knowing that the policy is to evacuate immediately, may make a threat in order to get
out of work. A student may use a bomb threat to avoid a class or miss a test. Also, a bomber wishing to cause personal injuries could
place a bomb near an exit normally used to evacuate and then call in the threat.
Initiating a search after a threat is received and evacuating a building after a suspicious package or device is found is the third, and
perhaps most desired, approach. It is certainly not as disruptive as an immediate evacuation and will satisfy the requirement to do
something when a threat is received. If a device is found, the evacuation can be accomplished expeditiously while at if the same time
avoiding the potential danger areas of the bomb.
Evacuation
An evacuation unit consisting of management personnel should be organized and trained. The organization and training of this unit
should be coordinated with the development of the bomb incident plan, as well as with all tenants of a building.
When police officers or firefighters arrive at the building, the contents and the floor plan will be unfamiliar to them if they have not
previously reconnoitered the facility. Thus, it is extremely important that the evacuation or search unit be thoroughly trained and familiar
29
with the floor plan of the building and immediate outside areas. When a room or particular area is searched, it should be marked or
sealed with a piece of tape and reported to the supervisor of that area.
The evacuation or search unit should be trained only in evacuation and search techniques and not in the techniques of neutralizing,
removing or otherwise having contact with the device. If a device is located, it should not be disturbed. However, its location should be
well marked and a route back to the device noted.
Search Teams
It is advisable to use more than one individual to search any area or room, no matter how small. Searches can be conducted by
supervisory personnel, area occupants or trained explosive search teams. There are advantages and disadvantages to each method of
staffing the search teams.
Using supervisory personnel to search is a rapid approach and causes little disturbance. There will be little loss of employee working
time, but a morale problem may develop if it is discovered that a bomb threat has been received and workers were left unaware. Using
a supervisor to search will usually not be as thorough because of his/her unfamiliarity with many areas and his/her desire to get on with
business.
The search conducted by a trained team is the best for safety, morale and thoroughness, though it does take the most time. Using a
trained team will result in a significant loss of production time. It is a slow operation that requires comprehensive training and practice.
The decision as to who should conduct searches lies with management, and should be considered and incorporated into the bomb
incident plan.
Search Technique
The following room search technique is based on the use of a two-person searching team. There are many minor variations possible in
searching a room. The following contains only the basic techniques.
1. When the two-person search they should first move to various parts of the room and stand quietly with their eyes closed and
listen for a clockwork device.
2. Frequently, a clockwork mechanism can be quickly detected without use of special equipment. Even if no clockwork
mechanism is detected, the team is now aware of the background noise level within the room itself.
3. Background noise or transferred sound is always disturbing during a building search.
4. Background noise may also include outside traffic sounds, rain, and wind.
The individual in charge of the room searching team should look around the room and determine how the room is to be divided for
searching and to what height the first searching sweep should extend. The first searching sweep will cover all items resting on the floor
up to the selected height.
You should divide the room into two virtually equal parts. This equal division should be based on the number and type of objects in the
room to be searched and not on the size of the room. An imaginary line is then drawn between two objects in the room; e.g., the edge
of the window on the north wall to the floor lamp on the south wall.
30
After the room has been divided and a searching height has been selected, both individuals go to one end of the room division line and
start from a back-to-back position. This is the starting point and the same point will be used on each successive searching sweep- Each
person now starts searching his/her way around the room, working toward the other person, checking all items resting on the floor
around the wall area of the room. When the two individuals meet, they will have completed a "wall sweep." They should then work
together and check all items in the middle of the room up to the selected hip height, including the floor under the rugs. This first
searching sweep should also include those items which may be mounted on or in the walls, such as air-conditioning ducts, baseboard
heaters, and built-in wall cupboards, if these fixtures are below hip height.
The first searching sweep usually consumes the most time and effort. During all the searching sweeps, use the electronic or medical
stethoscope on walls, furniture items, and floors.
Have a sign or marker indicating "Search Completed" conspicuously posted in the area. Place a piece of colored Scotch tape across
the door and door jamb approximately 2 feet above floor level if the use of signs is not practical.
The room searching technique can be expanded. The same basic technique can be applied to search any enclosed area. Encourage
the use of common sense or logic in searching. If a guest speaker at a convention has been threatened, common sense would indicate
searching the speakers platform and microphones first, but always return to the searching technique. Do not rely on random or spot
checking of only logical target areas. The bomber may not be a logical person.
31
3. Do not permit re-entry into the building until the device has been removed/disarmed, and the building declared safe for re-
entry.
The purpose of this provision is to furnish the news media with accurate information and to see that additional bomb threat calls are rot
precipitated by irresponsible statements from uninformed sources.
Command Center
1. Designate a primary location and an alternate location.
2. Assign personnel and designate decision making authority.
3. Establish a method for tracking search teams.
4. Maintain a list of likely target areas.
2. Maintain a blueprint of floor diagrams in the center.
3. Establish primary and secondary methods of communication. (Caution-the use of two-way radios during a search can cause
premature detonation of an electric blasting cap.)
4. Formulate a plan for establishing a command center, if a threat is received after normal work hours.
5. Maintain a roster of all necessary telephone numbers.
Below is a list of five different types of bombs based on the fundamental explosive mechanism they employ.
1. Compressed gas, Relatively small explosions can be produced by pressurizing a container until catastrophic failure such as
with a dry ice bomb.
2. Low explosive, The simplest and oldest bombs store energy in the form of a low explosive. Black powder is an example of a
low explosive. therefore, must generally be used in large quantities or confined in a container with a high burst pressure to be
useful as a bomb.
3. High explosive, A high explosive bomb is one that employs a process called "detonation" to rapidly go from an initially high
energy molecule to a very low energy molecule. Detonation is distinct from deflagration in that the chemical reaction
propagates faster than the speed of sound (often many times faster) in an intense shock wave.
4. Thermobaric, A thermobaric bomb is a type of explosive that utilizes oxygen from the surrounding air to generate an intense,
high-temperature explosion, and in practice the blast wave typically produced by such a weapon is of a significantly longer
duration than that produced by a conventional condensed explosive. The fuel-air bomb is one of the best-known types of
thermobaric weapons.
5. Nuclear fission, Nuclear fission type atomic bombs utilize the energy present in very heavy atomic nuclei, such as U-235 or
Pu-239.
32
6. Nuclear fusion, A thermonuclear weapon is a type of nuclear bomb that releases energy through the combination of fission
and fusion of the light atomic nuclei of deuterium and tritium. With this type of bomb, a thermonuclear detonation is triggered
by the detonation of a fission type nuclear bomb contained within a material containing high concentrations of deuterium and
tritium.
7. Weapon yield is typically increased with a tamper that increases the duration and intensity of the reaction through inertial
confinement and neutron reflection. Nuclear fusion bombs can have arbitrarily high yields making them hundreds or thousands
of times more powerful than nuclear fission.
PERSONNEL SECURITY
Includes all the security measures designed to prevent individuals of doubtful loyalty, character, integrity from gaining access to
classified matters and sensitive facilities. It is composed of conducting personnel security investigation and security education
programs.
Personnel Security Investigation - is an inquiry into the reputation, character, integrity, discretion moral and loyalty of an individual in
order to determine a person’s suitability for appointment or access to classified matters.
Security Chain – personnel security is the weakest link in the security chain. This weakness can be the best minimized or eliminated by
making init personnel security through good training program.
TYPES OF PSI
1. National Agency Check – this is an investigation of an Individual made upon the basis of written information supplied by him in
response to official inquiry and reference to national agencies as such;
a. NBI - is an agency of the Philippine government under the Department of Justice, responsible for handling and
solving major high profile cases that are in the interest of the nation.
b. NICA - is the primary intelligence gathering and analysis arm of the Philippine government, in charge of carrying out
overt, covert, and clandestine intelligence.
c. PNP Directorate for Intelligence Clearance.
2. Local Agency Check(LAC) – investigation from the local government agencies, work, school attended, residence. It also
includes all local clearances.
33
General Techniques of PSI:
A. BACKGROUND INVESTIGATION – is called as the comprehensive investigation other than the NAC and LAC, to verify
information on the application and to obtain pertinent information.
PERSONNEL IDENTIFICATION
The most practical and generally accepted system in personnel identification is the use of badges and identification cards. Generally
speaking, this system designates when and where and how passes should be displayed, and to whom; what is to be done in case of
loss of the pass; procedures for taking a pass from terminated employees; and a system in cancellation and re-issue of all passes;
either as a security review or when a significant number of badges have been reported stolen or lost. To be effective;
Badges must be tamper-resistant, which means that they should be printed or embossed on a distinctive stock which work
with a series of design difficult to reproduce.
34
They should contain a clear and recent photograph of the bearer, preferably in color.
The photograph appearing in the badge/pass should be at least one inch square and should be updated every two or three
years or when there is any significant change in facial appearance of the bearer.
It should additionally contain vital statistics, such as date of birth, height, weight, color of hair and eyes, sex and thumbprints.
Document Security
It is the branch of security involved in the protection of documents and classified papers from loss, access by unauthorized person,
theft, damage and compromise through disclosure.
The term document in security matters, covers any form of recorded information either printed, written, drawn, painted, sound
recording, films, maps, etc. The object is to secure and control the sensitive information contained therein so as not to prejudice the
firm, company or agency.
a. Policy – Security of document and information is the responsibility of all concerned.
b. Regulation – Anybody found guilty violating document and information security shall be dealt with accordingly.
c. Doctrine – Access to information is based on the Need to Know* and not by position.
d. Practice – Authority to have access to classified information is not permanent but can be withdrawn by the originating
authority.
* Need to Know – Is the principle whereby access to classified matter may only be given to those persons to whom it is necessary for
the fulfillment of their duty. Persons are not entitled to have access to classified matter solely by virtue of their status or office. *
Identity document (also called a piece of identification or ID) is any document which may be used to prove a person's identity.
Some countries issue formal identity documents, as national identification cards which may be compulsory or non-compulsory, while
others may require identity verification using regional identification or informal documents. When the identity document incorporates a
person's photograph, it may be called photo ID.
In the absence of a formal identity document, the following may be presented for identification;
A driver's license
Passport
National Identification card if available
The identity document is used to connect a person to information about the person, often in a database. The photo and the possession
of it is used to connect the person with the document. The connection between the identity document and information database is
based on personal information present on the document, such as the bearer's full name, age, birth date, address, an identification
number, card number, gender, citizenship and more. A unique national identification number is the most secure way, but some
countries lack such numbers or don't mention them on identity documents.
Document/Information Cycle:
1. Creation
2. Classification
35
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
Categories of Document:
1. Category A. Contains reportable time, it is critical information, forwarded delay, critical to friendly operation and requires
immediate action.
2. Category B. Contains communications, cryptographic documents and be classified secret and special handling.
3. Category C. It has an intelligence value, contains exploitable information regardless of its contents.
4. Category D. No value, yet lower level will never classify documents and no decision made.
Classification of documents:
Class I - Vital/company confidential/secret documents
Class II - Important/Private confidential documents.
Class III - Useful documents
Class IV - Non-essential documents
INFORMATION SECURITY
Security Hazard – any act or condition which may result in the compromise of information, loss of life, and destruction of property or
disruption of the activity of the installation.
Types of Hazards:
1. Natural Hazards – hazards which arise from natural phenomena.
2. Human/man made hazard – result on the state of mind, attitude, weakness, or character traits of one and more persons.
Sabotage – he is the most dangerous which deal of planning and implementing security, experiential and he can work alone in several
places.
Espionage – and very dangerous and underestimate with extensive training and highly effective information and he can defeat his own
game if proper techniques are undertaken.
Subversive activity – their activity is to know the weaknesses of organization in form of propaganda, morale and etc.
VIP Security – aims to protect people from physical violence, whether external states from violence, sub state actors and domestic
abuse from predatory adults.
VIP SECURITY
VIP – Very Important Person.
Escort – one and more person accompanying to give protection or to pay honor.
Bodyguard – a person or group of person responsible to protect one of more specific person.
36
Organization of VIP Security:
1. Area Security – covers and prophylactic (neutralize) the surrounding areas of engagement.
2. Perimeter Security – uniformed men secures the immediate areas surrounding the engagement.
3. Advance Security - sanitize and at the place before the arrival of the VIP.
4. Close-In security – accompanies the VIP wherever it goes and maximum 4 persons.
5. Reserve Security – on standby or possible back-up or reinforcement.
6. Routine Security – neutralize the possible route of the VIP party.
CRISIS MANAGEMENT
Crisis – is a decisive points of a condition, improper handling in which immediately places under threat or danger of one’s life, limbs,
freedom and property.
Crisis Management – is the totality of action of handling or responding to a given crisis situation.
Crisis Management Plan – is a complete and comprehensive plan of actions designed to protect life, limbs, freedom and property,
before and during any given situation.
Work Stoppage – is a condition of an enterprise whereby normal work operation is stopped as a result of strike or lockout.
Risk is associated with almost every activity especially in the business world. Risk is a potential loss or damage to an asset. It is a
financial loss to an enterprise, business or organization.
Risk Analysis is a management tool, the standards for which are determined by whatever management decides it wants to accept in
terms of actual loss.
BASIC INDUSTRIAL SECURITY CONCEPTS OF SECURITY SURVEY; SECURITY PLAN; SECURITY TEST AND EVALUATION;
PERSONNEL CHECK; TECHNICAL SURVEILLANCE AND SECURITY; AND SECURITY MANAGEMENT.
Security Planning
Planning is a corporate and extensive responsibility. This is a decision making in order to answer the precepts of knowing where we
are, where we are going, and determining the best way to get there.
37
Security Survey
A critical on-site examination and analysis of an industrial plant, business, home or public private institution done to ascertain the
facility’s current security status, to identify deficiencies or excesses in current practices, to determine what protection is needed, and to
make recommendations for improving the over-all level of security at that location.
Security Inspection
Inspection is one of the most important parts of security management process which insure that risks are recognized and covered in
security programs, and that programs are necessary and cost-effective. The assessment of what is happening from a security point of
view is made through an inspection program.
Formal inspections are planned in advance to highlight specific aspects of the workplace and scrutinize them for inconsistencies with
formal standards. This allows employers to see whether all precautions are in place and discover what resources they may need for the
future. As such, planned inspections are often performed with a written checklist of guidelines and carried out regularly by a designated
team. This way, they can ensure that nothing gets missed.
Informal Inspections
Also known as on-the-spot inspections, informal inspections are done by a company’s management to assess the general knowledge
of their employees. Performing these inspections helps them diagnose any weak spots in their employee training and supplies them
with the tools to make training better in the future. These quizzes or forms, filled out by the workforce, usually cover topics such as
project procedures, workplace safety standards, and general work-flow expectations.
3. Structured or Unstructured Inspection Structured inspection – the inspector moves systematically from one area to another
while Unstructured inspection means to conduct inspection in random manner.
Dr. Norman Bottom and Professor John Kostanoski – have applied a system approach to the problem of assets protection. Formulated
as a new way of considering security and loss prevention and called “WAECUP” (an acronym for waste, accidents, and error, crime,
and unethical practices).
Security Education
38
The basic goal of security education is to acquaint all the employees the rationale behind the security measures and to ensure their
cooperation at all times.
Security promotion- it is a positive effort to sell security or make the employees more involved in the implementation of security
measures.
5. Special interviews- it is conducted with the aide of senior company officials to facilitate compliance by means of example.
6. Debriefing- serves to place the person on special notice of his continuing responsibility to protect classified information which
he has knowledge of.
Security Audit – it is essentially an assessment and efficiency of the implementation and enforcement of the organization’s security
policy.
Newel Andrews
W – wearing of the uniform properly with sense of pride which includes passion and commitment.
O – observing and reporting incidents through person, object, place or event (POPE).
R – responding to emergencies
K – know your post, specific duties and responsibilities as a part of the established standard.
Security Investigation – is a planned and organized determination of facts concerning specific loss or damage of assets due to threats,
hazards or unsecured conditions.
39
1. Review the incident report – this is the process of determining the veracity and authenticity of the source and stated
information.
2. Prepare Investigative Plan – there must be a prudent chronological steps in the execution of the investigation.
3. Prepare of Investigative File – use a standard size of folder with case number and label upon the conclusion of the case it
should be kept and secured according to the policy of the company in keeping records cases.
Difficulties in Investigation:
1. Absence of eyewitness/witnesses.
2. Motive unknown
3. Lack of physical clues (evidence)
40