🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Summary

This document provides an overview of physical security, discussing its concepts, principles, and different types of barriers. It also explores various security levels and the use of alarm systems. The document is geared towards a professional audience.

Full Transcript

PHYSICAL SECURITY Concepts of Physical Security The broadest branch of security which is actually a system of barriers placed between potential intruders and the matters to be protected. It is concerned with the physical measures adopted to prevent unauthorized access to equipment, facilities,...

PHYSICAL SECURITY Concepts of Physical Security The broadest branch of security which is actually a system of barriers placed between potential intruders and the matters to be protected. It is concerned with the physical measures adopted to prevent unauthorized access to equipment, facilities, materials, and documents, and to safeguard them against espionage, sabotage damage and theft. Physical security covers other types of security to protect equipment, documents, facilities and materials against theft, damage, sabotage or espionage. It also encompasses protection of personnel from any criminal act. Principles of Physical Security In every establishment, physical measures are needed to deny unauthorized access or intrusion because of the following: 1. Enemy Agents Must not Access - Acquisition of information is the ultimate result, and the means and form in which the information is obtained. 2. There is No Impenetrable Barrier - For the unfriendly government or organization, they are willing to devote enough time, money, personnel, material, and imagination in passing barriers. So physical security attempts to build defense by using a certain barrier. 3. Defense in depth means barrier after barrier - In order that barrier could prevent unauthorized access and serve its purpose very well, there should be an integration of all barriers adopted in the installation. 4. Surreptitious versus Non-Surreptitious Entry - The possibility of surreptitious entry is the greatest hazard from the standpoint of counter intelligence security because it is usually difficult to determine that the information has been compromised. No action is taken to neutralize the act of espionage because surreptitious entry is not usually detected. Surreptitious entry means not observable while non- surreptitious entry is observable. Observable or not, intruders usually find the right place and right opportunity to gain access. Physical security then needed to detect or deny unauthorized entries. 5. Each Installation is Different - Since each installation is different, each will have different problems to overcome. The security procedures will be adequate for all installations. Barriers Defined Barriers refer to any physical structure whether natural man-made capable of restricting, deterring, delaying preventing illegal unauthorized access to an installation. TWO GENERAL TYPES OF PHYSICAL SECURITY BARRIERS 1. Natural Barriers - These are offered by nature which obstruct or delay the passageway of potential intruders. These also refer to natural structures that serve as deterrents or obstructions to intruders such as high canyon, desert, or bodies of water. 2. Man-made Barriers - These are structural construction like fences, walls, floors, roofs, grills, bars, roadblock other physical means to deter or impede pertetration. SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS 1. Natural Barriers - include mountains, cliffs, canyons, ravens, seas, marshes, deserts, or terrain difficult to traverse. 2. Structural Barriers - are those features constructed regardless of their original intent that tend to delay intruders. Examples of these are: walls; ceilings; doors; fences. 3. Human Barriers - include guards, charges of quarters office and shop workers, who stand between the intra and the matter to be protected. 4. Animal Barriers - are usually shepherd dogs trained for and used as guards. 5. Energy Barriers - are usually electrical and electronic devices that could assist security personnel in deter intrusions. Examples are: protected lighting, and intrusion devices. LEVELS OF PHYSICAL SECURITY Also varies depending on the type and location of the facility,and other facto needing security. The levels of physical security could be any of the following: 1. Minimum Security - is a system designed to impede unauthorized external activity such as simple intrusion to armed attack. 2. Low Level Security - is a system designed to impede and detect some unauthorized external activity such as on small retail store, storage warehouses. 3. Medium Security - is designed to impede, detect and assess most external activity and some unauthorized internal activity that range from simple shoplifting to conspiracy to commit sabotage. This includes the: a. Use of advance intrusion alarm system; b. Establishment of perimeter and perimeter barriers: and c. Use of an unarmed guard 4. High Level Security - is designed to impede, detect and assess most unauthorized external and internal activities of certain prisons, defense contractors, pharmaceutical companies and sophisticated electronic manufacturers. This includes the utilization of the following A. Close Circuit Television (CCTV); B. Perimeter alarm system; C. High security lighting: D. Highly trained armed guards; E. Control designs; and F. Coordination with local law enforcement agencies 5. Maximum Security - includes the application of the following: A. Sophisticated alarm system; and B. On-site response force. PERIMETER BARRIERS A. Concept of Perimeter Barriers - is a medium of structure which defines the physical limit of an installation or area to restrict. It is any physical barrier used to supplement the protection of an inside or outside perimeter. B. Line of Physical Defense - Security managers and security personnel also consider the various lines of defense that could help delay or stop intruders. 1. First Line - includes all perimeter barriers; 2. Second Line - includes the building exterior; and 3. Third Line - includes those internal control measures C. Perimeter Barriers Openings - In determining the appropriate perimeter barriers, security manager should not overlook the necessity of monitoring perimeter openings that could be used by intruders. D. Types of Perimeter Barriers 1. Fences - are independent structures designed to control physical and visual access between outside areas. a. Solid Fences - is made of opaque material in such a way that visual access through the fence structure is denied. Solid fences are constructed with heavy materials such as bricks, stone and concrete, and usually extended down into the ground to a point view below the frost line. Advantage of Solid Fences 1. Denies visual access of the installation to the intruder. 2. Denies the intruder the opportunity to become familiar with the personnel. activities, and the schedule of the - movement of the guards Disadvantage of Solid Fences 1. This Prevents the guards from observing the area around the installation. 2. Creates shadow which may be used by the intruder for cover and concealment. b. Full-view Fences - is constructed in such a manner that visuul access is permitted such as wire fence, through the fence structure. It is designed purely to control physical access between tico areas. Advantage of Full-view Fences 1. Guards are able to keep the area surrounding the installation under observation. 2. Does not create any shadows. Disadvantage of Full-view Fences 1. Allows visual access to the installation. 2. Allows the intruders to get familiar with the movements and the time schedule of the guard patrols. 2. Wire Fences - made of chain-link barbed wire concertina design with small or larger than 2 square inches and made of number gauge wires or heavier, twisted and barbed selvage top and bottom. 3. Building Walls - include walls, floor, roofs or their combinations serve also as barriers and they should be of such constructions to provide uniform protection just like wire-fencing. 4. Bodies of Water - like river, lake, cataract, sea, pond or any bodies of water forming part of the wall, building or fencing should not be considered an adequate perimeter barrier. E. Additional Protective Measures 1. Top Guard - is an additional overhang barbed wire placed on vertical perimeter fences facing upward and outward with 45 degree angle with three to four strands of barbed wires spaced 6-inches apart. This will increase protective height and prevent easy access. 2. Guard Control Stations - are normally provided at perimeter entrance to secure areas located out of doors and manned by guards on a full-time basis. Sentry stations should be near a perimeter for surveillance at the entrance. 3. Towers or “Guard Towers” - are house-like structures as the perimeter barriers. It gives a psychological effect to violators. Provides a level of illumination to clearly identify persons or objects and creates a psychólogical deterrent to criminal activity in the area being protected. 4. Signs and Notices or “Control Signs” - Signs provide information, directions, or warnings, while notices contain information or instructions. F. Perimeter Guard are also employed augmenting the existing perimeter security or perimeter barriers of a certain establishment 1. Fixed Post - security guards are assigned in a particular place of the compound to guard and watch the area surrounding; 2. Patrol (roving) - in this system, the security guard is required to walk and go around regularly around the company premises. SECURITY LIGHTINGS OR PROTECTIVE LIGHTINGS Basic Concept of Security & Protective Lighting provides a level of illumination to clearly identify persons or objects and creates a psychological deterrent to criminal activity in the area being protected. Perimeter Lighting Usually referred to as protective lightings is completely a part of standard system in security when fence and guard are employed. PURPOSE OF PROTECTIVE LIGHTING 1. To provide sufficient illumination to areas in the hours of darkness. 2. To improve visibility of human guards for identification purposes and apprehension of intruders. 3. It gives psychological deterrence to potential intruders. IMPORTANCE OF PROTECTIVE LIGHTING 1. Serve as deterrent to violators 2. Assisting security force 3. Serve as the essential elements of an integrated physical security program. TYPES OF PROTECTIVE LIGHTING 1. CONTINUOUS LIGHTING - the most familiar type of outdoor security lighting. This is designed to provide two specific results; glare projection or controlled lighting. 2. CONTROLLED LIGHTING - it is generally employed where, due to surrounding property owners, nearby highways or other limitations, it is necessary for the light to be more precisely focused. 3. MOVABLE OR PORTABLE LIGHTING - this system is manually operated and is usually made up with movable search or floodlights that can be located in selected or in special location which will require lighting only for a short period of time. 4. EMERGENCY LIGHTING - this system is used in times of power failure or other emergencies when other systems are innovative. TYPES OF LIGHTING USED FOR PROTECTIVE PURPOSES 1. INCANDESCENT LAMP - is the common light bulbs of the type found in the home 2. GASEOUS DISCHARGE LAMPS: MERCURY VAPOR LAMPS - give out strong light with bluish cast. This is widely used for interior and exterior lighting. SODIUM VAPOR LAMPS - give out soft yellow light 3. QUARTZ LAMPS - they emit very bright white light and snap rapidly ADVANTAGES -excellent for use along perimeter and critical areas. -frequently used at every high wattage Types of Lighting Equipment 1. STREET LIGHTS - produced a diffused light rather than directional beam. They are widely used in parking areas. This lighting equipment received the most widespread notoriety for its value in reducing crime. 2. SEARCH LIGHTS - These are highly focused incandescent lamps used to potential trouble shoot. 3. FLOODLIGHT - These lights project light in a concentrated beam. They are appropriate for use in instances which call for illumination and boundaries, building of fences. Lighting Terminologies and Definition 1. CANDLE POWER- one candle is the amount of light emitted by one standard candle 2. LUMEN- one lumen the amount of light required to light an area of one square foot to one candle power. 3. FOOT CANDLE- one-foot candle equals one lumen of light per square foot of space. The intensity of illumination is measured in foot candle. Areas to be Lighted 1. VEHICULAR GATE - normally manned by guards inspecting credentials, as well as inspecting for contraband or stolen property. 2. PEDESTRIAN GATE - Should be lighted about 25 feet on either side of the gate, if possible and the range for vehicular gates should be twice that street lighting is recommended in these applications. 3. THOROUGHFARE - used for pedestrians, vehicles should be lighted to 0.01 foot-candles for security purposes. 4.PARKING AREA - this area can be a hiding place and is vulnerable to pilferers and car thieves 5. SENSITIVE AREA - This includes vital buildings, storage depots, and vulnerable control points in communication, power light and water distribution system. 6. PERIMETER FENCE - wall lighted Security Lighting Technique 1. Security Lighting should enable the guard to observe merely the activities around and inside the premises and within its jurisdiction 2. High contrast between the intruder and the background should be provided. 3. Lighting the boundaries and approaches. 4. Effective lighting systems should deter or discourage attempts to enter the premises and make detection more lightly if enter is attempted. Lighting Maintenance Periodic checks should be made on all electrical circuits. Luminaries should be cleaned and replacement should be made as soon as possible. When 80% of their life is used in a sensitive area replacement should be made and the bulbs are used in less sensitive locations to do this strict recording is necessary. PROTECTIVE ALARMS Concept of Protective Alarm 1. ALARM (signal) is synonymous to warning of imminent danger. It can also be defined as a: a. Security device: a security device fitted to property, especially a house or car, to make a warning sound if a break-in or theft is attempted; or b. Sound of security or warning device: the sound made by a security or warning device. 2. PROTECTIVE ALARM - It is an aural or visual signal given by the enunciator to security guard when intruder actuates device in a protected area. 3. ENUNCIATOR is a visual or audible-signaling device, which initiates conditions of associated circuits. BASIC CONCEPT OF PROTECTIVE ALARMS Another safeguard used to assist security to complement is not to supplement physical security is an array of alarms. These alarms of various types and cost can be installed indoors or outdoors. Basically, alarm systems are designed to alert security personnel to consummated or attempted intrusion into an area building or compound. Alarms are not meant to prevent criminal acts. Each type of alarm is activated in the event that an intrude tampers the circuitry, a beam or radiated waves. In short intrusion, alarms can be electrical, mechanical or electronic. OPERATION AND TYPES OF INTRUSION ALARM SYSTEMS 1. Breaking an Electrical Circuit through a Metallic foil or Wire - In a building or compound, all possible entry can be wired by using electrically charged strips of tinfoil wire. Any actions that will move the foil or wire break the circuit and activate an alarm. 2. Interruption of Light Beam of PhotoCell through a Photoelectric or Electric Eye Device - An invisible light beam is transmitted at a frequency of several thousand per second to a special receiver. An infrared filter over the light source makes the beam invisible to intruders. 3. The disadvantages of photo-cell include the beam can be bypassed by crawling underneath or climbing over it, its requirement of a rigid base and permanent installation, it is not fit for external or outdoor installations because fog, smoke, dust, rain and other vision obstructions when devise enough can intern the light and trigger false alarms. 4. Detecting Sound and Vibration through an Audio Detection Device - Supersensitive microphone speaker sensors are installed in walls; ceilings and floors of protected area of any sound caused by attempted forced entry inspected by the sensor. This can utilized effectively to safeguarded closed areas, vaults safes, storage bins, file rooms, warehouse, and similar enclosures. 5. Vibration Detection Device - The vibration sensitive sensor is attached to walls, ceilings or floors of the protected areas. The sensor detects any vibration caused by attempted forced entry. 6. Space and Motion Detectors - These systems derive their operating principle usually from a physical phenomenon known as "Doppler Effect". Constant sound waves in a cubicle disturbed by an object will cause change of frequency and wave motion thereby causing an alarm to trigger. 7. Penetration of an Electron Or Electromagnetic Fence - It is an electronic fence consisting of 3 to 5 strands of wire spaced from 9 to 24 inches above one another which serves as antenna, a monitor panel, and an electric circuitry. When power is put on, an Electro- magnetic field is set among the wires from the top to the ground. An intruder about two feet from this field will trigger an alarm. 8. Foot Rail Activator - Placing the front of their foot to engage the activation bar placed on the floor in such a position that tellers may activate does not acquire any obvious use of the teller's hand and their hands may be kept in full view of the robbers for reason of safety. Because foot rail can be activated very obtrusively and safely, it is frequently found in the banks where tellers while standing up. 9. Bill traps - Bill traps or currency activation devices are usually placed in the teller's cash drawer and connected to the alarm system using a wire connector. When currency is removed from the devices, the alarm is activated. The advantage of these devices is that the robbers frequently remove the currency and activate the alarm. This is particularly helpful when the employees are immediately forced to leave their station without having an opportunity to activate the alarm safely. 10. Knee or Thigh Button - These are installed inside the desk or teller station so they can be activated by knees or thigh pressure. They are commonly found in location where personnel usually perform their duties from a seated position. 11. Foot Button - Like the foot rail permit alarm activation safety while both hands remain clear in view of the robber. 12. Double Squeeze Buttons - Pressure is required on both side of the device and therefore the probability of accidental alarm is reduced. TYPES OF ALARM DETECTION SYSTEM 1. Central Station System A type of protective alarm system where the central station is located outside the installation. It can be located in an agency and the installation is one of the subscribers. A system in which the alarm signal is relayed to a remote panel located at the facilities of private owned protection Service Company manned by its personnel. Alarm signal is transmitted over telephone lines to the central station. Here, an operator on duty is 24-hours to supervise, record, and maintain alarms. Several separate compounds tie their alarm system to a central station so that in case of need, the central station calls for assistance to the police, fire department, and hospital or with other government assistance units. The alarm signal could be transmitted to any of the following: a. Direct wire systems - Used by high-risks locations (banks, jewelers, furriers) b. Circuit party systems - This has a circuit transmission system where as many as 15 alarm transmitters may send an alarm to a single receiving panel at the central station over the same time. Each alarm has a distinct code. c. Multiplex system - This reduces leased telephone charges while at the same time providing higher degree of line security than circuit-loop alarms. d. Digital communicator is a computer - based which sends its signal through the regular switch line telephone network. The alarm signal transmitted series of coded electronic pulses that can only be received on a computer-type terminal at the central station. e. Telephone Dialer delivers pre-recorded verbal messages to a central station, answering service, or police department when an alarm is detected. f. Radio signal transmission - This method takes the alarm signal from the protected premises and sends it via radio or cellular phone to either a central station or police dispatch center. g. Video verification A video is sent to the central station - This provides higher level of protection while helping to eliminate false alarms by allowing central station operators to see what is happening inside the protected area. 2. Proprietary System - this functions in the same way as the central system except that it is owned and leased by the subscriber, and operated and located in the facility. Response to all alarms is by facility's own security or fire personnel. Since this system is monitored locally, the response time to an alarm is considerably reduced. Usually, the control console is located at the security control center where operators are on continuous duty. Any triggering information on fire, intrusion, or violation of security rules is monitored by security and appropriate action is initiated. 3. Local Alarm System - Consists of rigging up a visual audible alarm near the object to be protected, a bell light indicates an attempted or successful intrusion. case of alarm, response will be made by the local guard and other personnel within sight or hearing. Its success relies on someone hearing or seeing the signal and calling authorities. It also serves to notify the responsible burglars that they have been detected. In this case, the sensor activates the circuit, which in turn activates a ho or siren or even flashing light located in the immediate vicinity of the alarmed area. 4. Auxiliary System - In this system installation circuits a led into local police or fire department by leased telephone The au lines usually by special arrangements. responsibility for circuits and the high incidence of false alarms have made this system unpopular with public fin and police personnel. 5. Local Alarm-By-Chance System - This is a local alarm system in which a bell or siren is sounded with a predictable response. These systems are used in residence or small retail establishments, which cannot afford respond system. The hope is that a neighbor or passing will reach to the alarm and call for police assistance, but such a call is purely a matter of chance. 6. Dial Alarm System - This system is set to dial predestined number when the alarm is activated. The number selected might be the police or the subscriber home number, or both. When the phone is answered, recording states that an intrusion is in progress at the location so alarmed. This system is relatively inexpensive to install and operate, but since it is dependent on general phone circuits, it could fail if line were busy or if the phone connection were cut. Three Parts of an Alarm System Generally all alarming devices have these three (3) basic parts: 1.Sensor or Trigger Device. 2. Circuits which carries messages to the signaling apparatus. 3.Signaling system, sometimes called the enunciator. DESIRABLE CHARACTERISTICS OF INTRUSION ALARM SYSTEMS 1. A detection unit should initiate the alarm upon instruction of a human being in the area or vicinity of the protected object. 2. An annunciator console indicating the audible and or aural signal and the specific location of incident so that proper action can be made by security and other units. 3. Fail - A safe feature gives alarms in the enunciator when something is wrong with the system. 4. System should be difficult to tamper or render ineffective by outsiders, competitors or saboteurs. 5. Panel board central enunciators or operating console - monitoring activities should be removed at all times. Transmission can be by physical wires or by radio. G. Perimeter Protection This is the first line of defense to detect the intruders. This could be done through any of the following intrusion alarming devices. The most common points equipped with sensing devices for premise perimeter protection are doors, windows, vents, skylights, or any opening to a business or home. Since over 80% of all break-ins occur through these openings, most alarm systems provide this type of protection. H. Area and Space Protection This involves detection of intrusions inside the building. Indoor Detection Devices work through Motion Detectors. Motion Detectors have the following characteristics: This is a type of electronic security device that moves and usually triggers an alarm. Many types of motion detectors can sense motion in total darkness, without an intruder becoming aware that an alarm has been triggered. A motion detector will detect the intruder's movements as soon as he or she walks or otherwise moves within the area protected by the detector. I. Types of Operation and Motion Detectors Generally, motion detectors operate through any of the following: 1. Infrared Rays (beyond the red spectrum) - Infrared rays work in two ways: Passive infrared motion detectors sensitive to infrared wavelengths of energy, which are invisible to human eye. Infrared energy can be detected as heat, and this type senses the heat that a human or other animal emits. Active infrared motion detectors These detectors project a beam of infrared energy from one unit (transmitter) to another (receiver). When an intruder moves through the beam, it breaks a circuit in the receiver, triggering an alarm. 2. Ultrasonic - This uses ultrasound (sound of very high frequency) to detect motion. In such a detector, a transmitter sends out sound of a frequency that is too high for the human ear to hear. A receiver picks up the sound waves reflected from the room or area under protection. An intruder's motion will cause a change, or shift in the frequency of sound. A circuit in the device detects any unusual frequency shift. 3. Video - This detector senses changes in ambient light. or the light that is normally present in a space. A video camera views an area, and sends the image to a monitor; the motion detector's computer reads the pixels, or the tiny picture elements. The detector notes whether pixels are light or dark. When an intruder moves across the field of view, the monitor displays the movement, changing the lightness or darkness of the individual pixels. J. Reducing False Alarms A burglar can initiate a considerable response by police private security personnel, who may leave other important matters to race to the scene of the alarm. Therefore, it is important to prevent false alarms when designing and installing systems by using any of the following: 1. Passive infrared motion detectors - can be programmed to ignore the first movement detected and to sound the alarm when the movement passes through two or more detection zones within a specified period of time. 2. Dual Technology motion detectors - It combines a passive infrared device and a microwave device. The passive infrared sees many detection zones measures and the change in background temperature target moves across them. At the same time, the detector projects microwaves and measures the Doppler shift when a target moves through the protected space. An infrared detector will detect motion regardless of whether moving across the field of view or toward the detector. But such a detector is more sensitive to movement a its field of view. K. Intrusion Detection System (IDS) These electronic devices are used for detecting entry, or in some attempted entry of an intruder and signaling an alarm. Advantages of IDS: -provides 24 hour surveillance used with CCTV, permit guards to remain in protected positions; reduce the need of patrolling; manpower; and detect intruders at unmanned sit Limitations of IDS: if not carefully selected or installed, they can be circumvented, unacceptable false alarm rates; and they require skilled maintenance. L. Perimeter Intrusion Detection System (PIDS) These electronic devices are used for detecting entry or attempted entry across the external perimeter of a key point and signaling an alarm. They provide similar advantages as in IDS but have the following limitations: 1. liable to high false alarm rates 2. costly to maintain and install 3. maybe vulnerable to deliberate alarming 4. can sometimes be circumvented by knowledge intruders Types of Perimeter Intrusion Detection System (PIDS) 1. Linear Microwave System - a cigar shaped microwave beam is established between a transmitter and a receiver. Range is theoretically up to 200m between units but in practle is 100m to 150m. 2. Radiating Cable System - a.k.a. "buried cables”, usually invisible to intruders. To coaxial cables are buried about 2m apart. Radio frequency is transmitted along one cable and leaked through apertures cut in the cable to similar apertures in the receiving cable. Disturbance of the radio frequency field by intrusion causes an alarm signal. 3. Vibration Sensors - provide indication of forced entry through walls, ceilings, doors, window grills, and other rigid structures. These sensors operate through any of the following: Inertia Switches - a capsule enclosed or small gold plated supported on the electrical contact pins. Vibration causes the ball to lift off the contacts, producing an alarm. Geophones - a capsule encloses a spring loaded magnet suspended inside a coil. Vibration causes movement of the magnet relative to the coil and induces a current, producing an alarm. Crystal Vibration Sensor - a phezo-electric crystal compressed by vibration and produces a current, producing an alarm. Personal Attack Alarm - This allows a doorkeeper or guard to give a covert warning that he is under attack or threat of attack, by operating a push-button, kick bar or "panic strip". This device continues to signal an alarm until released by a key.

Use Quizgecko on...
Browser
Browser