CHAPTER 1
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT
Legal Bases of Industrial Security in the Philippines
1. Natural Authority
The highest law is the law of self-preservation. By instinct, man naturally reacts to protect
himself, his family, his honor, freedom, liberty and property from danger, threat or hazard. He
does it personally and/or thru the help of others.
2. Constitutional Authority
The prime duty of the Government is to serve and protect people. The government may call
upon the people to defend the State and, in the fulfillment thereof, all citizens may be required,
under conditions provided by law, or to render personal military or civil service. (Art II, Sec 4 of
the 1987 Constitution. No person shall be deprived of life, liberty or property without due
process of law, nor shall any person be denied the equal protection of the laws. (Art III Sec 1 of
1987 Constitution)This means the life, liberty; freedom and property can only be taken from a
person after the observance of due process of law. The right of the people to be secure in their
persons, houses, papers, and effects against unreasonable searches and seizures of whatever
nature and for any purpose shall be inviolable.
3. Statutory Authority
1. The RPC (Act No. 3815, as amended)
Applicable provisions of the Code on Crimes Against persons, Personal Liberty and
Security and Property have bearing on the security and protection of one’s life, liberty and
property.
2. Private Security Agency Law (R.A. 5487 as amended)
This law governs the operation, administration of security agency, and activities,
qualifications, duties and licensing of security guards, watchmen and private detectives. In
short, it is the intention of this law to professionalize the security services in order to upgrade
the level of security protection.
3. Law Relevant to Industrial Security Management Section 24, R.A. 6975, as amended –
Powers and functions of the PNP:
-Issue licenses for the possession of firearms and explosives in accordance with law.
-Supervise and control the training and operations of security agencies and issue licenses
to operate security agencies, and to security guards and private detectives, or the practice
of their profession.
Factors that bring about unsecured conditions or situation
Threat is activity that could lead to a loss.
Hazard is a condition that could lead to a loss.
Risk is a potential loss/damage to an asset.
Vulnerability is a weakness that can be gained to an access to an asset.
The security functions cycle
1. Preventive Functions - These functions are performed to address threats and deter or
prevent the risk from occurring.
2. Reactive Functions - These functions are performed to address emergency situation when
risk are occurring to prevent further loss or damaged or resources.
3. Investigative Functions - These functions are performed with the following objectives:
• To reconstruct the circumstances of a risk occurrence to possibly recover the loss.
• To identify the person responsible and liable for the event and subsequent loss and
justify sanctions against the said person.
• To find ways to prevent the recurrence of the loss.
Components of Security Management
1. Preventive Measures - are important tools and elements used in prevention of an
incident from happening.
2. Counter Measures - are programs implemented to avoid repetition of the same event?
3. Crime prevention is using instinct, common sense, and action to eliminate or greatly
reduce criminal's opportunity.
TRAID OF CRIME
OPPORTUNITY
DESIRE ABILITY
There are three elements that should be satisfied in order to complete commission of crime.
They are Desire, Opportunity, and Ability. Eliminate one of these elements and no crime will
happen. Practically, in crime prevention you have no control over the first two elements
because it remains in the imagination of the person with interest. However, you can have great
control in the commission of crime if you eliminate Opportunity, which is the very essence of
crime prevention effort.
TRIANGULAR FUNCTIONS OF LAW ENFORCEMENT
REACTIVE MEASURES
PROACTIVE MEASURES COUNTER MEASURES
It is important to note the proactive measures and preventive measures are totally
different from counter measures, although they have similar objective. Proactive measures are
designed to prevent crime from happening while counter measures are designed to prevent a
crime from happening again. Reactive measures will come into play to point out what was
wrong? What was the problem? Identify the criminal and solve the crime.
Types of control
➢ Administrative controls - consist of approved written policies, procedures, standards
and guidelines. Administrative control from the framework for running the business and
managing people. They inform people on how the business is to be run and how day to
day operation are to be conducted.
➢ Logical controls - (also called technical control? Use software and date to monitor and
control access to information and computing system ( E.G. passwords, network and host
based firewalls, network intrusion detection system. Access control lists, and data
encryption and logical control.
3. Physical monitors and controls the environment of the work place and computing
facilities. They also monitor and control access to and from such facilities.
(E.g. doors, locks, heating and air conditioning, smoke and fire alarms, fire suppression
system, cameras, barricades, fencing, security, guards ,cable locks, etc.)
The Principal Divisions of Security Management
In the business world, the field of security, there are only three areas covering the different
types, kind or specialization in security. They are the following: (figure 1)
➢ Physical Security is the sum total of all physical protection employed or installed to
secure assets.
➢ Personnel Security is the sum total of procedures followed, inquires conducted, and
criteria applied to determine the work suitable of a particular applicant or retention or
transfer of a particular employee.
➢ Document and Information Security is the sum total of all policies, regulation, practices,
enforce to safeguards the contents and integrity of any classified information or
documents from compromise or loss.
PRINCIPAL DIVISIONS OF SECURITY MANAGEMENT
What kind of Security?
Physical Security
Document
and
Personnel
Information
Security Security
Figure 1
What process or system
TYPES OF SECURITY
1. Hotel Security - A type of security applied to hotels where its properties are protected
from pilferage, loss, damage and the function in the hotel restaurants are not disturbed
and troubled by outsiders or the guest themselves. This type of security employs house
detectives, uniforms guard and supervisor and insures that hotel guests and their
personal effects safeguarded.
2. Bank Security - This type of security is concern with bank operations. Its main objective
is the protection of bank cash and assets, its personnel and clientele. Security personnel
trained to safeguard bank and assets while in storage, in transit and during transactions.
3. School Security - A type of security that is concern with the protection of students,
faculty members, and school properties. Security personnel are trained to protect the
school property from theft, vandals handling campus riots and detecting the use of
intoxicated drugs and alcohol by the students.
4. Supermarket or Mall Security - A type of security which is concern with the protection
of the stores, warehouses, storage, its immediate premises and properties as well as the
supermarket personnel and costumers. Security personnel are trained to detect
"shoplifter", robbery, and bomb detection and costumer relation.
5. Aviation Security - A type of security which is concern with the protection of the Airline
Industry.
The Science and Art of Security
(Guarding)
Guarding is an activity where one watches over or shields another person or property from
danger, harm, loss or damaged. Guarding is a science because it is a body of knowledge which is
composed of time-tested principles and theories and the application of such.
Major Activities of Security
The basic functions of security are classified as preventive, reactive, and investigative.
1. PATROLLING
Patrolling is an activity where the continuously observe the surrounding of the
facility for any unusual situation or condition that can be inimical to its security and
safety.
2. RECORDING
Recording is the process of preserving information obtained by the guard while in
duty and while performing his specific functions.
The Technical Logbook
A Technical Logbook is a record of the compliance of the guard of a specific security
function or procedure. A Technical Logbook generally has a prescribed format for the
information solicited and it is accomplished in strict chronological order. Its contents are
classified and it is proprietary to the client/organization.
Visitor Control is the process of screening out undesirable or illegitimate persons from
entering the facility premises.
Access Control is the process of preventing the intrusion of critical spaces and areas within
the facility by unauthorized persons.
CHAPTER 2
R.A.No.5487
THE PRIVATE SECURITY AGENCY LAW
Basic Facts and Terminology
R.A No. 5487
- The act that regulates the organization and operation of private detective,
watchman and security guard agencies in the Philippines. This act was approved on June 13,
1969. It is otherwise known as "The Private Security Agency Law" has been amended by P.D
no. 100 dated January 17, 1973.
Duty Detail Order/Letter of Instruction- is a written instruction issued by the agency to its
guard performs lawful activity at specific time, place and date. It shall include the make,
model and serial no. of the firearm issued to the guard and the name of operation officer or
manager of the agency.
PNPSAGSD - This is the unit under the Philippines National Police which is charged with the
supervision, direction and control of all security agencies in the Philippines.
Permit - A document issued by CPNP or his duly authorized representatives authorizing a
person to engage in the occupation, calling or employment of watchman, security guard or
private detective after payment of dues or fees.
Person - Shall include not only natural but also juridical person such as single proprietorship,
corporations, companies or association, duly organized and registered with the Security
Exchange Commission and /or the Department of Trade and Industry.
Private Security Service - Shall include the act of providing or rendering device to watch an
establishment whether public or private, building, compound/area or property, to conduct
access control/denial in any form whether physical, manually or scientifically by electronic
monitoring system, for the purpose of securing such property and at the same time ensuring
safety and protection of person within such areas, to maintain peace and order with in such
areas, to conduct private security training and investigation.
Private Detective Service - Shall include among others the act of providing personal security
protection, inquiry and information gathering, pre-employment verification and individual
background profiling, providing assistance in civil liability and personal injury cases,
insurance claims, and fraud, child custody and protection cases, for the purpose of assisting
in gathering information leading to determination and /or prevention of criminal acts and
/or resolution of legal, financial and personal problems.
Security Guard - Sometimes called private security guard or watchman shall include any
person who offers or renders personal service to watch or secure either a residence or
business establishment or both for hire or compensation, and with a license to exercise
profession.
Private Detective - Shall mean any person who does detective work for hire, reward or
commission, other than members of the AFP, Guard of the Bureau of Jail Management
Penology, Municipal or city jail guards, and members of the PNP or of any other Law
Enforcement agency of the government.
Private Security Personnel - Shall be natural persons which include private security guards,
private detectives, security consultant, security officers and others that may be classified
later, rendering performing security and/or detective services as employed by private
security agencies and/or private firms.
Government Security Personnel - Shall be natural persons which include government
security guards, detective, security consultant, security officers and others that may be
classified later except those of the AFP, PNP, BJMP, Municipal or City Jail guards
rendering/performing security and/or detective services as employed by Government
entities.
Private Security Agency (PSA) - Shall mean any person association, partnership, firm or
private corporation, who contracts, recruits, trains, furnishes or post any security guard, to
perform its functions or solicits individuals, businesses, firms, or private, public or
government owned or controlled corporation to engage his/its service or those of his/its
security guards, for hire, commission or compensation thru subscription or as
consultant/trainer to any private or public corporation whose business or transaction involve
national security or interest like the operation and/or management of domestic or ocean
vessels, airplanes, helicopter, seaports, airports, landing strips etc., or as consultant on any
security related matter.
Private Detective Agency (PDA) - Shall mean any person, association, partnership, firm or
private corporation, who contracts, recruits, trains, furnishes or post any private detective,
to perform its functions or solicits individuals, businesses, firms, or private, public or
government owned or controlled corporation to engage his/it's service or those of his/it's
detectives, for hire, commission or compensation thru subscription or as consultant/trainer
to any private or public corporation or as consultant on any detective related matter, or to
provide highly specialized detective and investigation services, or other detective needs that
PNPSAGSDCSG may approve.
License to Exercise Profession (LEP) - Shall mean any document issued by the chief PNP or
his duly authorized representative recognizing a person to be qualified to perform his duties
as private security or training personnel.
License To Operate (LTO) - Is license Certificate document, issued by the C/PNP or his duly
authorized representative, authorizing a person to engage in employing security guard or
detective, or a juridical person to establish, engage, direct, manage or operate an individual
or a private detective agency or private security agency/company security force after
payment of the prescribed dues or fees as provided.
Company Guard Force (CGF) - A security force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or guard its business
establishment premises, compound or properties.
Government Guard Unit (GGU) - As s security unit maintained and operated by any
government entity other than military or police, which is established and maintained for the
purpose of securing the office or compound and/or extension of such government entity.
PNP - As used herein mean the Philippine National Police, which was organized pursuant to
the provision of R.A No. 6975 otherwise known as DILG LAW.
SAGSD - As used herein shall refer to the current PNP Civil Security Group Security Agency
and Guard Supervision Division or any other PNP office that may be designed later as the
primary office for supervision of the implementation of these rules and regulations.
PADPAO - Refers to the Philippines Association of Detective and Protective Agency
operations, Inc., Which is an association of all licensed security agencies and company
security forces? PADPAO is authorized to issue the implementing rules and regulations
pertaining to R.A No.5487.
Duty Detail Order - Is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operation officer to security guard and detective.
Basic Guidelines in Security Organization
A. Who may organize and maintains a PSA and PDA?
Any Filipino citizen or corporation association, partnership may organize and maintain
PSA and PDA. One hundred percent (100%) is owned and controlled by Filipino citizen.
B. Basic age requirements of an operator or manager of agency
The basic age requirement of an operator or manager of an agency is not less than twenty
five (25) years old of age.
C. New applicant for license to operate
Minimum capitalization of one million (1,000,000.00) with minimum bank deposit of five
hundred thousand (P500, 000.00) pesos in order to start its business.
D. Membership
No regular license shall be granted to any private security agency unless it has minimum
of two hundred (200) licensed private security personnel under its employment. No regular
license shall be granted to any company guard's force or private detective agency unless it's
has a minimum of thirty (30) licensed private security personnel under it employment. The
maximum member of private security personnel that a PSA/CGF/PDA may employ shall be
one thousand (1000). The validity of all LTO is Two (2) years.
E. Applicant of LTO
The application shall contain the full name of the applicant, his age, civil status, his
residents and location of business. New applicant - Applicant from NCR may file their
application for license to exercise profession with the personnel licensing section, SAGSD,
Civil Security Group, Camp Crime, Quezon City. Applicants from the province may file their
application with the Firearms, Explosives, Security Agencies and Guard Section (FESAGS).
Regional Operation and Plan Division (ROPD) of the Police Regional Office concerned.
F. Renewal of license to operate
All applications for renewal of license to operate shall filed at least sixty (60) days before
expiry date of LTO subject of the renewal application filed/accepted thereafter shall
penalized for late filing. In addition to other renewal requirements under provision of these
rules and regulation, no application shall approved unless a certification is issued by FED-CSG
of the effect that all licensed firearms of the agency concerned are updated/renewal for at
least one (1) year forthcoming during the validity of the renewed LTO.
G. Payroll
Payroll shall be filed with the main office within fifteen (15) days after pay day.
H. Possession of Firearm
Ratio-one (1) firearm of every two (2) - (1:2) security guards in its employed. No
PSA/CSF/GSU shall be allowed to possess firearms in excess of 500 units.
I. Restriction to possess high powered firearms
The firearm first be registered with the FED before issuance and shall not be used or
transferred in place other than those specially authorized by the Director, CSG.
Stocking of Ammunition
PSA has not exceeded fifty (50) rounds of ammunition per unit of duly licensed firearms.
Individual issue to each security guard shall be limited to one half of such basic load or
twenty (20) rounds for every security guard.
Security Guard Force
Is a group of forces of men selected, trained or group into functional unit for the purpose
of protecting operational process from disruption which would impede efficiency or half
operation at a particular plant, facility, installations or special activities.
Types of Security Guard Force
1. Company guard force
2. Private security guard force
3. Government guard force
Firearm/weapons authorized for used by the security guard while on duty
➢ Handgun
➢ Shotgun
➢ Riot gun of prescribed caliber
Basic three weapons of security guard
➢ Firearm
➢ Handcuff
➢ Nightstick
Justification for a guard's firearm to be confiscated
6. When firearm to be used or being used in the commission of crime.
7. If carried while guard is not on tour of duty.
8. There is written court order.
9. Firearm is carried outside the property, compound or establishment serviced by
the agency without proper authority.
Basic Equipment of a Security Guard
2. Pen and paper (logbook)
3. Whistle
4. Communication Gadgets (warlike talkie)
5. Flashlight
TYPICAL STRUCTURE OF A SECURITY ORGANIZATION
The security force of any installation must be organized in accordance with the
principles of responsibility and authority. Each personnel must be assigned to a
position which corresponds to his experience, skills, training and knowledge. This is to
carry out different functions efficiently and effectively and thus insures smooth flow of
the organization. The security positions may be classified into the following:
1. Office of the General Manager/Security Director
a) The office of the General Manager/Security Director is vested with the authority and
responsibility of running the security force by authority of the President of the
Company/Corporation.
b) The General Manager/Security Director is directly responsible to the President of the
Company/Corporation in the operations and administration of the security force.
c) He is the principal adviser to the president on matters involving security operations
and administration of the security force.
d) He is the overall head of both various staff departments and field units where he
may delegate corresponding authority commensurate to their assigned
responsibility.
e) He implements policies promulgated by the policy making body and executed by the
President.
f) He directs controls and supervises all offices and field units of the force in their
respective assigned tasks.
g) He performs other functions as directed by the President of the
Company/Corporation
2. Office of the Executive Secretary of the General Manager
a) He is the principal administrative assistant to the General Manager/Security
Director.
b) He prepares communications intimated by the General Manager/Security Director.
c) He maintains records of scheduled conferences, appointments and other
engagement and advises the GM/SD of such activities.
d) He records and checks outgoing communications signed by the GM/SD as to its
completeness as well as to ensure the timely dispatch to the addresses through the
administrative section.
e) To perform other duties as directed by the General Manager/Security Director.
3. Office of the Assistant General Manager/Security Executive Director
a) The security Executive Director is the Assistant Manager of the Security Force and
takes the Operational and Administrative Management of the security force in the
absence of the GM/SD
b) He is directly responsible to the GM/SD.
c) He performs other duties as directed by GM/SD.
4. Office of the Human Resources and Administrative Manager/Staff Director for Personnel
and Administration Miscellaneous Administrative Functions:
1. Personnel Strengths
2. Replacement
3. Discipline, law and order
4. Morale and Personnel Services
5. Personnel Procedures
6. Interior Management
7. Personnel Adviser
5. Office of the Operations Manager/Staff Director for Operations
This office is the principal staff on Operations, training, intelligence and investigation.
6. Office of the Finance
1. Accounting
2. Credit and collection
3. Bookkeeping
4. Billing
5. Payroll
6. Disbursing
7. Office of the Logistic Manager
This office is in charge of the following:
a) Coordinates plans and supervise the implementation of directives.
b) Develops, administer, and coordinates research and development on logistical
matters.
c) Collects computers and evaluates statistical data on logistical matters.
d) Recommended logistics budget policy including budget planning.
e) Prepares estimates and/or requirements to ensure that logistical plans support for
corporate plans.
f) Performs necessary program and fiscal administration.
g) Supervise all matters pertaining to supply.
h) Determine the allocation of service personnel.
i) Plan for maintenance and repair or equipment.
8. Office of the Inspectorate and Special Projects (special staff)
This office assists the General Manager I inquiring into, and reports upon matters
pertaining to the performance of the different staff, units, towards the attainment of
corporate objectives. It also inquires on the state of discipline, efficiency and economy
of the company. The Inspectorate Staff conducts inspections, investigations and submits
report to the General Manager.
9. Office of the Communications Officer
The communication officer who is licensed radio operator is the principal adviser of
the Gems Manager on communication matters particularly radio communication. He is
responsible directly to the General Manager.
10. The Detachment Commander/Officer-in-Charge
A Detachment Commander shall command and be responsible for a certain detachment
with fifteen or more security personnel under him. He is directly responsible to the Security
manager of the installation.
a) He prepares and executes the security plan of his detachment in relation to the
security requirements of the establishment being guarded.
b) He is responsible for the enforcement and implementation of rules and
regulations/policies.
c) He receives instructions from the security manager and implements the same as
required.
d) He has full operational and administrative control of all his units to include his
assistant and shift-in-charge/supervisor.
e) He conducts inspection of his units and institute corrective measures on the spot on
those problems he may detect or brought to his attention. If not possible, he brings
the problem to the security manager of the establishment.
11. Assistant Detachment Commander
Detachment with more than twenty security personnel assigned may be provided
with an Assistant Detachment Commander who will be the principal assistant of the
Detachment Commander.
In the absence of the Detachment Commander, he performs the duties of the
Detachment Commander.
12. Shift-in-Charge
a) The shift-in-charge shall be responsible to the Detachment Commander as far as his
shift is concerned.
b) He forms his men at least 30 minutes before posting time seeing to it that all are in
proper uniform and presentable.
c) He disseminates instructions coming from his Detachment Commander/OIC or those
relayed to him by his counter-part, the outgoing SIC.
d) He inspects the post as often as he can to ensure that his men are on the alert and
performing their duties effectively.
e) He performs other duties as may be directed by the Detachment Commander or by
the ADC.
13. Security Guard on Duty/Post
a) The Security Guard (SG) on Duty/Post must always carry his license to practice his
profession, Xerox Copy of the firearms license assigned to him, and his duty detail
order, authorizing him to carry his issued firearm within his area of jurisdiction.
b) If the Security Guard is manning a fixed post especially entrance or exit points, he
must maintain a guard's logbook and enters in the same logbook all events/passages
of VIP's vehicles and inspections or visits of Security Manager/Director of the
Client/Firm.
c) Guard must observe and apply religiously the provisions of the Code of Ethics, Code
of Conduct, and the General Orders of the Security Guard when on post.
d) He may perform special task as may be directed by his shift supervisor, DC and or
ADC, like control of visitors, inspections of bags or persons coming in and going out
of the establishment, vehicle cargoes, or prevents the intrusion of unauthorized
persons in a particular area, etc.
Security Guard's Professional Conduct and Ethics
1. Security Guard's Creed
As a Security Guard, my fundamental duty is to protect lives and properties and
maintained order within the vicinity or place of duty, protect the interest of my
employer and our clients and the security and stability of our government and country
without compromise and prejudice, honest in my action, words and thoughts, and do
my best to upholds the principles: MAKADIOS, MAKABAYAN AT MAKATO.
2. Ethical Standard
As security guard/detective, his fundamental duty is to serve the interest or mission
of his agency in compliance with the contact entered into with the clients or costumers
of the agency he is to serve this,
1. He shall be honest in thoughts and deeds both in his official actuation, obeying the
laws of the land and the regulations prescribed by his agency and those establish by
the company he is supposed to serve;
2. He shall not reveal any confidential matter committed to him as a security guard and
such other matters imposed upon him by law;
3. He shall act all times with decorum and shall not permit personal feelings, prejudice
and undue friendship to influence his action in the performance of his official
functions;
4. He shall not compromise with criminal and other lawless elements to the prejudice
of the costumers or clients and shall assist government relentless drive against
lawlessness and other forms of criminality;
5. He shall carry out his assigned duties as required by law to the best of his ability and
shall safeguard life and property of the establishment he is assigned to;
6. He shall wear his uniform, badge, patches and insignia properly as a symbol of public
trust and confidence as an honest and trustworthy security guard, watchman and
private detective;
7. He shall keep his allegiance first to the government he is assigned to serve with
loyalty and utmost dedication;
8. He shall diligently and progressively familiarize himself with the rules and
regulations lay down by his agency and those of costumers or clients;
9. He shall at all times be courteous, respectful and salute his superior officers,
government officials and officials of the establishment where he is assigned and the
company he is supposed to serve;
10. He shall report for duty always in proper uniform and neat in his appearance and;
11. He shall learn at heart and strictly observe the laws and regulations governing the
use of firearm.
3. Code of Conduct
1. He shall carry with him at all times during his tour of duty his license identification
card and duty detail order with an authority to carry firearms;
2. He shall not use his license and privileges to the prejudice of the public, the client
or costumer and his agency;
3. He shall not engage in any unnecessary conversation with anybody except in the
discharge of his work and shall at all times keep himself alert during his tour of
duty;
4. He shall not read newspaper, magazines, books, etc., while actually performing his
duties;
5. He shall not drink any intoxicating liquor immediately before and during his tour of
duty;
6. He shall know the location of alarm box near his post and sound the alarm in case
of fire or disorder;
7. He shall know how to operate any fire extinguisher at his post;
8. He shall know the location of the telephone and/or telephone number of the
police precincts as well as the telephone number of the fire stations in the locality;
9. He shall immediately notify the police in case of any sign of disorder, strike, riot or
any serious violations of the law;
10. He or his group or guards shall not participate or integrate any disorder, strike,
rout or any serious violations of the law;
11. He shall assist the police in the presentation and maintenance of peace and order
and in the protection of life, property having in mind that the nature of his
responsibilities is similar to that of the latter;
12. He shall familiarize himself with the Private Security Agency Law (R.A. 5487) as
amended, and the PNP SAGSD implementing rules and regulations;
13. When issued a pass he should not lend his pass to anybody;
14. He shall always in proper uniform and shall always carry with him his basic
requirements, and equipment such as writing notebook, ball pen, nightstick
(baton) and/or radio. He shall endeavor at all times to merit and be worthy of the
trust and confidence of the agency he represents and the client he serves.
4. General Order
1. To take charge of this post and all companies property in view and
protect/preserve the same with utmost diligence;
2. To walk during tour of duty in military manner, keeping always in the alert and
observing everything that takes place within sight or hearing;
3. To report all violations of orders I am instructed to enforce;
4. To repeat all calls from post more distant from the guardhouse where I am station;
5. To quit my post only when properly relieved;
6. To receive, obey and pass out to the relieving guard all order from company
officers or official, supervisors post in charge or shift leaders;
7. To talk to no one except in the line of duty;
8. To sound or call the alarm in case of fire or disorder;
9. To call the superior officer in any case not covered by instructions;
10. To salute all company officials, superiors in the agency, ranking public official and
commission officers of the AFP and officers of the PNP;
11. To be especially watchful at night and during the time of challenging to challenge
all persons on or near my post and to allow no one to pass or loiter without proper
authority.
5. Security Guard's Daily Self-Appraisal
1. Am I PUNCTUAL in all my daily office schedules, formations, obligations and duties?
2. Am I with stout heart, intense loyalty and complete dedication to surmount all
obstacle and challenges in the daily situation?
3. Is I FIT to perform my duty for the day?
4. Am I in possession of my National License?
5. Am I in proper, neat and clean uniform (polished insignias, belt buckles and shoes)
complete with nightstick and/or firearms?
6. Am I presentable in appearance (regular haircut, shaved mustached and beard and
trimmed fingernails)?
7. Am I fully acquainted and well-versed with the duties and responsibilities of a
security guard?
8. Am I thoroughly oriented with the special orders for my post?
6. Don'ts for the Security Guard
1. Don't sit, lean against a wall, stand like a "MATCH BOX", converse unnecessarily
with passerby and/or acquaintances and smoke while on post.
2. Don't fraternized; be overly familiar with employees and personnel of the
office/entity where you are assigned in the performance of your guard duties.
Remember; "Familiarity Breeds Contempt".
3. Don't abandon giving the service and/or assistance to the customers or your client
entity, in order to attend to official/officials of the entity, who arrives while you are
still assisting the customers. Bear in mind the customers are very important
persons (VIP) and therefore they should be accorded preferential treatment and
consideration.
4. Don't display lack of keenness in and a feeling of responsibility for the job assigned
to you.
5. Don't forget that you are a cog in the wheel of progress of the entity you are
serving and that in the success of failure of that entity you are bound to have your
due share.
6. Don't let down your guard. Always be on the alert both in mind and body.
7. Don'ts in Handling Firearm
1. Don't carry your firearm outside the premises of your place of work without a
mission order.
2. Don't assume that a gun is not loaded. A gun presumed unloaded can kill.
3. Don't load your gun unless you are ready to use it, or told to do so, by proper
authority.
4. Don't insert your trigger finger or any finger in the trigger guard unless you are
ready to shoot.
5. Don't pull the slide of your pistol without removing its magazine.
6. Don't jerk your gun in any manner.
7. Don't point your gun to yourself or to anybody else unless you are ready to shoot.
8. Don't keep at the muzzle of your gun unless you have separated the barrel from
the gun or removed away the drum from the barrel.
9. Don't play with your gun loaded or not loaded.
10. Don't tinker with your gun. Give it to an expert the moment you notice anything
wrong to it.
11. Don't forget that accidents don't just happen. They are caused by carelessness or
plain stupidity.
12. Don't allow your firearms to be dirty or rusty.
8. Ten Commandments of Human Relation
1. Speak to People. There is nothing as nice as a cheerful word or greeting.
2. Smile at people. It takes 72 muscles to frown, only 14 to smile.
3. Call people by name. The sweetest music to anyone's ears is the sound of his own
name.
4. Be friendly and helpful. If you would have friends, be friendly.
5. Be cordial. Speak and act as if everything you do is genuine pleasure.
6. Be genuinely interested in people. You can like almost everybody. . .if you try.
7. Be generous with praise-cautious with criticism.
8. Be considerate with the feelings of others. It will be appreciated.
9. Be thoughtful of the opinions of others. There are usually three sides to a
controversy: yours, the other fellow's and the right one.
10. Be alert to give service of humor, a big dose of patience, and a dash of humility and
you will be rewarded many fold.
Criteria in the selection of Security Guard
R.A. No. 5487 and its implementing rules and regulations prescribed the minimum
requirements for guard to be able to secure a license to exercise profession as a security
guard, private detective, security officers and security consultant.
Basic Qualifications of an Agency Operator/Manager Agency
A. The operator or manager of an agency including, managers of branch offices, must be:
1. Filipino Citizen;
2. Not be less than 25 years of age;
3. College graduate and/or a Commissioned Officer, inactive or retired service or
retired from the AFP or PNP
4. Has taken a course/seminar on Industrial Security Management and/or must have
adequate training or experience in the security business; and
5. Good moral character
B. New applicant for license to operate shall be required to obtain minimum
capitalization of one million pesos with a minimum bank deposit of five hundred
thousand pesos in order to start its business operation.
Basic Qualifications of a Security Consultant
1. Filipino Citizen;
2. Physically fit;
3. Holder of master degree of Criminology, MPA, MNSA, Industrial Management or LL.B;
4. Must have at least ten year experience in the operation and management of security
business.
Basic Qualifications of a Security Officer
No person shall be licensed as security officer unless he has the following qualifications:
❖ Filipino Citizen;
❖ Holder of Baccalaureate Degree;
❖ Physically and mentally fit; and
❖ Has graduated from Security Officer Training Course or its equivalent.
Basic Qualifications of a Private Detective
No person shall be licensed as a private detective unless possesses the following
qualifications:
❖ Filipino Citizen;
❖ Holder of Baccalaureate Degree probably Bachelor of Law, BS Criminology.
❖ Physically and mentally fit;
❖ Graduate of a Criminal Investigation Course offered by the PNP or the NBI or any
Police training school, or detective training in any authorized/recognized training
center; and
❖ Advance ROTC/CMT graduate or its equivalent.
Basic Qualifications of a Private Security Guard
No person shall be licensed as security guard unless he possesses the following
qualifications:
❖ Filipino Citizen;
❖ High School graduate;
❖ Physically and mentally fit;
❖ Not less than 18 years of age nor more than 50 years old.(for new applicant and
SGs in supervisory position); and
❖ Has undergone a pre-licensing training course or its equivalent.
Desirable Qualities of Security Guard
❖ Alertness
❖ Judgment
❖ Confidence
❖ Physical fitness
❖ Tactfulness
❖ Self-control
❖ Interest
❖ Loyalty
❖ Responsible and
❖ Trustworthy
Licenses in the Security Profession
❖ License to Operate
❖ Security Guard License
❖ Firearm's License
Guard's Uniform, Equipment and Paraphernalia
1. Set of Uniforms for Security Personnel
❖ Headgear - Pershing cap for men and two ply cap for women.
❖ Service Bush Jacket - Intended for Directorial and staff officers.
❖ Service Shirt
❖ Service Trouser
❖ Service belt
❖ Footwear
2. Color of Uniforms
❖ Private Security Agency - Navy blue (upper and lower)
❖ Company Security Forces - Light blue/light gray for upper and navy blue for lower
❖ Government Security Forces - White for upper and navy blue for lower.
3. Ornaments and Patches
❖ National badge
❖ Cap device
❖ Regulation buckle
❖ Collar device
❖ Name cloth
❖ Agency/unit name
4. Equipment and Paraphernalia
a. Leather pistol belt with regulation buckle
b. Holster, black leather for pistol
c. Nightstick with horizontal handle
d. Whistle with lanyard
e. Handheld radio
f. Pocket notebook and ball pen
CHAPTER 3
PHYSICAL SECURITY
Physical Security is defined as a system of barriers placed between the potential intruder and the matter to be
protected. It is foundation of security. It is the first thing in security management.
Physical Security measures are used to defined, protect, and monitor property rights and assets. These
measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to
equipment, facilities, material and document and to safeguard then against espionage, sabotage, damage and
theft. In security management, physical security is known as the broadest because it compasses many aspects of
physical protection. The passive and active physical security barriers will differentiate the significant and
importance of physical security in the industry.
Foundation of Physical Security
➢ System of "Defense in depth, called "compartmentalization".
➢ Deny entry (Accumulated Delay Time)
Basic Principles of Physical Security
➢ The type of access will depend on the number of variable factors and may be achieved in a number of
ways.
➢ There is no impenetrable barrier.
➢ Defense is depth means barrier after barrier.
➢ Delay provides surreptitious and non-surreptitious entry.
➢ Each installation is unique and different.
Reasons in Establishing Physical Security
The following specific reasons are the basic principles why there is a need to install tangible and visible physical
security systems.
➢ Freedom from unauthorized intrusion.
➢ Freedom from theft, damage and arson.
➢ Free from outside interruption.
Physical Security Concepts
These concepts are used in physical security planning and in establishing protective system that would provide
guidelines on the initial steps to be taken in protecting the facility. The concepts are called the 9D's. These are
presented according to the recommended chronological order for purposes of systematic institution of each
concept.
➢ Define - this is the initial steps to be taken in order to determine what are to be protected which includes
the type of the facility, nature of business, type of costumers, materials, policies and its perceived threats
and risk. In this area, personnel are expected to know the "Intestine" of the building.
➢ Direct - after determining the scope of the responsibility, procedures on ingress and egress of people,
visitors, employees and materials should be established and conform to the company or organization. This
includes response and evacuation during emergencies.
➢ Deter - rigorous and consistent enforcement of comprehensive security program will present a
comfortable, safe and secure environment for costumers and the public in general and will discourage
would be perpetrators or person of interest to gain access. Visual evidence is the key.
➢ Deny - this serves as one of the objectives of physical barrier which is to deny or prevent surreptitious or
non-surreptitious entry to the asset at risk. Scrutinized is the key.
➢ Detect - this concern to the ability of the system and personnel to detect unauthorized access to the
facility.
➢ Disseminate - coordination and cooperation in security profession should co-exist. Communication is
imperative especially when penetration has been detected in the area of concentration to inform
authorized person in the organization.
➢ Delay - when penetration is noted and disseminated, to next thing to do is to delay and/or verify the
subject of the activity. Security personnel should be firm but courteous. Inspection and scrutinized are vital.
➢ Detain - when opportunity warrants, arrest should be immediately made to understand the circumstances
surrounding the incident. Its purpose is to: (1) recover assets; (2) deter other perpetrators/intruders.
➢ Defend - the final option is to protect the facility when the preceding concepts seem to be ineffective. In
this aspect, the ability of the personnel to deal with the present situation is critical.
LEVEL OF PHYSICAL SECURITY
1. Minimum Security - this system is designed to impede unauthorized external activity, which may be in the
form of simple intrusion or a serious armed attack. The proactive objects, therefore, are simple physical
barriers such as doors and windows with ordinary looks.
2. Low-level Security - this system is designed to impede and detect some unauthorized activity that theaters
safety. This consists of physical barriers and basic alarm system that will announce the treat. However,
small business offices, stores or warehouse could be protected with low-level system.
3. Medium-level Security - this system is designated to impede, detect and assess most unauthorized
external and internal activities. The system should have the following features:
An advance intrusion device installed apart the secured areas and monitored 24hours.
A physical barrier and/or guard dogs set up in a parameter before or beyond the confines of the
asset being protected.
A detailed security personnel (preferably unarmed)
But with "mano-mano" combat training and equipped with basic communication Gadgets
capable to warm and/or get off site assistance. Entities and sites such as large manufacturing
plants, large bonded warehouses, and mega malls are suited for medium-level security.
4. High-Level Security - this system is designed to impede, detect and assess unauthorized external and
internal activities. This system is composed of all the measures and devices incorporated in the three levels
above-cited plus the following:
Close-Circuit Television (CCTV)
A perimeter alarm system remotely monitored at or near the high physical barriers.
Security lightning equivalent to at least .02 foot candle of light around the entire protected area
is required.
A highly-trained, well screened guard force or unarmed watch people who are equipped with
adequate advance means of communications such as uninterrupted dedicated telephone lines,
two way-way radios with police linkages, cellular phones, duress alarms, etc.
Electronic controls designed to restrict access to authorized persons within the facility.
Pre-defined arrangement with police for ready response and assistance is needed.
Coordination with other Law enforcement authorities is also needed.
5. Maximum Security System - this system is designed to impede, detect, assess and neutralize all
unauthorized external and internal activities. This system consists of all previously-cited resources and
should incorporate the following:
A highly-sensitive, sophisticated and advance alarm system too strong to be foiled by a lone
individual remotely monitored in one or more protected locations and properly set up with back-
up source of power.
An armed highly-trained and well-screened guard force detailed 24 hours and equipped with
contingency armed system coupled with neutralizing or containing any threat against the
protected facility until the arrival of the off-site assistance.
Two General Types of Physical Barrier
1. Natural Barrier - Such as rivers, cliffs, and ravines, etc. which delay or make more difficult the entry of
the intruder.
2. Man-made Barrier - Are structural construction like fences walls, floors, roofs, grills, bars, raid block, or
other physical means to deter or impede penetration.
Kinds of Barrier
1. Natural Barrier - It includes bodies of water, mountains, marshes, ravines, deserts or other terrain that
are difficult to traverse.
2. Structural Barrier - These are features constructed by man regardless of their original intent that tends
to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinet or containers.
etc.
3. Human Barrier - Persons being used in providing a guarding system or by the nature of their
employment and location, fulfill security functions. Examples are guards, office personnel, shop
workers, etc.
4. Animal Barrier -Animal are used in partially providing a guarding system. Dogs are usually trained and
utilized to serve as guard dogs. German shepherds are the best suited for security functions. While not
completely fool-proof, the proverbial dog should provide a good way of discouraging unwanted people
to the establishment. Goose and turkeys could also be included.
5. Energy Barrier - It is the employment of mechanical, electrical, electronic energy imposes a deterrent
to entry by the potential intruder or to provide warning to guard personnel. These are protective
lighting, alarm system and any electronic devices used as barriers.
Generally, a barrier is use for the following purposes
Outline the physical limits of an area.
Create a physical and psychological deterrent to unauthorized entry.
Prevent penetration therein or delay intrusion, thus, facilitating apprehend of intruders.
Assist in more efficient and economical employment of guards.
Facilitate and improve the control and vehicular traffic.
Three Lines of Physical Defense
1. First line of defense - Perimeter fences/barriers.
2. Second line of defense - Doors, floors, windows, walls, roofs and grills and other entries to the
buildings.
3. Third line of barrier - Storage system like steel cabinets, safes, vaults and interior files.
Perimeter Barrier
A medium or structure which defines the physical limits of an installation or area that restrict or impedes
access thereto. Is any physical barrier used to supplement the protection of an inside or outside perimeter? The
main purpose of perimeter Barrier is to deny or impede access or exit of unauthorized person. Basically, it is the
first line of defense of an installation. This is maybe in the form of fences, building walls or even bodies of water.
The function and location of the facility itself usually determine of the installation.
Classifications of a Perimeter Barrier
Inside Perimeter
Outside Perimeter
Types of Perimeter Barrier
Fence
Wall
Bodies not Water
A. WIRE FENCE
Minimum acceptable requirements for fence used as security barrier:
❖ Height: Eight feet at minimum.
❖ Slack at the bottom: Not to exceed two inches, if the fence is not taut then it should extend even
closer to the ground.
❖ Wooden fence post: Minimum horizontal dimension of four inches by four inches.
❖ Steel fence post: The round type should be at least two inches in diameter and the H-beam type must
measurable no less than two inches at the smallest diameter.
❖ Fence posts: Fence post should be set in concrete or in firm soil using commercial drive anchors, to a
depth of three feet; Maximum distance between posts is ten feet.
❖ Fence top: There should be something in the top of the fence of the deter persons attempting to go
over the fence good example would be the use of barbed wire overhang, holding the stands of barbed-
wire should be two feet long and should be extended at 45 degree angle in the direction of the
expected approach.
❖ Fence area: There is surrounding the fence should be cleared of trees and vegetation and debris or
other materials which would offer concealment to the intruder or would aid him in scaling.
TYPES OF FENCE
❖ Solid Fence
❖ Full View Fence
Types of Full View Fence
A. Chain Link Fence
❖ It must be constructed of 7 feet material excluding top guard.
❖ It must be 9 gushes or heavier.
❖ The mesh opening is not to be larger than 2 inches pee side.
❖ It should be twisted and barbed salvage at top and bottom.
❖ It must be securely fastened to rigid metal or reinforce concrete.
❖ It must reach within 2 inches of hard ground or paving.
❖ On soft ground, it must reach below surface deep enough to compensate for shifting soil or sand.
B. Barbed Wire Fence
❖ Standard barbed wire is twisted, double-stand, 12-gauge wire with 4 point barbs spaces on equal
distance apart.
❖ Barbed wire fencing should not be less than 7feet high excluding top guard.
❖ Barbed wire fencing must be firmly affixed to post high excluding top guard.
❖ The distance between strands will not exceed 6 inches and midway between parts.
C. Concertina Wire Fence
❖ Standard concertina barbed wire is commercially manufactured wire coil of high strength steel barbed
wire clipped together at intervals to form a cylinder.
❖ Opened concertina wire is 50 feet long and 3 feet in diameter.
BUILDING WALL
Wall, floor, roof or their combination serves also as barriers and they should be of such construction to provide
uniform protection just like the wire fencing.
Masonry wall as perimeter barrier should have the same heights as the chain link and surmounted by the
barbed wire top guards, if the height of the masonry is less than the prescribed, additional chain link as "topping".
Wall can be made of stone slabs like abode or hollow bound by concrete with post regular intervals to prevent
the wall from toppling due to wind, or scouring facilities, security must sit down with design engineers so that
area where sensitive activity will be done should be given special emphasis on protective walls.
BODIES OF WATER
Bodies of water like lake, river marsh, sea pond or any bodies of water forming part of the wall, building or
fencing should never be considered adequate natural perimeter barrier. Addition security measures like wire
fence, concrete walling, security patrolling and floodlighting at night may be necessary for the portions of the
perimeter.
PERIMETER BARRIER OPENING
A. Gates and Door - when not in use and controlled by guards, gates and doors in the perimeter should be
locked and frequently inspected by guards. Lock should be changed from time to time and should be
covered under protective locks and key control.
B. Sidewalks elevators - these provide access to areas within the perimeter barrier and should be locked and
guarded.
C. Utilities Opening - sewers, air intakes, exhaust tunnels and other utility openings which penetrate the
barrier and which have cross sectional areas of 96 square inches of more should be protected by bars,
grills, water filled traps or other structural means providing equivalent protection to that portion of the
perimeter barriers.
D. Clear Zones - an obstructed area or a "clear zone" should be maintained on both sides of the perimeter
barrier. A clear zone of 20 feet or more is desirable between the barriers and exterior structures and
natural covers that may provide concealment for assistance to a person seeking unauthorized entry.
Specification on clear Zones
❖ Clear Zones of 20 feet or more should exist between the perimeter barriers and exterior structures,
parking areas and natural or man-made features.
❖ A clear zone of 50 feet or more should exist between the perimeter barrier and structure within the
protected areas when a building wall constitutes part of the perimeter barrier.
Security Specification for windows or opening
Windows or opening less than 18 feet above ground, roof, ledges, etc. or less than 14 feet directly or
diagonally, opposite uncontrolled windows in other walls, fire, escapes or other opening of 96 square inches or
larger should be grilled or have steel bar protections.
Additional Protective Measures
1. Top Guard - Additional overhang of barbed wire placed on vertical perimeter fences upward and
outward with a 45 degree angle with 3 to 4 strands of barbed wire a spaced 6 inches apart . This
increases the protective height and prevents easy access.
2. Guard Control Stations - This is normally provided at the main perimeter entrance to secure areas
located out of doors, and manned by guards on full time basis. Sentry station should be near a
perimeter for surveillance at the entrance.
3. Tower Guard - This is a house like structure above the perimeter barriers. The higher the tower, the
more visibility it provides. It gives a psychological unswerving effect to violators. By and large guard
towers, whether permanent or temporary, must have a corresponding support force in the event of
need. Towers as well as guard control stations should have telephones, intercoms, and if possible two-
way radios connected to security headquarters or office to call for reserves in the event of need.
4. Barrier Maintenance - Fencing barriers and protective walls should always be regularly inspected by
security. Any sign or attempts to break in should be reported for investigation. Destruction of fence or
sections thereof should be repaired immediately and guard vigilance should be increased.
5. Protection in Depth - In large open areas or ground where fencing or walling is impractical and
expensive, warning signs should be conspicuously placed . The depth itself is protection reduction of
access roads, and sufficient notices to warn intruders should be done. Use of animals as guards and
intrusion device can also be good as barriers.
6. Signs and notices - "Control signs" should be erected where it is necessary in the management of
unauthorized ingress to preclude accidental entry. Signs should be plainly visible and legible from any
approach and in an understandable language or dialect.
GUARD AND GUARD SYSTEM
The high tech security equipment does not mean it will replace the deployment of security guard. It will help
reduce expenditures of a company from employing additional security guards is certain. The deployment of
security guard is still dependent on the security plan of the company hence; guard and guard system is still very
important subject matter to be included in the discussion of this book.
A. Functions that must be accomplished by the guard system
❖ Detect Intruders
❖ Sound Alarm
❖ Apprehend Unauthorized Personnel and
❖ Identify Authorized Personnel
B. Human Barriers
1. Guard Procurement: Selection Criteria
❖ Must be eligible for security clearance
❖ Vigorous and physically able to serve in the capacity of a guard
❖ Intelligence necessary to accomplished the guard function
❖ The ability to make rapid decisions and to react in a claim way to emergencies
❖ Loyalty and discretion are required attributes and
❖ Experience is highly desirable although not usually mandatory
2. Guard Training: Programs of training should include
❖ General orientation
❖ Instruction in security procedures of the installation, first aid, and communication
❖ Instruction in traffic control, riot control, and self defense
❖ Weapons qualifications to include maintenance and safety
❖ Refresher course and advance training in specific subjects
3. Guard Employment: Two basic techniques of guard employment
❖ Fixed post
❖ Patrol
4. Guard Supervision
❖ Personal Supervision
❖ Artificial Supervision
❖ Recorded Tour - Guard takes with him on his tour of duty a form which must have the time punched
on it at each station.
❖ Supervisory Tour - This is where the guard sends signals to guard headquarters from each station that
he checks
5. Guard Communication
❖ Primary Communication
❖ Emergency Communication
PROTECTIVE LIGHTING
The idea that lighting can provide improve protection for people and facilities is as old as civilization. Protective
lighting is a single most cost-effective deterrent to crime because it creates a psychological deterrent to the
intruders. The main concern of security protective lighting is to provide illumination during the hours of darkness.
Ideally, the security guard can have a better observation and identification of would be intruders into the
establishment.
Purposes of Protective Lighting
❖ It provides sufficient illumination to the areas during hours of darkness.
❖ Lighting can help improve visibility so that intruder can be seen identified, if possible, and
apprehended.
❖ It serves as deterrent to would be thieves.
Types of Protective Lighting
1. Continuous Lighting - The most familiar type of outdoor security lighting, this is designed to provide two
specific results, glare projection and controlled lighting. It consist of a series of fixed luminaries at range to
flood a given area continuously during the hours of darkness.
2. Controlled Lighting - The lighting is focused on the pile of items, rather than the background. The width of
the lighted strip can be controlled and adjusted to suit the security needs.
3. Glare Projection Type - The intensity is focus to the intruder while the observer or guard remained in the
comparative darkness, the lighting is toward of the approach of an entrance to an installation.
4. Standby Lighting - It is designed for reserve or standby use or to supplement continuous system. A standby
system can be most useful to selectively light a particular area in an occasional basis.
5. Movable or Portable Lighting - This system is manually operated and is usually made up of movable search
or floodlights that can be located in selected or special locations which will require lighting only for a short
period of time.
6. Emergency Lighting - This system is used in times of power failure or other emergencies when other system
is inoperative.
General Types of Lighting Source
Listed below are the General lighting sources that are mostly used in providing indoor or outdoor lighting.
1. Incandescent Lamp - It is the least expensive in terms of energy consumed and has the advantage or
providing instant illumination when the switch is on.
2. Mercury Vapor Lamp - It is considered more efficient that he incandescent and used widespread in
exterior lighting. This emits a purplish-white color, caused by an electric current passing through a tube of
conducting and luminous gas.
3. Metal Halide - It has similar physical appearance to mercury vapor but provides a light source of higher
luminous efficiency and better color rendition.
4. Fluorescent - This provides good color rendition, high lamp effeciency as well as long life. However, it
cannot project light over long distance and thus are not desirable as flood type lights.
5. High Pressure Sodium Vapor - This has gained acceptance for exterior lighting of parking areas, roadways,
building and commercial interior installations. Constructed on the same principle as mercury vapor lamps,
they emit a golden white to light pink color and this provide high lumen efficiency and relatively good color
rendition.
Types of Lighting Equipment
Four types of lighting equipment are generally used or associated with security lighting. These are:
1. Floodlight - This can be used to accommodate most outdoor security lighting needs, including the
illumination of boundaries, fences and building and for the emphasis of vital areas or particular buildings.
2. Street Light - This lighting equipment received the most widespread notoriety for its value in reducing
crime.
3. Search Light - This are highly focused incandescent lamp and are designed to pinpoint potential trouble
spots.
4. Fresnel Light - This is wide beam units, primary used to extend the illumination in long, horizontal strips
to protect the approaches to the perimeter barrier. Fresnel projects a narrow, horizontal beam that is
approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane.
Protective Lighting Requirement
1. Protective lighting needs at installation and facilities depend on each situation and the areas to be
protected. Each situation requires careful study to provide the best visibility practicable for security
duties identification of badges and people at gate, inspection of vehicles, prevention of illegal entry, and
detection of intruders inside or outside the buildings and other structures and inspection of unusual or
suspicious circumstances.
2. When such lighting provisions are impractical, additional security posts, patrols, sentry dog patrols, or
other security means will be necessary.
3. It should be used on a perimeter fence line only where the perimeter fence is under continuous or
periodic observation.
4. Protective lighting may be desirable for those sensitive areas or structures within the perimeter, which
are under specific observation. Such areas include vital buildings, storage and vulnerable control points in
communication, power and water distribution system. In interior areas where night operations are
conducted, adequate lighting on the area facilitates detection of unauthorized persons approaching or
attempting malicious acts within the area.
SECURITY ALARM (INTRUSION DETECTION)
High-tech security gadgets like detection alarms play an important role as a security tool in the protection of
assets in the industry. An alarm is defined as an aural or visual signal given by annunciate to security when
intruder actuates device in a protected area.
Protective Alarm
It assist the security in detecting, impeding it deterring potential security threat in the installation. Basically, its
function is to alert the security personnel for any attempt of intrusion into a protected area, building compound.
Each type of alarm activated in there is electrical, mechanical or electronics.
Three Basic Parts of Alarm System
1. Sensor or trigger device - It emits the aural or visual signals or both.
2. Transmission line - A circuit which transmit the message to the signaling apparatus.
3. Enunciator - It is the signaling system that activates the alarm.
Types of Protective Alarm System
1. Central Station System 4. Auxiliary Alarm
2. Proprietary System 5. Local Alarm by Chance System
3. Local Alarm 6. Dial Alarm System
Kinds of Alarm
1. Audio Detection Device 4. Laser Beam Alarm
2. Vibration Detection Device 5. Photoelectric or Electric Eye Device
3. Metallic foil or wire 6. Microwave Motion Detection Device
Foot Rail Activator
Foot Rail Activator is place on the in such a position that tellers may activate the alarm by placing the front of
their foot to engage the activation bar.
Foot Rail don not acquire any obvious use of the tellers hand and their hands may kept in full view of the
robbers for reason of safety, because foot rail can be activated very obtrusively.
Disadvantage
Tellers with platform shoes, itchy feet, or using brooms and other articles will often inadvertently cause a
false alarm.
Bill Traps
Bill Traps or currency activation device are usually place in the teller cash drawer and connected to the alarm
system using a wire connector. When currency is removed from the devices, the alarm is activated
Knee or Thigh Button
This is installed inside the desk or teller station which can be activated by knee or thigh pressure. They are
commonly found in location where personnel usually perform their duties from the seated position.
Foot Button
Like the foot rail permit alarm activation relatively safely while both hands remain clear from the view of the
robbers.
Double Squeeze Buttons
Required pressure on the both side of the device and therefore the probability of accidental alarm is reducing.
Lock
A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a
building, room, container or hiding place.
Types of Lock
1. Key operated mechanical lock 4. Code-operated lock
2. Padlock 5. Electrical lock
3. Combinations lock 6. Card-operated lock
Four General Groups and Key Control
a. Disc tumblers lock c. Lever tumbler lock
b. Pin tumbler lock d. The warded lock
Types of Key
1. Change Key
2. Sub-master Key
3. Master Key
4. Grand Master Key
Key Control Management
Once an effective key control has been installed, positive control of all key must be gained and maintained. This
can be accomplished only if it is established in conjunction with the installation of new locking devices. The
following methods can be used to maintain effective key control;
1. Key Cabinet 4. Audits
2. Key record 5. Daily reports
3. Inventories
SECURITY CABINET
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, jewelries or other especially valuable assets are protected. These security containers will depend of a
size and quantity, which the nature of the business dictates.
Three Types of Security Cabinet
1. Safe - A metallic container used for the safekeeping of documents or small items in an office or
installation.
2. Vault - A heavily constructed fire and burglar resistance container is usually a part of the building
structure used to keep and protect cash, documents and negotiable instruments. Vault are bigger than
safe but smaller than a file room.
3. File room - A cubicle in a building constructed a little than a vault but of bigger size to accommodate
limited people to work on the records inside.
CHAPTER 4
Personnel Security
Personal Security is the protection of the company assets against loss of life and damage to property. Its
main concern is the security and safety of each people and the organization. In personnel security, the people in
the organization are considered the greatest threat to the security organization because they create the security
holes.
Purpose of Personnel Security
1. To insure that a firm hires those employ best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees while they are carrying out
there functions.
Scope of Personnel Security
1. Personnel Security investigation (PSI)
2. Security Education
Key Functions of Personnel Security
1. It serves as a screening device in hiring suitable employees.
2. It provides background investigation services of both potential and present employees for possible
assignment to sensitive position.
3. It handles investigation of employees suspected of wrong doing.
4. It develops security awareness among employees.
5. It attempts to ensure the protection of employees from discriminatory hiring or terminating
procedures as well as unfounded allegations of illegal or unethical activities and conduct.
Personnel Security Investigation
Personnel Security Investigation (PSI) is a process of inquiry into the character, reputation, discretion,
integrity, morals and loyalty of an individual to determine the suitable for appointment or access to classified
matter.
General Techniques of PSI
1. Background Investigation (BI) - This technique is very expensive but necessary in personnel security. It
serves to verify information on the application form and to obtain other information pertinent to the
decision to employ.
Factors to consider in the conduct of BI
a. Loyalty d. Morals
b. Integrity e. Character
c. Discretion f. Refutation
Components of Complete BI
a. Application Name k. Neighborhood Investigation
b. Date of birth l. Character reference
c. Present Residence Address m. Employment History
d. Personal History n. Military History
e. Marital History o. Foreign travel history
f. Residence History p. Criminal Record
g. Citizenship q. Credit records
h. Physical Data r. Application's signature
i. Educational History s. Date of Application
j. Organization Membership
Types of Local Agency Check (LAC)
a. Barangay Clearance c. Local Police Clearance
b. City of Municipal Clearance d. Court Clearance
Types of National Agency Check (NAC)
a. National Bureau of Investigation ( NBI) Clearance
b. PNP Directorate for Intelligence (DI) Clearance
c. Intelligence Service, AFP (ISAFP) Clearance
2. Positive Vetting- Is the process of inspecting or examining with careful thoroughness.
3. Prowling- is the process whereby a subjects reaction in a future critical situation is predicted by observing
his behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as an honestly
test.
4. Deception Detection Techniques- This process of using devices in detecting deception during the
interview stage. This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer.
5. Financial and Lifestyle Inquiry- This type of investigation seeks to gather information on income and
mode of living, sometimes referred to as the earning to debt ratio.
Undercover Investigation- This is the placement of an agent in a role in which the agent's true identity and
role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of
asset losses.
6. Exit Interview- This is a valuable tool because it gives departing employees an opportunity to list
grievances.
Phases of Security Education Program
Initial Interview
Orientation and Training
Refresher conference
Security Reminders
Security Promotion
Executive Protection (VIP Security)
The Executive Protection aims to protect people from physical violence, whether from the state or external
states, from violent individuals and sub-state actors, from domestic abuse, or from predatory adults. For many
people, the greatest source of anxiety is crime, particularly violent crime
1. VIP - Very Important Person
2. Escort - One or more persons accompanying another to give guidelines or protection or to pay honor
3. Bodyguard- a person or a grouped of persons usually armed and responsible for the physical safety of
one or more specific person.
Organizational Structure
1. Area Security - Covers the surrounding areas of engagement
- Conduct prophylactic (neutralize the area), operations in the area of engagement
2. Perimeter Security - Secures the immediate area surrounding the place of engagement.
3. Advance Security - This are the advance security at the place of engagement before the arrival of the VIP.
4. Close in Security - Accompanies the VIP where ever he goes.
- Maximum of four (4) persons.
5. Reserve Security - On standby for possible black-up/ re-enforcement.
6. Routine Security - Neutralize the possible route of the VIP party.
Four Common Elements in all Assassination
1. Victim
2. Assassin
3. Modus Operandi ( Mode of Operation)
4. Opportunity
CHAPTER 5
DOCUMENT AND INFORMATION SECURITY
The protection of the company property information from the inadvertent disclosure and destruction of
documents is the paramount focus of information security management. It is closing the window of exposure.
The sum total of all policies, regulation, practices, enforce to safeguards the contents and integrity of any
classified information or document from compromise or loss.
Access to information security is based on the required broad principles known as C-I-A TRAID.
1. Confidentiality - the assurance that information is accessible only to those authorized to have access.
2. Integrity - the assurance that information and processing methods are accurate and complete.
3. Availability - the assurance that authorized users has access to information and associated assets when
needed.
Two (2) kinds of Document
1. Personal - letters, diary and notebook. These should be treated usually the same with official document.
2. Official - orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain
of command.
Three (3) Security Concepts
1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of document.
3. Training is necessary for the practice of "Need to Know" principle.
Four (4) Types of Classified Matter
1. TOP SECRET (green color code) - Is any information and materials the unauthorized disclosure of it would
cause exceptionally grave damage to the nation, politically, economically and military operation.
2. SECRET (red color code) - Is any information and material, the unauthorized disclosure of it would endanger
national security cause serious injury to the interest or prestige of the nation or any government activity or
advantage to a foreign nation.
3. CONFIDENTIAL (blue color code) - Is any information or material, the unauthorized disclosure of it be
prejudicial to the interest and prestige of the national or government activity or would cause administrative
embarrassment or unwanted injury to and be advantage to a foreign country.
4. RESTRICTED (white or no color code) - Is any information and material which requires special protection other
than those determines confidential, secret and top secret.
In the security management application, top secret is not used, classified matter will starts on secret
classification. This is because the applications is limited or focused only to the industry.
Types of Proprietary Information
1. Trade Secret - This consist of any formula, pattern, device or compilation of information which is used in one's
business and which gives him an opportunity to gain an advantage over competitors who do not know or use
it. A trade Secret is a process or device for continuous use in the protection of the business.
2. Patent - This is a grant made by the government to an inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for term of years.
The following are the common equipment being used for communication
1. Hand held radio or Walkie talkie - Communication on electromagnetic waves transmitted through the space.
2. Basic types of radios:
a. Amateur radio- For hobby and emergency purposes; and
b. Commercial radio- For business purposes.
Cardinal principles in using radio
a) Speak clearly and distinctly at all times.
b) Think and act promptly on emergency situation.
c) through understanding of the capacity of the communication system and,
d) Knowledge - of the rules and regulation and the use of codes if deemed necessary.
Requisites for Modulation/ Voice Transmission
a) Alertness- give the impression that you are alert and wide awake and interested as the person calling;
b) Pleasantness- Build a pleasant office image with voice of smile;
c) Naturalness – Use simple language and avoid slang;
d) Distinctness – Speak clearly and relax to avoid garbled transmission; and
e) Expressiveness – Normal tone of voice in moderate manner not too fast and not too slow.
Duty cycle of PTT
As a rule transmitting message in short duration carries 3 to 5 words at a time.
Approaches to adhere the duty cycle
1. Use of phonetics alphabet and numerals;
Ex. From Alpha to Zebra
2. Use of 2400- hour system and Zulu time;
3. Police ten APCO SIGNALS:
Ex. 10-1 = receiving poorly
10-2 = loud and clear
10-4 = copied message
10-9 = repeat message
10-20 = location
10-28 = identify yourself/call sign
10-32 = radio check
4. Use more codes
APCO – Association Public Safety Communication Officers Inc.
PTT – Press to Talk
5. Telephone - combination of apparatus of converting speech energy to electrical wave than transmit the
same to a certain point then finally re-convert the electrical energy to audible sound.
6. Intercom - wired system of communication being used with in a building or compound for direct exchange
of calls.
7. Audio Hailer - portable transistorized and battery operated amplifier that magnify the voice of the user.
8. Computer Facsimile – modern type of communication equipment.