LEA 3: Introduction to Industrial Security Concepts PDF
Document Details
Uploaded by RichVoice5823
UST-Legazpi
Tags
Summary
This document provides an introduction to industrial security concepts. It includes a course description, learning objectives, and a historical overview of security from early civilizations to the present day. The document covers diverse aspects of security, such as security industry development, theoretical concepts, and operational details.
Full Transcript
**INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS** **COURSE DESCRIPTION** This course provides the overview of the following: Development of Security Industry; Theories, Concepts and Principles of security; Security organization, management, administration and operation of private security agency, c...
**INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS** **COURSE DESCRIPTION** This course provides the overview of the following: Development of Security Industry; Theories, Concepts and Principles of security; Security organization, management, administration and operation of private security agency, corporate and government security unit; qualifications, trainings, skills or competencies development in industrial security, technology-led security operations, crime prevention, safety, investigation and detective skills, crime scene preservation, and report writing. To ensure that you will demonstrate the above cited course learning outcomes at the end of this semester, this course is divided into the following: - **Historical development and Evolution of Security.** - **Theories and Concepts of Security & Safety** - **Related laws in Security and Detective Agency Operations, Management and Administration.** - **Security Training and Skills Development and enhancement on the following areas: customer relations, basic security and safety protocols, crime prevention and investigation** - **Types of Security.** - **Basic Industrial security concepts of the following: Security Survey; Security Plan; Security Test and Evaluation; Personnel Check; and Security Management.** **MODULE 1: THE CONCEPT OF SECURITY** ***"Safety and Security is the concern of everybody"*** **INTRODUCTION** Security appears to be one of the fundamental needs of the human being pushing them to spend more time and money establishing a security instrument to protect their properties and their persons. Industrial security refers to the measures taken to protect physical and digital systems from unauthorized access, cyber threats, and physical intrusions, all of which could lead to disruptions, financial losses, or damage to reputation. This Module 1 introduces fundamental concepts of industrial security, including the identification and mitigation of security risks in industrial environments such as factories, power plants, and critical infrastructure facilities. Key topics include the integration of physical security systems, cybersecurity, risk assessment, threat detection, access control, and compliance with regulatory standards. The goal of this module is to provide students with a solid foundation in understanding how industrial security practices are implemented to protect sensitive systems, operations, and data. By the end of the module, learners will gain the knowledge needed to assess security vulnerabilities, design appropriate security protocols, and respond effectively to security incidents. **Learning Objectives** - Understand the Importance of Industrial Security - Identify Key Security Threats and Vulnerabilities - Learn about physical security practices such as surveillance systems, access controls, and facility monitoring to safeguard industrial assets. - Learn how to perform a basic risk assessment to evaluate security risks and determine appropriate mitigation strategies. - Understand how to create and execute incident response plans to effectively respond to security breaches and minimize damage. The historical roots of private security agencies can be traced back to thousand years when the protection of life and personal property were to up the individual, and later on passed to tribes, and then to cities. In pre- historic times, man recognized the need to keep himself safe from both known and unknown enemies such as animals, other inhabitants and the environment itself. He used different methods to keep himself safe. The Greeks of ancient times were the ones who organized the first police force in the city states which they term polis. The romans, on the other hand, established PRAEOTORIAN GUARDS known as VIGILES who were tasked to be fighters. In the middles Ages during their invasion in England, the French formed a group carefully selected men called SHIRES OR SHERIFF look after the peace and order of the different regions. The greatest influence in the history of security came from England in 1655, Oliver Cromwell set up in England and Wales a police force that operated to capture and punish criminals. In 1748 London Magistrate Henry Fielding introduced the concept of crime prevention by organizing citizen's patrol or watchmen that not only chased criminal for felony and misdemeanor but also served Fielding's purpose of preventing crime ahead of time with their patrolling function. 15 years later, English home secretary Sir Robert peel formed the first formal police department. **HISTORY OF SECURITY** a. **Early Civilizations** - Security has a long history dating back to the origin of human being. Cave dwellers devised various forms of security to protect themselves and their property from other tribe and wild animals. - The LAW OF HAMMURABI (King of Babylon 1900 B.C.). The Law of Hammurabi is the earliest record of laws to protect people and property. - The ancient GREEK CITY STATES (about 600 B.C). This was consisted of the municipality and the surrounding territory with a centrally located fortress built on a hill. These city states created what is considered the FIRST POLICE FORCE. b. **Middle Ages** - England, King William-assumed ownership of the land when he conquered England. - France, King William (Duke of Normandy) - he divided England into fifty-five military district and given the title REEVES. - **King John-** was forced to sign the MAGNA CHARTA (1215) this document guaranteed basic civil and Political liberties to both people and nobles. - **King Edward I-** issued the statute of WESTMINSTER in 1285- established a systematic Police and Justice System - **The Watch and Ward**- organized town watchmen to patrol at night and to assist the constable who worked during the day. - **Curfew-** this act also established the position of bailiff. Who was required to check on all strangers every fifteen days. Today bailiffs are Officers of the court. - **The Hue and Cry-** was an integral part of the watch and ward - **Assize of Arms-** is requiring on males between fifteen and sixty years to maintain a weapon in their home. The Statue of Westminster established this. The statute of Westminster played a significant role in promoting law and order. c. **The Eighteenth Century** - **In 1749,** Henry Fielding-published the first great social novel entitled TOM JONES. - **The Bow Street Runners-** referred to as the first detective unit, since they quickly moved to the scene of crimes for immediate investigation. d. **The Nineteenth Century** - Sir Robert Peel- was introduced into Parliament the **Metropolitan Police Act in 1829.** He argued for a single police system in London composed of professionals that would be carefully selected and thoroughly trained. At the same time, he realized the police could never be effective if the law were wide in scope and harsh in penalty. Today Police officers in England are called **BOBBIES** and named after Sir Robert Peel. e. **Evolution of Security in America** - **1600's-** several cities established a **"watch".** - **1800's- several** cities, Detroit, Chicago, Philadelphia, San Francisco and Los Angeles established **"paid police force".** - **New York City-** adopted the Peelian principles. Federal Law Enforcement agencies were also organized. - The US Post office established an investigative arm in 1828. The US treasury Development did the same in 1864. - **In 1908-** the Department of Justice formed the Bureau of investigation that became the FBI in 1924 headed by J. Edgar Hoover. f. **Private Security Grows in America** - Allan Pinkerton- who was cooper (maker of barrels) by trade, settled in Chicago from Scotland. He became interested in law enforcement and made a career change by becoming a deputy sheriff. America's foremost private detective. By profession, he was a self-employed barrel and cask maker. Among his numerous methods, he pioneered the "shadowing" and a "Role". The agency was also the first to hire a female detective "Kate Warne". Established the first national private security and investigation company in the US. - **President Lincoln-** during Civil War he summoned Pinkerton to Washington to establish an intelligence network for Union forces. - **United States of America, William J. Burns-** he was a former Secret Service Investigator who headed the Bureau of Investigation. He formed William J. Burns International Services Corporation was originally founded as the William J. Burns International Detective Agency. - **Today,** Burns International Services Corporation is the Subsidiary of SECURITAS. - **1850's-** Henry Wells joined William Fargo and established American Express, which operates east of the MISSOURI RIVER. Today, Wells Fargo is a division of Burns International Services Corporation. - **In 1859, Washington Perry Brink-** established a freight and package delivery Service in Chicago. He also concentrated on the protection of valuable in transit. - **In 1910, William J. Burns-** the pored most American Investigator of his day and the first director of the government agency that became the FBI, formed the William J. Burns Detective Agency. - **In 1917,** Brinks started using armored trucks (armored truck was born) for transporting valuables, which became a revolutionary service in security logistics. Over the years, Brinks expanded its services, eventually becoming part of the Pittston Company in 1953. By the **1970s,** it was the largest armored truck service in the world, and today, it still remains a major player in the global security services industry g. **Other National Contributed to the Development of Security** - Greek and Roman civilizations devised various forms of protection. - The French, under King Louise XIV, during the 1600's promoted crime prevention through preventive patrol and street lighting. - Asian investigative methods used psychology to elicit confession. h. **Railroad Police** - The Railroad Police were specialized law enforcement officers employed by railroad companies in the United States (and other countries) to protect railroad property, employees, and cargo. They were a critical part of the railroad industry\'s operations, especially in the 19th and early 20th centuries, when the rapid expansion of railroads made them key targets for theft, sabotage, and even violence. - This was the era of the ROBBER BARONS when massive corporate organizations - formed secret agreements to eliminate competition. Although Congress passed the Sherman Anti-trust Act in 1890 to curb monopolies, railroads, (monopolies charged) became one of the most hated industries, thus were subject to violence. - **Jessie James-** devised the idea of using dynamite to wreck a train before robbing it. - **July 21, 1873-** first gang used this dangerous technique headed by Jessie James. - Several states enacted legislation permitting rail roads to organize security force with full police power. - **By 1914-** there were about 14 thousand railroad police in America. They were been deputized by the federal government to help prevent sabotage. i. **The Growth of Security After World War II** - **In 1950 Korea-** the department of defense formulized security requirement for defense contractors to protect classified information and materials and to prevent espionage. j. **A New Century with Challenges** - **September 11, 2001** - Terrorist attacked with hijacked airline killed about 5,000 people by leveling the World Trade Center and destroying part of the Pentagon these bolt surprise attracts, subsequent bio- terrorism, and the war in Afghanistan show the difficult and guard are yielding to professional security officer who is more educated, better trained, knowledgeable of humorous security and loss prevention strategies. k. **Development of Security Device** - **Personnel-** are the backbone of protection efforts, various security devices and stems provided additional safe guard like: a. **Dogs-** with their keen sense and smell they are a very old form of alarm notification. b. The ancient civilizations of China and Egypt **doors with primitive keyed locks.** c. **Pegs-** used to slide down into a door to secure it. A special notched board was required to raise the pegs high enough to clean the door. d. Early Egyptians constructed locked vaults deep inside huge pyramids that illustrated the concept of **"protection-in-depth"** (using multiple layers of defense to protect valuable assets) a modern strategy used at banks. e. The ancient of Israel used **bright light and loud noise** to scare intruders. f. **Gideon-** a Jewish warrior king instilled fear in a large invading force by blowing three hundred trumpets and waving three hundred torches. g. The Romans used the sensitive hearing and squawking of **geese** to warn of an approaching army. h. During 1700's, British inventors assembled the **first mechanical burglar alarm system** to protect doors. It was set of chimes linked to a door lock. Therefore, burglars defeated the system by cutting the cord between the lack and the chimes. i. **In 1852, Augustus R. Pope**- filed a patent for an **electromagnetic alarm** consisting of an electric bell activated by a falling weight or uncoiling of a spring when a door or window opened. j. **Edwin Holmes-** after six years he bought Pope patent and formed the first private company that provides alarm protection. Holmes Protection Group INC was acquired by **ADT** (American District Telegraph) **Security** century service Inc. at the end of twentieth **OTHER PERSONA** 1. **August Pope (1853)-** Patented one of the first burglar alarms. 2. **Edwin Holmes (1858)-** Introduced the first central station burglar alarms 3. **Washington Perry Brinks (1858)-** Introduced the first armored carriages for transportation of money and valuables 4. **Linus Yale Jr.- in 1861,** he invented and introduced the modern combination lock, bankers quickly adopted Yale's lock for their safe, but bank robbers came up with several ways to get past the new inventions. 5. **James Sargent-** an employee of Yale, developed "theft proof lock" - **THEFT PROOF LOCK** - This was a combination of lock that worked on a timer. The vault or safe door could only be opened after a set number of hours had passed; thus, a kidnapped bank employee could not open the lock in the middle of the night even under force. Time locks become widespread at bank in the 1870's 6. **Walter Bruch-** German engineer who introduced and was responsible for the design and installation of the system. (CCTV) - The first CCTV system was installed by Siemens Ag at Test Stand VII in Peenemunde, Germany in 1942, for observing the launch of V-rocket. - Kings Lynn- The first place to use CCTV in the United Kingdom - This is a sea port and market town in the ceremonial country of North folk in the East of England - Olean New York- In September 1968, the first City in the US to install video cameras along its main business street in an effort to fight crime. The use of closed- circuits TV cameras piping images into the Olean Police Department propelled Olean to the forefront of crime- fighting technology. 7. **George Wackenhut (1954)-** A retired FBI agent formed the Wackenhut Corporation an enterprise that become another one of the largest Private Security Companies in the US. - American Society for Industrial Security ASIS (1955) this is the world largest organization of security professional. **THE CONCEPT OF INDUSTRIAL SECURITY** The concept of industrial security has evolved significantly over the past century, driven by advancements in technology, globalization, and the growing complexity of industrial operations. Early industrial security efforts focused primarily on protecting physical assets, labor, and facilities, often through simple security measures like fencing, guards, and locks. Security measures were initially concerned with protecting physical goods, controlling access to work areas, and ensuring the safety of employees. Basic physical security tools such as locks, gates, and guards were common. As industrial operations grew more complex, the scope of security expanded to include surveillance and the protection of intellectual property. The early 20th century saw the introduction of more sophisticated physical security systems, such as alarm systems and closed-circuit television (CCTV) monitoring. Security threats, however, remained mostly physical in nature, focusing on theft, vandalism, and employee disputes. Today, industrial security must address both physical and cybersecurity challenges in an increasingly interconnected world. The convergence of Information Technology (IT) and Operational Technology (OT) has led to a new paradigm in industrial security. The need to protect sensitive data, prevent cyber-attacks on critical infrastructure, and ensure the safety of employees and assets is more complex than ever. Notable incidents such as the 2010 Stuxnet attack, which targeted Iran's nuclear facilities, demonstrated the catastrophic potential of cyber-attacks on industrial control systems, propelling industrial cybersecurity into the spotlight. In response, governments, industries, and organizations worldwide have developed new standards, frameworks, and best practices to enhance industrial security. Additionally, there is a growing emphasis on regulatory compliance, risk management, and continuous improvement in security protocols to address emerging threats and challenges. **DEFINITION OF TERMS** **What is Security?** - It is the state or condition of being safe or free from fear, harm, danger, loss, destruction or damages - There is a need for adequate protection because of the prevailing action of man against man that leads to unsecured and/or unsafe conditions due to economic reasons, revenger, or just plain greed and avarice. - It is the assurance, guarantee and certainly of being safeguard and free from fear of danger. - a Defense against crime (Security World Magazine, March 1973) - The security of any business establishment today is a complex process. Security works involve active and passive measures so that effective defense can be established against crime. - **Active Measure**- these are physical barriers, security lighting, use of vaults, locks and others. - **Passive Measure-** are those that will dates man from committing such acts for fear of being caught, charge in court, or get dismissed; Security education programs, investigations, fire prevention seminars, personal security checks. Basically, it was the action of man against man that led to many unsecured and unsafe conditions. The reason could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs adequate protections. **THE NATURE OF SECURITY:** A. **Action of Man against Man.** **Reasons:** Economic, Revenge, just plain greed, Avarice. B. Individual: We should be concerned with security and protection from pilferage or theft, robberies and disasters. C. Government Service: Background check of personnel, and VIP protection D. Every Installation, private of governmental need electronic alarms for disaster as well against sabotage, pilferage and industrial Espionage. **3 D's of Security** **The basic theory of any security program can be summed up in the words:** A. **Denial-** takes the form of physical barriers like fences, walls, gates, locked doors, watch dogs, etc. when the access id denied, the things or area are protected. B. **Detection-** form of guards and electronic devices. C. **Deterrence-** This can be both physical and psychological Management in all business and organizational activities is the act of getting people together to accomplished desired goals and objectives efficiently and effectively. **SECURITY MANAGEMENT** - The broad field of management related to asset management, physical security and human resources safety functions. It entails the identification of organizations information assets and the development, documentation and implementation of policies, standards, procedures and guidelines. **SECURITY PLANNING**: - The decision-making process made by executives in preparation of accomplishing goals and objectives within an organization. **In security Management, a security plan composed of the ff:** A. **Situation-** It explains in a short paragraph the historical background of the organizations and its security forces. B. **Mission-** Covers what plan is all about and what tends to do. C. **Execution-** The concept of the project will outline and explain. D. **Administration and Logistics-** involves the listing of security equipment and facilities to be used. E. **Command and Signal-** Pertains to the channel of communication needed when implementing the project. **FIELDS OF SECURITY** 1. **IT FIELDS:** A. **[Computer Security]-** Is a branch of information security applied to both theoretical and actual computer systems. A branch of computer science that addresses enforcement of secure behavior on the operation of computers. B. **[Data Security]-** Is the means of ensuring that data is kept safe from corruption and that access to its suitably controlled. C. **[Application Security]-** Encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or destruction of application. D. **[Network Security]-** Consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network- accessible resources from unauthorized access and the effectiveness (or lack) of the measures combined together. 2. **PHYSICAL FIELDS:** A. **[Physical Security]-**Describes measures that prevent of deter attackers from accessing a facility, resource, or information, stored on physical media. It can be as simple as a locked door or as elaborate as multiple layers of armed guard posts. B. **[Shopping Security]-** A type of security which is concern with protection of stores, warehouse, storage, its immediate premises and properties as well as the supermarket personnel and customers. C. **[Airport Security-]** Refers to the techniques and methods used in protecting airports and by extension aircraft from crime and terrorism. D. **[Home Security]-** Are those methods use of protecting residential homes or town sites which include the interior protection of houses against property losses or damages. 3. **POLITICAL FIELDS:** A. **[International Security]-**Consist of the measures taken by the nations and international organizations, such as the UN, to ensure mutual survival and safety. These measures include military action and diplomatic agreements such as treaties and conventions. International security is invariably linked. B. **[National Security]-** Refers to the requirement to maintain the survival of the nation- state through the use of economic, military and political power and the exercise of diplomacy. C. **[Human Security]-** Refers to the emerging paradigm for understanding global vulnerabilities whose proponents challenge the traditional notion of national security by arguing that the proper referent for security should be individual rather than the state. 4. **MONETARY FIELDS:** A. **[Financial Security]-** Refers to the methods applied for the protection of fungible, negotiable instruments representing financial value. **Industry** - The term denotes "earnest or constant application to work or business", or "a special branch of productive work, or the capital or workers employed in it". ***(Webster, 1993)*** - It is likewise defined as large-scale production or organized economic activity connected with the production, manufacture, or construction of a particular product or range of product or range of products. ***(Microsoft Encarta, 2001-2006)*** **Industrial** - This is defined as "pertaining to or engaged in industry". (Webster,1993) Management - This term means the "skillful use of means to accomplish a purpose". (Webster,1993) - This term is the process of properly utilizing available resources to achieve organizational goals and objectives. **Industrial Security** - This term may mean: a. security measures applied to business industries. (Manwong and Delizo,2006); or b. the business of providing security and protection to private individuals, business and enterprises, or government and non-government industries. **Industrial Security Management** - It is the skillful handling of the security and safety measures of business enterprises and industrial establishments. - The utilization of all available resources within security organizations in order to function and attain its goals and objectives. It is the managing of money, men materials and methods with in security system. I. **LEGAL BASES OF INDUSTRIAL SECURITY MANAGEMENT IN THE PHILIPPINES** A. **Natural Authority** 1. **The highest law is the law of self-preservation.** - Man, naturally reacts to protect himself, his family, his honor, freedom, liberty and property from danger, threat or hazard. - It became an unwritten law of the early Filipinos to protect themselves and their property against the natural and man-made hazards. B. **Constitutional Authority** 1. **The prime duty of the Government is to serve and protect the people. (Art. II, Sec. 4)** - The government may call upon the people to defend the State and, in the fulfilment thereof, all citizens may be required, under conditions provided by law or to render personal military service. - Although the defense of the States is the one contemplated here, people being one of the elements of the State is directly affected in whatever protection the state will receive from the government and the people. Take not also that all citizens who are qualified, including the security guards, may be required by law to render personal military or civil services. The service required of the citizens is personal. 2. **No person shall be deprived of life, liberty or property without due process of law, nor shall any person be denied the equal protection of the laws. (Art. III, Sec. 1)** - This means the life, liberty, freedom and property can only be taken from a person after the observance of due process of law. Due process of law is of two aspects: substantive and procedural. Daniel Webster, in brief, defines procedural due process as "one which hears before it condemns, which proceed upon inquiry, and render judgment only after trial". But if the taking of life, liberty, freedom or property does not fall within the framework of due process of law, available remedies under the law should be resorted to. 3. **Private property shall not be taken for public use without just compensation. (Art III, Sec.9)** - The Constitution protects not only ownership but also possession, enjoyment, use and disposition of private property by their rightful owners subject to such limitations imposed by law. In this regards, private property to be taken by the government in its exercise of the power of the eminent domain must satisfy two important conditions, namely: public use and just compensation. 4. **The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures** of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of arrest shall be issued except upon examination under oath or affirmation of the complainant and the witnesses he may produce, and particularly describing the place to be searched and the persons or things to be seized. **(Art. III, Sec. 2)** C. **Statutory Authority** 1. **Revised Penal Code (Act 3815, as amended)** - The applicable provisions for the Code on Crime Against Persons, Personal Liberty and Security and Property have bearing on the security and protection of one's life, liberty and property. 2. **Private Security Agency Law (RA 5487, as amended)** - This law governs the operation, administration of security agency and activities, qualification, duties and licensing of security guards, watchmen and private detectives. In short, it is the intention of this law to professionalize the security services in order to upgrade the level of security protection II. **TYPES OF SECURITY** 1. **Industrial Security**- a type of security applied to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. 2. **Hotel Security-** a type of security applied to hotels where its properties are protected from pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type of security employs house detectives, uniform guards and supervisor and ensures that hotel guests and their personal effects are safeguarded. 3. **Bank security-** this type of security is concerned with bank operations. Its main objective is the protection of the bank cash and assets, and personnel and clientele. Security personnel are trained to safeguard bank and assets while in storage, in transit and during transactions. 4. **VIP Security --** a type of security applied for the protection of top- ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries. 5. **School Security-** a type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are tined to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students. 6. **Supermarket or Mall Security**- a type of security which is concerned with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers. Security personnel are trained to detect "shoplifter", robbery and bomb detection and customer relation. 7. **Physical security-** part of security concerned with the physical measures designed to safeguard personnel and to prevent unauthorized access to equipment, facilities, materials and the documents and to protects them from espionage sabotage, damages or theft. This if the broadest type of security. 8. **Document security-** protection of documents, classified papers and vital record from loss, access to unauthorized persons, damages, theft, and compromise through proper storage and procedures. 9. **Operational Security-** this involves the protection of process, formula and patents, industrial and manufacturing activities from espionage, infiltration, loss compromise or photocopying. 10. **Communication Security --**the protection resulting from the application of various measures which prevents or delay the enemy or unauthorized person in gaining information through communication. This includes transmission, cryptographic and physical security. **[THREE MAJOR DIVISIONS OF SECURITY]** I. **Physical Security-** this concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft. II. **Personnel Security-** this is as important as physical security. Personnel security starts even before the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to ensure that a firm hires those best suited to assist the firm in achieving its goal and objectives and once hired assist in providing necessary security to the work force while carrying out their functions. III. **Document band Information security-** this involves the protection of documents and classified papers for loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft, and unauthorized disclosure of the documents. **WHAT IS PHYSICAL SECURITY?** - Physical measures are used to define, protect and monitor property rights and object; they consist of barriers and devices that are able to detect, impede, and deter potential security threats. - Physical security measures help to combat the crime --related threats that both employees and outsiders pose to the organization (for example: robbery, burglary, arson, assault, rape, theft and vandalism). If measures are properly planned, most potential intruders, whether employees or outsiders, should see that the risk of detection and punishment for attempting to penetrate a protected area are significantly greater that whatever they may gain. **CONCEPT:** A. **[Enemy Agents must have access]-** In most cases espionage, acquisition of information is the ultimate results, and means and form in which information is obtained is merely an operational detail. Normally, information on tapes and film is as usable as the original documents. Therefore, in considering access, one should think not only of current physical access to the discussion of the matter by the use of clandestine listing device. B. **[There are no impenetrable barriers]-** in an unfriendly government or organizations is willing to devote enough time, money, personnel, materials, and imagination to passing a barrier, it can do so. So, we can attempt to build defense in depth by using then one barrier. C. **[Surreptitious vs non- Surreptitious entry] --** The possibility of surreptitious entry is the greatest hazard from standpoint of counter intelligence security because it is usually difficult to neutralize the act of espionage because surreptitious entry is not usually detected. D. **[Each installation is different]-** Since each installation is different and it will have different problems to overcome. The security procedures will not be adequate for all installations. **FOUR LAYERS OF PHYSICAL SECURITY** A. **[Environmental Design]-** The initial layer of security for a campus, building, office, or physical space uses environmental design to deter threats. B. **[Mechanical and electronic access control]-** Includes gates, doors, and locks. Key control of the locks becomes a problem with large user populations and any user turnover. Keys quickly become unmanageable forcing the adoption of electronic access control. C. **[Intrusion detection]-** Monitors for attacks. It is less preventive measures and more of a response measure. Although some would argue that it is a deterrent. Intrusion detection has a high incidence of false alarms. D. **[Video monitoring]-** are more useful for incident verification and a historical analysis. For instance, if alarm is being generated and there is camera in the place, the camera could be viewed to verify the alarm. - **Protective Barriers** **Barrier--** this can be defined as any physical structure whether natural or man-made capable of restricting, deterring, delaying or preventing illegal and unauthorized access to an installation. **Purpose of Barriers** 1. Define the physical limits of an area 2. Create a physical and psychological deterrent to unauthorized entry 3. Prevent penetration there in or delay intrusion, thus, facilitating apprehension of intruders 4. Assist in more efficient and economical employment of guards 5. Facilitate and improve the control of vehicular topic. **TWO GENERAL TYPES OF PHYSICAL BARRIERS:** 1. **NATURAL BARRIERS** **[Advantage:]** A. They can provide a protection system without additional cost to the installation B. The difficulty to penetrate an installation increase according to the barriers. **[Disadvantage:]** A. Trees, ravines, vegetation could serve as a hiding place to any possible intruder. B. Installations that have as barrier a body of water could be subject to penetration through team divers. **OTHERS:** - **BODIES OF WATER AS BARRIERS** A. When the surface of the water is calm, it offers the guard or security personnel a very extensive filed view range. B. Water offers much resistance to a vehicle used by intruder by making its almost impossible to have rapid access to the installation. C. To gain access, the task of hiding a vehicle or boat without been detected by the guards or security personnel will be an obstacle to the intruder. **[DISADVANTAGE:]** A. When the water is agitated it reduces the field of vision of the guards or security personnel. B. It is possible to control the movement of a vehicle or boat to keep it hidden between waves C. The surface of the water reflects the lights given by the illumination system. An intruder may use this situation in their favor when trying to penetrate an installation. - **THE LAND AS A BARRIER:** A. The land where the installation sits must be evaluated and considered as much from the surface access point of view as from below the surface: B. Points to consider when evaluating the land as a barrier: 1. The looser the ground the more noise wit it causes when the intruder walk. 2. Muddy soil without vegetation is very difficult to cross and at the time the intruders leave their footprints. 3. Light colored soil provides reflection and contrast so as to allow the most efficient use of natural and artificial illumination. 4. Land that is uneven such as cliff and ravines are difficult to cross and limit the amount of equipment's and materials that the intruder could introduce in the exterior perimeter area. 2. **MAN-MADE BARRIERS** - Are structural constructions like fences walls, floors, roof, grills, bars, road, blocks, or other physical means to deter or impede penetration. **Types of Physical Barriers** 1. **Natural Barrier -- ex.** Geographical features like rivers, cliffs, canyons, or any other terrain that is difficult to traverse. 2. **Structural Barrier-** these are features constructed by man regardless of their original intent that tends to delay the intruder. **Examples**: Fence, walls, grills, doors, roadblocks, screens or any other construction that will serve as a deterrent to unauthorized entry. 3. **Human Barrier-** persons being used in providing a guarding system or by the nature of their employment and locations, fulfil security functions. **Examples:** Security guards and employees of the establishments. 4. **Animal Barrier --** animals are used in partially providing a guarding system. **Examples:** dogs, geese, turkey 5. **Energy --** it is the employment of mechanical, electrical, electronic energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. **Examples:** protective lightning, alarm system and any electronic devices used as barriers. **Three Lines of Physical Defense** 1. **First line of defense-** perimeter fences or barriers 2. **Second line of defense-** doors, floors, windows, walls, roofs, grills and other entries to the building 3. **Third line of defense --** storage system like steel cabinets, safes, vaults, and inferior files. **Principles of Physical Security** 1. The type of access necessary will depend upon a number of variable factors and therefore may be achieved in a number of ways. 2. There is no impenetrable barrier. 3. Defense- in depth is barrier after barriers. 4. Delay is provided against surreptitious entry. 5. Each installation is different A. **Perimeter Barrier** - A medium or structure, which defines the physical limits of an installation or area to restrict or impede access thereto. - It refers to any physical barrier used to supplement the protection of an inside perimeter. - This maybe form of fences, building walls or even bodies of water - The main purpose of perimeter barrier is to deny or impede access or exit of un authorized person. a. **Inside Perimeter-** a line protection adjacent to protected area and passing through points of possible entry into the area such as doors, windows, skylights or other points of access. b. **Outside Perimeter-** a line of protection surrounding but somewhat removed from a protected area, such as fence **OTHER PURPOSE OF PERIMETER BARRIER** - Defines the boundary of the property to be secured. - Creates a physical and psychological deterrent to unauthorized entry. - Delays intrusion, thus facilitating apprehension of intruders. - Assists in a more efficient and economical employment of guards - Facilitates and improves the control of pedestrian and vehicular traffic. **TYPES OF PERIMETER BARRIERS** A. Fences B. walls C. Bodies of water 1. **Fences** - Wire fencing can be barbed wire, chain link or concertina. Chain link is for permanent structure, barbed wire is for semi-permanent structure, and concertina for the least permanent and can also be used as temporary roadblock for impediment during strikes and crowd control. Wire fences are attractive and low in maintenance cost; they offer fewer hazards to people because of the absence of barbs, and the openings are small to prevent passage of pilfered article. 1. **Building Walls** - Walls floors, roofs or their combination serve also as barriers and they should be of such construction to provide uniform protection just like the wire fencing. 2. **Bodies of Water** - The river, lakes, marsh cataract, sea pond or any other bodies of water forming a part of the wall, building or fencing should never be considered adequate natural perimeter barrier. Additional security measures like wire fence, concrete walling, security patrolling and floodlighting at night may be necessary for the portions of the perimeter. **Types of Fences** 2. **Solid Fences** - constructed in such a way that visual access through the fences is denied. On the other hand, it prevents the guards from observing the area around the installation and it creates shadow that may be used by the intruder for cover and concealment. - **ADVANTAGE:** 1. Denies visual access of the installation to the intruders 2. Denies the intruder the opportunity to become familiar with the personnel, activities, and time scheduled of the movement of the guards on the installation. - **DISADVANTAGE:** 1. It prevents the installation guards from observing the area around the installation. 2. A solid fence creates shadows which may be used by the intruder for cover and concealment. 3. **Full-view Fence** - It is constructed in such a way that visual access is permitted through the fence. It allows the intruders to become familiar with the movements and time schedule of the guard patrols thereby allowing him to pick the time that is advantageous on his part. - **ADVANTAGE:** 1. Roving patrols and stationary guards are able to keep the area surrounding the installation under observation 2. It does not create shadows which would provide cover and concealment for the intruder. - **DISADVANTAGE:** 1. It allows visual access to the installation, its personnel, its guards; and its activities. 2. It allows the intruder to become familiar with the movements and the time schedule of the guard's patrol; thereafter- allowing him to pick the time for attempting penetration which would be the most advantageous to him. **Types of Full-View Fence** 1. **Chain link Fence** 1. It must be constructed or 7 feet material excluding the top guard. 2. It must be of 9 gauges or heavier. 3. The mesh openings are not to be larger than 2 inches per side. 4. It should be twisted and barbed selvage at the top and bottom. 5. It must be securely fastened to rigid metal or reinforced concrete. 6. It must reach within 2 inches of hard group or paving. 7. On soft ground, it must reach below surface deep enough to compensate for shifting soil or sand. 1. **Barbed wire fence** 1. Standard barbed wire is twisted, double-strand, 12 gauges wire with 4-point barbs spaces in an equal distance apart. 2. It should not be less than 7 feet high excluding the top guard. 3. It must be firmly affixed to posts not more than 6 feet apart. 4. The distance between strands must not exceed 6 inches at least one wire will be interlaced vertically and midway between posts. 2. **Concertina wire fence** 1. Standard concertina barbed wire is commercially manufactured wire coil of high strength steel barbed wire clipped together at intervals to from a cylinder. 2. Opened concertina wire is 50 feet long and 3 feet in diameter. **Types of Perimeter Barrier Openings** 1. **Gate and Doors-** when not in active use and controlled by guard, gates and doors in the perimeter should be locked and frequently inspected by guards. Locks should be changed from time to time and should be covered under protective locks and key control. 2. **Sidewalk Elevator-** these provide access to areas within the perimeter barrier and should be locked or guarded. 3. **Utilities Openings-** Sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water filled traps, or other structural means providing equivalent protection to that portion of perimeter barriers. 4. **Clear Zone-** an obstructed area or a "clear zone" should be maintained on both sides of the perimeter barrier. A clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural cover s that may provide concealment for assistance to a person seeking unauthorized entry. a. A "clear zone" of 20 feet or more should exist between the perimeter barrier and exterior structure parking areas and natural or man-made features. b. A "clear zone" of 50 feet or more should exist between the perimeter barrier and structure within the protected area except when building wall constitute part of the perimeter barrier. B. **Additional Protective Barrier** 1. **[Top Guard]-** additional overhang of barbed wire placed on vertical perimeter fences upward and upward with a 45degree angle with 3 to 4 strands of barbed wires paced 6 inches apart this increases the protective height and prevents easy access. 2. **[Guard Control Stations]-** this is normally provided at main perimeter entrances to secure areas located out of doors, and manned by guards on fulltime basis. Sentry station should be near a perimeter for surveillance at the entrance. 3. **[Tower Guard]-** this is house-like structure above the perimeter barriers. The higher the tower the more visibility it provides. It gives a psychological unswerving effect to the violators. By and large guard tower, whether permanent or temporary, must have corresponding support force in the event of need. Towers as well as guard control stations should have telephones, intercoms, and if possible two-way radios connected to security headquarters or office to call for reserves in the event of need. 4. **[Barrier Maintenance]-** Fencing barrier and protective walls should always be regularly inspected by security. Any sign or attempts to break it should be reported for investigations. Destructions of fences or section thereof should be repaired immediately and guard vigilance should be increase. 5. **[Protection in Depth]-** In large open areas or ground where fencing or walling is impractical and expensive, warning sign should be conspicuously placed. The depth itself is protection reduction of access road, and sufficient, notices to warn intruders should be done. Use of animals as guards and intrusion device can also be good as barriers. 6. **[Signs and Notices]-** "control signs" should be erected where necessary in the management of unauthorized ingress to preclude accidental entry. Signs should be plainly visible and legible from any approach and in an understood language or dialect. **GUARD AND GUARD SYSTEM:** A. **Four basic function that must be accomplished by this Guard System:** 1. Detect intruders 2. Sound alarms 3. Apprehend unauthorized personnel; and 4. Identify unauthorized personnel. B. **Human Barriers:** - **Guard procurement: selection criteria:** 1. Must eligible for security clearance; 2. Vigorous and physically able to serve in the capacity of a guard; 3. Intelligence necessary to accomplished the guard function; 4. The ability to make rapid decisions and react in a calm way to emergencies; 5. Loyalty and discretion are required attributes; 6. Experience is highly desirable although not usually mandatory. - **Guard Training: Programs of training should include:** 1. General orientations 2. Instruction in security procedures of the installation, first aid, and communication 3. Instruction in traffic control, riot control, self defense 4. Weapons qualifications to include maintenance and safety. 5. Refresher course and advance training in specific subject. - **Guard Employment: Two basic techniques of guard employment:** 1. Fixed Post 2. Patrols - **Guard Supervisions:** A. **[Personal supervision]**- Personal inspection of all guards prior to their starting tour of duty. Periodic checks of guards during their tour by the senior member of each relief or his representative. B. **[Artificial Supervision: ]** a. **[Recorded Tour-]** Guard takes with him on his tour of duty a form which must have time punched on it at each station. b. **[Supervisory tour-]** This is where the guard sends signal to guard headquarter from each station that he checks. [ ] - **Guard Equipment:** 1. Distinctive uniform 2. Weapons (38 rev., 45 pistols) 3. Notebooks 4. Nightsticks 5. Credentials 6. Whistle 7. Flashlights 8. Others uniforms as may be directed by the unit SOP - **Guard Communication:** A. **Primary Communications-** Direct line telephone or some instance radio B. **Emergency Communication-** ex. Messenger **In counter intelligence security consideration there are two outstanding energy barriers:** A. Protective lightings B. Protective alarms **Protective Lighting** - The idea that lighting can provide improve protection for people and facilities is as old civilization. Protective lighting is the single most cost- effective deterrent to crime because it creates a psychological deterrent to intruders. - Protective Lighting provides a means of continuing, during hours of darkness, a degree of protection approaching that maintained during daylight hours. This safeguard also has considerable values as a deterrent to thieves and vandals and may make the job of the saboteur more difficult. It is an essential element if an integrated physical security program. - Depending on the nature of the facility, protective lighting is designed to emphasize the illumination of the perimeter. In the case, it produces sufficient light to create a psychological deterrent to intrusion as well as to make detection virtually certain in the event an entry is made. It must avoid glared that would reduce the visibility of security personnel, while creating glared to detect intruder. This is particularly important where the facility is within streets, highways or navigable waterways. - The system must be reliable and designed with overlapping illumination to avoid creating unprotected area in the event of individual light failure. It must be easy to maintain and it must secure itself against attack. Poles should be within the barrier power lines and the switch box must be protected. **PURPOSE OF PROTECTIVE LIGHTING** A. It provides sufficient illumination to the areas during hours of darkness. B. Lighting can help improve visibility so that intruder can be seen and identified and, if possible, apprehended. C. It serves as deterrent to would-be thieves. **Principles of Protective Lighting** - Protective lighting should enable guard force personnel to observe activities around or inside an installation without disclosing their presence. - Adequate lighting for all approaches to an installation not only discourages attempted unauthorized entry, but also reveals persons within the area. However, lighting should not be used alone. - It should be used with other measures such as fixed security posts or patrols, fences, and alarms. **Types of Protective Lighting** A. **Stationary Luminary/ Continuous** - this is a common type consisting of a series of fixed luminaries to continuously flood a given area. - The most familiar type of outdoors security lighting, this is design to provide two specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to flood a given area continuously during the hours of darkness. **Types of Stationary Lighting** 1. **Glare Projection Type** - the intensity is focused to the intruder while the observer or guard remained in the comparative darkness. The lighting is toward the entrance to an installation. This is being used in prisons and correctional institution to illuminate walls outside barriers. - The glare projection lighting method is useful where the glare of lights directed across surrounding territory will not be annoying nor interfere with adjacent operations. It is a strong deterrent to a potential intruder because it makes it difficult for him to see the inside of the area. It also protects the guard by keeping him in comparative darkness and enabling him to observe intruders at considerable distance beyond the perimeter. 2. **Controlled Lighting** - the lighting is focused on the pile of items, rather than the background. The width of the lighted strip can be controlled and adjusted to suit the security needed - the lighting is focused on the pile of items rather than the background. The width of the lighted strip can be controlled and adjusted to suit the security needs. - Controlled lighting is best when it's necessary to limit the width of the lighted strip outside the perimeter because of adjoining property or nearby highways, railroads, navigable waters, or airports. In controlled lighting, the width of the lighted strip can be controlled and adjusted to fit the particular need, such as illumination of a wide strip inside a fence and a narrow strip outside; or floodlighting a wall or roof. This method of lighting often illuminates or silhouettes security personnel as they patrol their routes. B. **STANDBY LIGHTING** - this system is similar to continuously lighting but it is turned on manually or by a special device or other automatic means. - It is designed for reserve or standby use or o supplement continuous system. A standby system can be most useful to selectivity light a particular area in an occasional basis. C. **MOVABLE LIGHTING** - This system is manually operated and is usually made up of movable search or floodlights that can be located in selected or special locations which will require lighting only for short period of time. - this consists of stationary or portable, manually operated searchlights. The searchlights may be lighted continuously during the hours of darkness or only as needed, and are usually supplementary to other types of secure lighting. D. **EMERGENCY LIGHTING** - This system is used in times of power failure or other emergencies when other system is inoperative. - This may be duplicative of existing systems. This is at standby, which can be utilized in the event of electronic failure, either due to local equipment or commercial power failure. **Types of Light Lamps** a. **Incandescent Lamp-** these are common light bulbs of the type found in the home. They have the advantages of providing illumination when in the home. They have the advantages of providing illumination when the switch is thrown and are thus most commonly used protective lighting system. b. **Gaseous discharge lamp-** the use of gaseous discharge lamps in protective lighting is somewhat limited since they require a period from two to five minutes to light when they are cold and even longer to relight when hot or after a power interruption. This is very economical to use but for industrial security, it is not acceptable due to long time in the lighting in case it is turned off by accident or by low voltage or brown-out. **Types of Gaseous Discharge Lamps** a. **Mercury Vapor Lamps-** these lamps give a blue-green color light due to the presence of mercury vapor. Its initial cost is higher than the incandescent lamps of the same voltage but is more efficient and gives more light. This is widely used for interior and exterior lighting. b. **Quartz Lamps-** these lamps emit a very bright white light and snap on almost as rapidly as the incandescent lamp. They are frequently used at very high voltage, and they are excellent for use along the perimeter barrier and in troublesome areas. **General Types of Lighting Sources** Listed below are the general lighting sources that are mostly used in providing indoor or outdoor lighting. 1. **Incandescent Lamp-** it is the least expensive in terms of energy consumed and has the advantage of providing instant illumination when the switch is on. 2. **Mercury Vapor Lamp-** it is considered more efficient than the incandescent and used widespread in exterior lighting. This emits a purplish-white color, caused by an electronic current passing through a tube of conducting and luminous gas. 3. **Metal Halide-** it has similar physical appearance to mercury vapor but provides a light source of higher luminous efficiency and better color rendition. 4. **Fluorescent-** this provides good color rendition, high lamp efficiency as well as long life. However, it cannot project light over long distance and thus, are not desirable as flood type lights. 5. **High Pressure Sodium Vapor-** this has gained acceptance for exterior lighting of parking areas, roadways, buildings and commercial interior installations. Constructed on the same principles as mercury vapor lamps, they emit a golden white to light pink color and this provide high lumen efficiency and relatively good color rendition **Types of Lighting Equipment** 1. **Floodlights-** these can be used to accommodate most outdoor security lighting needs including the illumination of boundaries, fences and buildings and for the emphasis of vital areas or particular buildings. These are wide beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier. 2. **Street lights-** this lighting equipment received the most widespread notoriety for its value in reducing crime. This produce diffused rather than directional beam. They are directly used in parking areas. 3. **Search lights-** these are highly focused incandescent lamp and are designed to pinpoint potential trouble spots. 4. **Fresnel lights-** these are wide beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier. Fresnel projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from **[15 to 30 degrees]** in the vertical plane. **General Considerations in Protective Lighting** 1. The determination of lighting needs must be depending upon the threat, perimeter extremities, surveillance capabilities, and available guard forces 2. Protective lighting must be designed to discourage unauthorized entry and to facilitate detection of intruders approaching or attempting to gain entry into protected areas. 3. The protective lighting must be continuously operated during periods of reduced visibility, and that standby lighting is maintained and periodically tested for used during times of emergency and mobilization alerts. 4. Cleaning and replacement of lamps and luminaries, particularly with respect to costs and means required and available 5. The effects of local weather conditions may be a problem in cases where fluorescent units are used. 6. Fluctuating or erratic voltages in the primary power sources. 7. Requirements for grounding fixtures and the use of common ground on an entire line to provide a stable ground potential. **AREAS TO BE LIGHTED** A. Perimeter Fence B. Building Faces Perimeter C. Pedestrian and vehicle entrance D. Parking area E. Storage, large open working areas, piers, docks, and other sensitive areas **What is ALARM?** - Aural or visual signal given by annunciator to security when intruder actuates device in a protected area. An annunciator is a visual or audible signaling device which initiates conditions of associated circuits. - -Basically, alarm systems are design to alert security personnel to consummated or attempted intrusions into an area, building or compound. Each type of alarm is activities in the event that an intruder tempers with the circuitry, a beam or radiated waives. Intrusion alarm can be electrical, mechanical or electronics. Alarms are also used for fire, smoke or other emergencies and presence of other hazards. **Protective Alarms** - Is one of the important barriers in security. It assists the security in detecting, impeding or deterring potential security threat in the installation. Basically, its function is to alert the security personnel for any attempt of intrusion into a protected area, building or compound. Once an intruder tampers the circuitry, the beam or radiated waves of the alarm system, it will activate an alarm signal. - Another safeguard used to assist security to complement if not to supplement physical security is an array of alarms. These alarms of various types and cost can be installed indoors or outdoors. - Basically, alarms systems are designed to alert security personnel to consummated or attempted intrusion into an area, building or compound. - Each type of alarm is activated in the event that an intruder tampers the circuitry, ab beam or radiated waves. In short, intrusion alarms can be electrical, mechanical or electronic. **THREE BASIC PARTS OF ALARM SYSTEM** A. **Sensor or trigger devices-** it emits the aural or visual signal or both. B. **Transmission Line-** a circuit which transmit the message to the signaling apparatus C. **Annunciator-** It is the signaling system that activates the alarm. **Types of Alarm System** 1. **Metallic foil or wire-** in building or compound, all point of entry can be wired by using electrically charge strips of tinfoil wire. Any actions that will move the foil or wire break the circuit and activate an alarm. Metallic foil or wire is used in window or glass surfaces. Doors and windows can be equipped with magnetic or spring activated contacts, which will sound and alarm when the door or window is opened. 2. **Photoelectric or electric eye-** a light beam is transmitted at a frequency of several thousand per second. It is connected by a wire to a control station and when an intruder crosses the beam, he makes contact with the photo electronic coil which thus activates the alarm. 3. **Audio detective device-** supersensitive microphone speaker sensor is installed in walls, ceiling and floors of the protected area of any sound caused by attempted forced entry inspected by the sensor. 4. **Vibration detection device-** the vibration sensitive sensor is attached to walls, ceiling or floors of the protected areas. The sensor detects any vibration caused by attempted forced entry. 5. **Foot Rail Authority-** placing the front of their foot to engage the activation bar places foot rail activator on the floor in such a position that tellers may activate the alarm. Foot rails do not acquire any obvious use of the teller's hand and their hands may be kept in full view of the robbers for reason of safety. Because of foot rail can be activated very obtrusively and safety, it is frequently found in the banks where tellers normally operate while standing up. 6. **Bill Traps-** bill traps or currency activation devices are usually placed in the teller's cash drawer and connected to the alarm system using a wire connector. When currency is removed from the devices, the alarm is activated. The advantage of these devices is that the robbers frequently remove the currency and activate the alarm. This is particularly helpful when the employees are immediately forced to leave their station without having an opportunity to activate the alarm safely. 7. **Knee or Thigh Button-** these are installed inside the desk or teller station so they can be activated by knee or thigh pressure. They are commonly found in location where personnel usually perform their duties from a seated position 8. **Foot button-** like the foot rail permit alarm activation safety while both hands remain clear in view of the robber. 9. **Double squeeze buttons-** pressure is required on both side of the device and therefore the probability of accidental alarm is reduced. **Types of Alarm Detection System (Protective Alarm System)** 1. **Central Station System-** a type of protective alarm system where the central station is located outside the installation. It can be located in an agency and the installation is one of the subscribers. When alarm is sounded, central station notifies police and other agency. A system in which the alarm signal is relayed to remote panel located at the facilities of private owned protection. Service Company manned by its personnel. 2. **Proprietary System-** this function in the same way as central system except that is owned by, operated and located in the facility. Response to all alarms is by facility's own security or fire personnel. Since this system is monitored locally, the response time to an alarm is considerably reduced. 3. **Local Alarm System-** in this case, the sensor activates the circuit, which in turn activities a horn or siren or even flashing light located in the immediate vicinity of the alarmed area. Only guard within sound or hearing can respond to such alarms, so their use is restricted where guards are so located that their response is assured. 4. **Auxiliary System --** in this system installation circuits are led into local police or fire department by lease telephone lines. The dual responsibility for circuits and the high incidence of false alarms have made this system unpopular with public fire and police personnel. 5. **Local Alarm-By-Chance System-** this is a local alarm system in which a bell or siren is sounded with no predictable response. These systems are used in residence or small retail establishments, which cannot afford a respond system. The hope is that a neighbor or passing will reach to the alarm and call for police assistance, but such a call is purely a matter of chance. 6. **Dial Alarm System-** this system is set to dial a predestined number when the alarm is activated. The number selected might be the police or the subscriber's home number, or both. When the phone is answered, a recording states that an intrusion is in progress at the location so alarmed. This system is relatively inexpensive to install and operate, but since it is dependent on general phone circuit, it could fail if line were busy or if the phone connection were cut. A. **[Audio Detection Device]-** It will detect any sound caused by attempted force entry. A supersonic microphone speaker sensor is installed in walls, ceiling and floors of the protected area. B. **[Vibration Detection]-** It will detect any vibration caused by attempted force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the protected area. C. **[Metallic Foil or Wire]-** It will detect any action that moves that foil or wire. An electrically charge strips of tinfoil or wire is used in the doors, windows or glass surface of the area. D. **[Laser Beam Alarm]-** A laser emitter floods a wall or fencing with in a beam so that when this beam is disturbed by a physical object an alarm is activated. E. **[Photoelectric or Electric Eye Device]-** An invisible/visible beam is emitted and when this is disturbed or when intruder breaks contact with the beam, it will activate the alarm. **UTILIZATION OF ALARM DEVICES** The selection of proper alarm system is not a simple matter, because the needs of each installation are different, like sets of fingerprints. Some factors that determine the requirements of the installation will include: A. Nature of the area or installation B. Critically of the area or complex C. Accessibility D. Location of installation and areas to be protected E. Construction and types of buildings F. Hours of normal operations G. Availability of other types of protection H. Initial and recurring cost of installed alarm system I. Design and salvage value of desired equipment J. Response time of the security force and local police K. Savings in manpower and money for a period of time if alarm is used. **INTRUSION ALARM DEVICES** - These are designed to detect and not to prevent criminal acts and should be used normally as an adjunct and not a replacement of the human guard forces. The primary consideration on the choice of a particular alarm system includes stability and reliability. **Desirable characteristics furthermore should include:** A. A detection unit should initiate the alarm upon intrusion of a human being in the area or vicinity to be protected area or object. B. Panel board central annunciator operating console- monitoring activities should be manned at all times. C. Fail-safe features which give alarm in the annunciator when something is wrong with the system. D. System should be difficult to tamper or render ineffective by outsider, saboteurs. **SUMMING UP PROTECTIVE ALARM DEVICES** A. Alarm devices are physical safeguards used to assist security but not a replacement in the protection of assets and lives in the installation. B. It assists the guards to extend their hearing and vision even in areas where they are not physically present. C. The alarm system whether a local, a central, proprietary, or auxiliary type are to inform the guard either visually or aurally of an attempt or a break-in within the premises being protected. D. Maintenance of alarm system must be regularly made, the signal line must be protected, and there must be alternative source of man power. E. New and improve intrusion hardwires are being developed and placed in the market but again, the human guard is irreplaceable in spite of computerization and the arrival of super sophisticated devices in security alarm systems. **PROTECTIVE LOCKS AND KEYS** - **Locks** are one of the most widely used physical security devices in the asset protection program of an installation. It complements other physical safeguards of the installation against any possible surreptitious entry. However, the owner of the installation or his security officer needs to understand the weaknesses and strength of each type of lock including door, windows or walls to be used to achieve maximum benefit from its application. This is because highly skilled burglars more often concentrate on the locks and its surrounding mechanism in order to make forcibly entry. It is for these obvious reasons that locks are considered as delaying devices which cannot really top a determine intruder from destroying the lock just to launched an attacked. Hence, knowledge of the basics principle of locking systems will enable the installation owner or the security officer to evaluate any lock and determine its quality and effectiveness in particular application. - The best defense against lock picking and making of key by impression is the installation of special pick-resistant, impression-resistant lock cylinders. - Generally speaking, locks are the cheapest security investment that can be made. - Locking device is simply a mechanism that extends the door or window into a wall that hold them. If, thereof, the wall or the door itself is weak or easily destructible, the lock cannot be effective. - It must be recognized that any lock will eventually yield to attack. - They must be thought of only as delaying. But this delay is of primary importance. The longer the intruder is stalled in an exposed position while he works to gain entry, the greater the chances of discovery. - Even the highest locking devices are only one part of door and entrance security locks, cylinders, door and frame construction, and key control are inseparable element; all must equally be effective. If one element is weak, the system will breakdown. **Lock-** a mechanical, electrical, hydraulic or electronic device to prevent entry into a building, room, container or hiding place and to prevent the removal of items without the consent of the owner. **Padlock-** a portable and detachable lock having a sliding hasp which passes through a staple ring or the like and is them made fast of secured. **Peterman** -- An English term used to describe a lock picker **TYPES OF LOCKS** 1. **Key Operated Mechanical Lock-** it uses some sort of arrangement of internal barriers which prevent the lock from operating unless they are properly aligned. The key is device used to align these internal barriers so that the lock may be operated. 2. **Padlocks-** A portable and detachable lock having a sliding hasp which passes through a staple ring and is then made fasten or secured. 3. **Warded Locks-** offer very little security. This type of lock must therefore be used only to have privacy but not to provide a high degree of security. 4. **Disc Tumbler Locks --** designed for the use of automobile industry and are in general used in car doors today. Because this lock is easy and cheap to be manufactured, its use has expanded to others areas such as desks, files and padlocks. The delay afforded is approximately ten minutes. 5. **Lever Locks --** are difficult to define in terms of security since they vary greatly in their effectiveness. They are used in safe deposit boxes and are for all practical purposes, pick-proof. The least of these locks are used in desks, lockers and cabinets and generally less secure than pin tumbler lock. 6. **Combination Locks --** Instead of using they key to align the tumblers, the combination mechanism uses number, letters or other symbols as references point which enables an operator to align them manually. They are difficult to defeat, since they cannot be picked because few can manipulate the device to discover the combination. Most of these locks have three dials, which must be aligned in the proper order before the lock will open. Some locks may have four dials for greater security. 7. **Code Operated Locks --** a type of lock that can be opened by pressing a series of numbered button in the proper sequence. These are combination-type locks and that no key is used. Pressing the series of numbered button in the proper sequence opens them. Some of them are equipped to alarm if wrong sequence is pressed. These are high security locking device. 8. **Electromagnetic Locks --** These are devices holding a door by magnetism. These are electrical units consisting of the electromagnetic on metal holding sequence. When three power is secured on the door, they will resist pressure of up to 1000 pounds. 9. **Electrical Lock-** A type of that can be opened and closed remotely by electrical means. 10. **Card Operated Locks --** are electronically or more usually magnetic. Coded card notched, embossed or containing an embedded patter of copper locks are used to operate suck locks. These are frequently fitted with recording device, which registers time of use and the identity of the user. **Types of Keys** 1. **Change Key --** a specific key, which operates the lock and has a particular combination of cuts, or biting, which match the tumblers of the tumblers in the lock. 2. **Sub-Master Key --** a key that will open all the lock within a particular area or grouping in a particular facility. 3. **Master Key --** A special key that will capable of opening a series of locks. 4. **Grand Master Key --** a type of key that will open everything in a system involving two or more master key groups. **Key Control** - Once an effective control has been installed, positive control of all keys must be gained and maintained. This can be accomplished only if it is in conjunction with the new locking devices. ***The following can be utilized to maintain effectively key control:*** 1. **Key Cabinet --** a well-constructed cabinet will have to be produced. The cabinet will have to be of sufficient size to hold the original key to every lock in the system. It should be locked at all times. 2. **Key Records --** some administrative means must be set up to record code number of the locks and to whom the keys of a specific locks were issued. 3. **Inventories --** periodic account must be made of all duplicates and original keys in the hands of the employees whom they have been issued. 4. **Audits --** in addition to periodic inventories, an unannounced audit should be made of all the key control records and procedures by a member of the management. 5. **Daily Report --** a regular report must be made to the person responsible for the key control from the personnel department indicating all persons who have left or will be leaving the department or the company. In the event that a key was issued, steps should be made to recover the key **Protective Cabinet (Security Cabinet)** - The final line of defense at any facility is in the high security storage area where records, papers, plans or cashable instruments, precious metals or other especially valuable assets are protected, these security cabinets will be of a sized and quantity which the nature of the business dictates. **3 TYPES OF SECURITY CABINET** 1. **Safe** - A metallic container used for the safekeeping of documents or small items in an office or installation. Safe can be classified as either robbery or burglary resistance depending upon the use and need. 1. At least 750 lbs., anchored 2. Any safe that weigh less than 750lbs. should be anchored to a building structure 3. Its body should at least one thick steel or equal 4. Safe as a general rule, require the door to be made of steel and at least 11/2 thick. 2. **Vault** - Heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cash, documents and negotiable instruments. - Vaults are bigger than safe but smaller than a security file room. 1. The vault door should be made of steel at least 6 inches in thickness 2. Vault walls, ceiling, floor reinforce concrete at least12 inches in thickness 3. Electrical conduits into the vaults not exceed 11/2 in diameter 4. Vault floor should be higher by hour inches with the surrounding floors and if in level with the floor buttons, storage container should be raised at least 4 inches above the floor. 5. Standard vaults, to reduce destroying of too many records, should not be more than 500 cubic feet. 6. Vault must be resistive up to 6 hours. 3. **File Room** - A cubicle in a building constructed a little lighter than a vault but bigger size to accommodate limited people to work on the records inside 1. It should at most be 12feet high 2. The interior cubage should not more than 10,000 cubic feet 3. The ventilation should be through the door. 4. It must have a watertight door and at least fire proof for one hour. 5. The supporting structure, the walls, floor and roof should be made fire-proof. **PACKAGE MOVEMENT CONTROL** Every facility must establish a system for the control of package entering or leaving the premises. Therefore, since the transporting of packages through the portals is a fact of life, they must be dealt with in order to prevent theft and misappropriation. Thus; A. No packages shall be authorized to be brought inside the industrial installation, offices and works are without proper authority. This basic precept help reduce is not eliminate pilferage, industrial espionage and sabotage. B. Outgoing packages, carried by personnel should be closely inspected and those in vehicles should be as many pilfered items hidden in the surface of the vehicles leaving the compound. C. Any personnel/ visitor entering the installation with a package should be deposit the same to the security and in return receives a numbered tag, which he/she uses in claiming his/her packages upon deporting. **VEHICLE MOVEMENT CONTROL AND IDENTIFICATION** Vehicular traffic within the boundaries of any facility must carefully controlled for safety as well as to control transporting of pilfered goods from the premises. Thus; A. Privately owned vehicle of personnel / visitors should be registered and are subject to the identification and admittance procedure. B. Vehicles should be subjected for search at the entrance and exit of an installation C. All visitors with vehicle should provide him security as to the complete details of their duration of stay, person to be visited and other information D. All vehicles of visitors should be given s sign/stickers to be placed on the windshield E. Traffic warning signs should be installed in all entrances in order to guide the visitors in their destination as well as to provide them the necessary safety precautions while they are inside installation. F. Security personnel must constantly supervise parking areas and make frequent spots searches of vehicle found there. **BUILDING ACCESS CONTROL** - At any physical barrier, a security system must possess the ability to distinguish among authorized persons, unauthorized visitors, and other unauthorized persons. This is to assist the security personnel protects sensitive are and information within the installation. - Appropriate warning signs should be posted at the building perimeter. Special restricted entry facilities to public access should be provided. This will be dependent on the degree of security needed for the protection of property, activity and other processes within the building. - The access to the restricted area shall be limited to authorize personnel who have the direct involvement with the installation, construction and operation and maintenance of the equipment and systems and or use of the materials contained within the restricted area. A clear-cut policy on the access control should be disseminated to all personnel of the installation.