Industrial Security Mngt Part 2 – WILBER

17 Aug.,2023

 

INDUSTRIAL SECURITY MANAGEMENT PART 2

WHAT IS PHYSICAL SECURITY

PHYSICAL SECURITY is the protection of people, property, and physical assets from actions and events that could cause damage or loss. The most common forms of physical security are structures and man having the following purpose:

  • deter potential intruders (e.g. warning signs, security lighting, and perimeter markings);
  • detect intrusions and monitor/record intruders (e.g. intruder alarms and CCTV systems); and
  • trigger appropriate incident responses (e.g. by security guards and police).

It is up to security designers, architects, and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring, and maintaining the controls, along with broader issues such as aesthetics, human rights, health and safety, and societal norms or conventions. Physical access security measures that are appropriate for a high-security prison or a military site may be inappropriate in an office, a home, or a vehicle, although the PRINCIPLES ARE SIMILAR, to instituting SAFETY & SECURITY.

The recent development of policing philosophy introduces Crime Prevention Through Environmental Design (CPTED) whose primary feature is about security, in criminology, this is more known as ENVIRONMENTAL CRIMINOLOGY. Though often overlooked in favor of cybersecurity, physical security is equally important.

THE NEED FOR SECURITY: Because Of the Factors that Bring About Insecure Condition

  • Threats - positive inimical acts.
  • Hazards - passive inimical conditions.
  • Vulnerability - degree of exposure against intrusion, attack, or injury.

COMPONENTS OF PHYSICAL SECURITY

  • Perimeter Barriers (1st Line of Defense)
  • Building Exteriors (2nd Line of Defense)
  • Interior Controls (3rd Line of Defense)

What are the GENERAL TYPES of physical barriers?

  1. Natural such as mountains, rivers, seas, and terrain.
  2. Man-made such as structural construction like fences, walls, floors, roofs, grills, etc.

PURPOSE OF BARRIERS

  1. Outline the perimeter of the area to be protected
  2. Create a physical and psychological deterrent to unauthorized entry
  3. Delay intrusion, thus facilitating apprehension of intruders
  4. Assist in more efficient and economical employment of guards
  5. Facilitate and improve the control of pedestrian and vehicular traffic

TYPES OF BARRIERS

Natural Barriers - refers to natural terrain features that delay or make the entry or access of intruder difficult. Examples: rivers, cliffs, ravines, etc.

Structural Barriers - refers to barriers or features constructed by man that tend to deny access or delay intrusion. Examples: walls, fences, roofing’s, ceilings, etc.

Human Barriers - refers to guards, office and shop workers who stand between the intruder and the matter being protected.

Animal Barriers - refers to canine or dogs trained to guard duties such as German Shepherds, Doberman, etc.

Energy Barriers - refers to the electrical or electronic devices used to enhance security in addition to the guard system. Examples: protective lighting and anti-intrusion alarm system

 

THE PERIMETER BARRIERS

It refers to the medium which defines the physical limits of an installation or area and restricts or impedes access thereto

It is a system of protection designed to restrict or impede access to restricted areas by unauthorized persons.

TYPE OF PERIMETER BARRIERS:

  1. Wire Fences
  2. Building Walls
  3. Bodies of Water

Main Purpose of Perimeter Barrier: To deny or impede access or exit of an unauthorized person.

The best example of perimeter barrier placed in an installation – FENCE 

FENCE is an independent structure usually existing in a vertical plane, designed to control physical and/or visual access between outside areas.

TYPES OF FENCES

  • Solid Fence
  • Full View Fence

THE SOLID FENCE

SOLID FENCE is a fence constructed out of opaque materials in such a way that visual access through the fence structure is impossible.

Advantages of Solid Fence:

  • It

    denies observation and viewing

    of the installation from outside.
  • It denies

    intruder the opportunity to become familiar with the personnel, activities, and the time schedules and movement of guards within

    the installation.

Disadvantages of Solid Fence:

  • It

    prevents the security guard from observing

    the area around the installation;
  • It

    creates a shadow that may be used by the intruder as cover

    and concealment

THE FULL VIEW FENCE

FULL VIEW FENCE is a fence constructed in such a way that a visual access through the fence is possible. Barbed wire, cyclone wire (chain link), concertina, or decorative grills are examples of Full View Fence.  

Advantages of Full View Fence:

  • It permits

    24-hour observation

    by roving and stationary security guards;
  • It

    does not create shadows

    for possible cover and concealment

Disadvantages of Full View Fence:

  • It

    allows visual access/observation

    to the installation by outsiders/intruders;
  • It

    allows intruder to become familiar

    with the movement and time schedule of security personnel

SOME SPECIFICATIONS OF FULL VIEW FENCE

  • At least 7 feet (8 feet including top guard)
  • Vertical Clearance at the Bottom. No more than 2 inches
  • Wooden Fence Post. Minimum horizontal dimension
  • Fence Post. Should be Concrete
  • Top Guard. 45-degree angle. Upward and outward
  • Chain Link. Not more than 3 inches in diameter

THE PROTECTIVE LIGHTING

Security lighting provides a level of illumination to clearly identify persons or objects and creates a psychological deterrent to criminal activity in the area being protected.

Protective lighting should enable security personnel to observe activities at an installation without disclosing their presence. Adequate lighting for all approaches to an installation discourages attempted unauthorized entry and reveals persons in the area.

However, don't solely rely on lighting. You should use it with other measures, such as fixed security posts or patrols, fences, and alarms. Your goal is to place glaring lights in the eyes of the intruder and relatively little light on security patrol routes.

THE SECOND LINE OF DEFENSE

The second line of defense is the independent control function that oversees risk and monitors the first-line-of-defense controls. It can challenge the effectiveness of controls and management of risk across the organization.

Building Exteriors - 2nd line of defense

  • Walls and roofing
  • Doors and ceilings
  • Windows & fire escapes

 

THE THIRD LINE OF DEFENSE

This high level of independence is not available in the second line of defense. An internal audit of the security system provides assurance on the effectiveness of governance, risk management, and internal controls, including the manner in which the first and second lines of defense achieve risk management and control objectives.

A broad range of objectives, including efficiency and effectiveness of operations; safeguarding of assets; reliability and integrity of reporting processes; and compliance with laws, regulations, policies, procedures, and contracts.

All elements of the risk management and internal control framework, which includes: internal control environment; all elements of an organization’s risk management framework (i.e., risk identification, risk assessment, and response); information and communication; and monitoring. Below are features of the 3RD LINE OF DEFENSE.

INTERIOR CONTROL- 3rd line of Defense

  • Guard and Guard System
  • Restricted Areas
  • ID System and Access Control
  • Entry/Exit Control (visitors, clients, suppliers)
  • Vehicle Identification and Control
  • Communication System
  • Protective Alarm and Emergency System
  • Emergency Plans
  • CCTV, & Combined Electronic, Biometric, and Energy Barriers
  • Key Management and Control   

SUMMING up, below is the total security system expected for a safe environment whether governmental or industrial establishments.

GOING BACK TO THE FIRST LINE OF DEFENSE: Specifications for perimeter barrier (chainlink fence) 

Specifications for Chain-link Fences

  1. Must be constructed of 7 feet material excluding top guard;
  2. Must be 9 gauge or heavier;
  3. Mesh opening must not be larger than 2 inches per side;
  4. Should be twisted and barbed salvage at top and bottom;
  5. Must be accurately fastened to rigid metal or reinforced concrete;
  6. Must reach within 2 inches of hard ground or paving
  7. On soft ground must reach below surface deep enough to compensate for shifting soil or sand.

Specification Regarding the Use of Barbed Wire

  1. Standard barbed-wire is twisted, double-strand, 12 gauge wire, with four points barbs spaced on equal distance apart.
  2. Barbed wire fencing should not be less than 7 feet high excluding the top guard.
  3. Barbed wire fencing must be firmly affixed to post more than 6 feet apart.
  4. The distance between strands will not exceed 6 inches and midway between parts.

PERIMETER BARRIER OPENING

  1. Gates and doors 
  2. Sidewalk elevators
  3. Utility openings
  4. Clear zones

(Above is an example of a common opening and entrance to the protected establishment.)

A CLEAR ZONE is an unobstructed area which, should be maintained on both sides of the perimeter barrier.

SPECIFICATION ON CLEAR ZONE

  1. A clear zone of 20 feet or more should exist between the perimeter barriers and exterior structures, parking areas, and natural or man-made features.
  2. A clear zone of 50 feet or more should exist between the perimeter barriers and structures within the protected areas except when a building wall constitutes part of the perimeter barriers.

OTHER ADDITIONAL PROTECTIVE MEASURES OTHER THAN PHYSICAL AND PERIMETER BARRIERS

(1) TOP GUARD - it is an additional overhang of barbed wire placed on vertical perimeter fences facing upward and outward with a 45-degree angle with 3 to 4 strands of barbed wires spaced 6 inches apart.

(2) GUARD CONTROL STATION - located at the main entrance.

(3) TOWERS - guardhouse located above the perimeter barriers.

(4) Barrier Maintenance.

(5) PROTECTION IN-DEPTH - barrier after barrier.

(6) SIGNS AND NOTICES - these are control signs

SECURITY LIGHTING TECHNIQUES: (See also Protective Lighting) 

Using protective lighting is a practical, cost-effective way to add a layer of security to your overall security strategy. Protective lighting delivers increased visibility for risk scenarios as well as the optimal visibility for security functions like video surveillance and guard duties. 

  1. Security lighting should enable the guard to observe clearly the activities around and inside the premises within his jurisdiction.
  2. High contrast between intruder and background should be provided.
  3. Lighting the boundaries and approaches.
  4. The effective lighting system should:
  5. Deter or discourage attempts to enter the premises;
  6. Make detection more likely if entry is attempted;

TYPES OF SECURITY LIGHTING

(1) STATIONARY LUMINARY – continuous lighting either:

    1. glare projection
    2. controlled lighting

(2) STANDBY LIGHTING – similar to lighting but is turned on manually or automatically when there is suspicion of entry.

(3) MOVABLE LIGHTING – consist or manually operated movable searchlight which may be either lighted during darkness or only as needed.

(4) EMERGENCY LIGHTING – may duplicate the 3 systems in whole or in part, and is used during power failure or emergencies.

TYPES OF LIGHT LAMPS

  1. Incandescent Lamps (Fluorescent)
  2. Gaseous Lamps - also known as discharge lamps such as;
  3. Mercury - vapor lamps - blue-green in color.
  4. Sodium - (high & low pressure) vapor lamps - yellow light.
  5. Quartz Lamps - very bright light.
  6. LED (light-emitting diode) 

(Standard lamp post or street light are common examples of mercury lamp)

PURPOSE OF INTRUSION ALARM SYSTEMS

  1. To economize
  2. To substitute in place of other security measures
  3. To supplement by providing additional controls

BASIC PRINCIPLES OF OPERATION OF INTRUSION DETECTION SYSTEM

  1. Breaking an electrical circuit
  2. Interrupting a light beam
  3. Detecting sound
  4. Detecting vibration
  5. Detecting a change in capacitance due to penetration of an electrostatic field.

(An example of anti-intrusion alarm system technology)

TYPES OF PROTECTIVE ALARM/ALARM DETECTION SYSTEMS

  1. LOCAL ALARM SYSTEM

    – this system consists of rigging up a visual or audible alarm near the object to be protected. In case of alarm, response will be made by the local guards and other personnel within sight or hearing.
  2. AUXILIARY SYSTEM

    – one in which the installation system owned is a direct extension of the police and fire alarm system.
  3. CENTRAL STATION SYSTEM

    – in this system, alarms are transmitted to a central station outside the installation from which appropriate action is taken, such as notifying the local police and fire department.
  4. PROPRIETARY SYSTEM

    – it is similar to the central station system, except it is owned by and located on the installation.

(Alarm system and technology: Camera identification equipped and auto-activation (voice activation, temperature activation, etc.) in case of disorder without manual manipulation) 

COMMUNICATION SYSTEM IN SECURITY

  1. Local telephone exchange
  2. Commercial telephone service
  3. Inter-communication
  4. Two-way radios for security
  5. Security supervising system
  6. Paging and recall system
  7. Bull-horns or megaphones
  8. Amplifier or loud speaker systems

PASS and BADGE is issued by security for personnel to be admitted to the installation (entry and access control)

PROTECTIVE LOCKS AND KEYS CONTROL

FOUR GENERAL GROUPS OF KEY LOCKS

  1. Warded Lock –

    a lock that had been developed in the middle ages.
  2. Lever Tumbler Lock

    – lock used in safe deposit boxes and mailboxes.
  3. Disc Tumbler Lock –

    also known as wafer tumbler lock.
  4. Pin Tumbler Lock –

    the most widely used lock

COMBINATION LOCK is a lock that requires manipulation of parts according to a predetermined combination code of numbers or letters.

PADLOCK is used to secure two objects like a lock in the same relative position.

MASTER KEYING is when a lock operates on a master key plus an individual or change key. A MASTER KEY therefore can open every lock within a system (or building) and can be used when an independent key is LOST. 

PASS KEY is a key used to operate an inexpensive lock by moving it in the keyhole until it catches the locking belt and unlocks mechanism. Some dictionaries considered pass key as a master key, but specifically, it is not. It is more known as INDEPENDENT KEY which operates only on a certain lock.

PICK LOCK. A picklock is a tool that can be used to open a lock without a key and normally used by thieves or burglars. There were countries that criminalize the possession of picklock. 

TYPES OF FIRE ALARM SYSTEM

  1. Smoke Detectors -

    detect the presence of smoke.
  2. Ionization Detectors -

    detect particles created during the early stage of fire.
  3. Sprinkler Water-

    flow Detector - for an automatic sprinkler system.

TYPES OF AUTOMATIC SPRINKLER SYSTEM

  • Wet Pipe System -

    water held in pipes.

(Above is an example of a layout for a wet pipe sprinkler system)

  • Dry Pipe System -

    when the sprinkler head is ruptured, a pressurized air escapes and water rushes into the pipes.

(Above is an example of a layout for a dry pipe sprinkler system)

  • Deluge System -

    dry pipe installation except that it is designed to direct water flow in a chosen direction

(Above is an example of a layout for a deluge sprinkler system)

STORAGE SECURITY OF RECORDS

TYPES OF BUSINESS RECORDS

  1. Class I -

    Vital records (records that are irreplaceable)
  2. Class II -

    Important records (loss will involve considerable expense and cause labor)
  3. Class III -

    Useful records (loss will cause inconvenience but readily replaced)
  4. Class IV -

    non-essential records (daily files)

CATEGORY OR TYPES OF STORAGE CONTAINERS

  1. Class 1 -

    Commercial records safes designed for fire protection.
  2. Class 2

    - Commercial money safes designed for robbery burglary protection.
  3. Class 3 -

    Security cabinets designed to meet specifications for safeguarding classified materials.

VAULTS is an enlarged safe. VAULTS are classified according to fire resistivity such as two, three, or four hours. The considerations for the construction of vaults are:

  1. Location
  2. Vault Utilities
  3. Structural Foundation
  4. Doors

GUARD SYSTEM is the strategic placement and combination of human, animal, and energy barriers between the intruder and the matter to be protected.

Functions of Human Guard System

  • Sounds Alarms
  • Apprehends unauthorized personnel
  • Identifies unauthorized personnel
  • Detects intruder

2 Basic Techniques of Guard Employment: 

  • Stationary (Fixed)
  • Moving (Patrol)

TYPES OF GUARD FORCE SYSTEM

  • Proprietary Guards
  • Contract Guards
  • Government Guard

Proprietary Guards

Advantages:

  • Generally high caliber
  • Provide better service
  • Knows more complex security issues
  • Less turnover
  • More loyal to the company

Disadvantages:

  • Expensive
  • Possibility of joining guard union is high
  • Non-availability of back up personnel

Contract Guards

Advantages:

  • Less expensive
  • Convenient
  • Lesser administrative/personnel-related problems
  • Free from Payroll-related problem
  • Relieved of guard supervision
  • Availability of Back up guards
  • Security Agency usually accepts civil liability

Disadvantages:

  • Improper Training
  • Low Caliber personnel
  • Project image
  • No loyalty to the company
  • Large turnover

SIGNIFICANT INFORMATION RELATED TO R.A. 5487

(An Act Governing the Organization & Management of Private Security Agencies, Company Guard Forces and Government Security Forces)

Disqualifications for LICENSE to operate and exercise Security Profession: (Sec. 4)

  1. Having previous record of any conviction of any crime;
  2. Having previous record of any conviction of any offense involving moral turpitude;
  3. Having been dishonorably discharged or separated from employment or service;
  4. Being a mental incompetent;
  5. Being a user/addicted to the use of prohibited drugs or narcotics;
  6. Being a habitual drunkard;
  7. Dummy of a foreigner

What is SAGSD?

RA 5487 defines SAGSD to the current PNP Civil Security Group Security Agency and Guard Supervision Division or any other PNP Office that may be designated later as the primary office for supervision and implementation of RA 5487.

Who may organize and maintain a Private Security Agency and Private Detective Agency? (Rule IV, Part 1, Section 1)

  • Any Filipino citizen or corporation, association, partnership, one hundred percent (100%) of which is owned and controlled by Filipino citizens, may organize and maintain a Private Security Agency or private Detective Agency.

What are the basic requirements of an operator or manager of an agency? (Rule IV, Part 1, Section 2)

  • The operator or manager of an agency including managers of branch offices. Must be:
    1. Filipino Citizen;
    2. Not less than twenty five (25) years of age;
    3. College graduate and/or a commissioned officer in the inactive service or retired from the Armed Forces of the Philippines or the Philippine National Police;
    4. Has taken a course/seminar on Industrial Security Management and/or must have adequate training or experience in security business; and
    5. Good moral character.
  • A new applicant for a license to operate shall be required to obtain a minimum capitalization of one million pesos (P1,000,000.00) with a minimum bank deposit of five hundred thousand (P500,000.00) pesos in order to start its business operation.

What is the minimum number of licensed private security personnel can be employed by a private security agency? 200

What is the minimum number of licensed private security personnel that can be employed by a company guard force or private detective agency? 30

What is the maximum number of private security personnel that a private security agency/company guard forces/private detective agency can be employed? 1000

How long is the duration of License To Operate (LTO) private security agency? 2 years.  All temporary LTOs upon expiration are automatically canceled.

What are the Basic Requirements of private security personnel? (Rule V, Section 2)

  1. Filipino citizen;
  2. Not less than 18 years old;
  3. Must have taken a private security course/seminar and/or must have adequate training or experience in security business or rendering security/detective services;
  4. Of good moral character and must not have been convicted of any crime or violation of these rules and regulations carrying a penalty of prohibition to be licensed; and
  5. Must be physically and mentally fit.

What are the Qualifications of a Private Security Guards? (Rule V, Section 3)

  1. Filipino citizen;
  2. High school graduate;
  3. Physically and mentally fit;
  4. Not less than eighteen (18) years of age nor more than fifty (50) years of age (for new applicants and security guards in non-supervisory position); and
  5. Has undergone a pre-licensing training course or its equivalent.

What are the Qualifications for Security Officer? (Rule V, Section 4)

  1. Filipino citizen;
  2. Holder of Baccalaureate Degree;
  3. Physically and mentally fit;
  4. Has graduated from Security Officer Training Course or its equivalent;

What are the Qualifications for Security Consultants? (Rule V, Section 5)

  1. Filipino citizen;
  2. Physically and mentally fit;
  3. Holder of Master’s Degree in either Criminology, Public Administration, MNSA, Industrial Security Admin. or law.
  4. Must have at least ten (10) years of experience in the operation and management of the security business.

What are the Qualifications for a Private Detective? (Rule V, Section 6)

  1. Filipino Citizen;
  2. Physically and mentally fit;
  3. Holder of Baccalaureate degree preferably Bachelor of Laws or Bachelor of Science in Criminology;
  4. Graduate of Criminal Investigation Course offered by the PNP or the NBI or any police training school, or a detective training in any authorized/recognized training center;
  5. Advance ROTC/CMT graduate or it's equivalent.

Who are exempted from Basic Pre-licensing Training? (Rule V, Section 7)

  1. Veterans, retired military/police personnel, or those honorably discharged military/police possessing all the qualifications mentioned in the preceding Section shall be exempted from the pre-licensing training/seminar and academic/scholastic attainment which is a requirement for the initial issuance of a license to exercise private security profession but shall NOT however be exempted from taking the refresher training course or its equivalent;
  2. Likewise, graduates of ROTC advance/CHDF (or its equivalent in the PNP) Training graduates shall be exempted from the required Basic-licensing Training/Seminar.

What are the types of licenses stipulated under RA 5487?

  1. Temporary License – initial and conditional issuance while awaiting issuance of regular license identification cards or in the interim for purposes not covered by Rule V.
  2. Regular License – generated Private Security Personnel License Card, duration or validity of which shall be for two (2) years.

How is government security personnel licensed? (Rule V, Section 10)

No person shall be licensed as a Government Security personnel unless he possesses the qualifications as prescribed in Section 3, 4, and 5 of rule V, provided he submits an appointment order coming from the Civil Service Commission.

(You can read more about RA 5487: see link below) 

If you have any questions on fiber optic perimeter intrusion detection systems. We will give the professional answers to your questions.