0% found this document useful (0 votes)
191 views85 pages

INDUSTRIAL SECURITY - Lecture Notes

This document is a compiled lecture note on Industrial Security Management, covering definitions, concepts, legal bases, major areas, types of security, security hazards, and physical security fundamentals. It emphasizes the importance of protecting life, assets, and operations through various methods and devices while detailing specific security types such as industrial, hotel, bank, and school security. Additionally, it discusses risks, measures against pilferage, and the principles of physical security, including perimeter security and barrier types.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views85 pages

INDUSTRIAL SECURITY - Lecture Notes

This document is a compiled lecture note on Industrial Security Management, covering definitions, concepts, legal bases, major areas, types of security, security hazards, and physical security fundamentals. It emphasizes the importance of protecting life, assets, and operations through various methods and devices while detailing specific security types such as industrial, hotel, bank, and school security. Additionally, it discusses risks, measures against pilferage, and the principles of physical security, including perimeter security and barrier types.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 85

MOUNTAIN PROVINCE STATE POLYTECHNIC COLLEGE

CRIMINOLOGY DEPARTMENT
BONTOC CAMPUS, BONTOC, MOUNTAIN PROVINCE

A COMPILED LECTURE NOTES ON


INDUSTRIAL SECURITY MANAGEMENT
(LEA 112)

Yea, though I walk through the valley of the shadow of death, I will fear no evil: for thou art
with me; thy rod and thy staff they comfort me.

INSTRUCTOR:

LYNDEN K CODMOR, MSCRIM

SECOND SEMESTER
SY 2023-2024

1
INTRODUCTION

Security is the

Industry can be defined as an organized economic


activity connected with the production, manufacture, or
construction of a particular product or range of products

In a general sense, it is the production of goods and


services in an economy. The term industry also refers to a
group of enterprises (private businesses or government-
operated corporations) that produce a specific type of good
or service—for example, the beverage industry, the gold
industry, or the music industry. Some industries produce
physical goods, such as lumber, steel, or textiles. Other
industries—such as the airline, railroad, and trucking
industries—provide services by transporting people or
products from one place to another. Still other industries,
such as the banking and restaurant industries, provide
services such as lending money and serving food,
respectively. Microsoft ® Encarta ® 2009. © 1993-2008 Microsoft Corporation. All
rights reserved.

Security means a protection against any type of crime to


safeguard life, assets, and operation by the use of various
methods and devices. It is commonly known as state or feeling
of being safe and protected.

Management as defined by microsof Encarta, pertains to


the ability of handling of something successfully or the act
of handling or controlling something successfully

DEFINITION AND CONCEPT OF SECURITY

Security is a state or condition of being secured; the


freedom from fear, danger, loss, destruction or damages.
Basically, it was the action of man against man that led
to many unsecured and unsafe conditions. Reason could be
economic, revenge or just plain greed and avarice. Whatever
the motives, the civilized man needs adequate protection
(Peckley & Dulipas, 2008).

2
LEGAL BASES OF INDUSTRIAL SECURITY MANAGEMENT
(Peckley & Dulipas, 2008)

1. Natural Authority
The highest law is the law of preservation. By instinct,
man naturally react to protect himself, his honor, freedom,
liberty, and property from danger, threat or hazards. He do
it personally and/or through the help of others.
Even before the coming of early Chinese traders,
Filipinos were already organized into tribes. Each tribe has
his own chieftain and also of the members. The inherent
mechanism of self-preservation became the unwritten law of
the early Filipinos to protect themselves and their property
against the natural and man-made hazards.

2. Constitutional Authority
A. The prime duty of the government is to serve and
protect people. The Government may call upon the
people to defend the state and in the fulfillment
thereof; all citizens may be required, under
conditions provided by law, or to render personal
military civil service (Art. II, Section 4 of the
1987 Constitution).
B. No person shall be deprived of lives, liberty or
property without due process of law, nor shall any
person be denied the equal protection of laws (Art.
III, Section 1 of the 1987 Constitution).
C. Private property shall not be taken for public use
without just compensation (Art. III, Section 9 of
the 1987 Constitution).
D. The right of the people to be secured in their
persons, houses, papers, and effects against
unreasonable search and seizures of whatever nature
and for any purposes shall be inviolable, and no
search warrant or warrant of arrest shall be issued
except upon examination under oath or affirmation
from the complainant and the witnesses (Art. III,
Section 2 of the 1987 Constitution).

3. Statutory Authority
A. The Revised Penal Code of the Philippines
The applicable provisions of the Code on Crime
Against Person, Crime Against Personal Liberty and
Security, and Crime Against Property have bearing
on the security and protection of one’s life,
liberty, and property.

3
B. The R.A. 5487 otherwise known as the Private
Security Agency Law as amended
This law governs the operation and
administration of private security agencies
including qualifications of security guards,
security officers, consultants and detectives.
C. Presidential Decree No. 11 (Ammending R.A. 5487)
D. Presidential Decree No. 100 (Ammending R.A. 5487
and P.D. 11)
E. Presidential Decree No. 1919

Major Areas of Security


Since security is general is every hard to comprehend,
it can be divided into three majors areas:
1. PHYSICAL SECURITY- this concern with the physical
measures adopted to prevent unauthorized access to
equipment, facilities, material and document and to
safeguard them against espionage, sabotage, loss and
theft.
2. PERSONNEL SECURITY- this is important as physical
security. Personnel security starts even before the
hiring of n employee and remains to be maintained for as
long as the person is employed.
Its purpose is to insure that a firm hires those best
suited to assist the firm in achieving its goals and
objectives and once hired assist in providing necessary
security to the work force while carrying out their
functions.
3. DOCUMENT AND IMFORMATION SECURITY- this involves the
protection of documents and classified papers from loss,
access by unauthorized person.

Classified document need special handling. Lack of


indoctrination and orientation among the personnel
handling them can result in leakage, loss, theft and
unauthorized disclosure of the documents.

TYPES OF SECURITY

1. Industrial security- a type of security applied to


business group engage in industries like manufacturing,
assembling, research and development, processing,
warehousing and even agriculture

2. Hotel Security- a type of security applied to hotels


where its properties are protected from pilferage, loss,
damage, and the function in the hotel restaurants are not

4
disturbed and troubled by outsiders or the guest
themselves. This type of security employs house
detectives, uniforms guard and supervisors and insures
that hotel guests and their personnel effects are
safeguarded.
3. Operational Security – is a part of physical
security that deals primarily with the protection of
processes, formulas, patents and other industrial and
manufacturing activities from espionage, infiltration,
loss, compromise or photocopying.
4. Bank security- a type of security is concern with
bank operations. Its main objective is the protection of
bank cash and assets, its personnel and clientele.
Security personnel are trained to safeguard bank and
assets while in storage, in transit and during
transactions
5. VIP Security- a type of security applied for the
protection of top- ranking officials of the government or
private entity, visiting persons of illustrious standing
and foreign dignitaries
6. School Security-type of security that is concern
with the protection of students faculty members, school
officials, and school properties. Security personnel are
trained to protect the school property from theft,
vandals, handling campus riots and detecting the use of
intoxicated drugs and alcohol by the students.
7. Supermarket Security a type of security which is
concern with the protection of the stores, warehouse,
storage, its immediate premises and properties as well as
the supermarket personnel and customers. Security
personnel are trained to detect “shoplifter”, robbery,
and bomb detection and customer relation.
8. Air Cargo Security – to minimize if not prevent
losses of cargo during in transit, storage or transfer.

SECURITY HAZARDS

Security Hazards – is an act or condition which results in a


situation conducive to a breach of the protection system and
the subsequent loss or compromise of defense information,
company secrets or damage to personnel, property or
facilities.

Kinds of Security Hazards:

5
a. Human Hazard – are the acts or conditions affecting the
safe operation of the facility caused by human action,
accidental or intentional. It includes sabotage, espionage,
pilferage and theft, disloyalty, disaffection and subversive
activity.

b. Natural Hazards – are those caused by natural phenomena


which cause damage, disturbance and problems of the normal
functioning of human activities including security. It
includes floods, typhoons, earth quakes, lightning storms,
volcanic eruption, high velocity winds tidal waves and etc.

It should be noted the real problem actually in industrial


plants are the human or manmade hazards, the most common of
which are pilferage, theft, arson, accidents, carelessness
and sabotage.

The Extent and Degree of Risks to Security

a. Relative criticality of operation – is the importance


of the firm with reference to the natural/national
economy and security.

b. Relative vulnerability – is the susceptibility of the


plant or establishment to damage, loss or disruption of
operation due to various hazards.

Pilferage – is the act of taking away any property without


any authority; also known as petty theft. It maybe also
defined as the unlawful taking of someone’s property without
the consent of the owner.

Types of Pilferer:

a. Casual pilferer – one who steals due to his


inability to resist the unexpected opportunity and
has little fear by detection.
b. Systematic Pilferer – steals with
preconceived plans and takes away any or all types
of supplies or items for economic gain.

Some Common Measures Against Pilferage:

a. Package inspection
b. Body search
c. Garbage and trash checks before disposal

6
d. Personnel ID and management control
e. Locks and key management
f. Property audits
g. Inspections
h. Asset inventories
i. Use of alarm
j. Security education

FUNDAMENTALS OF PHYSICAL SECURITY


Physical security measures are being used to define,
protect, and monitor property rights and assets. These
measures consist of barriers and devices that would detect,
impede, and prevent unauthorized access to equipment,
facilities, material and document and to safeguard them
against espionage, sabotage, damage and theft.

Definition and Concept of Barrier


A Barrier can be defined as any structure or physical
device capable of restricting, deterring, illegal access to
an installation.

Generally, barriers are used for the following purposes:


1. Define the limits of boundaries of an area.
2. Create physical and psychological deterrent to
unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus,
facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of
guards
5. Facilitate and improve the control of vehicular traffic.

Types of Barriers
1. Natural Barriers- it includes bodies of water,
mountains, marshes, ravines, deserts other terrain
that are difficult to traverse.
2. Structural Barriers- these are features constructed
by man regardless of their purpose such as
windows, locks, fences, safe, cabinets or containers
etc.
3. Human Barriers- person being used in providing a
guarding system or by the nature of their employment
and location, fulfill security functions. Examples
are guards, office personnel, shop workers, etc.
4. Animals Barriers- animals are used in partially
providing a guarding system. Dogs are usually

7
trained and utilized to serve as guard dog. German
shepherds are best suited for security functions.
Goose and turkeys could also be included.
5. Energy Barriers- it is employment of mechanical,
electrical, electronic energy impose a deferent to
entry by the potential intruder or to provide
warning to guard personnel. These are protective
lighting, alarm system and any electronic devices
used as barriers.
Three Line of Physical Defense
1. First line of Defense- perimeter fences / barriers
2. Second line of Defense-doors, floors, windows, walls,
roof and grills and other entries to the buildings.
3. Third line of Defense- storage system like steel
cabinets, safes, vaults and interior files.

Principles of Physical Security


1. The type of access necessary will depend upon a number
of variable factors and therefore may be achieved in
number of ways.
2. There is no impenetrable barrier
3. Defense- in depth is barriers after barriers
4. Delay is provided against surreptitious and non-
surreptitious entry.
5. Each installation is different.

PERIMETER SECURITY

Perimeter barrier is a medium or structure which


defines the physical limits of the area or compound and
its purpose is to deny or impede access or exit of
unauthorized person basically; it is the first line of
defense of an installation. This maybe in the form of
fences, building walls or even bodies of water. The
function and location of the facility itself usually
determine the perimeter of the installation. If facility
is located in a city whereby the building or enterprise
occupies all the area where it is located, the perimeter
may be the walls of the building itself. Most of the
Industrial companies, however, are required to have a
wide space for warehousing, manufacturing etc.

Types of Perimeter Barrier


1. Fences
2. Walls
3. Bodies of water

8
Types of Fences

Solid fence- constructed in such a way that visual access


through the fence is denied. Its advantage is that it denies
the opportunity for the intruder to become familiar with the
personnel, activities and the time scheduled of the movements
of the guards in the installation. On the other hand, it
prevents the guards from observing the area around the
installation and it creates shadow that may be used by the
intruder for cover and concealment.

Full-view fence- it is constructed in such a way that visual


access is permitted through the fence. Its advantages are
that it allows the roving patrol and stationary guard to keep
the surrounding are of the installation under observation. On
the other hand, it allows the intruder to become familiar
with the movements and time schedule of the guard patrols
thereby allowing him to pick the time that advantageous on
his part.
Types of Full- View Fence

1. Chain link fence


It must be constructed of 7 feet material excluding
top guard.
It must be of 9 gauges or heavier.
The mesh openings are not to be larger than 2
inches per side.
It should be twisted and barded selvage at top and
bottom
It must be securely fastened to rigid
metal or reinforced concrete.
It must reach within 2 inches of hard ground or
paving.
On soft ground, it must reach below surface deep
enough to compensate for shifting soil or sand.

2. Barbed wire fence


a. Standard barbed wire is twisted, double-
strand, 12-gauge wire with 4 point bars
spaces in an equal distance apart.
b. Barbed wire fencing should not be less than
7 feet high excluding top guard.
c. Barbed wire fencing must be firmly affixed
to posts not more than 6 feet apart
d. The distance between strands must not
exceed 6 inches at least one

9
wire will be interlaced vertically and
midway between posts.

3. Concertina wire fence


a. Standard concertina barbed wire is commercially
manufactured wire coil of high strength steel
barbed wire clipper together at intervals to form
a cylinder.
b. Open concertina wire us 50 feet long and 3 feet
in diameter.

Perimeter Barrier Opening

1. Gates and Doors- When not in use and controlled by guards,


gates and doors in the perimeter should be locked and
frequently inspected by guards. Locks should be changed from
time and should be covered protective locks and key control.
2. Side -walk -elevators- these provide access to areas
within the perimeter barrier and should be locked and
guarded.
3. Utilities Opening- Sewers, air intakes, exhast tunnels and
other utility opening which penetrate the barrier and which
have cross sectional areas of 96 square inches or more should
be protected by bars, grills, water filled traps or other
structural means providing equivalent protection to that
portion of the perimeter barriers.
4. Clear Zones- an unobstructed area or a “ clear zone”
should be maintained on both sides of the perimeter barrier,
A clear zone of 20 feet or more is desirable provide
concealment for assistance to a person seeking unauthorized
entry.

Additional Protective Measures

1. Top Guard- additional overhang of barbed wire placed on


vertical perimeter fences upward and outward with a 45 degree
angle with 3 to 4 strands of barbed wires spaced 6 inches
apart. This increases the protective height and prevents easy
access.
2. Guard Control Stations- this is normally provided at main
perimeter entrances to secure areas located out- of- doors,
and manned by guards on full- time basis. Sentry station
should be near a perimeter for surveillance at the entrance.
3. Tower Guard- this is a house- like structure, above the
perimeter barriers. The higher the tower, the more visibility
it provides. Its gives a psychological unswerving effect to
violators. Large guard towers, whether permanent or

10
temporary, must have a corresponding support force in the
event of need. Towers as well as guard control stations
should have telephones, intercoms, and it possible two- way
radios connected to security headquarters or office call for
reserves in the event of need.
4. Barrier Maintenance- Fencing barriers and protective walls
should always be regularly inspected by security. Any sign or
attempts to break in should be reported for investigation.
Destruction of fence or sections thereof should be repaired
immediately and guard vigilance should be increased.
5. Protection in Depth- In large open areas or ground where
fencing or wailing is impractical and expensive, warning
signs should be conspicuously placed. The depth itself is
protection. Reduction of access roads, and sufficient notices
to warn intruders should be done. Use of animals, as guards
and intrusion device, can also be good as barriers.
6. Signs and Notice- “Control signs” should be erected where
necessary in the management of unauthorized ingress to
preclude accidental entry. Signs should be plainly visible
and legible from any approach and in an understood language
or dialect.

PROTECTIVE LIGHTING/SECURITY LIGHTINGS

The idea that lighting can provide improve protection


for people and facilities is as old as civilization.
Protective lighting is the single most cost effective
deterrent to crime because it creates a psychological
deterrent to the intruders. Security Lighting provides
sufficient illumination to areas during hours of darkness.

Purposes of Security Lightings;


a. It improves visibility so that intruders can be seen,
identified or apprehended.
b. It gives psychological fear which serves as a deterrent
to thieves, pilferers, trespassers and saboteurs.
c. It makes easier the routine work of guard in identifying
employees, vehicles and etc. during night time.
d. If placed in certain areas, may even reduce the number
of stationary guards, and instead, may require only
roving patrols at night.

Security Lighting Techniques:


a. Security lighting should enable a guard to observe
clearly the activities around and inside the
premises within his jurisdiction.

11
b. In planning, high contrast between intruders and
background should be provided. When contrast is
poor, increase intensity will improve guards ability
to see.
c. Lighting boundaries and approaches, as well as the area
and structure, is useful to discourage unauthorized
entries and reveal identity of persons. Good
lighting should reveal well boundaries, areas,
glaring to intruders and adequate for the guard to
observe.
d. If lighting at night cannot be provided due to
impracticability, other means of protection have to
be make like additional guard post, roving patrols
and animals.

Types of Security Lighting:

a. Stationary Luminary – most common type consisting of


series of fixed luminous to flood a given area
continuously with overlap.
It may either be:

1) Glare projection type – the intensity is


focused to the intruder while the observer
or guard remain in the comparative darkness.
The lighting is toward the approach of an
entrance to an installation. Lights with
reflectors increase glare.
2) Controlled lighting – the width of the
lighted stop can be controlled and adjusted
to suit the security needs. The lighting is
focused, sag, on a file of items, rather
than on the background.

These 2 types are used on the entry gate


of employees and vehicles.

b. Stand by Lighting – similar to continuous lighting


but in turned on manually or by special device or
other automatic means, when there is suspicion of
entry.

c. Movable Lighting – consist of stationary or portable,


manually operated search lights which may be lighted
continuously during hours of darkness or only as
needed, and usually supplementary to either to the
first 2 types.

12
d. Emergency Lighting – a stand by lighting which can be
utilized in the event of electrical failure, either
due to local equipment or commercial power failure.

Types of Light Lamps:

a. Incandescent Lamp – common light bulbs in which light is


produced by the resistance of a filament to electric
current. For better concentration of light, metal
reflectors are used, and directed on areas to be
lighted.
b. Gaseous Discharged Lamps – economical to use but take 2
to 5 minutes to light which may be a disadvantages in
industrial security lighting.
c. Mercury vapor Lamps – blue green color light due to the
presence of mercury vapor.
d. Sodium vapor Lamps – emits yellow light, placed usually
in areas to connote special concern like bridges and
street.
e. Quarts Lamps – very bright light.

PROTECTIVE ALARMS

1. Alarm – aural or visual signal given by the


annunciator to security when intruder actuates device in a
protected area. An annunciator is an visual or audible
signaling device which initiates conditions of associated
circuits.

Basically, alarm system are designed to alert


security personnel to consummated or attempted intrusions
into an area building or compound. Each type of alarm is
activated in the event that an intruder interrupts the
circuitry, a beam or radiated waves. Intrusion alarm can be
electrical, mechanical or electronic. Alarms are also used
for fire, smoke or other emergencies and presence of other
hazards.

Three Parts of Alarm System:


1. Sensor or Triggering Device – the detecting mechanism of
the alarm system
2. Transmission Line – circuit that carries message
3. Enunciator – signaling system or that part which
produces the alarm

13
Types of Alarm system
1. Central Station System – A type of alarm where the
control station is located outside the plant or
installation. When the alarm is sounded or actuated by
subscriber, the central station notifies the police and
other public safety agencies.
2. Proprietary system – Centralized monitor of the
proprietary alarm system is located in the industrial
firm itself with a duty operator. In case alarm, the
duty operator calls whatever is the primary need;
firefighters, police, an ambulance or a bomb disposal
unit.
3. Local Alarm – This system consist of ringing up a visual
or audible alarm near the object to be protected. When
an intruder tries to pry a window, the alarm threat goes
off.
4. Auxiliary alarm – Company- owned alarm system with a
unit in the nearest police station so that in case of
need, direct call is possible. The company maintains the
equipment and lines both for the company and whose in
the police, fire and other emergency agencies by special
arrangement. Radio, landlines, or cell phones can avail
of the auxiliary system.

Kinds of Alarms
1. Audio Detection Device – It will detect any sound caused
by attempted force entry. A supersonic microphone
speaker sensor is installed in walls, ceiling and floor
of the protected area.
2. Vibration Detection Device – It will detect any
vibration caused by attempted force entry. A vibration
sensitive sensor is attached to walls, ceilings or
floors of the protected area.
3. Metallic foil or wire – It will detect any action that
moves the foil or wire, An electrically charge strips of
tinfoil or wire is used in the doors, windows or glass
surfaces of the protected area.
4. Laser Beam Alarm – A laser emitter floods a wall or
fencing with a beam so that when this beam is disturbed
by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device – An invisible/
visible beam is emitted and when this is disturbed or

14
when an intruder break contract with the beam, it will
activate the alarm.

OTHER TYPES OF PROTECTIVE ALARMS

1. Foot rail activator- placed on the floor in such a


position that tellers may activate the alarm by placing
the front of their foot to engage the activation bar.
2. Bill traps or currency activation devices- are usually
placed in tellers top, cash drawer and connected to the
alarm system using a wire connector. When currency is
removed from the devices, the alarm is activated.
3. Knee or thigh buttons- installed inside the desk or
teller station so they can be activated by knee or thigh
pressure. They are commonly found in location where
personnel usually perform their duties from seated
position.
4. Foot button- permits alarm activation in relatively
safety while both hands remain clear in view of the
robbers.
5. Double squeeze buttons- re4quires pressure on both side
of the device and therefore the probability of
accidental alarm is reduced.

Operation of Intrusion Alarm System:

Intrusion alarm – is a type of alarm that emits a


signal when device is actuated by breaking a circuit, a beam,
disturbing an electromagnetic field or tipping an electro-
mechanical gadget.
Intrusion devices emit certain signals to the
annunciator and operate on the following principles:

a. Breaking an electric circuit – in a building or


compound, all possible points of entry can be wired
by using electrically charged strips of tinfoil or
wire. Any action that will move the foil or wire
breaks the circuit and activate an alarm. The alarm
can be local, or near the area where circuit is
broken, or can be monitored in a distant annunciator
or both.
b. Interruption of a light beam – This system uses a
photo-electric cell of the electric eye which
operates on the principle of light rays. In this

15
system, an invisible light beam is transmitted to a
special receiver. An infrared filter over the light
source makes the beam invisible to intruders. The
source of the beam is hidden, and the rays criss-
crops a room by the use of reflecting mirrors until
they contact sensitive cells in a receiver. This
device terminates by wire to a console in the
security control room. When an intruder breaks the
beam, an alarm is activated. The Disadvantages of
photo-cell include: the beam can be by passed by
crawling undermeath or climbing over it; its
requirement of a rigid base and permanently
installation, it is not fit for external or outdoor
installation because fog, smoke, dust, rain and other
obstructions to vision when enough can interrupt the
light and trigger false alarms.
c. Detection of sound and vibration – this can be
utilized effectively to safeguard enclosed areas
vaults, safes, storage, bins, file rooms, warehouses
and similar enclosures. Supersensitive tiny
microphones are embedded in the walls, ceiling and
floors of the enclosure to be protected by sound or
vibrations. The microphones distributed evenly can
detect sound or vibrations of sound caused by
attempts to force entry into the protected area. The
main advantage of this detector device is its
relatively low cost and easy installation. The
amplifier which monitors the sound from the
microphone can be adjusted to suit the sensitivity
level requirements. The obvious-disadvantage is its
limited application to enclosed vaults, and
depositories where minimum external sound exist. It
is not satisfactory where high ambient noise level
are encountered proximate to construction sites,
aircraft traffic and vehicular movement.
d. Space and motion detection – these systems derive
their operating principle from a physical phenomenon
known as “Doppler Effect”. Constant sound waves in a
cubicle disturbed by an object will cause change of
frequency and wave motion thereby causing an alarm to
trigger.
e. Penetration of an electronic or electromagnet fence –
is an electronic fence consisting of 3 to 5 strands
of wire spaced from 9 to 24 inches above one another
which serves as antenna, a monitor panel and an
electric circuitry. When power is put on, an

16
electromagnetic field’s set among the wires from the
top to bottom

Utilization of Alarm Devices


The selection of proper alarm system is not a simple
matter, because the needs of each installation are different,
like a set of fingerprints. Some factors that determine the
requirement of the installation will include the following:
1. Nature of the area or installation
2. Criticality of the area or complex
3. Vulnerability of the area or complex
4. Accessibility
5. Location of installation and area to be protected
6. Constructions and types of buildings
7. Hours of normal operations
8. Availability of other types of protection
9. Initial and recurring cost of installation alarm system
10. Design and salvage value of desired equipment
11. Response time of the security force and local
police
12. Saving in manpower and money for a period of time
if alarm is used

Desirable Characteristics of Alarm System


1. A detection unit should initiate the alarm upon
intrusion of a human being in the area or vicinity upon
intrusion of a human being in the area or vicinity to
the protected area or object.
2. Panel board central enunciator opening, console
monitoring activities should be manned at all times.
3. An enunciator console indicating the audible and/ or
aural signal and the specific location of incident so
that proper action can be made by security and other
unit.
4. Fail- safe features which give alarm in the enunciator
when something is wrong with the system.
5. System should be difficult to tamper or render
ineffective by outsiders, competitors or saboteurs.

Summing up Protective Alarm Devices

17
1. Alarm devices are physical safeguards used to assist
security but not a replacement in the protection and
lives in the installation.
2. It assist the guards to extend their hearing and vision
even in areas where they are not physically present.
3. The alarm system whether a local, a central,
proprietary, or an auxiliary type are to inform the
guard either visually or aurally of an attempt or a
break-in within the premises being protected.
4. Maintenance of alarm system must be regularly made, the
signal line must be protected, and there must be
alternate source of power.
5. New and improve intrusion hardwires are being developed
an is placed in the market but again, the human guard is
irreplaceable in spite of computerization and the
arrival of super sophisticated devices in security alarm
systems.

Communication System in Security


The regular communications facility of
a plant is not adequate for protective security purposes.
Security needs a special communication system that will
vary in size, type, nomenclature, and cost commensurate
with the importance, vulnerability, size, location, radio
propagation, and other factors affecting the security of
the installation.

Equipment Used in Communications


The following are some means of
communication that can be useful part of the protective
systems:
1. Local telephone exchange
2. Commercial telephone service
3. Intercommunication
4. Two-way radios
5. Paging and recall systems
6. Bullhorns or megaphones
7. Amplifier or loud speaker system
8. Cellular or mobile phones

PROTECTIVE LOCKS AND KEYS

18
Lock is one of the most widely used physical security
devices in the asset protection program of an installation.
It complements other physical safeguards of the installation
against any possible surreptitious entry. However, the owner
of the installation or his security officer needs to
understand the weaknesses and strength of each type of lock
including the door, window or walls to be used to achieve
maximum benefit from its application. This is because highly
skilled burglars more often concentrate on the lock and its
surrounding mechanism in order to make a forcible entry. It
is for these obvious reasons that locks are considered as
delaying devices which cannot really stop a determine
intruder from destroying the lock just to launch an attack.
Hence, knowledge of the basic principles of locking systems
will enable the installation owner or the security officer to
evaluate any lock and determine its quality and effectiveness
in a particular application.

What is a lock?
A lock is defined as a mechanical,
electrical, hydraulic or electronic device designated to
prevent entry into a building, room, container or hiding
place.

Lock (fastening device), mechanical device used for


fastening doors, chests, and lids, consisting essentially of
a bolt guarded by a mechanism released by a key or a
combination. It is a mechanism used to fasten or secure a
window, door, container, or lid and usually operated by key.
Microsoft ® Encarta ® 2009. © 1993-2008 Microsoft Corporation. All rights reserved.

Types of Locks
1. Key-operated mechanical lock- it uses some sort of
arrangement of internal physical
Barriers (wards tumblers) which prevent the lock from
operating unless they are properly aligned. They key is
the device used to align these internal barriers so that
the lock may be operated.

Three (3) Types of Key-operated Lock


Disc or wafer tumbler mechanism

19
Pin tumbler mechanism
Lever tumbler mechanism

2. Padlock – a portable and detachable lock having a


sliding hasp which passes through a staple ring and is
then made fasten or secured.
3. Combination lock- instead of using the key to align the
tumblers, the combination
Mechanism uses numbers, letters or other symbols as
reference point which in enable an operator to align
them manually.
4. Code-operated Lock- a type of lock that can be opened by
pressing a series of numbered button in the proper
sequence.
5. Electrical Lock- a type of lock that can be opened and
closed remotely by electrical means.
6. Card-operated lock- a type of lock operated by a coded
card.

Keys
Key – is a metal bar with notches or grooves that, when
inserted into a lock and turned, operates that lock’s
mechanism . Microsoft® Encarta® 2009. © 1993-2008 Microsoft
Corporation. All rights reserved.

Types of Keys

1. Change Key- specific key, which operates the lock and


has a particular combination of
Cuts, or biting, which matches the arrangement of the
tumblers in the loc k.
2. Sub-master key- a key that that will open all the lock
within a particular area or
Grouping in a given facility.
3. Master key- a special key capable of opening a series of
lock.
4. Grand master key- a key that will open everything in a
system involving two or more master key groups.
5. Great Master key - All locks operated by change key. Grand
Master Key and Great Grand Master Keys. Used in great or
large complex system and similar to three levels.

20
6. Great great Grand Master Key - All locks operated by change
key, grand master key, great grand master key and great great
grand master key. Examples: big universities, complexes,
large industrial complexes.

Maison Keying – the issue of key to open the main entrance


and the office. A Maison key system is a keying system that
permits a lock to be opened with a number of unique,
individual keys. Maison key systems are often found in
apartment building common areas, such as main entrance or a
laundry room where individual residents can use their own
apartment key to access these areas

Lock picking - is the art of unlocking a lock by analyzing


and manipulating the components of the lock device, without
the original key. Although lock picking can be associated
with criminal intent, it is an essential skill for a
locksmith. Lock picking is the ideal way of opening a lock
without the correct key, while not damaging the lock,
allowing it to be rekeyed for later use, which is especially
important with antique locks that would be impossible to
replace if destructive entry methods were used.
http://en.wikipedia.org/wiki/Lock_picking

Key Control
Once an effective key control has been installed,
positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in
conjunction with the installation of new locking devices.
The following methods can be used to maintain effective key
control.
1. Key cabinet – a well-constructed cabinet will have to
be procured. The cabinet
Will have to be of sufficient size to hold the
original key to every lock in the system. It should
be secured at all times.
2. Key record – some administrative means must be set up
to record code numbers and indicates to whom keys to
specific locks have been issued.
3. Inventories – periodic inventories will have to be
made of all duplicate and original keys in the hands
of the employees whom they have been issues.

21
4. Audits- in addition to periodic inventory, an
unannounced audit should be made of all key control
records and procedures by a member of management.
5. Daily report- a daily report should be made to the
person responsible for key control from the personnel
department indicating all persons who have left or
will be leaving the company. In the event that a key
has been issued, steps should be initiated to insure
that the key is recovered

Security Cabinet
The final line of defense at any facility is in
the high security storage where papers, records, plans
or cashable instrument, precious metals or other
especially valuable assets are protected. These security
containers will be of a size and quantity, which the
nature of the business dictates.
In protecting property, it is essential to
recognize that protective containers are designed to
secure against burglary or fire. Each type of equipment
has a specialized function and it will depend on the
owner of the facility which type he is going to use.

Three (3) Types of Security Cabinet

1. Safe- a metallic container used for the safekeeping


of documents or small Items in an office or
installation. Safe can be classified as either
robbery or burglary resistance depending upon the
use and need.
 Its weight must be at least 750 lbs. And should
be anchored to a building structure
 Its body should at least one inc thick steel.
2. Vault- heavily constructed fire and burglar
resistance container usually a part of the building
structure used to keep and protect cash, documents
and negotiable instruments. Vaults are bigger than
safe but smaller than a file room.
 The vault door should be made of steel at least
6 inches in thickness.

22
 The vault walls, ceiling, floor reinforce
concrete at least12 inches in thickness.
 The vault must be resistive up to 6 hours.

3. File room – a cubicle in a building constructed a


little lighter than a vault but of bigger size to
accommodate limited people to work on the records
inside.

 The file room should at most be 12 feet high.


 It must have a watertight door and least fire
proof for one hour.

Personnel Identification and Movement Control

In every installation, the use of protective barriers,


security lighting, communication and electronic hardware
provides physical safeguards but these are insufficient not
to maximize the effort of the guard force. A control point
must be established for positive personnel identification and
check system. This is to insure that only those persons who
have the right and authority will give the necessary access
to the area.
The most practical and generally
accepted system of personnel identification is the use of
identification cards badges or passes. Generally speaking,
this system designates when and where and how identification
cards should be displayed, and to whom. This helps security
personnel eliminate the risk of allowing the access
unauthorized personnel within the establishments.

2 TYPES OF PERSONNEL IDENTIFICATION

1. Personal Recognition
2. Artificial Recognition- identification cards,
passes, passwords, etc.

PASS AND BADGE SYSTEM

A pass or badge is issued by security for personnel


to be admitted in the installation. These system precludes
those visitors with escorts and personnel in the access list.

23
The pass system is for general use and not for the restricted
areas like exclusive, limited and controlled areas. The
following are systems recommended.

Access List – and authenticated list of personnel given to


security guards allowing entry to a compound or installation
or part thereof.

Pass System – it is a method used by security guards to


screen outsiders and visitors with or without vehicles before
being admitted into an installation.

Badge System – a system for personnel movement and control


whereby badges or identification tags are issued to personnel
upon entering and leaving an installation. Visitors are also
issued temporary badges when entering the installation.

1. Single pass system- the badge or pass coded for


authorization to enter specific areas is issued to
an employee who keeps it in his possession until
his authorization is terminated. Pass is issued for
permission to enter different and specific areas by
letters, numerals or colors. For example, green
back grounds of current passes in the general area,
or white pass with overprinted blue symbols for a
certain specific area.
2. Pass exchange system- an exchange takes place at
the entrance of each controlled area. Upon leaving
the personnel surrenders his badge or passes and
retrieve back his basic identification. Multiple
copies of passes are issued to an individual with
the same photograph. The individual exchange his
badge for another color remarking at the gate. Once
inside, if he needs to enter a restricted area, he
exchange it for one of another color acceptable in
that area.
3. Multi pass system- this provides an extra measure
of security by requiring that an exchange take
place at the entrance of each restricted area.

Badge and Pass Control

24
1. The system should have a complete record of all
badges and identification cards
Issued, return, mutilated or lost by serial number
and cross-indexed alphabetically.
2. The supervisor from time to time for its accuracy and
authenticity should check
The lists.
3. Passes and badges reported lost should be validated
and security at entrance
Be informed through conspicuous posting.

Visitors Movement Control

Security should establish proper methods of


establishing the authority for admission of visitors as well
as the limitation thereat. This security measure would depend
on the sensibility o9f the installation, but could include
the following:
1. Visitor’s logbook – All visitors to any facility
should be required to identify themselves
And should be given a visitor’s ID by the
security. Visitors logbook should be filled up
With the named of visitors, nature and
duration of visit.
2. Photograph – taking of photographs should also be
considered. Extreme caution
Must be exercised in areas where classified information
is displayed to preclude unauthorized taking of
pictures of the installation. If a visitor has camera
and it is prohibited to take picture, said camera
should be left in the care of security either
corresponding receipt.
3. Escort – If possible visitors should be escorted by the
security to monitor their
Activity within the establishment and guide them where
to go.
4. Visitor entrances- separate access for visitors and
employees of the establishment
Should be provided.
5. Time-traveled- If there is a long delay or time lapse
between the departure and

25
Arrival, the visitors maybe required to show cause for
the delay.

Package Movement Control

Every facility must establish a system for


the control of package entering or leaving the premises.
However, desirable it might seem it is simply unrealistic to
suppose that a blanket rule forbidding packages either in or
out would be workable. Such a rule would be damaging to the
employee morale and, in many cases, would actually work
against the efficient operation in the facility. Therefore,
since the transporting of packages through the portals is a
fact of life, they must be dealt with in order to prevent
theft land misappropriation of company properties. Thus.

1. No packages shall be authorized to be brought inside the


industrial installation, offices and work area without
proper authority. This basic precept help reduce if not
eliminate pilferage, industrial espionage or sabotage.
2. Outgoing packages carried by personnel should be closely
inspected and those in vehicles should also be checked
as many pilfered items are hidden in the surface of the
vehicles leaving the compound.
3. Any personnel/ visitor entering the installation with a
package should deposit the same to the security and in
return receives a numbered tag, which he/ she will use
in claiming his/ her package upon departing.

Vehicle Movement Control and Identification


Vehicular traffic within the boundaries of any
facility must be carefully controlled for safety as well as
to control the transporting of pilfered goods from the
premises. Thus;

1. Privately owned vehicle of personnel/ visitor should be


registered and are subject to the identification and
admittance procedure.
2. Vehicle should be subjected for search at the entrance
and exit of the installation.

26
3. All visitors with vehicle should provide the security as
to the complete details of their duration of stay,
person to be visited, and other information.
4. All vehicles of visitors should be given a sign/ sticker
to be placed on the windshield.
5. Traffic warning signs should be installed in all
entrances in or ler to guide the precautions while they
are inside the installation
6. Security personnel must constantly supervise parking
areas and make frequent spots searchers of vehicles
found there.

Building Access Control

At any physical barrier, a security system must


posses the ability to distinguish among authorized persons,
unauthorized visitors, and other unauthorized persons. This
is to assist the security personnel protects sensitive are
and information within the installation.

Appropriate warning signs should be posted at


the building perimeter. Special restricted entry facilities
to public access should be provided. This will he dependent
on the degree of security needed for the protection of
property, activity and other processes within the building.

The access to the restricted area shall be


limited to authorize personnel who have the direct
involvement with the installation, construction and operation
and maintenance of the equipment and systems and/ or use of
the materials contained within the restricted area. A clear-
cut policy on the access control should be disseminated to
all personnel of this installation.

PERSONNEL SECURITY

Of the three major aspects of security,


personnel security is considered as the most important. This
is for the simple reason that security is considered as the
assets to be protected and as source of security involves
people; both a losses are attributed mainly to negligence or

27
active participation of employees, either through theft and
sabotage. This emphasizes the need to set a system of hiring
the people for the company.

Purpose of Personnel Security

1. to insure that a firm hires those employees best suited


for the firm; and
2. Once hired, to assist in providing the necessary
security to these employees while they are carrying out
their functions.
Scope of Personnel Security

1. Personnel Security Investigation (PSI)


2. Security Education

Key Functions of Personnel Security

1. It serves as a screening device in hiring suitable


employees.
2. It provides background investigation service of both
potential and present employees, for possible assignment
to sensitive of wrong doing.
3. It handles investigation of employees.
4. It attempts to ensure the protection of employees from
discriminatory hiring or terminating procedures as well
as unfounded allegations of illegal or unethical
activities and conduct.

Personnel Security Investigation

Personnel Security Investigation (PSI) is a


process of inquiry into the character, reputation,
discretion, integrity, morals and loyalty of an individual to
determine the suitability for appointment of access to
classified matter.

General Techniques of PSI

1. Background Investigation (BI) – this technique is very


expensive but necessary in personnel security. It serves

28
to verify information on the application form and to
obtain other information pertinent to the decision to
employ.

Factors to consider in the conduct of BI

→ Loyalty, Integrity, Discretion, Morals,


Character, Reputation

Components of Complete BI

→ Applicants Name, Organization Membership, date


of Birth, Neighborhood Investigation, Present Residence
Address, Character Reference, Personal History, Employment
History, Martial History, Military History, Residence
History, Foreign Travel History, Citizenship, Criminal
Record, Physical Data, Credit Records, Educational History,
Applicant’s signature, Date of Application.

Types of Local Agency Check (LAC)

a. Barangay Clearance
b. City Municipal Clearance
c. Local Police Clearance
d. Court Clearance

Types of National Agency Check (NAC)

National Bureau of Investigation (NBI) Clearance


PNP Directorate for Intelligence (DI) Clearance
Intelligence Service, AFP (ISAFP) Clearance

Positive Vetting – Is the process of inspecting or examining


with careful thoroughness. The essence of vetting that it is
a personal; interview conducted under stress. It is based on
information previously given by the applicant. Other
information is sued during the interview, such as those
discovered in the BI, which confirms or denies this given by
the applicant.

29
Profiling – Is the process whereby a subject’s reaction in a
future critical situation is predicted by observing his
behavior, or by interviewing him, or analyzing his responses
to a questionnaire, such as an honesty test. The Reid Report
is an example of honesty test.

Deception Detection Techniques – This a process of using


devices in detecting deception during the interview stage.
This includes the use of a Polygraph, Psychological Stress
Evaluator and Voice Analyzer.

Financial and Lifestyle inquiry – This type of investigation


seeks to gather information on income and mode of living,
sometimes referred to as the earning to debt ratio.

Undercover Investigation – This is the placement of an agent


in a role in which the agent’s true identity and role remains
unknown, in order to obtain information for criminal
prosecution or for recovery or limitation of asset losses.

Exit Interview – This is a valuable tool because it gives


departing employees an opportunity to list grievances. It
offers security managers an opportunity to learn of problems
not previously known. Incorporating a checklist of company-
issued property and confronting a departing employee of this
has resulted in reducing losses of company property.
Debriefing an employee is also incorporated into the exit
interview to remind employees of their continuing legal
obligation to safeguard confidential company information.

Security Education
Security Education is conducted to develop
security awareness among employees of the company. It should
cover all employees, regardless of rank or position.

Objectives of Security Education


1. Guidance for all supervisory and executive levels
of the organization
2. A mandatory indoctrination on security for all new
personnel before their assignment of their
respective jobs

30
3. Development of high degree of security
consciousness among the selected supervisors and
other key personnel in a program that should be
continuing and supported by top management.
4. A down-the –line security program aimed at
instilling consciousness and dedication through
demonstration, lectures, motivations and
suggestions
5. To let all employees force informed that they all
belong to the organization and that non-awareness
to the security program is tantamount to disloyalty
6. That the program is also to develop discipline,
loyalty and belongingness.
Phases of Security Education Program

Initial interview- it is the first time contact of


the prospective employee wherein
The interviewer determine the suitability of the
applicant for employment through his give answers
on the different type of question is being
conducted. It is in this stage where the
interviewer may start providing the necessary
information as to the overview of company security
policies and at the same time on the employee
accountability and corresponding penalties that
could result from violation there from.

Orientation and training- it is in this stage where


new employees receive detailed presentation of
personnel security policy. Usually harvest or
employees manual is being distributed for
reference. New employees also requested to sign
acknowledgement that they have been aware of the
exiting company policies and will abide the same.
Refresher conference – it is design to remind
employees of the company about their
responsibilities, review the guidelines and
policies, introduction of new policies and
regulations and a moment of getting employees
feedback about the company policies that is being
implemented.

31
Security Reminders – a phase which employs an
indirect approach of educating the employees such
as posting security posters and distributing
fliers.
Security Promotion – it is the act of emphasizing the
importance and role of employee cooperation and
support.

DOCUMENT AND INFORMATION SECURITY

In every installation, document and


information are indispensable for their daily operations and
activities, be it in the form of a paper, film, and magnetic
media or in the computer system. Once there is a leakage in
the contents of a company’s document and information, the
business operation stability is at stake. It may be a start
of bankruptcy that would lead to its total disclosure.

The leakage of document and information cost


government, business and industry alike, billion of pesos. A
rival company or an enemy agent might use an illegally obtain
document and information through out all preserve the
confidentiality and integrity of document and information
through out all of this existence.

Purpose of Protecting Classified Materials

1. Deter and impede potential spy


2. Assist in security investigations by keeping accurate
records of the moments of classified materials.
3. Enforce the used of “ Need to know” principle

Categories of Document for Security Purposes

1. Category A

→ Information which contains reportable time


sensitive, order of battle, and
significant information.
→ It must be given priority because it is critical
information

32
→ it must be forwarded without delay.
→ it is critical to friendly operations.
→ it re queries immediate action.

2. Category B

→ Anything that contains communications,


cry photographic documents, or system
that should be classified as secret
and requires special handling.
→ Higher authorities should declassify
it.

3. Category C

→ Other information, which contains something


that, could be an intelligence value.
→ Contains exploitable information regardless of
its contents.
→ Unscreened materials/ documents should be
categorized as Category C.

4. Category D

→ No value, yet lower level will never classify


documents as category D
→ No decision must be made at the lower echelon that
document has no value.
It is the responsibility of the higher
Headquarters.

Three (3) Security Concepts


1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel
conscious and realize the value of document.
3. Training is necessary for the practice of “Need to
Known” principle.

Rules for Classification of Documents

33
1. Documents shall be classified according to their
content.
2. The overall classification of a file or a group of
physically connected therein. Pages, paragraphs,
sections or components thereof may bear different
classifications. Documents separated from file or group
shall be handled in accordance with individual
classification.
3. Transmittal of documents or endorsements which do not
contain classified information or which contain
information classified lower for than that of the
preceding element or enclosure shall include a notation
for automatic downgrading.
4. Correspondence, Indexes, receipts, report of possession
transfer or destruction, catalogs, or accession list
shall not classify if any reference to classified matter
does not disclosed classified information.
5. Classified matter obtained from other department shall
retain the same original classification.

Protection of Sensitive Information

Proprietary information is information that in


some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership. In
the business community, proprietary information relates to
the structure, products or business methods of the
organization. It is usually protected in some way against
causal or disclosure.

All proprietary information is confidential,


but not all confidential information is proprietary. For
example, confidential personnel data in employee files is not
considered as proprietary although the companies treat it as
confidential.
Types of proprietary Information

1. Trade Secrets – this consist of any formula, pattern,


device or compilation of information which is used in
one’s business and which gives him an opportunity to again
an advantage very competitors who do not know or use it.

34
It may be a formula for a chemical compound a process of
manufacturing, treating or preserving materials, a pattern
for machine or device, or ephemeral events. A trade secret
is a process or device for continuous used in the
protected of the business.
2. Patents – this is a grant made by the government to an
inventor, conveying or securing or securing to him the
exclusive right to make, use, or sell his invention for
term of years.

Primary Distinctions between Patents and Trade Secrets

Requirements for obtaining a patent are specific. To


quality for a pattern the invention must be more than
novel and useful. It must represent a positive
contribution beyond the skill of average person.
A much lower of novelty is required of a trade secret.
A trade secret remains secret as long it continues to meet
trade secret tests while the exclusive right to patent
protection expires after 20 years.

Proprietary Information Protection Program


Realizing that the most serious threat to trade
secrets is the employees a measure of protection is often
realized through the use of employee agreements which the
company. The following countermeasures may be adopted:

1. Policy and procedure statement regarding all sensitive


information.
2. Pre and post employment screening and review.
3. Non- disclosure agreements form employees, vendors,
contractors and visitors.
4. Awareness programs
5. Physical security measures
6. Informed monitoring

RISK ANALYSIS AND SECURITY HAZARD

Risk Defined

35
It is the potential damage or loss of an
asset. The level of risk is a combination of two factors: The
value placed on that asset by its owner and the consequence,
impact adverse effect of the loss or damage to that asset
and; the likelihood that a specific vulnerability will be
exploited by a particular threat.

Risk Management
It is a process of selecting and
implementing security counter measures to achieve an
acceptable level of risk at an acceptable cost.

Risk Analysis
It is the analysis of risk include
examinations of the vulnerability, probability and
criticality of potential threats and include natural and man
made risk.

Adversary
An individual, group organization, or
government that conducts activities or has the intention and
capability to conduct activities detrimental to the
individual, private or government entity.

Asset
An information, facility, material, information, or
activity which has a positive value to its owner whether it
is an individual, private or government entity.

Vulnerability
Any weakness that can be exploited by an adversary to
gain access to an asset.
Countermeasures
An action taken or a physical entity used
to reduce or eliminate one or more vulnerabilities. The cost
of possible countermeasures may be monetary, but may also
include non-monetary cost such as reduced operational
efficiency, adverse publicity unfavorable working conditions,
and political consequences.

Probability

36
It is the change or likelihood that a
loss will take place. Indicated by a mathematical statement
concerning the possibility of an event occurring.

Criticality
It is the impact of a loss as measured in
financial terms. How important it is an terms of the survival
or existence of the organization.

Risk Management Alternatives and Strategies

Risk Avoidance – eliminating or removing the risk


totally from the business government
For which the risk
manager has responsibility.
Risk Reduction – decreasing the risk by minimizing
the probability of the potential loss.
The reduction of
criminal opportunity is often accomplished by
situational crime.
{prevention strategies to discourage, deter, or deny
criminal incidents.
Risk Spreading - spreading the risk through
compartmentation or decentralization to
Limit the impact (criticality) of the potential loss.
Risk Transfer - moving the financial impact of the
potential loss – over to an insurance
Company.
Risk Self-assumption- planned assumption and acceptance of
the potential risk by making a deliberate managerial decision
of doing nothing about the threat or
setting aside resources for use in case a specific loss
incident.

Sabotage as a Security Hazard

Description of a Saboteur

37
1. He is the most dangerous foe whom security will
have to deal with while planning and
implementing security measures and techniques.
2. He is an ordinary looking as the next guy but in his
mind, he has the training in
deception, knowledgeable in incendiaries,
explosives, chemistry, bacteriology,
mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in
several places.

Possible Targets of Saboteur


1. Armed Forces Installation
2. Natural resources mines, forest, farms and farm
products
3. Industries- buildings, power sources, machinery, fuel
etc.
4. Warehouses depots, communications, public utilities,
etc.

Countermeasures against Sabotage


1. Use of an efficient, alert and trained guard force.
2. Use of physical security aids like barriers, personnel
and vehicular control, intrusion devices, communication
systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system
5. Searches on incoming vehicles
6. Safeguarding of classified information
7. Designation of restricted areas
8. Investigation of breaches of security
9. Security education and indoctrination
10. Good housekeeping methods
11. Effective and compatible emergency planning
12. Regular audit
13. Continuing background checks

Espionage as a Security Hazard


Description of an espionage agent

38
1. He is very dangerous adversary and his skills in
deception and his cunning should never be under
estimated.
2. He is usually a person of extensive training and will be
highly effective in gaining the confidence of people and
of extracting information of value to be relayed to his
employer or handler.
3. Even how well-trained and espionage agent he might be,
he is human like the saboteur and he can be defeated in
his own game if proper methods and techniques are
undertaken.

Some Methods employed by Espionage Agent

1. Stealing or information from employees.


2. Stealing information from records or other sources.
3. Using various methods of reproducing documents products
equipment or working models.
4. Using “front” as commercial concerns, travel agencies,
associations, business groups and other organizations to
obtain confidential information or data.
5. Using various form or threats to obtain information.
6. Using blackmail techniques by exposing intimate and
personal details concerning an individual or
organization.
7. Penetration and operational tactics.

Countermeasure against Industrial Espionage

1. Careful and complete pre-employment measures designed to


control threats of industrial espionage.
2. Continuing personnel check on employees and particularly
personnel on sensitive positions even already employed.
3. Prevention of unauthorized entry to the plant or
industrial installation.
4. Restricting of movement of personnel in the premises of
the plant.
5. Controlled disposal of waste papers including carbons in
classified work.
6. Only properly cleared personnel should handle classified
document.

39
Subversive Activity as a Security Hazard
Threats of Subversive Activity

1. It can be local or national in nature and their mission


is to undermine the authority
weaken the organization, and eventually take over.
This can be in business or any
activity.
2. This can be in the form of rumormorgering, propaganda
underminining, morale, and
injecting defeatist attitudes, and other emotional
approaches
3. It is an activity not easy to detect.

Countermeasures to Subversive Activity


1. The spreading of rumors, written materials, slogans or
any other devices to confuse
the work population and discredit the government
should be immediately reported.
2. Labor and other company unions can be infiltrated so
that strikes and “slow downs”
can be called to disrupts the normal operation of a
plant or installation.
3. Security force should be alerted for person trying to
recruit others in organizing
movements for peace, anti-colonials, anti trade and
anti-imperialism.
4. Employees or outside personnel seeking memberships in
“paper organizations” should report this activity to
security.
5. Other methods of subversion like united fronts, mob
action, terrorism and sabotage will be done to gain the
subversive ends.

SECURITY SURVEY AND INSPECTION

1. Entrance Conference – a conference or dialogue


between the survey team and management officials of a plant
before security survey is conducted.

40
2. Exit Conference – a conference similar to entrance
conference done after the completion of the security survey.

3. Who Performs Security and Audit Survey:

Security Survey is performed by qualified security


expert who can from the organization or outsiders contracted
to do the job. Recommendations will fall into three
categories:

1) Human guard
2) Equipment
3) Procedures

Security System

The information pertaining to one of the most important


security services offered to a head of office is the conduct
of security surveys and security inspections.
Every unit chief desires a security system that will reduce
to an absolute minimum the possibility of espionage, sabotage
and compromise of classified information on his office or
unit. Since there are many security countermeasures to be
considered, head of offices should utilized specially trained
personnel, if the effort of espionage and sabotage agents and
other criminal elements are to be negated. Security is an
extremely complex program an objective analysis of an office
head’s security program by security survey and inspection
personnel can be of great assistance in determining the
efficiency of any established security program.

Security Survey
A fact finding probe to determine a plant adequacy and
deficiency in all aspects of security with the corresponding
recommendations.
It is an estimate of the security standards of a unit,
and is conducted to enable the responsible officer to
recognize and evaluate security hazards and determine
protective measures necessary to the prevention of sabotage,
espionage, subversive activities and other criminal acts

41
inimical towards the interest and/or mission of the unit
and/or command.

Security Inspection
It is a check of how well existing security measures and
regulations are being carried out within a command. A
security inspection may also include an investigation of
alleged or suspected security violations. Physical security
is concerned with forces, entrances and exists, guards,
traffic control, lighting, fire control and with such other
physical measures, which, if probably established and
maintained, with deny access to unauthorized persons.

Security Survey Distinguish with Security Inspection


The term “Security Survey” and “Security Inspection” to
accentuate the particular differences between the two types
of services are defined as follows:
Security Survey is defined as a counterintelligence
service to assist heads of office in determining the security
measures required to protect key installation from possible
sabotage, espionage, subversion, unauthorized disclosures of
or access to classified information or material contained
therein.
Security Inspection is defined as a counterintelligence
service performed to determine compliance with established
security policies and procedures.

Who Performs Security and Audit Survey:


Security Survey is performed by qualified security
expert who can from the organization or outsiders contracted
to do the job. Recommendations will fall into three
categories:
Human guard
Equipment
Procedures

Role of Security Officer in Offices


With the exception of the office head, the security
officer is more interested in the survey that any other
individual of the office. It is the security officer who is
directly responsible to the head of office for proper
maintenance of security of the security program of the
office.

42
A Survey Specialist must be cognizant of established
security procedures relative of the office since much of the
survey including the resulting recommendations will be
affected by these measures.

This knowledge will enable him to recognize the present


or potential hazards in the area, answer most of the security
questions put forth by the head of office personnel, suggest
minor recommendations during the survey which can be
implemented on the spot and to discuss completely his
tentative recommendations with office personnel.

Authority in Conducting Security Survey

The unit head may request a survey of his entire office


or of specific function of a unit within the office.

When higher authorities directs a security survey to be


conducted for of its subordinate office, an information copy
of the correspondence may also be forwarded to the unit to be
surveyed.

It must be remembered that a security survey is not


conducted solely for the purpose of establishing a security
program of an office. The head of the office is directly
responsible for establishing a security system for his
officer after which a survey may be conducted to determine if
the program is adequate in comparison with the importance of
the office to the overall national objective.
Some of the situations under which a security survey may
be requested or directed:
 Activation of organization or office.
 Reactivation of an organization or office.
 A substantial change the mission, number of
personnel, structures or real estate of the office.
 Indications of laxity in the security program which
would indicate the need for a complete revaluation
of the security system.
 When no record exists of a prior survey having been
conducted.

43
Preliminary Planning
1. To assure as much as possible the successful
completion of a security survey, a chronological plan
of action is developed. The first action taken by the
security survey agent is to prepare for and conduct
those preliminary courses of action that precede the
actual conduct of the survey.
2. A very important consideration during the
preliminary planning stage is the use of a checklist.
This is a list of general considerations or specific
points that must be covered during the survey.
Checklist may be either the general type or the
specific/ detailed type.

Initial Briefing
After completion of the preliminary stage, the
specialist is prepared to visit the office. It is to be
recalled as mentioned previously that contact is made with
the security officer of the office for the purpose of
establishing a time and date for the initial briefing but his
entire staff and other key personnel of the office.

Escort Personnel
It is often desirable for both the specialist and the
office that an escort accompany the specialist during the
survey. Preferably, this escort should be the security office
of the office or representative. In any event he should be a
person conversant with the security practice and procedures
employed as the office.

Preliminary Exterior and Interior Check


As soon as possible after the initial briefing, the
specialist conducts a tour of the area surrounding the
office. The purpose of such an inspection is to gain a
general knowledge of those elements outside the office which
do or could conceivably have either a direct or indirect
influence upon the security of the office.
It is often in the areas adjacent to the office that you
find many of the office personnel congregating for relaxation

44
or entertainment, often under circumstances conductive to
loose talk. The agent also checks geographical features:
terrain, road and railroad networks, bridges and natural or
man made hazards near the office.

History of the unit to be surveyed


When the survey specialist completes his check of the
surrounding area of the installation and preliminary survey
of the interior of the installation, he is ready to commence
the analysis of the office’s security program.

The specialist first determines the history of the


organization to be surveyed and or the office on which it is
located. There may be some information contained in the
history of the organization or office which may directly
affect the security situation as it exists during the current
survey.

Analyzing Existing Security


Having completed the preliminaries and determined the
level or required security, the specialist must no ascertain
the existing level of security of the installation. This
portion of the survey is a minute examination of all factors
pertaining the physical security, security of personnel and
the security of information. It includes the collection of
all factual data that affects the security of the office.
This data will include all preventive measures as well as
hazards and deficiencies any of the security measures the
specialist examine are not based upon existing requirements.
The specialist arrives at his own conclusion and these
conclusions are reflected in his recommendations.

Final Briefing
The final conference is an oral to the chief wherein the
specialist determines whether or not his tentative
recommendations can be realistically implemented. The
specialist discusses the recommendations with the command
since information may exist which may negate or change the
recommendations. In many instances the chief may have
unsuccessfully attempted to implement corrective measures or
the recommendations are not feasible for some reasons unknown

45
to the agent. If the chief has unsuccessfully attempted to
correct its certain security weakness, a report of these
attempts is included in the specialist’s final report.

Report of Security Survey


A security Inspection is a service performed to
determined compliance with established security policies and
procedures and is conducted on recurring schedule or a
follow-up to a security survey.

In Security Inspection
The inspection, although akin to the security survey, is
much more restricted in scope. As observed, the security
survey considers everything pertaining to an office’s
security, but the security inspection is limited to
determination of the degree of compliance buy unit personnel
with established policies and procedures.
The preliminary land investigative procedures
involved in the conduct of a security inspection are
essentially the same as those required for a security survey;
this is the selection of inspection personnel, the necessary
file checks and other preparation, the duties of the In-
charge, the use of checklists and the coordination with the
Security Officer. The actual inspection will closely
parallel the same procedures followed during the conduct of a
security survey. Prior to the actual conduct of the
inspection the agent conducts preliminary checks of the
office or offices to be inspected to determine what security
regulations are enforced at the unit.
There are three specific types of security
inspections, to wit:
Announced Inspection – is one has been so
published to the office that all concerned personnel are
usually aware of its imminence and may consequently, make
such preparations as are necessary.
Unannounced Security Inspection - is an inspection
whose imminence is
Known only to certain selected personnel, normally the office
head and intelligence personnel of the office to be
inspected. It is usually conducted during non-duty hour
periods.

46
Penetration Security Inspection - is an
inspection conducted in such a manner that office personnel
are not aware that such action is taking place.

EXECUTIVE/VIP PROTECTION

The Need for VIP Security


With increased incidence of kidnapping/hostage
taking and other violent crimes such as assault, armed
robbery, murder and even political assassination, the
security of local and foreign dignitaries, designated
individuals or very important persons (VIP) is of extreme
importance.
Problems of person’s security vary with each
individual case in terms of potential hazards and threats,
political and sociological consideration, geography,
environment, mode of transportation, etc., the preparation of
a comprehensive. Standing operating procedures (SOP) becomes
virtually impossible. However there are basic factors that
must be considered which ca n be applied to all situations
regarding personal security.

Executive/VIP Security
Are those measures taken by Agents, Security
Officers, Law Enforcement officers or an Agency / officers to
protect heads of state, foreign national or local
dignitaries, civilian or military against any personal
injury, assassination, sabotage, and individual utilized as
government witnesses?

Basic Security Principles in VIP Security


Every phase of security must be carefully in
advance; to include the importance of the individual to be
protected, political attitude of the population, obstacles
involved means of transportation, and duration of the
security mission.
Physical protection should consist of a series of
protection cordons. These protective cordons may be composed
of a composition of personnel or physical security barriers.

Central Direction and Unity of Effort

47
The officer in charge should be given full
responsibility for all phases of the security mission.
Close coordination must be established with all
local military and civilian authorities. Civilian authorities
will include police and other interested city, municipal or
other local officials.
The agencies responsible for each of the
security plan must be clearly defined. Arrangements should be
made for local police to control local inhabitant. All
available intelligence channels should be used to obtain
information of potential danger areas, persons, or groups.
Coordination must be accomplished by an advance
party after the official itinerary is received.
Protective measures must be through but
inconspicuous and afford security without impending the
protectee/VIP’s performance of his functions.
The degree of protection is dependent upon the degree of
contact with the general public desired by the protectee.
A basic element of VIP/Executive protection is
the identification and the elimination of possible sources of
danger of the VIP/Executive before the danger becomes actual.
Plans for a perimeter of protection must be
surprise proof and flexible enough to allow a quick response
to any emergency.

Preventive Intelligence Measures


The main objective – To collect, processes and
evaluates information about persons or groups of persons who
may be a danger to the protectee/VIP.

The methods:
1. Security clearance of all employees and all tradesmen
who service the
Executive/VIP’s residence, quarter or office. Security
processing of gifts sent to the Executive/VIP.
1. Technical inspection against covert listening devices.
2. Process communications, letters that in any way
indicates anyone may have possible intention of harming
the Executive/ VIP.
3. Maintain an album of photographs and description of
individuals who are regarded as clear risks to the

48
Executive/VIP, including those who are penal or hospital
custody
4. Liason with other agencies for intelligence information
that may come in contact with that would indicate danger
to the protectee/ VIP.

Defense-in-Depth Theory
There is no impenetrable barrier. If an unfriendly
individual, organization or government can devote time,
money, personnel, material or imagination to passing a
barrier, he can succeed.
To achieve the ultimate results from a physical security
system, it is necessary to add barrier, delay time, until
sufficient delay time has been accumulated to allow control
of any foreseeable penetration.
THEREFORE, rather than attempting to achieve exclusion
through the use of a single barrier, security must be built
upon accumulated time or a system of “Defense-in-Depth.

Contingency Planning
Security planning should be flexible. Weather
conditions, mechanical failures and failure of lighting
system are three-ever-present potential hazards. The
unexpected arrival of large numbers visitors, audience is
another situation frequently encountered. Last-minute changes
in the security plan or schedule of events occur routinely.
The security plan therefore must be sufficiently fluid to
cover these and other eventualities, all of which present
hazards.

A Standard Operation Order (SOP) Format for preparation


of a protective plan should include the following
requirements.

 Mission
 Concept of Operation
 Coordination and Liaison
 Itinerary area of interest
 Personnel and equipment requirements
 Cooperation
 Communication

49
 Logistical support
 Public relation
 Emergency information
 Command and control

The order should be in writing and produced in sufficient


copies and duly classified. Only key staff officers/
personnel with whom coordination is necessary should be given
a complete copy, however, all proactive personnel are given
an orientation on the contents of the order and should be
familiar with the whole operation. Each participant commits
to memory the requirements his specific mission. And for this
reason, these instruction must be simple to understand and
easy to execute.

The itinerary and other information pertaining to the


travel of the protectee/VIP, which is often attached as an
annex, May under certain conditions, are also classified.

Sufficient time must be allowed for dissemination of


travel information to permit suitable security measures to be
taken.
The key to successful accomplishment of a security mission is
detailed continuous planning a careful selection, training
and use of personnel.

Mission Orientation

An orientation/ briefing must be conducted b y the offer


in charge or the protection plan, during which he explains
fully the contents of the plan. Some topics to be emphasized
are:

Conduct of Security Personnel


Police/ Security personnel assigned to there duties are
selected to the basis of the appearance, alertness, and
intelligence, as well as their ability to act quickly and
correctly in unforeseen circumstances.
Restriction on the approach the protectee or his effects, the
person is checked carefully for identification and the
authority for his presence is established.

50
Use of weapons
There is always the danger of accidental discharge and
hury innocent persons when weapons are carried. All
protective personnel must be qualified to fire the weapons
with they are armed.

Crowd Control
Protective personnel should understand the principles of
crowd control. They should not show prejudice or sympathy, or
become involved in any grievances expressed by the crowd.

Security Preparation in Local/Foreign Travel


Advance Preparations
Arranging for timetable/ itinerary and coordinating with
those concerned with visit, local or foreign law enforcement
security men.
Conduct security survey and inspection of routes,
quarters, conference luncheon and inaugural site.
Arrange for security measures for motorcade routes,
quarters, conference site, etc.
Confer with local or foreign security men. About
potential danger to the Executive, such as persons,
organizations or obtain copies of photographs and place these
persons under surveillance.

Motorcades
Select and consider the best motorcade route, preferably
the most direct route to destination.
Select a route which affords a chance to have alternate
routes if something happened on the motorcade route.
Review or dry run the route and take notes on the
requirements for controlling the crowd and traffic and
deployment of foot patrolmen and motorcycle police at various
positions along the route.
Arrange for police or buildings custodian to inspect
buildings along the motorcade routes.

Security in Inaugural/ Conference/ Luncheon sites


1. Control access to the building/ sites
2. Closing off and policing areas around it,

51
3. Securing rooftops and adjoining buildings.
4. Ensure the presence of numerous police officers
inside and around the building/site.

Security in VIP Officer/Quarters/Residence.

1. “Defense-in-Depths” Barriers – Concentric patterns (Any


attack will have to penetrate layer after of defenders,
the heavies’ layer of defense, being closest, being
closest to the Executive/VIP.)
2. outer ring- sidewalks, stationed in front of quarters/
residence/office, covering all entrances, front, center,
side and rear
3. Middle ring- inside quarters, office/ residence,
covering all stair ways and elevators.
4. Inner ring- immediately outside executive/VIP’S door, or
close to Executive/VIP if outside.

Personnel Duty
1. To hold ones position no matter what happens outside of
his own ring
2. Be ready to place his own body between the Executive/VIP
and any danger to him.
3. Be prepared to intercept a bullet, knife, or other
weapon with his own flesh.
4. The final defense against an attack on the person of the
Executive/VIP (as human shield).
5.
VIP Security Measures in all Areas

1. Establish screening points to allow only authorized


persons access to the protected area/ person and to keep
out those who have no valid reasons to enter same.
2. Duty stations or posts should be marked on a floor/
ground plan or sketch/ map.
3. If an unusually large crowd are expected along a parade
route security men may call on the armed forces to
station troops along the line of March.
4. If the Protectee/VIP travels by train, a pilot engine
must run the trucks IN advance of the VIP train.
5. Every manhole and sewer along the route should be sealed

52
6. Every single building and all its occupants along the
route should be checked.
7. Bellboys, waiters, cooks should be cleared.
8. Food to be cooked must be examined and samples be sent
to laboratory for analysis.
9. Inspect for time bombs, radio- active materials and
hazards.
10. Inspect closets and under the tables
11. Never allow the VIP to stop his car a crowd if can
be avoided.
12. Drivers for the VIP can be competent, reliable, and
well trained in protective driving and must be alert for
dangers and to take instant action.
13. While walking, it is necessary to increase the
number of guards because the VIP becomes an easy target.
14. In case the VIP is going to speak at hasty made
stage, its strength and capacity should be inspected to
limit the persons going up to stage.
15. During afternoon sessions, lightning facilities
must be checked or installed. It is estimated that the
program may reach up to nighttime.
16. An alternate generator fore emergency use made
available if source of electric power is from a central
source. Designate qualified electrician to watch main
source or switch.
17. If traveling by air, close the door of VIP plane
when parked and place constant guards every time.
18. If traveling by water craft, select boats of type
and size capable of facing danger at the ocean. Thorough
inspection is made on the ship and check the adequacy of
life saver and emergency facilities.
19. All non-uniformed men must wear signs or
countersigns for identification.
20. Checklist of all security hazards noted in the
course of security survey or inspection should be given
to the OIC for reference/planning.
21. Security plans and specific duties of men assigned
or details must be stated.
22. All written instructions must be classified
SECRET.

53
Other Guidelines for VIP Security
Security Formation assists in allowing the
Protectee/VIP to have the best possible protection and
defensible position even for the limited amount of
manpower while protectee is mobile/ in transit, or static.
Threat evaluation is to ascertain at varying
times and function which will give the best formation
sequence or set. Other considerations are threat levels
and type and advance planning for staff levels.

The Need for Close in /Escort security


officers, such as first and requirements {which differs
from location to location} and special weapon ns (a real
headache-the less you need to rely on them, the better),
and other logistical needs must be considered. One must
have the ability to use a lot of common sense and
attention to detail, to give the possible protection,
without overbearing or on top of the protectee/principal.
Fully aware with this information, the close-in/ Security
Escort team will be well equipped, with an understanding
of their respective position, alternatives and functions.
These could be varied hourly, in response to current
threat level, and areas of coverage or occasion in any of
the following:
 Crowds, restaurants, home, office – Public transport,
bus, taxi
 Friends of protectee/principal, business
 Movie theatre
 Functions: private, public, business
 Huge crowds: a tight-packed area of swirling bodies
 Elevators: opening a door to the unknown, Turn side
on, so that you can see the front at one side and the
area behind before you. Are you rising with the
escalator; you will become level with the floor
behind before you, giving you something to watch.
 Stairs: give way, standing, doors on way
 Doors: can’t see through them, an unknown reality.
 Streets lights: workmen, doorways, shops you are
working past

Threat Analysis and Reaction

54
1. Concentration do not get loss or be left behind, it
takes only a second or two to get killed;
2. Anticipation – anticipate your fellow officer/Escort’s
moves you can keep the protective formation together
nice and well coordinated. Because of obstacles,
obstruction, and areas of threats, the movement of Close
in security Escorts will be spasmodic and spontaneous.
3. Relaxation / Observation - Observation should be done in
relaxed manner. Be very attentive but looking relaxed.
One that is nervous, sweating; Fidgety with quick
spasmodic movements over his shoulder is very unnerving
for everybody, including the protectee/principal. You
will stand out for the entire public to see. This will
lessen with experience and time.
4. Common Sense – Most important part. Common sense comes
from using your brain, foresight, experience, and good
training.
5. Participation within the Team – The team must train
together and understand completely what their job is and
their responsibilities. There will be big gaps in the
defenses if we do not have participation within the
team.

Multi-Position/Formation
 Knowing your position
 Responsibility of that position
 Ability of that position
 Ability to respond to all positions

55
Important Features of R.A. 5487

R.A. 5487 – is the law that governs the organizations and


operation of private security agency throughout the
Philippines. It is otherwise known as the “Private Security
Agency Law of the Philippines”. This act was ammended by
P.D. No. 11 on October 3, 1972 and P.D. 1919 on April 28,
1984.

PNP-SAGSD – Philippine National Police Security Agency and


Guard Supervisory Division
- It is the unit under the organization of the
Philippine National Police charged with the
supervision, direction and control of all
security agencies in the Philippines.
- It shall further refer to the current PNP Civil
Security Group Security Agency and Guard
Supervision Division or any other PNP Office that
may be designated later as the primary office for
supervision of the implementation of the rules
and regulations of R.A. 5487 as amended.

PADPAO – Philippine Association of Detective and Protective


Agency Operations, Inc.
- It is the organization or association of all
licensed security agencies and companu security
forces authorized to issue the implementing rules
and regulations pertaining R.A. 5487.

DEFINITION OF TERMS
For purposes of and when used in these rules and regulations,
the following terms shall be construed in the sense indicated
herein unless the context of a particular section clearly
indicates that a different sense is intended:

a. Person – shall include not only natural but also juridical


persons such as single proprietorships, partnerships,
corporations, companies or associations, duly organized and
registered with the Securities and Exchange Commission and/or
the Department of Trade and Industry.

56
b. Private Security Services – shall include the act of
providing or rendering services to watch an establishment
whether public or private, building, compound/area or
property, to conduct access control/denial in any form
whether physically, manually or scientifically by electronic
monitoring systems, for the purpose of securing such
area/property and at the same time ensuring safety and
protection of persons within such areas, to maintain peace
and order within such areas, to conduct private security
training, and/or to conduct investigation. It shall also
include the act of contracting, recruiting, training,
furnishing or posting any security guard, to do its functions
or solicit individuals, businesses, firms, or private, public
or government-owned or controlled corporations to engage
his/its service or those of his/its security guards, for
hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation.

c. Private Detective Services – shall include among others


the act of providing personal security protection, inquiry
and information gathering, preemployment verification and
individual background profiling, providing assistance in
civil liability and personal injury cases, insurance claims
and fraud, child custody and protection cases, for the
purpose of assisting in gathering information leading to
determination and/or prevention of criminal acts and/or
resolution of legal, financial and personal problems.

d. Private Security Industry – shall cover those in the


legitimate business of providing private security and
detective services.

e. Private Security Guard (SG) – sometimes called private


security guard or watchman shall include any person who
offers or renders personal service to watch or secure either
a residence, business establishment, or buildings, compounds,
areas, or property, inspects/monitors bodily checks/searches
individuals and/or baggage and other forms of security
inspection, physically/ manually or scientifically
electronic, including but not limited to, logging concessions
and agricultural, mining or pasture lands, transportation,
for hire or compensation , or as an employee thereof,
including any employee of the national or local governments
or agencies or instrumentality’s thereof and or government
owned or controlled firm or corporations who is employed to
watch or secure government buildings, compounds, premises and
other properties, other than members of the Armed Forces of

57
the Philippines, guards of the Bureau of Jail management and
Penology, Municipal or City jail guards, and members of the
Philippine National Police or of any other law enforcement
agency of the Government.

f. Private Detective (PD) – shall mean any person who does


detective work for hire, reward or commission, other than
members of the Armed Forces of the Philippines, guards of the
Bureau of Jail Management and Penology, municipal or city
jail guards, and members of the Philippine National Police or
of any other law enforcement agency of the government.

g. Private Security Personnel – shall be natural persons


which include private security guards, private detectives,
security consultants, security officers and others that may
be classified later, rendering/performing security and/or
detective services as employed by private security agencies
and/or private firms.

h. Government Security Personnel – shall be natural persons


which include government security guards, detectives,
security consultants, security officers and others that may
be classified later, except those of the Armed Forces of the
Philippines, Philippine National Police, Bureau of Jail
Management and Penology, Municipal or City Jail guards
rendering/performing security and/or detective services as
employed by government entities.

i. Private Security Agency (PSA) – shall mean any person


association, partnership, firm or private corporation, who
contracts, recruits, trains, furnishes or posts any security
guard, to perform its functions or solicit individuals,
businesses, firms, or private, public or government-owned or
controlled corporations to engage his/its service or those of
his/its security guards, for hire, commission or compensation
thru subscription or as a consultant/trainer to any private
or public corporation whose business or transactions involve
national security or interest like the operation and/or
management of domestic or ocean vessels, airplanes,
helicopters, seaports, airports heliports, landing strips
etc., or as consultant on any security related matter, or to
provide highly specialized security, detective and
investigation services like gangway security, catering
security, passenger profiling, baggage examination, providing
security on board vessels or aircraft, or other security
needs that PNP SAGSD may approve.

58
j. Private Detective Agency (PDA) – shall mean any person
association, partnership, firm or private corporation, who
contracts, recruits, trains, furnishes or posts any private
detective, to perform its functions or solicit individuals,
businesses, firms, or private, public or government-owned or
controlled corporations to engage his/its service or those of
his/its detectives, for hire, commission or compensation thru
subscription or as a consultant/trainer to any private or
public corporation or as consultant on any detective related
matter, or to provide highly specialized detective and
investigation services, or other detective needs that SAGSD-
CSG may approve.

k. License to Exercise Profession – shall mean any document


issued by the Chief, Philippine National Police or his duly
authorized representative recognizing a person to be
qualified to perform his duties as private security or
training personnel.

l. License to Operate (LTO) – is a License Certificate


document, issued by the Chief, Philippine National Police or
his duly authorized representative, authorizing a person to
engage in employing security guard or detective, or a
juridical person to establish, engage, direct, manage or
operate an individual or a private detective agency or
private security agency/company security force after payment
of the prescribed dues or fees as provided in these Rules and
Regulations.

m. Company Guard Force (CGF) – a security force maintained


and operated by any private company/corporation utilizing any
of its employees to watch, secure or guard its business
establishment premises, compound or properties.

n. Government Guard Unit (GGU) – a security unit maintained


and operated by any government entity other than military or
police, which is established and maintained for the purpose
of securing the office or compound and/or extension of such
government entity.

o. PNP as used herein shall mean the Philippine National


Police, which was organized pursuant to the provision of RA
6975 otherwise known as the National Police Act of 1991.

p. SAGSD as used herein shall refer to the current PNP Civil


Security Group Security Agency and Guard Supervision Division
or any other PNP Office that may be designated later as the

59
primary office for supervision of the implementation of these
rules and regulations.

q. PADPAO refers to the Philippines Association of Detective


and Protective Agency Operators, Inc., which is an
association of all licensed security agencies and company
security forces.

r. Duty Detail Order is a written order/schedule issued by a


superior officer usually the private security agency/branch
manager or operations officer assigning the performance of
private security/detective services duties.

GUARD FORCE AND GUARD SYSTEM


The security guard force is the key element in the
overall security system of a plant or installation. Its basic
mission is to protect all the property within the limits of
the facility boundaries and protect employees and other
persons on the installation.
The security guard who will become a part of a guard
force must be required to meet minimum criteria to assure
that they will effectively perform their assigned security
related duties. It is the responsibility of the security
director of the installation to insure that is guard force is
of a high caliber to make a judgement that could save multi-
million pesos facility from total destruction.
The security guard force must be ready to meet the
new challenges with new concepts, bold innovation,
unrelenting insistence on high standards.

SECURITY GUARD – sometimes called watchman, and shall include


any person who offers or renders personal service to watch or
secure either residential or business premises, private or
government establishments, and the like, for hire or for
compensation, and with a license to practice security
profession.
Any Persons who offers of renders personal service
to watch or secure either residential or business
establishment, or both, or any building, compound, or area
including but not limited to logging concessions,
agricultural, mining or pasture lands for hire or
compensation. (P.D. 11)

WATCHMAN OR SECURITY GUARD AGENCY – any person, association,


partnership, or corporation, who recruits, trains, musters,
furnishes, solicits individuals or business firms, private or

60
government-owned or controlled corporations to engage his
service or those of its watchmen.

SECURITY GUARDS FORCE – is a group of force of selected men,


trained or grouped into functional unit for the purpose of
protecting operational processes from disruption which would
impede efficiency of operation at a particular plant,
facility, installation, or special activity.

Types of Security Guard Forces:


1. Private Security Agency – shall mean any person
association, partnership, firm or private corporation, who
contracts, recruits, trains, furnishes or posts any security
guard, to perform its functions or solicit individuals,
businesses, firms, or private, public or government-owned or
controlled corporations to engage his/its service or those of
his/its security guards, for hire, commission or compensation
thru subscription or as a consultant/trainer to any private
or public corporation whose business or transactions involve
national security or interest like the operation and/or
management of domestic or ocean vessels, airplanes,
helicopters, seaports, airports heliports, landing strips
etc., or as consultant on any security related matter, or to
provide highly specialized security, detective and
investigation services like gangway security, catering
security, passenger profiling, baggage examination, providing
security on board vessels or aircraft, or other security
needs that PNP SAGSD may approve.

2. Government Security Force/Unit – a security unit


maintained and operated by
any government entity other than military or police, which is
established and
maintained for the purpose of securing the office or compound
and/or extension of such government entity.

3. Company Security Force – a security force or unit


maintained operated by private company/corporation for its
own security requirement. In another definition, it means a
security force maintained and operated by any private
company/corporation utilizing any of its employees to
watch,secure or guard its business establishment premises,
compound or properties.

Advantages of PSA:
1. Economical

61
2. Security administrative problems are reduced.
3. Problems relating to recruiting, training and pre-
employment investigation are reduced if not eliminated.
4. Reduced problems on absenteeism and leaves.
5. Security personnel are separated from employees.
6. In case of accidents, deaths, agency takes care of the
cumbersome details.
7. In case of emergencies, extra guards are available.
8. In case of company strikes, agency guards will be on
duty to carry out their assigned duties.

Disadvantages of PSA:
1. Lack of training
2. SG carry low caliber of firearms.
3. No company loyalty
4. Higher turnovers
5. SG is not familiar with facilities they protect.

Advantages of CSA/GSA:
1. Loyalty to the organization is more intense.
2. Security of tenure of service.
3. Generally, high caliber of men is employed.
4. Highly classified works can be assigned.
5. Company guards are more familiar with facilities they
protect.

Disadvantages of CSA/GSA:
1. It costs more.
2. Problems of available back-up personnel.
3. SG maybe required joining union.

Private Detective – any person who does detective works for


hire, reward or commission, other than members of the PNP and
AFP or other Law Enforcement Agency of the government. Those
engaged in private services such as:
1. Inquiry and information gathering (pre-employment
verification & background profiling)
2. Character check of a person
3. Locating missing persons
4. Surveillance works
5. Other matters as embodied in the contract

License to Exercise Profession – shall mean any document


issued by the Chief, Philippine National Police or his duly
authorized representative recognizing a person to be
qualified to perform his duties as private security or
training personnel.

62
Categories of License:
1. Security Consultant
2. Security Officer
3. Private Detective
4. Security Guard

License to Operate –is a License Certificate document, issued


by the Chief, Philippine National Police or his duly
authorized representative, authorizing a person to engage in
employing security guard or detective, or a juridical person
to establish, engage, direct, manage or operate an individual
or a private detective agency or private security
agency/company security force after payment of the prescribed
dues or fees as provided in these Rules and Regulations.

Qualification of a PSA/PDA Organizer:


- a Filipino citizen or corporation, association,
partnership 100% owned by a Filipino citizen.

Basic Requirements of an Operator/Manager of an agency:

A. The operator or manager of an agency including, managers


of branch offices,
must be:
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the
inactive service or retired from the Armed Forces of the
Philippines or the Philippine National police;
4. Has taken a course/seminar on industrial Security
Management and/or must have adequate training or experience
in security business; and,
5. Good moral character

B. New applicants for license to operate shall be required to


obtain a minimum
capitalization of one million pesos (P1, 000,000.00) with a
minimum bank deposit of five hundred thousand (P500, 000.00)
pesos in order to start its business operation.

Basic Qualifications of a Security Consultant:


No person shall be licensed as a Security Consultant
unless he possesses the following qualifications:

63
a. Filipino citizen;
b. Physically and mentally fit;
c. Holder of a Masters degree in either Criminology,
Public Administration, MNSA, Industrial Security
Administration, or Law;
d. Must have at least ten (10) years experience in the
operation and management of security business.

Basic Qualification of a Security Officer:


No person shall be licensed as Security Officer unless
he has the following qualifications:
a. Filipino citizen;
b. Holder of a Baccalaureate Degree;
c. Physically and mentally fit; and
d. Has graduated from a Security Officer Training Course
or its equivalent.

Basic Qualification of a Private Detective:


Qualifications of a private detective.- No person shall
be licensed as a private detective unless possesses the
following qualifications:
a. Filipino citizen;
b. Physical and mentally fit;
c. Holder of a baccalaureate degree preferably Bachelor
of laws or Bachelor of Science in Criminology;
d. Graduate of a Criminal Investigation Course offered
by the Philippine
National Police or the National Bureau of Investigation
or any police training
school, or a detective training in any
authorized/recognized training center;
e. Advance ROTC/CMT graduate or its equivalent.

Basic Qualification of a Security Guard:


No person shall be licensed as security guard unless he
possesses the following qualifications:
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. Not less than eighteen (18) years of age nor more
than fifty (50) years of age (for new applicants and SGs
in non-supervisory position); and
e. Has undergone a pre-licensing training course or its
equivalent.

64
*The pre-licensing training course is an
orientation of incoming security personnel as security guards
regarding the nature of the security profession and the law
that governs its operation. It is designed to educate new
applicants/new security guards on the national and community
security needs, and to upgrade discipline, competence and
efficiency of security guards or private detectives.

As a matter of licensing prerequisite, Pre- Licensing


Training Programs include all training and/or academic
programs and courses whose objective is to indoctrinate the
individual with the basic skills and educational backgrounds
necessary in the effective exercise and performance of
his/her elected/would-be security/detective profession. It
includes but is not limited to the Basic Security Guard
Course, the Security Officers Training Course, Private
Security Agency Operators Training/Seminar, Private Security
Training Trainors’ Course.

Categories of Private Security Training Institutions.


a) Private Security Training Systems. Government or duly
registered private training establishments, associations,
firms, partnerships, corporations and the like, which provide
the physical facilities and installations, and the
appropriate management, administrative, and
instruction/training staff necessary and for the purpose of
conducting Private Security Training:

1) Private Security Training Centers – Private Security


Training Systems
whose primary purpose is to provide private security training
and training services, may be qualified to offer and conduct
Private Security Training Programs in all categories provided
that, it has secured Regular Accreditation from the SAGSD
upon compliance and conformity with the latter’s application
and approval requirements, and prior TESDA
registration/accreditation.

2) Other Juridical Entities - Private Security Training


Systems whose primary purpose is not to provide private
security training and training services, may be qualified, on
interim basis, to offer and conduct Private Security Training
for a specific course/class and duration under Refresher and
Specialized programs only, provided that, it has secured
prior Interim Accreditation from the SAGSD upon compliance
and conformity the latter’s application and approval
requirements. Such Interim Accreditation is also issued to

65
those with Regular Accreditation but which cannot comply with
the renewal requirements.

3) Watchman/Security and/or Detective Agencies defined under


RA 5487 as amended, which shall not be required prior
accreditation to operate, by virtue of their License to
Operate as Private Security Agency, Company Security Force or
Government Security Force, may be authorized to conduct only
in-house refresher or specialized training for its own
security personnel, upon compliance and conformity with
application and approval requirements of SAGSD.
4) Police Offices/Units assigned/designated to conduct
Private Security Training, which shall not be required TESDA
registration but shall require prior official authority of
SAGSD, may conduct training in all categories but subject to
requirements of Rule XI of these rules and regulations or as
may be prescribed by SAGSD.

5) Police Supervisory Office (presently the SAGSD) as having


the primary responsibility of the conduct, supervision, and
control of all private security training and training
services.

Required Characteristics of a Security Guard:


1. Alertness – being watchful, keen observer
2. Judgment – wise good discretion on timely decisions
3. Confidence – faith in himself and abilities
4. Physical Fitness – always in good condition to render
service
5. Tactfulness and Self-Control – ability to deal with
others successfully and to take hold of himself
regardless of a provoking situation.

ORGANIZATIONAL STRUCTURE
1. PSA – organized to operate with an initial requirement
of at least 100 SG during the first year of operations,
and 200 SG, the minimum number of SG required by Regular
License to Operate, during the succeeding years.
2. CSA – shall be organized to conform substantially to the
organizational structure prescribed for security agencies.
3. GSA – shall be organized and conform with the
organizational structure of the said government firm but
not contrary to the organizational structure as prescribed
for government security units.

66
*PSA shall maintain a branch or office in their registered
address. To maintain only one main branch with in the
registered address, and may maintain other sub-branches or
offices outside the province or city where they have at least
an initial employment of 10 guards during the first year
until the 30 minimum guard requirement shall have been
complied in the third year of operation.

*PSA shall execute service contract between the agency and


its client, and shall stipulate therein the following:
1. Money/Commission for guards
2. Number of hours of security service per guard per day

*Tenure of service of security personnel shall be co-terminus


with the service contract between PSA and client. However, a
security guard must be terminated on the following:

Grounds of Termination of Security Personnel:

1. Expiration of contract
2. Revocation of license to exercise profession
3. Conviction of a crime
4. Loss of trust and confidence by PSA
5. Violation of pertinent rules and regulations or policies

LICENSES AND FEES


 PSA license or License to Operate (LTO) – its issuance
requires that applicant should obtain a minimum
capitalization of one (1) million pesos and a minimum bank
deposit of 500,000 pesos.
 Filing of application of LTO shall be directed at the
PNPSOSIA
 Endorsement of application shall be made by the CSFDO

 Graduate Scale for License for PSA:


1. PSA-temporary LTO having 200 SG but not exceeding 1000
SG shall ______________ LTO good for 2 yrs.
2. New PSA shall be issued temporary LTO good for one year.
3. PSA with temporary LTO posted 100 SG but less than 200
shall, upon expiration of LTO be issued an extension
period of six months. However, upon expiration of 6
mos. extension periods, no additional extension of
license shall be granted unless PSA concerned submit a
certification for posting an additional of 50 SG thereby
making a total of 150 SG.

67
4. PSA with extended temporary LTO shall be given another 6
mos. of operation to comply with the 200 SG minimum
requirements for regular LTO otherwise non-compliance
shall mean cease operation.
5. License of PSA with less than 100 SG shall not be
renewed after one year of operation.
Renewal of License to Operate.
a. Filing of Applications for Renewal and Late Filing. All
applications for renewal of License to Operate shall be filed
at least sixty (60) days before expiry date of LTO subject of
the renewal application. Applications filed/accepted
thereafter shall be penalized for late filing.

b. Failure to Conform to the Standards for Renewal. Renewal


applicants/holders of regular license not able to maintain
the 200 minimum number of security personnel under its employ
or license renewal requirements at the time of filing of
application, shall be reverted to temporary status and issued
temporary LTO. Within its duration the agency-applicant may
comply with the required minimum number of employed security
personnel or license renewal requirements prior to
reissuance/renewal of its regular LTO.

c. Failure to file for renewal. The Licenses to Operate of


applications for renewal of regular Licenses to Operate who
fail to file applications sixty (60) days after the expiry
date of LTO subject of the renewal application, SHALL
AUTOMATICALLY BE
CANCELLED.

d. In addition to other renewal requirements under provisions


of these rules and regulations, no application shall be
approved unless a certification is issued by FEDCSG to the
effect that all licenses of firearms of the agency concerned
are updated/renewed for at least one (1) year forthcoming
during the validity of the renewed LTO.

USE OF FIREARMS AND EQUIPMENT:

Possession of FA by PSA
 Upon complying with the requirements prescribed by the
C/PNP pertinent to possession of FA, the PSA shall be
entitled to possess the following:
a. Shotguns (not higher than 12 gauge)
b. Caliber 22
c. Caliber .38 (pistol/revolver)
d. Other low powered rifles

68
 The number of FA items are the following:
a. PSA w/ 100 SG – initial procurement of 30 pcs.
licensed FA. However, after 6 mos. of operation,
PSA may procure licensed FA in proportion to the
number of guards posted to clients.
b. PSA w/ regular LTO may possess at least 70 licensed
FAs.
c. Use of FA by PDA shall be optional.

C. Restriction to possess certain caliber of FA

 As a general rule, PSA/PDA/CSA/GSA is not allowed to


possess high caliber guns such as carbines, M16, cal. .45,
magnum cal. .44 and .41 and other military FA.

 Exception to the above rule:


1. Security Agency is operating in areas where there is
upsurge of criminality and lawlessness as determined by
the C/PNP or RD within the region.
2. When the nature of the function of guards requires the
use of high powered FA such as when escorting big
amounts of money or valuable from one place to another.

D. Limitations in the carrying of FA:


 The FA issued to a security personnel of the agency shall
be carried by the security guard only during his tour of
duty while in proper uniform and within the compound of
the establishment where he is assigned to guard except
when he is escorting big amounts of cash or valuables, and
upon proper coordination with the nearest PNP unit.

E. Duty Detail Order:


- Is a written instruction issued by the agency to
its guard to perform lawful activity at a
specific time, place and date. It includes the
description, the make, model and serial number of
FA and the name of the operation officer or
manager of the agency.

- is a written order/schedule issued by a superior


officer usually the private security
agency/branch manager or operations officer
assigning the performance of private
security/detective services duties.

69
 DDO is issued while escorting big amount of cash outside
the jurisdiction or area of operation

F. Justification in the confiscation of issued FA:

 General Rule: No FA issued to any SG/PD while in the


performance of his duties shall be confiscated by any
member of the law enforcement agencies except by uniformed
members of the PNP under any of the following
circumstances:
1. When the FA is about to be used in the commission of a
crime.
2. When the FA is actually being used in the commission of
a crime.
3. When the FA has just been used in the commission of the
crime.
4. When the FA being carried by SG is unlicensed or
unauthorized by law.
5. When the FA being carried by the SG is used or carried
outside the compound or establishment serviced by the SG
without proper authority.
6. When the confiscation of the FA is directed by order of
the court.
7. When the SG does not possess any license to exercise his
profession.

G. Disposition of Confiscated FA’s:

 Confiscated FA shall be turned over to the nearest PNP


unit and confiscating officer shall inform the C/PNP
through the CSFDO within 24 hrs. After such confiscation.

 When FA confiscation is directed by order of the court, in


which case shall be turned over to the court concerned.

H. Filing of Application of FA license:

 Application of licensing of FA by security agency shall be


filed with the FEO through the SOSIA and CSFDO.

 Requirements:

1. LTO
2. Certification of safety vault
3. Surety bond of 40 pesos/FA
4. Sworn Statement of Operator/Manager:

70
a. To report to the C/PNP or to the nearest PNP unit
when there is an impending strike.
b. To exercise diligence in the collection of FA for
safekeeping in the furtherance of the strike.
c. To insure that all FA be collected and secured in
the safety vault under control of the agency.
d. To assume responsibility in the proper handling
of FA, to prevent misuse of FA.

I. Revocation of License

 License to possess FA maybe revoked under any of the


following instances:
1. Failure to submit issued FA for verification
2. Carrying of FA without appropriate DDO.
3. When FA serial number has been duplicated or using
another FA other than those stipulated in the license.
4. Carrying of FA outside the place of work
5. Conviction of mngr./optr. of the agency of any crime
involving moral turpitude.
6. When FA was reported lost.

J. Illegal Possession of FA:

 No person employed as security guard or PD shall not use


unlicensed FA, nor be allowed to use FA with duplicated
serial numbers. Only FAs licensed in the name of the
agency shall be used.

K. Stocking of Ammunition:

 Security Agency shall be authorized on a limited and


reasonable quantity of ammunitions that will suit the
requirements and need of the agency.
- 50 rounds of ammo/unit of FA
- 25 rounds of ammo issued to SG

L. Use of Hand held Radio:

- The use of VHF and UHF on the part of the agency


shall be optional.

71
UNIFORMS, EQUIPMENTS AND PARAPHERNALIA

A. Set of Uniforms for Security personnel:

1. Headgear – perching cap for men


- 2 ply cap for women
2. Service bush jacket – intended for directorial and staff
officers
3. Service shirt
4. Service trouser
5. Service belt
6. Footwear
B. Color of Uniforms:

1. PSA – navy blue-upper and lower


2. CSA – light blue/light gray upper – navy blue lower
3. GSA – white upper – navy blue lower

C. Ornaments and Patches:

1. National badge
2. Cap device
3. Regulation Buckle
4. Collar device
5. Name cloth
6. Agency/unit name cloth

D. Equipments and Paraphernalia:

1. Leather pistol belt with regulation buckle


2. Holster, black leather for pistol
3. Night stick (baton) with horizontal handle
4. Whistle with lanyard
5. Hand held radio
6. Pocket notebook and ball pen

E. Provision on Special Set of Uniform:

 Operators/managers of security agency forces shall provide


at least one (1) set of the prescribed uniform free for
charge to their respective security guards for every year
of service with them. Likewise, licensed security guards
shall provide themselves with one set of the prescribed
uniform once a year unless their employees provide it for
free.

72
B. RANKS, POSITIONS, STAFFING PATTERN AND JOB
DESCRIPTION

A. Ranks and Positions

1. Security Management Staff


 Security Director (SD) – Agency Manager/Chief Security
Officer
 Security Executive (SED) – Asst. Agency Manager/Asst. CSO
 Security Staff Director (SSD) – Staff Director for
Operations and Staff Dir. for Admin.

2. Line Leadership Staff


 Security Supervisor 3 – Detachment Commander
 Security Supervisor 2 – Chief Security Inspector
 Security Supervisor 1 – Inspector

3. Security Guards
 Security Guard 3 – Post in-Charge
 Security Guard 2 – Shift in-Charge
 Security Guard 1 – Watchman/guard

4. Security Consultant – optional

B. Staffing Pattern and Job Description:

1. Security Manager – is automatically the CSO who shall be


responsible for the entire operation and administration
of the agency.
2. Assistant Security Manager – is automatically the
security executive director who will assist in the
operation and the administrative management of the
agency.
3. Staff Director for Operation – take responsibility to
canvass clientele and the implementation of contract and
agreement, conduct of investigation and training.
4. Staff Director for Administration – responsible for the
professionalization of personnel,
procurement/recruitment, confirming of awards, mobility
and issuance of FAs.
5. Detachment Commander – is the field or area commander of
the agency. A detachment shall consist of several
posts.
6. Chief Security Inspector – responsible in inspecting an
entire detachment.

73
7. Security Inspector – responsible for the area assigned
to him by the Chief Security Officer.
8. Post in-Charge – responsible for the entire detailed
security office within a certain establishment.
9. Shift in-Charge – responsible for the security officers
who are scheduled in a certain shift for a particular
period.
10. Security Guard – is the one actually posted as
watchman and or guard.

PROFESSIONAL CONDUCT AND ETHICS

A. SECURITY GUARD CREED:

As a security guard my fundamental duty is to protect


lives and property and maintain order within the vicinity or
my place of duty; protect the interest of my employer and our
clients, and the security and the stability of our government
and country without compromise and prejudice; honest in my
action, words and thought and do my best to uphold the
principles: Makadiyos, Makabayan at Makatao.

B. THE 11 GENERAL ORDERS:


All security guards shall memorize and strictly keep by heart
the following general orders:
1. To take charge of the post and all company properties in
view and protect/ preserve the same with utmost diligence;
2. To walk in an alert manner during my tour of duty and
observing everything that takes place within sight or
hearing;
3. To report all violations of regulations and orders I am
instructed to enforce;
4. To relay all calls from posts more distant from the
security house where I am stationed;
5. To quit my post only when properly relieved;
6. To receive, obey and pass on to the relieving guard all
orders from company officers or officials, supervisors, post
in charge or shift leaders;
7. To talk to no one except in line of duty;
8. To sound or call the alarm in case of fire or disorder;
9. To call the superior officer in any case not covered by
instructions;
10. To salute all company officials, superiors in the agency,
ranking public officials and officers of Philippine National
Police; and

74
11. To be especially watchful at night and during the time of
challenging, to challenge all persons on or near my post and
to allow no one to pass or loiter without proper authority.

C. CODE OF CONDUCT:

1. He shall carry with himself at all times during his tour


of duty his license, identification card and duty detail
order with an authority to carry firearm.
2. He shall not use his license and other privileges if
any, to the prejudice of the public, the client or
customer and his agency.
3. He shall not engage in any unnecessary conversation with
anybody except in the discharge of his duties or sit
down unless required by the nature of his work and shall
at all times keep himself alert during his term of duty.
4. He shall refrain from reading newspaper, magazines,
books, etc., while actually performing his duties.
5. He shall not drink any intoxicating liquor immediately
before and during his tour of duty.
6. He shall know the location of the alarm box near his
post and sound the alarm in case of fire or disorder.
7. He shall know how to operate fire extinguisher at his
post.
8. He shall know the location of the telephone and or
telephone number of the police precincts as well as the
telephone number of the fire stations in the locality.
9. He shall immediately notify the police in case of any
sign of disorder, strike, riot or any serious violation
of the law.
10. He or his group of guards shall not participate or
integrate any disorder, strike, riot or any serious
violations of the law.
11. He shall assist the police in the preservation and
maintenance of peace and order and in the protection of
lives and properties having in mind that the nature of
his responsibilities is similar to that of the latter.
12. He shall familiarize himself with the Private
Security Agency Law and its implementing rules and
regulations.
13. When issued firearm, he should not lend his firearm
to anybody.
14. He shall be always in proper uniform and shall
always carry with him his basic requirements and
equipments such as writing notebook, ball pen,
nightstick and or radio.

75
15. He shall endeavor at all times, to merit and be
worthy of the trust and confidence of the agency he
represents and the client he serves.

D. ETHICAL STANDARDS

1. As a security guard or a detective his fundamental duty


is to serve the interest or mission of his agency in
compliance with the contract entered into with clients
or customers of the agency he is supposed to serve.
2. He shall be honest in thoughts and deeds both in his
personal and official actuations, obeying the laws of
the land and the regulations prescribed by his agency
and those established by the company he is supposed to
protect.
3. He shall not reveal any confidential information
confided to him as a security guard and such other
matters imposed upon him by law.
4. He shall act at all times with decorum and shall not
permit personal feelings, prejudices and undue
friendship to influence his actuation while in the
performance of his official function.
5. He shall not compromise with other lawless elements to
the prejudice of the customers and clients and shall
assist the government in its relentless drive against
lawlessness and other forms of criminality.
6. He shall carry out his assigned duties as required by
law to the best of his ability and shall safeguard life
and property of the establishment he is assigned to.
7. He shall wear his uniform, badge, patches and insignia
property as a symbol of public trust and confidence, as
an honest and trustworthy security guard and private
detective.
8. He shall keep his allegiance first to the government, to
the agency where he is employed and to the establishment
he is assigned to serve you with loyalty and utmost
dedication.
9. He shall diligently and progressively familiarize
himself with rules and regulations laid down by his
agency and those of the customers and clients.
10. He shall at all times be courteous, respectful and
salute his superior officers, government officials of
the establishment where he is assigned or the company he
is supposed to serve.
11. He shall report for duty always in proper uniform
and neat in his appearance.

76
12. He shall learn at heart and strictly observe the
laws and regulations governing the use of the firearms.

POWERS AND DUTIES

A. Territorial Power:
- SG shall watch, secure the property of the
person, firm or establishment with whom he or his
agency has a contract for security services. Such
service shall not, however, extend beyond the
property or compound of said person, firm or
establishment except when required by the latter in
accordance with the terms of their contract to escort
big amounts of valuable or in some cases, in hot
pursuit of criminal offenders.

B. Method of Arrest:
- When making an arrest, the SG shall inform the
person to be arrested of the intention to arrest him
and the cause of arrest, unless the person to be
arrested forcibly resist arrest and there is no
opportunity to inform him, and when giving such
information will imperil the arrest.
C. Duty of SG in Making Arrest:
- To turn over the arrested person to the nearest
police officer, unit or station without necessary
delay and with the time prescribed in article 125 of
the RPC.

- A security guard may search a person without


warrant incidental to lawful arrest in the presence
of at least 2 witnesses. He may also search persons
when such search is required by the nature of his
search.

TRAINING SYSTEM

A. Objective of Security Training:

1. To upgrade discipline, competence and efficiency of


security guards/PD.
2. To educate them on the importance of national and
community needs and prevention of losses.
3. To enhance a highly professionalized security industry
in the country.

77
B. Classification of Training:

1. Basic Security Training Course (Pre-licensing Training)


2. In-Service Training Course:
a. Re-Training Course – requirement for the renewal of
license
b. Security Officers Training Course – for supervisors
and officers
c. Basic Security Supervisory Training Course –
required for supervisory positions
d. Security Supervisor Development Course – for
security supervisors only

3. Other Specialized Courses such as seminars and


leadership training.

C. Authorized Training Unit:

1. Security Agencies authorized by the government to


conduct in-service training at least every two years.
2. Security Agencies authorized by the government to
conduct Basic Supervisory Courses and other specialized
training.
3. Civil Security Force Districts in the regions.
4. PNP Regional Training Centers.

D. Duration of Courses:

1. Pre-licensing Training Courses – 150 hours


2. Re-training Course - 48 hrs.
3. Supervisory Courses - 48 hrs.
4. Security Officer Training Course – 300 hrs.

E. Qualification of Training Officer:

1. Commissioned Officer of the PNP/AFP (Ret.)


2. Non-PNP/AFP officer with 3 yrs. continuous service.
3. Non-PNP/AFP officer with an actual experience in
security management for one year.
4. With teaching experience with enforcement, security
administration, etc.
5. Must pass an Instructor’s Job Training Course at the PNP
training center for those with non-teaching experience.

UTILIZATION OF AGENCIES DURING EMERGENCIES

78
A. Powers of Mayors over the agencies in case of emergency:

- In time of disaster, disorder or calamity when


security services are required, the city or municipal
mayor may utilize security agencies to help in the
maintenance of peace and order, prevention of crime,
or apprehension of criminal offenders and the
protection of lives and properties within the area of
such calamity.

B. Emergency Deputation:

- In times of emergency, disorder and calamity, the


C/PNP may deputize security guard to assist the PNP
members in the performance of their duties for the
duration of the calamity.

PROHIBITION AND LIMITATIONS

A. On membership:
- PSA shall not deploy/post more than 1000 SG
include its branches.

B. On Orientation:
- No person shall organize or operate or have
interest in more than one security agency in one city
or municipality.

C. On Service:
- No agency shall offer, render or accept services
on illegal business such as gambling dens, etc.
- The extent of security services shall not go
beyond the establishment of area of duty. No
watchman or detective shall serve as bodyguards of
any person.

D. Prohibition on “Kabit System”


- No security agency shall operate, promote and
enter into an agreement of merger or “kabit
system” with any person or group of persons for
purposes of _______________.

Prima-facie Evidence of the existence of “Kabit System”

1. Maintaining a separate branch, unit or subsidiary office


of the agency situated within the same locality.

79
2. Receiving direct payments from the agencies clientele
and issuing official receipt of their own distinct from
that issued by the agency concerned.
3. Remitting direct SSS premiums and other policy insurance
benefits by the branch or subsidiary office.
4. Existence of an agreement of the license and the branch
manager, whereby the latter obligates himself to pay a
certain percentage of his income to the former on the
condition that the control and the supervision of the
guards shall be under the course of the branch manager.
5. Maintaining separate payrolls for the branch employees
signed and approved by branch manager only.
6. Absence of records of monthly income remittances from
the main office from branches.
7. All other similar acts tending to show separate
ownership/relationship/management.

DISPLAY OF LICENSE, REPORTS AND RECORDS

A. Display of License to Operate – at all times in


conspicuous and suitable place in the main office likewise
to sub-branches.

B. Reports: a. guard/firearm strength reports


b. Other reports as may be required by SO,
circulars or memoranda

C. Records and Files of Agencies:


a. Prescribed monthly reports
b. Current Service Contracts
c. Guards File – alphabetically arranged in
individual folders
d. Individual records of offenses
e. Property lists
f. Payrolls/vouchers of payments
g. Performance reports/Records of conduct
h. Other records pertinent to their opts to the
agency

COMPENSATION

A. General Rule: No security guard or private


detective shall be paid a salary or compensation
lower than the minimum wage or salary prescribed by
existing laws, rules and regulations including
those that may be promulgated relative there to.

80
INSPECTION

A. Pre-licensing Inspection – inspection conducted


prior to the release of regular license, conducted
on the applicant agency.
B. Post-licensing Inspection – inspection conducted
after the issuance of LTO to determine or ascertain
that the provisions of RA 5487 and its implemented
rules and regulations are complied with by the
agency.
C. Authority to conduct inspection – PNPSAGSD/CSFDO
or, authorized representatives

ADMINISTRATIVE SANCTIONS

A. Classification of Offenses:
a. Light offenses
b. Less grave offenses
c. Grave offenses

B. Penalties:
1. Light offenses – 1 to 30 days suspension or a fine
ranging P100.00 minimum – P500.00 maximum or both.

2. Less Grave Offenses – 1 month and 1 day to 6 months


suspension or a fine ranging from P500.00 maximum or
both.

3. Grave Offenses – 6 months and 1 day to 1 year suspension


or a fine ranging from P10,000 minimum to P50,000
maximum or both and / or cancellation of license/permit.

C. Status During Suspension:


- SG who is under suspension shall not receive his
salary corresponding to the period of suspension.
Security agency shall provide a substitute to man
the post of the suspended guard in order not to
prejudice the interest of clients. Substitutes
shall be good only during the period of such
suspension.

E. Investigating Officers: C/SOSIA or representative, all


CSFDO or representative

C. RENEWAL OF LICENSE TO OPERATE

81
a. Requirements:
1. Seminar workshop attendance
2. NP clearance
3. 60 days preparation of renewal of LTO prior to expiry
date
4. Records of individual SG
5. 200 minimum no. of SG
6. Settlement of accounts at the SAGSD
7. PADPAO registration
8. Renewed FA licenses

D. DUTIES DURING STRIKES AND LOOKOUTS

A. Policies:
1. Personnel in direct confrontations with strikers
shall not carry FAs.
2. Security personnel shall refrain from abetting or
assisting acts of management leading to physical
clash between labor and management.
3. SG at all times in complete uniforms.

B. Duties:
1. CSO collection of FAs.
2. CSO records the whereabouts of FAs.
3. CSO assessment of the situation.
4. CSO to maintain constant contact with the
management.
5. CSO to initiate peaceful talk with the leader of
strikers.
6. If the situation becomes worsen, CSO to request PNP
security assistance.
7. CSO to publish telephone number at all guard posts.

C. Inter-relationship between PNP and Security Personnel:


- Security personnel are always subordinate to
members of the PNP on matters pertaining to law
enforcement and crime prevention. They cannot
impose any provisions of law except in executing
citizen’s arrest.
- Criminal Investigation is the responsibility of
the PNP. Any CI conducted by security personnel:
shall turn over to the PNP as a matter of course
with out delay.

D. Responsibilities of Security Personnel:

82
- Responsible purely for enforcing company
policies, rules and regulations of management and
client.

AWARDS AND DECORATIONS OF SECURITY PERSON

A. Types of Awards: Authority


to grant Reward
1. Medalya ng Kagitingan DILG Secretary
2. Medalya ng Katapatan sa Paglilingkod C/PNP
3. Medalya ng Katapangan C/PNP
4. Medalya ng Pambihirang Paglilingkod Regional
Dir./PNP
5. Medalya ng Kadakilaan RD PNP/CSFDO
6. Medalya ng Katangiang Asal RD PNP/CSFDO
7. Medalya ng Kasanayan RD PNP/CSFDO
8. Medalya ng Papuri PD, C/SOSIA, DD,
RCSFDO
9. Medalya ng Sugatang Magiting PD,
C/SOSIA, DD, RCSFDO
10. Medalya sa Pagtulong sa Nasalanta PD,
C/SOSIA, DD, RCSFDO
11. Letter of Commendation PSA
operator/manager

B. Categories of Recognition:
1. Male Blue Guard of the Year
2. Female Blue Guard of the Year
3. Private Security Agency of the Year
4. Company Guard Force of the Year

C. Categories of Recognition of the Most Outstanding Blue


Guards Training Schools:
1. Pre-licensing Trainee Graduates
2. Blue Guards in Service Training Graduates
3. Outstanding Blue Guards Training School

PRIVILEGES

1. Priority in Enlistment with the PNP


2. Scholarship and Monetary Benefits
3. Benefits granted to Security Personnel Medal of
Bravery Awardees
4. Housing Benefits

OFFENSES, VIOLATIONS AND FINES

83
A. Authority to Cancel – C/PNP to impose
administrative penalties or cancel or not to renew the
license of PSAs with the following offenses:

1. Falsification of License or Contact


2. Falsification of other documents/reports issued by
the PNP for renewal of LTO
3. Violation of minimum wage rates fixed by law.
4. PSA engaged in activities dangerous to public safety.
5. Non-compliance of orders from SOSIA.
6. PSA engage in Kabit System.
7. Failure to maintain the 200 minimum number of SG.
8. PSA employing unlicensed SG.
9. PSA posting SG without prescribed uniforms.
10. PSA failed to submit periodic reports as prescribed
by CSFDO/SOSIA.

REFERENCES

The Revised Rules and Regulations Implementing the Private


Security Agency Law or Republic Act 5487. Manila Philippines, 1994

Corpuz, W. (2011) Industrial Security Management Manual .


Wiseman’s Books Trading, Quezon City, Philippines.

Dulipas & Peckley (2008) Industrial Security Management: A Review


Handbook for Criminology. Wiseman’s Books Trading, Quezon City,
Philippines.

84
De Leon,S. O. (1979) Security Guards Manual, Publishers
Association of the Philippines, Manila, Philippines.

Peckley, M.F. (2012) Security Officers and Guards Manual.


Wiseman’s Books Trading, Quezon City, Philippines.

Payba, N. (______). Primer on Industrial Security. Manila,


Philippines

Others

Corpuz, Warren (2001) Notes on Industrial Security Management,


Baguio Colleges Foundation, Baguio City.

Compilations of Criminology Review Materials and Handouts


issued at University of Baguio and University of Cordilleras

Unpublished Manuals and Collections

http://en.wikipedia.org/wiki/Lock_%28device%29

http://en.wikipedia.org/wiki/Alarms

http://en.wikipedia.org/wiki/Passive_infrared_sensor

http://www.biblegateway.com/passage/?search=Exodus
%2020%20&version=NIV

http://psm.du.edu/media/documents/national_regulations/countries/
asia_pacific/philippines/
philippines_rules_and_regulations_on_the_implementation_of_the_196
9_act_2005-english.pdf

http://en.wikipedia.org/wiki/Lock_picking

Microsoft ® Encarta ® 2009. © 1993-2008 Microsoft Corporation. All


rights reserved.

________. (2011). Encyclopædia Britannica. Encyclopædia Britannica


Student and Home Edition. Chicago: Encyclopædia Britannica.

85

You might also like