Notes Industrial Security Management

Download as pdf or txt
Download as pdf or txt
You are on page 1of 38

INDUSTRIAL SECURITY MANAGEMENT & ADMINISTRATION

CONCEPT OF SECURITY

Security is a state or condition of being secured; there is freedom from fear, harm, danger, loss, destruction or
damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions.
Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man needs
adequate protection.

Since security in general is very hard to comprehend, it can be divided into


three major areas—

1. Physical Security - this concern with the physical measures adopted to prevent unauthorized access to
equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage, loss
and theft.
2. Personnel Security- this is as important as physical security. Personnel security starts even before the
hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to
insure that a firm hires those best suited to assist the firm in achieving its goals and objectives and once hired
assist in providing necessary security to the work force while carrying out their functions.
3. Document and Information Security- this involves the protection of documents and classified
papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure.
Classified documents need special handling. Lack of indoctrination and orientation among the personal handling
them can result in the leakage, loss, theft and unauthorized disclosure of the documents.

➢ Physical security, personnel security, and document security cannot exist independently- they are mutually
supporting. They are in many respects overlapping. Physical security is correlated to the other two parts,
interwoven and one is essential to the other.

PROTECTIVE SECURITY SYSTEMS

Protective Security can be defined as those measures taken by an installation or unit to protect itself
against sabotage, espionage or subversion and at the same time provide freedom of action in order to provide the
installation of the unit with the necessary flexibility to accomplish its mission.

The aspects of protective security can be seen with the application of the
following:

1. Industrial Security – a type of security applied to business groups engaged in industries like
manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may
also mean the business of providing security.
2. Hotel Security - a type of security applied to hotels where its properties are protected from pilferage,
loss, damage and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest
themselves. This type of security employs house detectives, uniforms guard and supervisor and insures that
hotel guests and their personal effects are safeguarded.
3. Bank security - this type of security is concern with bank operations. Its main objective is the protection
of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and
assets while in storage, in transit and during transactions.

1
4. VIP Security - a type of security applied for the protection of top-ranking officials of the government or
private entity, visiting persons of illustrious standing and foreign dignitaries.
5. School Security - a type of security that is concern with the protection of students, faculty members, and
school properties. Security personnel are trained to protect the school property from theft, vandals, handling
campus riots and detecting the use of intoxicated drugs and alcohol by the students.
6. Supermarket or Mall Security - a type of security which is concern with the protection of the
stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and
customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer
relation.
7. Other types – this include all other security matters not covered in the above enumeration.

PHYSICAL SECURITY

➢ Definition: Physical security measures are being used to define, protect, and monitor property rights and
assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized
access to equipment, facilities, material and document and to safeguard them against espionage, sabotage,
damage and theft. Physical security may be also defined as the safeguarding by physical means, such
as guard, fire protection measures, of plans, policies, programs, personnel, property, utilities, information,
facilities and installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud, or other
dishonest criminal act.

What is a Barrier?

➢ A barrier can be defined as any structure or physical device capable of restricting, deterring, delaying, illegal
access to an installation. Generally, a barrier is use for the following purposes—

1. Define the physical limits of an area.


2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic.

Types of Barriers

1. Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that
are difficult to traverse.
2. Structural barriers - these are features constructed by man regardless of their original intent that tends
to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
3. Human barriers - persons being used in providing a guarding system or by the nature of their
employment and location, fulfill security functions. Examples are guards, office personnel, shop workers, etc.
4. Animal barriers - animals are used in partially providing a guarding system. Dogs are usually trained and
utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys
could also be included.
5. Energy barriers - it is the employment of mechanical, electrical, electronic energy imposes a deterrent to
entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm
system and any electronic devices used as barriers.

2
Three Line of Physical Defense

1. First line of Defense- perimeter fences/ barriers


2. Second line of defense- doors, floors, windows, walls, roofs and grills and other entries to the
buildings
3. Third line of defense- storage system like steel cabinets, safes, vaults and interior files.

Principles of Physical Security

1. The type of access necessary will depend upon a number of variable factors and therefore may be achieved in a
number of ways.
2. There is no impenetrable barrier
3. Defense-in depth is barriers after barriers
4. Delay is provided against surreptitious and non-surreptitious entry.
5. Each installation is different.

What is a Restricted Area?

➢ A restricted area is any area in which personnel or vehicles are controlled for reasons of security. Restricted
area is established to provide security for installation or facilities and to promote efficiency of security operations
and economy in the use of security personnel.

Types of Restricted Areas

Two types of restricted areas may be established to permit different degrees of security within the same installation
or facility, and to provide efficient bases for the application of different degrees of access, circulation and protection.
These restricted areas are termed Exclusion areas and Limited areas. Exclusion Area- an exclusion area is a
restricted area which contains a security interest to TOP SECRET importance, and which requires the highest degree
of protection. Limited Area Control- a limited area is a restricted area in which a lesser degree of control is required
than in an exclusion area but which the security interest would be compromised by uncontrolled movement.

Limited Area Control includes the following—

A. Interior Area Control - Interior area control is generally affected in two ways. The first method is the system
which is initiated and terminated at the outer limits of the area to determine the movements of a visitor within the
area. A second somewhat less means of accomplishing the same thing is time travel. This system provides for
checking the actual time used by the visitor against known time requirements for what the visitor is to
accomplish.
B. Visitor Identification and Movements Control - Processing and control of movements of visitor shall be
included in the PASS SYSTEM. The control of movements of visitor will depend on the installation. A visitor
register shall be maintained to include the name of the visitor, date of visit, purpose of visit, which may be filed
for the future reference
C. Key Control- A system of controlling keys shall be advised and regulations covering the disposal, storage or
withdrawals, shall be issued and imposed.
D. Fire Prevention- fire is so potentially destructive without human assistance, with assistance it can be caused to
devastate those things you are attempting to secure and, professionally accomplished, often in a way that does
not leave recognizable evidence of sabotage.

3
What is Perimeter Security?

➢ It is the protection of the installation’s inner and the immediate vicinity. The main purpose of perimeter barrier is
to deny or impede access or exit of unauthorized person. Basically, it is the first line of defense of an installation.
This is maybe in the form of fences, building walls or even bodies of water.
➢ The function and location of the facility itself usually determine the perimeter of the installation. If the facility is
located in a city whereby the facility is located in a city whereby the building or enterprise occupies all the area
where it is located, the perimeter may be the walls of the building itself. Most of the Industrial companies,
however, are required to have a wide space for warehousing, manufacturing etc.

Types of Perimeter Barrier

1. fences,
2. walls,
3. bodies of water

Types of Fences

1. Solid fence -constructed in such a way that visual access through the fence is denied. Its advantage is that
it denies the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled
of the movements of the guards in the installation. On the other hand, it prevents the guards from observing the
area around the installation and it creates shadow that may be used by the intruder for cover and concealment.
2. Full-view fence - it is constructed in such a way that visual access is permitted through the fence. Its
advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the
installation under observation. On the other hand, it allows the intruder to become familiar with the movements
and time schedule of the guard patrols thereby allowing him to pick the time that is advantageous on his part.

Types of Full-View Fence—

1. Chain link fence—


▪ It must be constructed of 7 feet material excluding top guard.
▪ It must be of 9 gauges or heavier.
▪ The mesh openings are not to be larger than 2 inches per side.
▪ It should be twisted and barbed selvage at top and bottom
▪ It must be securely fastened to rigid metal or reinforced concrete.
▪ It must reach within 2 inches of hard ground or paving.
▪ On soft ground, it must reach below surface deep enough to compensate for shifting soil or sand.

2. Barbed wire fence—


▪ Standard barbed wire is twisted, double-strand, 12-gauge wire with 4 point barbs spaces in an equal
distance apart.
▪ Barbed wire fencing should not be less than 7 feet high excluding top guard.
▪ Barbed wire fencing must be firmly affixed to posts not more than 6 feet apart.

➢ As a standard, the distance between strands must not exceed 6 inches at least one wire will be interlaced
vertically and midway between posts.

4
3. Concertina wire fence—
▪ Standard concertina barbed wire is commercially manufactured wire coil of high strength steel barbed wire
clipped together at intervals to form a cylinder.
▪ Opened concertina wire is 50 feet long and 3 feet in diameter.

Perimeter Barrier Opening

1. Gates and Doors - when not in use and controlled by guards, gates and doors in the perimeter should be locked
and frequently inspected by guards. Locks should be changed from time to time and should be covered under
protective locks and key control.
2. Side-walk-elevators - these provide access to areas within the perimeter barrier and should be locked and
guarded.
3. Utilities Opening - sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier
and which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water
filled traps or other structural means providing equivalent protection to that portion of the perimeter barriers.
4. Clear Zones - an obstructed area or a “clear zone” should be maintained on both sides of the perimeter barrier.
A clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural covers that
may provide concealment for assistance to a person seeking unauthorized entry.

Additional Protective Measures

1. Top Guard - additional overhang of barbed wire placed on vertical perimeter fences upward and outward with a
45 degree angle with 3 to 4 strands of barbed wires spaced 6 inches apart. This increases the protective height
and prevents easy access.
2. Guard Control stations - this is normally provided at main perimeter entrances to secure areas located out-of-
doors, and manned by guards on full-time basis. Sentry station should be near a perimeter for surveillance at the
entrance.
3. Tower Guard - this is a house-like structure above the perimeter barriers. The higher the tower, the more
visibility it provides. It gives a psychological unswerving effect to violators. By and large guard towers, whether
permanent or temporary, must have a corresponding support force in the event of need. Towers as well as guard
control stations should have telephones, intercoms, and if possible two-way radios connected to security
headquarters or office to call for reserves in the event of need.
4. Barrier Maintenance - fencing barriers and protective walls should always be regularly inspected by security.
Any sign or attempts to break in should be reported for investigation. Destruction of fence or sections thereof
should be repaired immediately and guard vigilance should be increased.
5. Protection in Depth - in large open areas or ground where fencing or walling is impractical and expensive,
warning signs should be conspicuously placed. The depth itself is protection reduction of access roads, and
sufficient notices to warn intruders should be done. Use of animals, as guards and intrusion device, can also be
good as barriers.
6. Signs and notices - “Control signs” should be erected where necessary in the management of unauthorized
ingress to preclude accidental entry. Signs should be plainly visible and legible from any approach and in an
understood language or dialect.

What is Protective Lighting?

➢ The idea that lighting can provide improve protection for people and facilities is as old as civilization. Protective
lighting is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the
intruders.

5
Types of Protective Lighting

1. Continuous lighting - the most familiar type of outdoor security lighting, this is designed to provide two specific
results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to flood a given
area continuously during the hours of darkness.

A. Glare projection type- it is being used in prisons and correctional institutions to illuminate walls and outside
barriers.
B. Controlled lighting- it is generally employed where, due to surrounding property owners, nearby highways
or other limitations, it is necessary for the light to be more precisely focused.

2. Standby lighting - it is designed for reserve or standby use or to supplement continuous systems. A standby
system can be most useful to selectively light a particular area in an occasional basis.
3. Movable or Portable lighting - this system is manually operated and is usually made up of movable search or
floodlights that can be located in selected or special locations which will require lighting only for short period of
time.
4. Emergency lighting - this system is used in times of power failure or other emergencies when other systems
are inoperative.

General Types of Lighting Sources

Listed below are the general lighting sources that are mostly used in providing indoor or outdoor lighting.

1. Incandescent lamp - it is the least expensive in terms of energy consumed and has the advantage of providing
instant illumination when the switch is on.
2. Mercury vapor lamp - it is considered more efficient that the incandescent and used widespread in exterior
lighting. This emits a purplish-white color, caused by an electric current passing through a tube of conducting
and luminous gas.
3. Metal halide - it has similar physical appearance to mercury vapor but provides a light source of higher luminous
efficiency and better color rendition.
4. Fluorescent - this provides good color rendition, high lamp efficiency as well as long life. However, it cannot
project light over long distance and thus are not desirable as flood type lights.
5. High-pressure sodium vapor - this has gained acceptance for exterior lighting of parking areas, roadways,
buildings and commercial interior installations. Constructed on the same principle as mercury vapor lamps, they
emit a golden white to light pink color and this provide high lumen efficiency and relatively good color rendition.

Types of Lighting Equipment

Three types of lighting equipment are generally used or associated with security lighting. These are—

1. Floodlights - These can be used to accommodate most outdoor security lighting needs, including the
illumination of boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
2. Street lights - This lighting equipment received the most widespread notoriety for its value in reducing crime.
3. Search lights - These are highly focused incandescent lamp and are designed to pinpoint potential trouble
spots.
4. Fresnel lights - These are wide beam units, primary used to extend the illumination in long, horizontal strips to
protect the approaches to the perimeter barrier. Fresnel projects a narrow, horizontal beam that is approximately
180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane.

6
What are Protective Alarms?

➢ Protective alarm is one of the important barriers in security. It assists the security in detecting, impeding or
deterring potential security threat in the installation. Basically, its function is to alert the security personnel for any
attempt of intrusion into a protected area, building or compound. Once an intruder tampers the circuitry, the
beam or radiated waves of the alarm system, it will activate an alarm signal.
➢ On the other hand, the use of communication equipment in the installation helps security in upgrading its
operational efficiency and effectiveness.

Three Basic Parts of Alarm System

1. Sensor or trigger device - it emits the aural or visual signals or both.


2. Transmission line - a circuit which transmit the message to the signaling apparatus.
3. Enunciator/annunciator - it is the signaling system that activates the alarm.

Types of Protective Alarm System

1. Central Station System - a type of alarm where the control station is located outside the plant or installation.
When the alarm is sounded or actuated by subscriber, the central station notifies the police and other public
safety agencies.
2. Proprietary system - centralized monitor of the proprietary alarm system is located in the industrial firm itself
with a duty operator. In case of alarm, the duty operator calls whatever is the primary need; firefighters, police,
an ambulance or a bomb disposal unit.
3. Local Alarm – This system consist of ringing up a visual or audible alarm near the object to be protected. When
an intruder tries to pry a window, the alarm thereat goes off.
4. Auxiliary alarm - company-owned alarm systems with a unit in the nearest police station so that in case of
need, direct call is possible. The company maintains the equipment and lines both for the company and those in
the police, fire and other emergency agencies by special arrangement. Radio, landlines, or cell phones can avail
of the auxiliary system.

Kinds of Alarms

1. Audio Detection Device - it will detect any sound caused by attempted force entry. A supersonic microphone
speaker sensor is installed in walls, ceilings and floors of the protected area.
2. Vibration Detection Device - it will detect any vibration caused by attempted force entry. A vibration sensitive
sensor is attached to walls, ceilings or floors of the protected area.
3. Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically charge strips of tinfoil or
wire is used in the doors, windows or glass surfaces of the protected area.
4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by
a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and when this is disturbed or when
an intruder breaks contact with the beam, it will activate the alarm.

What is Protective Lock and Key Control?

➢ Lock is one of the most widely used physical security devices in the asset protection program of an installation.
It complements other physical safeguards of the installation against any possible surreptitious entry. However,
the owner of the installation or his security officer needs to understand the weaknesses and strength of each
type of lock including the door, window or walls to be used to achieve maximum benefit from its application. This
is because highly skilled burglars more often concentrate on the lock and its surrounding mechanism in order to

7
make a forcible entry. It is for this obvious reasons that locks are considered as delaying devices which cannot
really stop a determine intruder from destroying the lock just to launch an attack. Hence, knowledge of the basic
principles of locking systems will enable the installation owner or the security officer to evaluate any lock and
determine its quality and effectiveness in a particular application.

What is a Lock?

➢ A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a
building, room, container or hiding place.

Types of Locks

1. Key-operated mechanical lock - it uses some sort of arrangement of internal physical barriers (wards tumblers)
which prevent the lock from operating unless they are properly aligned. The key is the device used to align these
internal barriers so that the lock may be operated.

Three (3) Types of Key-operated Lock


A. Disc or wafer tumbler mechanism
B. Pin tumbler mechanism
C. Lever tumbler mechanism

2. Padlock - a portable and detachable lock having a sliding hasp which passes through a staple ring and is then
made fasten or secured.
3. Combination lock - instead of using the key to align the tumblers, the combination mechanism uses numbers,
letters or other symbols as reference point which enables an operator to align them manually.
4. Code-operated lock - a type of lock that can be opened by pressing a series of numbered button in the proper
sequence. 5. Electrical lock - a type of lock that can be opened and closed remotely by electrical means. 6.
Card-operated lock - a type of lock operated by a coded card.

Types of Keys

1. Change key - a specific key, which operates the lock and has a particular combination of cuts which match the
arrangement of the tumblers in the lock.
2. Sub-master key - a key that will open all the lock within a particular area or grouping in a given facility.
3. Master key - a special key capable of opening a series of lock.
4. Grand Master key - a key that will open everything in a system involving two or more master key groups.

Key Control

➢ Once an effective key control has been installed, positive control of all keys must be gained and maintained. This
can be accomplished only if it is established in conjunction with the installation of new locking devices. The
following methods can be used to maintain effective key control—

1. Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system. It should be secured at all times.
2. Key record- some administrative means must be set up to record code numbers and indicates to whom
keys to specific locks have been issued.
3. Inventories- periodic inventories will have to be made of all duplicate and original keys in the hands of the
employees whom they have been issued.

8
4. Audits- in addition to periodic inventory, an unannounced audit should be made of all key control records
and procedures by a member of management.
5. Daily report- a daily report should be made to the person responsible for key control from the personnel
department indicating all persons who have left or will be leaving the company. In the event that a key has
been issued, steps should be initiated to insure that the key is recovered.

What is a Security Cabinet?

➢ The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, precious metals or other especially valuable assets are protected. These security containers will be
of a size and quantity, which the nature of the business dictates.
➢ In protecting [property, it is essential to recognize that protective containers are designed to secure against
burglary or fire. Each type of equipment has a specialized function and it will depend on the owner of the facility
which type ha is going to use.

Three (3) Types of Security Cabinet

1. Safe - a metallic container used for the safekeeping of documents or small items in an office or installation. Safe
can be classified as either robbery or burglary resistance depending upon the use and need.
A. Its weight must be at least 750 lbs. And should be anchored to a building structure.
B. Its body should at least one inch thick steel.
2. Vault - heavily constructed fire and burglar resistance container usually a part of the building structure used to
keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than a file
room.
A. The vault door should be made of steel at least 6 inches in thickness.
B. The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
C. The vault must be resistive up to 6 hours.
3. File room - a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate
limited people to work on the records inside.
A. The file room should at most be 12 feet high.
B. It must have a watertight door and at least fire proof for one hour.

Control of Personnel in the Physical Facility

➢ In every installation, the use of protective barriers, security lighting, communication and electronic hardware
provides physical safeguards but these are insufficient to maximize the effort of the guard force. A control point
must be established for positive personnel identification and check system. This is to insure that only those
persons who have the right and authority will be given the necessary access to the area.
➢ The most practical and generally accepted system of personnel identification is the use of identification cards
badges or passes. Generally speaking, this system designates when and where and how identification cards
should be displayed, and to whom. This helps security personnel eliminate the risk of allowing the access of
unauthorized personnel within the establishments.

Types of Personnel Identification

1. Personal recognition
2. Artificial recognition- identification cards, passes, passwords, etc.

9
Use of Pass System

1. Single pass system - the badge or pass coded for authorization to enter specific areas is issued to an
employee who keeps it in his possession until his authorization is terminates.
2. Pass exchange system - an exchange takes place at the entrance of each controlled area. Upon leaving the
personnel surrenders his badge or passes and retrieve back his basic identification.
3. Multiple pass system - this provides an extra measure of security by requiring that an exchange take place at
the entrance of each restricted area.

Visitors Movement Control

➢ Security should establish proper methods of establishing the authority for admission of visitors as well as the
limitation thereat. This security measure would depend on the sensibility of the installation, but could include the
following—

1. Visitor’s logbook – All visitors to any facility should be required to identify them and should be given a
visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors, nature and
duration of visit.
2. Photograph - taking of photographs should also be considered. Extreme caution must be exercised in
areas where classified information is displayed to preclude unauthorized taking of pictures of the installation.
If a visitor has camera and it is prohibited to take picture, said camera should be left in the care of security
with corresponding receipt.
3. Escort - If possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
4. Visitor entrances - separate access for visitors and employees of the establishment should be provided.
5. Time- traveled - If there is a long delay or time lapse between the departure and arrival, the visitors may be
required to show cause for the delay.

Package Movement Control

➢ Every facility must establish a system for the control of package entering or leaving the premises. However,
desirable it might seem it is simply unrealistic to suppose that a blanket rule forbidding packages either in or out
would be workable. Such a rule would be damaging to the employee morale and, in many cases, would actually
work against the efficient operation in the facility. Therefore, since the transporting of packages through the
portals is a fact of life, they must be dealt with in order to prevent theft and misappropriation of company
properties. Thus—

A. No packages shall be authorized to be brought inside the industrial installation, offices and work area
without proper authority. This basic precept help reduce if not eliminate pilferage, industrial espionage or
sabotage.
B. Outgoing packages carried by personnel should be closely inspected and those in vehicles should also be
checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
C. Any personnel/visitor entering the installation with a package should deposit the same to the security and in
return receives a numbered tag, which he/she will use in claiming his/her package upon departing.

Control of Vehicle in the Installation

➢ Vehicular traffic within the boundaries of any facility must be carefully controlled for safety as well as to control
the transporting of pilfered goods from the premises. Thus—

10
1. Privately owned vehicle of personnel/visitor should be registered and are subject to the identification and
admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicle should provide the security as to the complete details of their duration of stay, person
to be visited, and other information.
4. All vehicles of visitors should be given a sign/sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the visitors in their destination as
well to provide them with the necessary safety precautions while they are inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent spots searches of vehicles
found there.

Building Access Control

➢ At any physical barrier, a security system must possess the ability to distinguish among authorized persons,
unauthorized visitors, and other unauthorized persons. This is to assist the security personnel protects sensitive
are and information within the installation. Appropriate warning signs should be posted at the building perimeter.
Special restricted entry facilities to public access should be provided. This will be dependent on the degree of
security needed for the protection of property, activity and other processes within the building. A clear-cut policy
on the access control should be disseminated to all personnel of the installation.

PERSONNEL SECURITY

Personnel Security includes all the security measures designed to prevent unsuitable individuals or persons
of doubtful loyalty to the government, from gaining access to classified matter or to any security facility, and to
prevent appointment, or retention as employees of such individuals,

The Security “Chain”: Personnel Security is the “weakest link” in the security “chain”. This weakness can best
be minimized or eliminated by making in it personnel security conscious through good training program. Security
depends upon the action of the individuals. The superior must instruct his subordinates so that they will know exactly
what security measures to take in every instance, a safe will not lock itself. An individual must be properly instructed
and must do the locking.

Control of Personnel

➢ Access to “restricted Areas” can be partially controlled by fences, gates and other physical means, but the
individual working in the area is the key to the bringing out of classified matter to unauthorized personnel. Written
information does not have the power of speech. Only the individual has knowledge of this written information can
pass it to an unauthorized personnel if he unguardedly talks about information.

What is Personnel Security Investigation?

➢ It is an inquiry into the character, reputation, discretion and loyalty of individual in order to determine a person’s
suitability to be given security clearance.

Types of Personnel Security Investigation (PSI)

1. National Agency Check (NAC). – This is an investigation of an individual made upon the basis of written
information supplied by him in response to official inquiry, and by reference to appropriate national agencies. It is

11
simply a check of the files and record of national agencies. The national agencies checked under this type of
investigation are the following—
▪ National Intelligence Coordinating Agency (NICA)
▪ National Bureau of Investigation (NBI)
▪ ISAAFP or J2 Division, GHQ AFP
▪ CIDG PNP Camp Crame., etc.

2. Local Agency Check (LAC) – This type of investigation consist of the first type plus written inquiries sent to
appropriate local government agencies, former employees, references and schools listed by the person under
investigation. The local agencies normally check besides the past employment, schools and references are the
following—
▪ Place of the locality where the individual is a resident.
▪ Mayor, Police, Fiscal, Judge of the locality where the individual is a resident.

3. Background Investigation (BI) This is more comprehensive investigation than the NAC or the NAC and LAC. A
through and complete investigation of all or some of the circumstances or aspects of a person’s life is conducted.

This type of personnel Security Investigation may either be a complete (CBI) or a partial Background
Investigation (PBI).
1. Complete Background Investigation – Consist of the investigation of the background of a person,
particularly all the circumstances of his personal life.
2. Partial Background Investigation – Consist of the investigation of the background of an individual but
limited only to some of the circumstances of his personal life which are deemed pertinent to the
investigation. Normally, the request for the investigation will indicate the specific personal circumstances to
be covered. This type of BI is also used to further develop questionable information contained in another
investigation report.

Factors considered in Background Investigation.

1. Loyalty – faithful allegiance to the country, government and its duly constituted authority.
2. Integrity- uprightness in character, soundness of moral principles, freedom from moral delinquencies, ore more
simply stated-honesty.
3. Discretion- the ability of tendency to act or decide with prudence; the habit of wise judgment or simply stated-
good judgment
4. Moral- distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person; his
outward manifestation, personal traits or moral habits.
5. Character- the sum of the traits that serves as an index of the essential intrinsic nature of a person. It is the
aggregate of distinctive mental and moral qualities that have been impressed by nature, education and habit
upon the individual.
6. Reputation- opinion or estimation in which one is generally held. It is what one reported to be, whereas
character is what a person is.

Motives that cause people to be disloyal

1. Revenge- a real or fancied wrong can create a hatred which will stop at nothing to obtain revenge of the
offender. Hatred wraps the sense of moral values until the hater will go to any lengths, even betrayal of his
country, to avenge himself on the person or class of people hated.
2. Material Gain- some people are so avid for material gain that they will stop at nothing to achieve this end.

12
3. Personal Prestige- this motivation applies to those whose main desire is for power-power over others-to prove
to the world what leaders they are. However, their desire for power makes them especially vulnerable to
subversion.
4. Friendship –through close attachment to another person, many people, otherwise of high integrity, will do things
inimical to their country’s interest.
5. Ideological Beliefs- If a person holds inimical to their country, they are of course vulnerable to approach by
subversive groups of agents.

THE GUARD FORCE AND GUARD SYSTEM

➢ The security guard force is the key element in the overall security system of a plant or installation. Its basic
mission is to protect all the property within the limits of the facility boundaries and protect employees and other
persons on the installation.

Security Guard Defined

➢ Sometimes called private security guard or watchman shall include any person who offers or renders personal
service to watch or secure either a residence or business establishment or both for hire or compensation, and
with a license to exercise profession.

Security Guard Force

➢ It is a group of force selected men, trained or grouped into functional unit for the purpose of protecting
operational processes from those disruption which would impeded efficiency or halt operation at a particular
plant, facility, installation or special activity

Types of Security Guard Forces

1. Private Security Agency - any person, association, partnership, firm or private corporation, who contracts,
recruits, trains, furnishes or post any security guard, to do its functions or solicit individual s, business firms,
or private, public or government-owned or controlled corporations to engage his/its service or those of his/its
security guards, for hire commission or compensation.
2. Company Security Force - A security force maintained and operated any private company/ corporation for
its own security requirements only.
3. Government Security Unit - a security unit maintained and operated by any government entity other than
military and/a police, which is established and maintained for the purpose of securing the office or
compound and/or extension such government entity.

Typical Structure of a Security Organization

➢ The security force of any installation must be organized in accordance with the principles of responsibility and
authority. Each personnel must be assigned to a position that corresponds to his experience, skills, training and
knowledge. This is to carry out different functions efficiently and effectively and thus insures smooth flow of the
organization.

The security positions may be classified into the following—

1. Office of the General Manager/Security Director

13
A. The office of the General Manager/Security Director is vested the authority and responsibility of running
the security force by authority of the President of the Company/Corporation.
B. The General Manager/Security Director is directly responsible to the President of the
Company/Corporation in the operations and administration of the security force/
C. He is the principal adviser to the president on matters involving security operations, administration of
the security force.
D. He is the overall head of both various staff departments and field units where he may delegate
corresponding authority commensurate to their assigned responsibility.
E. He implements policies promulgated by the policy making body and executed by the President.
F. He directs controls and supervises all offices and field units of the force in their respective assigned
tasks.
G. He performs other functions as directed by the President of the Company/Corporation.

2. Office of the Executive secretary of the General Manager


A. He is the principal administrative assistant to the General Manager/Security Director.
B. He prepares communications initiated by the General Manager/Security Director.
C. He maintains records of scheduled conferences, appointments and other engagements and advises
the GM/SD of such activities.
D. He records and checks outgoing communications signed by the GM/SD as to its completeness
(attachments to be considered) as well as to ensure the timely dispatch to the addressee through the
administrative section.
E. To perform other duties as directed by the General Manager/Security Director.

3. Office of the Assistant General Manager/Security Executive Director


A. The Security Executive Director is the Assistant Manager of the Security Force and takes the
Operational and Administrative Management of the security force in the absence of the GM/SD
B. He is directly responsible to the GM/SD
C. He performs other duties as directed by GM/SD

4. Office of the Human Resources and Administrative Manager/Staff Director for Personnel and
Administration
▪ The principal staff assistant to the General Manager/Security Director for planning and supervising matters
or activities pertaining to personnel management and miscellaneous administrative functions such as—
A. Personnel Strengths
B. Replacement
C. Discipline, Law and Order
D. Morale and Personnel Services
E. Personnel Procedures
F. Interior Management
G. Personnel Adviser

5. Office of the Operations Manager/Staff Director for Operations


▪ This office is the principal staff on Operations, training, intelligence and investigation.

6. Office of the Finance


▪ This office is principally concerned with budgeting, finance, reports control and program review and
analysis. Exercises supervision over the management engineering activities of the company and the
accounting office. Renders advice, assistance and guidance to GM/SD on financial management. Specific
duties and functions of the Finance Office are—
A. Accounting
B. Credit and collection

14
C. Bookkeeping
D. Billing
E. Payroll and disbursing

7. Office of the Logistic Manager


▪ This office is in charge with the following—
A. Coordinates plan and supervise the implementation of directive and guidance determines divisional
responsibility and evaluates in logistical planning and related planning programs.
B. Develops, administers, and coordinates research and development on logistical matters.
C. Collects and computes statistical data on logistical matters.
D. Recommends logistics budget policy including budget planning.
E. Prepares estimates and/or requirements to ensure that logistical plans support for corporate plans.
F. Performs necessary program and fiscal administration.
G. Supervise all matters pertaining to supply.
H. Determine the organization, allocation of service personnel
I. Plans for maintenance and repair of supplies and equipment.

8. Office of the Inspectorate and Special Projects (Special Staff)


A. This office assists the General Manger in inquiring into, and reports upon matters pertaining to the
performance of the different staff, units, towards the attainment of corporate objectives. It also inquires on
the state of discipline, efficiency and economy of the company.
B. The Inspectorate Staff conducts inspections, investigations and submits reports to the General Manager. In
the performance of its duties and functions, the General Manger is provided relevant information pertaining
to meritorious conduct and performance of a unit or individual.
C. This office is also tasked to conduct overt and covert inspections and investigations and other related
services.
9. Office of the Communications Officer
▪ The Communications Officer who is a licensed radio operator is the principal adviser of the General
Manager on communication on matters pertaining to radio communication.

10. The Detachment Commander/Officer-in-Charge


A. A Detachment Commander shall command and responsible for a certain detachment, with fifteen (15) or
more security personnel under him. He is directly responsible to the Security Manager of the installation.
B. He prepares and executes the security plan of his Detachment in relation to the security requirements of the
establishment being guarded.
C. He is responsible for the enforcement and implementation of Rules and Regulations/Policies.
D. He receives instructions from the Security Manager and implements the same as required
E. He has full operational and administrative control of all his units to include his assistant and shift-in-
charge/supervisor.
F. He conducts inspection of his units and institutes corrective measures on the spot on those problems he
may detect or brought to his attention. If not possible, he brings the problem to the Security Manager of the
establishment.

11. Assistant Detachment Commander


A. Detachment with more than twenty (20) security personnel assigned may be provided with an Assistant
Detachment Commander who will be the principal assistant of the Detachment Commander.
B. In the absence of the Detachment Commander, he performs the duties of the Detachment Commander.

12. Shift-in-Charge
A. The Shift-in-Charge shall be responsible to the Detachment Commander as far as his shift is concerned.

15
B. He forms his men at least 30 minute before posting time seeing that all are in proper uniform and
presentable.
C. He disseminates instructions coming from his Detachment Commander/OIC or those relayed to him by his
counter-part, the outgoing SIC.
D. He inspects the posts as often as he can to ensure that his men are on the alert and performing their duties
effectively.
E. He performs other duties as may be directed by the Detachment Commander or by the ADC.

13. Security Guard on Duty/Post


A. The Security Guard (SG) on Duty/Post must always carry his license to practice his profession, Xerox copy
of the firearm’s license assigned to him, and his duty detail order, authorizing him to carry his issued firearm
within his area of jurisdiction.
B. If the Security Guard is manning a fixed post especially entrance or exit points, he must maintain a guard’s
logbook and enters in the same logbook all events/passages of VIP’s vehicles and inspections or visits of
Security Manager/Director of the Client/Firm.
C. Guards must observe and apply religiously the provisions of the Code of Ethics, Code of Conduct, and the
General Orders of the Security Guard when on post.
D. He may perform special task as may be directed by his shift supervisor, DC and or ADC like control of
visitors, inspections of bags of persons coming in and going out of the establishment, vehicle cargoes, or
prevents the intrusion of unauthorized person in a particular area, etc.

Security Guard’s Professional Conduct and Ethics

Security Guard’s Creed:

As a Security Guard, my fundamental duty is to protect lives and properties and maintained order within the vicinity or
place of duty, protect the interest of my employer and our clients and the security and stability of our government and
country without compromise and prejudice, honest in my action, words and thought, and do my best to uphold the
principle: MAKADIOS, MAKABAYAN AT MAKATAO.

Ethical Standard: As security guard/detective, his fundamental duty is to serve the interest or mission of his
agency in compliance with the contract entered into with the clients or customers of the agency he is to serve thus,

1. He shall be honest in thoughts and deeds both in his official actuation, obeying the laws of the land and the
regulations prescribed by his agency and those establish by the company he is supposed to serve.
2. He shall not reveal any confidential matter committed to him as a security guard and such other matters imposed
upon him by law.
3. He shall act all times with decorum and shall not permit personal feelings, prejudices and undue friendship to
influence his actuation in the performance of his official functions.
4. He shall not compromise with criminal and other lawless elements to the prejudice of the customers or clients
and shall assist government relentless drive against lawlessness and other forms of criminality.
5. He shall carry out his assigned duties as required by law to the best of his ability and shall safeguard life and
property of the establishment he is assigned to.
6. He shall wear his uniform, badge, patches and insignia properly as a symbol of public trust and confidence as an
honest and trustworthy security guard, watchman and private detective.
7. He shall keep his allegiance first to the government he is assigned to serve with loyalty and utmost dedication.
8. He shall diligently and progressively familiarize himself with the rules and regulations lay down by his agency
and those of the customers or clients.
9. He shall at all times be courteous, respectful and salute his superior officers, government officials and officials of
the establishment where he is assigned and the company he is supposed to serve.

16
10. He shall report for duty always in proper uniform and neat in his appearance
11. He shall learn at heart and strictly observe the laws and regulations governing the use of firearm.

Code of Conduct: The watchman should abide by the following code of conduct—

1. He shall carry with him at all times during his tour of duty his license identification card and duty detail order with
an authority to carry firearms.
2. He shall not use his license and privileges to the prejudice of the public, the client or customer and his agency.
3. He shall not engage in any unnecessary conversation with anybody except in the discharge of his work and shall
at all times keep himself alert during his tour of duty.
4. He shall not read newspapers, magazines, books, etc., while actually performing his duties.
5. He shall not drink any intoxicating liquor immediately before and during his tour of duty.
6. He shall know the location of the alarm box near his post and sound the alarm in case of fire or disorder.
7. He shall know how to operate any fire extinguishers at his post.
8. He shall know the location of the telephone and/or telephone number of the police precincts as well as the
telephone number of the fire stations in the locality.
9. He shall immediately notify the police in case of any sign of disorder, strike, riot or any serious violations of the
law.
10. He or his group or guards shall not participate or integrate any disorder, strike, riot or any serious violations of
the law.
11. He shall assist the police in the preservation and maintenance of peace and order and in the protection of life,
property/having in mind that the nature of his responsibilities is similar to that of the latter.
12. He shall familiarize himself with the Private Security Agency Law (RA5487) as amended, and the PNP SAGSD
implementing rules and regulations.
13. When issued a pass he should not lend his pass to anybody.
14. He shall always in proper uniform and shall always carry with him his basic requirements, and equipment such
as writing notebook, ballpen, nightstick (baton) and/or radio. He shall endeavor at all times to merit and be
worthy of the trust and confidence of the agency he represents and the client he serves.

The 11 General Orders (GO’s)

1. To take charge of this post and all companies property in view and protect/preserve the same with utmost
diligence.
2. To walk during tour of duty in military manner, keeping always in the alert and observing everything that takes
place within sight or hearing.
3. To report all violations of orders I am instructed to enforce.
4. To repeat all calls from post more distant from the guardhouse where I am station.
5. To quit my post only when properly relieved.
6. To receive, obey and pass out to the relieving guard all order from company officers or officials, supervisors post
in charge or shift leaders.
7. To talk to no one except in the line of duty
8. To sound or call the alarm in case of fire or disorder
9. To call the superior officer in any case not covered by instructions.
10. To salute all company officials, superiors in the agency, ranking public officials and commission officer of the
AFP and officers of the PNP.
11. To be especially watchful at night and during the time of challenging to challenge all persons on or near my post
and to allow no one to pass or loiter without proper authority.

17
Selection of Guards

Republic Act Number 5487 and its implementing rules and regulations prescribed the minimum requirements for
guards to be able to secure a license to exercise profession as a security guard, private detective, security officer and
security consultant.

General Requisites in the Security Profession

1. Filipino Citizen
2. Physically and mentally fit
3. Good moral character
4. Must not possess any disqualification

General Disqualification

1. Dishonorably discharge from the service in the PNP/AFP or any private government entities.
2. Physically or mentally unfit
3. Conviction of a crime
4. Addicted to drugs or alcohol
5. dummy of a foreigner
6. Elective or appointive government official

Basic Qualifications of an Agency Operator/Manager

In addition to the general qualifications, an operator should be—


1. At least 25 years of age
2. Commissioned officer, inactive or retired from AFP or PNP or a graduate of Industrial Security Management with
adequate training and experience in the security business.

Basic Qualification of a Security Consultant

In addition to the general qualifications, a consultant should be—


1. Holder of Master Degree in Criminology, MPA, MNSA, Industrial Management or LL.B.
2. Must have at least ten (10) years experience in the operation and management of security business.

Basic Qualifications of a Security Officer

In addition to the general qualifications, a security officer, should be—


1. At least graduated from Security Officers Training Course
2. A retired personnel in the PNP/AFP
3. Must not possess any of the disqualification.

Basic Qualifications of a Private Detective

In addition to the general qualification, a detective should possess any of the following—
1. BS Criminology Graduate
2. LL.B. holder
3. Graduate of a Criminal Investigation Course

18
4. Advance ROTC graduate

Basic Qualification of a Security Guard

In addition to the general qualifications , a security guard should—


1. Be at least high school graduate
2. Be at least 18 years of age but not more than 50 years old
3. Undergone pre-licensing training course
4. Passed a neuropsychiatry examination.
5. Be locally cleared with PNP or NBI

Desirable Qualities of Security Guards

1. Alertness- A good guard must be alert in spotting violators. This can be attained by being watchful, dedicated
and diligence.
2. Judgment- sound and good judgment is more than the use of common sense. It is the arriving at wise and
timely decision.
3. Confidence- it is the state of being sure; a state of the mind free from doubt or misgivings. This attribute
includes faith in oneself and in his abilities, which is attained by job knowledge. Thorough and proper training
plus good supervision instills confidence.
4. Physical fitness- security work is strenuous and demanding. Physical conditioning is essential if he is to be a
dependable guard.
5. Tactfulness- ability of the guard to deal with others successfully without offending. In short, he can be firm but
pleasant.
6. Self-control- ability to take hold of oneself regardless of a provoking situation. With self-control, the guard will do
his work without being angry and the situation will be on hand.
7. Interest, loyalty, responsible and trustworthy, is also important attributes of a reliable guard.

Licenses in the Security Profession

1. License to Operate- before a Private Security Agency (PSA) can operate; it has to secure a License to Operate
(LTO) categorized as either temporary or regular. A temporary license is issued by the PNP thru Civil Security
Croup Directorate after the applicant /licensee should have complied with all the requirements while it has less
than two hundred guards. A Regular license to operate is issued to the PSA once it is qualified of having two
hundred (200) or more license security guard in its employ duly posted. Regular license is renewable every two
(2) years.
2. Security Guard License- before a security guard can practice his profession; he shall possess valid security
license. The use of expired license is not allowed. In case of doubt, licenses may be verified at the PNP SAGSD
whether valid or fake.
3. Firearm’s license- all firearms of the security agency should be covered with firearms license issued by the
PNP through its Firearms Explosive Division under the Civil Security Group, renewable every two years. No
duplication of two or more firearms with the same make and serial number shall be covered by one license.

Firearms and Weapons Authorized for Used of the Security Guard While on
Duty

1. Handguns/Low-powered (cal. 22 and cal.38) not exceeding one FA for every two guards employed.
2. Shotguns (not bigger than 12 gauge)
3. High-powered- when the agency is operating in areas where there is upsurge of lawlessness and criminality as
determined by the Chief PNP.

19
Guard’s Uniforms, Equipment and Paraphernalia

1. Set of Uniforms for Security Personnel


A. Headgear- perching cap for men and 2 ply cap for women
B. Service Bush Jacket- intended for Directorial and Staff officers
C. Service shirt
D. Service trouser
E. Service belt
F. Footwear

2. Color of Uniforms
A. Private Security Agency- navy blue (upper and lower)
B. Company Security Forces- light blue/light gray for upper and navy blue for lower
C. Government Security Forces- white for upper and navy blue for lower

3. Ornaments and Patches


A. National badge
B. Cap device
C. Regulation buckle
D. Collar device
E. Name cloth
F. Agency/unit name cloth

4. Equipment and Paraphernalia


A. Leather pistol belt with regulation buckle
B. Holster, black leather for pistol
C. Night stick with horizontal handle
D. Whistle with lanyard
E. Handheld radio
F. Pocket notebook and ball pens

DOCUMENT AND INFORMATION SECURTY

The leakage of document and information cost government, business and industry alike, billions of pesos. A rival
company or an enemy agent might use an illegally obtain document and information for their own advantage. For this
reason, a comprehensive and information security program is very essential to the installation in order to focus freely
on the attainment of its goals and objectives.

Basis of Document, Information, and Communication Security

Security of documents and information is based on the premise that the government has the right and duty to protect
official papers from unwarranted and indiscriminate disclosure. In answer to this problem, Malacanang, Manila dated
August 14, 1964 entitled “Promulgating rules governing security of classified matters in Government Officers” was
promulgated in order to safeguard our secrets as secrets.

There are various laws likewise effecting security of officials papers of the government, namely, appropriate articles
of the Revised Penal Code as amended and commonwealth Act 616 as amended. Any violations of the provisions of

20
Memorandum Circular No. 78 shall be dealt administrative proceedings without prejudice to offense under provisions
soft the cited penal statutes. The unauthorized publication of any classified information shall be deemed a violation of
Memorandum Circular No. 78 by the parties responsible thereof.

Standard Rules

The authority and responsibility for the preparation and classification of classified matter rest exclusively with the
originating office.

Classified matter should be classified according to their content and not to the file in which they are held or of another
document to which they refer, except radiograms or telegrams referring to previously classified radiograms or
telegram.

Classification should be made as soon as possible by placing the appropriate marks of the matter to be classified.

Each individual whose duties allow access to classified matter, or each individual who possesses knowledge of
classified matter while it is in his possession and shall insure that dissemination of such classified matter is on the
“need-to- know” basis and to property cleared persons only.

Document Security Systems

Documents Security is that aspect of security which involves the application of security measures for the proper
protection and safeguarding of classified information. Classification Categories - Official matter which requires
protection in the interest of national security shall be limited to four categories of classification which in descending
order of importance shall carry one of the following designations:
TOP SECRET – SECRET
CONFIDENTIAL - RESTRICTED

In Document and Information Security, a matter includes everything, regardless of its physical character, or in which
information is recorded or embodied. Documents, equipment, projects, books, reports, articles, notes, letters,
drawings, drawings, sketches, plans, photographs, recordings, machinery, models, apparatus, devices, and all other
products or substances fall within the general term “matter”. Information, which is transmitted orally, is considered
“matter” for purposes of security.

Security Clearance is the certification by a responsible authority that the person described is cleared for access to
classified matter the appropriate level. Need-to-know is the principle whereby access to classified matter may only
be only given to those persons to whom it is necessary for the fulfillment of their duties. Persons are not entitled to
have access to classified matter solely by virtue of their status or office. It is a requirement that the dissemination of
classified matters be limited strictly to persons whose official duty requires knowledge or possession thereof.

Certificate of Destruction is the certification by a witnessing officer that the classified matters describe therein has
been disposed of in his presence, approved destruction methods.

Classified refers to assign information by one of the four classification categories. Security Clearance refers to the
administrative determination that an individual is eligible for access to classified matter. Compromise means lose of
security, which results from an authorized persons obtaining knowledge of classified matter. Compartmentalization
is the grant of access to classified matter only to properly cleaved persons in the performance of their official duties.

Declassify is the removal of security classification from classified matter. Reclassify / Re grading is the act of
changing the assigned classification of matter. Up- grading is the act of assigning to a matter of higher classification
to a classified document.

21
What are Top Secret Matters?

➢ These are information and material (matter), the unauthorized disclosure of which would cause exceptionally
grave damage to the nation, politically, economically or from a security aspect. This category is reserve for the
nation’s closest secrets and is to be used with great reserve.

Classification Authority

The original classification authority for assignment of TOP SECRET classification rests exclusively with the head of
the department. This power may however, be delegated to authorized offices in instances when the necessity for
such arises. Derivative classification authority for TOP SECRET classification (authority for) may be granted those
officers who are required to give comments or responses to a communication that necessitates TOP-SECRETS
response.

Examples of Top Secret Documents

▪ Very important political documents regarding negotiation for major alliances.


▪ Major governmental projects such as proposal to adjust the nation’s economy.
▪ Military – Police defense class/plans
▪ Capabilities of major successes of Intel services.
▪ Compilations of data individually classified as secret or lower but which collectively should be in a higher
grade.
▪ Strategies plan documenting overall conduct of war.
▪ Intel documents revealing major Intel production effort permitting an evaluation by recipients of the success
and capabilities of Intel agencies.
▪ Major government project like drastic proposals.

What are Secret Matters?

➢ These Information and material (matter), the unauthorized disclosure of which would endanger national security,
cause serious injury to the interest or prestige of the nation or of any governmental activity or would be of great
advantage to a foreign nation.

A secret grading is justified if—

1. It materially influences a major aspect of military tactics;


2. It involves a novel principle applicable to existing important projects;
3. It is sufficiently revolutionary to result in a major advance in existing techniques or in the performance of
existing secret weapons;
4. It is liable to compromise some other projects so already graded.

Classification Authority – Same as TOP SECRET matter.

Examples of Secret Documents

▪ Those that jeopardize or endanger Intel relations of a nation.


▪ Those that compromise defense plans, scientific or technological development.

22
▪ Those that reveal important intelligence operations.
▪ War plans or complete plans for future war operations not included in top secret.
▪ Documents showing disposition of forces.
▪ New designs of aircraft projections, tanks, radar and other devices.
▪ Troop movement to operational areas.
▪ Hotel plans and estimates
▪ Order of battle info.

What are Confidential Matters?

➢ These are information and material (matter) the unauthorized disclosure of which, while not endangering the
national security, would be prejudicial to the interest or prestige of the nation or any governmental activity, or
would cause administrative embarrassment or unwarranted injury to an individual or would be of advantage to a
foreign nation.

Confidential grading is justified if—

1. It is a more than a routine modification or logical improvement of existing materials and is sufficiently
advanced to result in substantial improvement in the performance of existing CONFIDENTIAL
weapons.
2. It is sufficiently important potentially to make it desirable to postpone knowledge of its value reaching a
foreign nation.
3. It is liable to compromise some other project already so graded.

Classification Authority – Any officer is authorized to assign confidential classification to any matter in the
performance of his duties.

Examples of Confidential Documents

▪ Plans of government projects such as roads, bridges, building, etc.


▪ Routine service reports like operations and exercise of foreign power.
▪ Routine intelligence reports.
▪ Certain Personnel records, Staff matters.

What are Restricted Matters?

➢ These are information and material (matter), which requires special protection other than that determined to be
TOP SECRET, SECRET, or CONFIDENTIAL.

➢ Authority to classify shall be the same as for CONFIDENTIAL matter. Reproduction is authorized. Transmission
shall be through the normal dissemination system.

Control of Classified Matters

Custody and accounting of classified matter – Heads of departments handling classified matter shall issue orders
designating their respective custodians of classified matter. Custodian shall—

1. Store all classified matter.


2. Maintain a registry of classified matter showing all classified matter received and to whom transmitted.
3. Maintain current roster of persons authorized access to classified matter for each classification in the office.

23
4. Insure physical security for classified matter.
5. Conduct an inventory of all TOP SECRET matter as specified in paragraph 7 (Memo Cir Nr 78/196). f. Upon
his relief, account for all TOP SECRET and SECRET matter by inventory and transmit the same to his
successor.

Unauthorized keeping of private records – All government personnel are prohibited from keeping private records,
diaries, or papers containing statement of facts or opinions, either official or personal, concerning matters which are
related to or which affects national interest or security. Also prohibited is the collecting of souvenirs or obtaining for
personal use whatsoever any matter classified in the interest of national security.

Dissemination – Dissemination of classified matter shall be restricted to properly cleared persons whose official
duties required knowledge or possession thereof. Responsibility for the determination of “need-to-know” rests upon
both each individual, who has possession, knowledge or command control of the information involve, and the
recipient.

Disclosures to other departments of classified information originating from another department

→ Classified matter originating from another department shall not be disseminated to other departments
without the consent of the originating department.

Release of classified matter outside a department

→ General Policy. – No person in the government shall convey orally, visually or by written communication
any classified matter outside his own department unless such disclosures has been processed and cleared
by the department head or his authorized representative.

Release of classified matter to Congress

→ Government personnel, when giving oral testimony before Congressional Committee involving classified
matter, shall advice the committee of the classification thereof. Government personnel called upon to
testify shall obtain necessary and prior instruction from his department head concerning disclosure.

When Congressional members visit government offices, department heads are authorized to release classified
matter which is deemed and adequate response to an inquiry provided that it is required in the performance of official
functions.

Disclosure to Foreign Government or Nationals

1. Its use shall be solely for the purpose for which the classified matter is requested.
2. It shall be treated or handled in accordance with the classified categories of the originating office.
3. Handling shall be made by security-cleared personnel.
4. Reproduction and dissemination shall not be made without the consent of the department head.

Disclosure of classified matter for publication

→ Classified matter shall be released for public consumption only upon the consent of the department head
or his authorized representative. However, in instances where there is a demand or need for releasing
classified information, extreme caution must be exercised to analyze in detail contents of the classified
matter before release. Normally all information are released through Public Information Officers. Public
Information Officers should be assisted in the analysis of classified information by the Security Officer.

24
Purpose of Protecting Classified Materials—

1. Deter and impede potential spy


2. Assist in security investigations by keeping accurate records of the moments of classified materials.
3. Enforce the use of “Need to Know” principle

Categories of Document for Security Purposes—

1. Category A—
a. Information which contains reportable time sensitive, order of battle and significant information.
b. It should be given priority because it is critical information.
c. It must be forwarded without delay.
d. It is critical to friendly operations.
e. It requires immediate action.
2. Category B—
a. Anything that contains communications, cryptographic documents, or systems that should be classified
as secret and requires special handling.
b. Higher authorities should declassify it.

3. Category C—
a. Other information, which contains something that, could be an intelligence value.
b. Contains exploitable information regardless of its contents.
c. Unscreened materials/documents should be categorized as Category C.

4. Category D—
a. No value, yet lower level will classify documents as category D.
b. No decision must be made at the lower echelon that document has no value. It is the responsibility of
the higher Headquarters.

Three (3) Security Concepts

1. Personnel are the weakest link in the security chain.


2. Training is important to make security personnel conscious and realize the value of document.
3. Training is necessary for the practice of “Need to Know” principle.

Rules for Classification of Documents

1. Documents shall be classified according to their content.


2. The overall classification of a file or of a group of physically connected therein. Pages, paragraphs, sections
or components thereof may bear different classifications. Documents separated from file or group shall be
handled in accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain classified information or which contain
information classified lower than that of the preceding element or enclosure shall include a notation for
automatic downgrading.
4. Correspondence, Indexes, receipts, reports of possession transfer or destruction, catalogs, or accession list
shall not be classify if any reference to classified matter does not disclosed classified information.
5. Classified matter obtained from other department shall retain the same original classification.

Protection of Sensitive Information

25
Proprietary information is information that in some special way relates to the status or activities of the possessor
and over which the possessor asserts ownership. In the business community, proprietary information relates to the
structure, products or business methods of the organization. It is usually protected in some way against causal or
general disclosure.

All proprietary information is confidential, but not all confidential information is proprietary. For example, confidential
personnel data in employee files is not considered as proprietary although the company treats it as confidential.

Types of Proprietary Information

1. Trade Secrets- this consist of any formula, pattern, device or compilation of information which is used in
one’s business and which gives him an opportunity to gain an advantage over competitors who do not know
or us e it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving
materials, a pattern for machine or device, or a list of customers. It differs from other secret information as to
single or ephemeral events. A trade secret is a process or device for continuous use in the protection of the
business.

2. Patents- this is a grant made by the government to an inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for term of years.

Primary Distinctions Between Patents and Trade Secrets

1. Requirements for obtaining a patent are specific. To qualify for a patent the invention must be more than
novel and useful. It must represent a positive contribution beyond the skill of the average person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive right to
patent protection expires after 17 years.
Proprietary Information Protection Program

Realizing that the most serious threat to trade secrets is the employee, a measure of protection is often realized
through the use of employee agreements which restrict the employee’s ability to disclose information without specific
authorization to the company. The following countermeasures may be adopted—

1. Policy and procedure statements regarding all sensitive information.


2. Pre and post-employment screening and review.
3. Non-disclosure agreements from employees, vendors, contractors and visitors.
4. Non-competitive agreements with selected employees.
5. Awareness programs
6. Physical security measures
7. Informed monitoring of routine activities.

COMMUNICATION SECURITY

Communication Security is the protection resulting from the application of various measures which prevent or delay
the enemy or unauthorized persons in gaining information through our communications. It includes Transmission,
Cryptographic and Physical security.

Rules- governing communications security do not in guarantee security, and they do not attempt to meet every
conceivable situation. Communication security rules are a means, not an ends.

26
Department heads- are responsible for the maintenance of communication security and for the promulgation of
additional directives as may be necessary to insure proper communication security control within their jurisdiction.

All communication personnel should have an appreciation of the basic principles of communication security may
result in compromise.

Communication Security Officer - A properly trained and cleared Communication Security Officer shall be
appointed in every Department of the Government handling cryptographic communication.

TRANSMISSION SECURITY

Transmission Security is that component of communication security which results from all measures designed to
protect transmission from interception, traffic analysis and imitative deception.

Communication personnel shall select the means most appropriate to accomplish the delivery of message in
accordance with the specified precedence and security requirements.

Radio Operators shall adhere to the use of correct procedures, circuit discipline and authentication system as a
security measures against traffic analysis, imitative deception and radio direction finding.

CRYPTOGRAPHIC SECURITY

Cryptographic Security is that component of communication security which results from the provisions of
technically sound crypto-system and their proper use.

CODES AND CIPHERS

Code - a system which uses words as the smallest element like the one below.

Code word Plaintext


Angel we are ready
Fox send additional

Cipher - a system that manipulate one, two, or three characters at a time like:

Cipher Plaintext
B 1
C 2
J 3
D 4

Abbreviation

C: code or cipher
P: Plaintext
K: keyword/ key number

27
Note: Code and cipher may be used interchangeably to mean the same.

Categories of Cipher

1. Concealment – is the simplest, which means to hide/hidden. For instance:

I WILL DO IT. IF NOT TODAY, THEN TRUST ME. SIGNED SMITH.

message: ( copy out every third word )

Decipher: DO NOT TRUST SMITH

EFDH GORA NQBO PETE YTDS RTOU ZESV ITVE SOWM XNIM CTLK HJEA

Same: copy of the third letter

decipher: DO NOT TRUST SMITH

Example—

ADDE DAQD NPCR OOLL TMAT RLOC RATS TKCL MNRA KETI SSTU ARTF THEE OSET ULCO JEOU TAKE
BLFZ IAHF SQUI TIFC ANLL TMZX AEXE DLGY ZZTI FLOO VWKA TTIM IFTT HATH EEFC ANND FLHA
(Read this by copying out a progressive cipher. Progress 1, 2, 3….)

Decipher: DO NOT TRUST SMITH

Note: The plaintext are concealed by “nulls” - are meaningless symbol to fill in and separate plaintext.

2. Transposition System – is another category of cipher. Below is an example.

C: NRUTE RAMOH ALKOL ECNAC


(Everything is written backward)

(Put into 5 letters)

Decipher: Return to base – this is the plaintext


P: CANCEL LOKLA HOMAR ETURN
P: CANCEL OKLAHOMA RETURN – which means
P: Return to base.

Example

RTRTBS
encipher by droppings every other letter
EUNOAE

C: RTRTBS EUNOAE

then put in four letter code group

C: RTRT BSEU NOAE

28
Decipher:

P: Return to base

Decipher:

P: Charlie will attack 2001


P: CHARLIE WILL ATTACK TWO ONE ZERO ONE
C: charliewillattacktwoonezero
C: char liew illa tack twoo nez roome

3. Substitution Method - original message elements, letters, numbers or other symbols are replaced with
alternate symbols.

Example 1 - symbols number of times


j 26
4 19
I 16
) 15
* 13

Example 2 - c: x y z a b c d e
p: ABCD EFGH
p: stop icebox
c: VWRS LFHERA

Example 3 - Using a keyword/phrase


c: FOURSCOREANDSEVENYEARSAGO
p: abcde………………………xyz

RISK ANALYSIS AND SECURITY HAZARD

What is a Risk?

→ It is the potential damage or loss of an asset. The level of risk is a combination of two factors: The value
placed on that asset by its owner and the consequence, impact adverse effect of the loss or damage to
that asset and; the likelihood that a specific vulnerability will be exploited by a particular threat.

What is Risk Management?

→ It is a process of selecting and implementing security countermeasures to achieve an acceptable level of


risk at an acceptable cost.

What is Risk Analysis?

→ It is the analysis of risk include examinations of the vulnerability, probability and criticality of potential
threats and include natural and manmade risk

29
What is an Adversary?

→ An individual, group, organization, or government that conducts activities or has the intention and capability
to conduct activities detrimental to the individual, private or government entity.

What is Asset?

→ Any information, facility, material, information, or activity which has a positive value to its owner whether it
is an individual, private or government entity.

What are Countermeasures?

→ An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities. The cost of
possible countermeasures may be monetary, but may also include non-monetary cost such as reduced
operational efficiency, adverse publicity unfavorable working conditions, and political consequences.

What is Probability?

→ It is the chance or likelihood that a loss will take place. Indicated by a mathematical statement concerning
the possibility of an event occurring

What is Criticality?

→ It is the impact of a loss as measured in financial terms. How important it is in terms of the survival or
existence of the organization.

Risk Management Alternatives and Strategies

1. Risk Avoidance- eliminating or removing the risk totally from the business, government, or industrial
environment for which the risk manager has responsibility
2. Risk Reduction- decreasing the risk by minimizing the probability of the potential loss. The reduction of
criminal opportunity is often accomplished by situational crime [prevention strategies to discourage, deter, or
deny criminal incidents.
3. Risk Spreading- spreading the risk through compartmentation or decentralization to limit the impact
(criticality) of the potential loss
4. Risk Transfer- moving the financial impact of the potential loss-over to an insurance company.
5. Risk Self-assumption- planned assumption and acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or setting aside resources for use in case of a
specific loss incident.

SECURITY HAZARDS

Any act or condition which may result in the compromise of information, loss of life, loss or destruction of property or
disruption of the objective of the installation.

Types of Hazards

1. Natural Hazard- these are hazards which arise from natural phenomena. The following are types of natural
hazards or disasters—
a. Floods caused by typhoons

30
b. Earthquakes
c. Fire (not caused by human action)
d. Storms (typhoons, cyclones, tornado and hurricane)
e. Lighting storms
f. Extreme temperature and humidity

2. Human-Man made Hazards- These are hazards which are the result of a state of mind, attitude,
weaknesses or character traits of one or more persons. They can be acts of commission or omission, both
overt and covert, which can disrupt operation of a plant or installation. The following are types of human or
manmade hazards—
a. Carelessness- accidents and dissatisfaction
b. Disloyalty-subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism, etc.

Sabotage as a Security Hazard

Description of a Saboteur—

1. He is the most dangerous foe that security will have to deal with while planning and implementing security
measures and techniques.
2. He is an ordinary looking as the next guy but in his mind, he has the training in deception, knowledgeable in
incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.

Possible Targets of Saboteur—

1. Armed Forces Installation


2. Natural resources- mines, forests, farms and farm products
3. Industries- buildings, power sources, machinery, fuel, etc.
4. Warehouses depots, communications, public utilities, etc.

Countermeasures Against Sabotage—

1. Use of an efficient, alert and trained guard force.


2. Use of Physical security aids like barriers, personnel and vehicular control, intrusion devices,
communication systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination.
10. Good housekeeping methods.
11. Effective and compatible emergency planning.
12. Regular audit.
13. Continuing background checks.

Espionage as a Security Hazard

31
Description of an Espionage Agent—

1. He is very dangerous adversary and his skills in deception and his cunning should never be under
estimated.
2. He is usually a person of extensive training and will be highly effective in gaining the confidence of people
and of extracting information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like the saboteur and he can be
defeated in his own game if proper methods and techniques are undertaken.

Countermeasures against Industrial Espionage—

1. Careful and complete pre-employment measures designed to control threats of industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive positions even already
employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.

Subversive Activity as a Security Hazard

Threats of Subversive Activity—

1. It can be local or national in nature and their mission is to undermine the authority weaken the organization,
and eventually take over. This can be in business or any activity.
2. This can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist
attitudes, and other emotional approaches.
3. It is an activity not easy to detect.

Countermeasures to Subversive Activity

1. The spreading of rumors, written materials, slogans or any other devices to confuse the work population and
discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and “slowdowns” can be called to disrupt
the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing movements for peace, anti-
colonials, anti-trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations” should report this activity to
security.
5. Other methods of subversion like united fronts, mob action, terrorism and sabotage will be done to gain the
subversive ends.

Pilferage as a Business Hazard—

1. Pilferage is one of the most annoying and common human hazards which security has to deal with. This
activity if uncontrolled can become financial drain if not a menace to smooth and orderly operation.
2. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may be labeled as
pilferage.

Types of Pilferers

32
1. Casual Pilferer- one who steals due to his inability to resist the unexpected opportunity and has little fear of
detection is no plan or premeditation and he is usually a “loner” on the job. The temptation to pick up the
article is basically due to poor security measure. The implication of causal pilfering is the big cumulative cost
if it remains unchecked.
2. Systematic Pilferer- one who steals with preconceived plans and takes away any or all types of items or
supplies for economic gain. Pilferers of this kind can be employees or outsiders of the establishment.

Factors considered in Pilferage—

1. Location of items to be pilfered- the systematic pilferer surveys shopping and store areas, or through
contacts from the firms.
2. Access to the items- techniques can be from fake documents, bribing of guards, outsmarting security,
creating disturbance and other methods to divert attention while pilferage goes on.
3. Removal of item- this can be done as wearing the stolen shoes or shorts, concealment in body or
vehicles, use of false documents, etc. Driver may conceal pilfered items in his vehicle.
4. Disposal of items- there is a need for “fences” brokers” or “clearing houses” for these “hot” items.

Countermeasures for Casual Pilferage—

1. “Spot”: check on outgoing vehicles and persons.


2. An aggressive security education and indoctrination program with emphasis that “crime does not pay”.
3. Superiors should set example of integrity and desirable moral climate for employees in the
establishment.
4. All employees must be enjoined to report or any loss to security.
5. Inventory and control methods should be done especially to pilferable items.
6. Control of tools equipment and sets.

Countermeasures for Systematic Pilferage—

1. Guards and electronic surveillance on all exits.


2. Package and material control system.
3. Parking area outside perimeter fence of establishment.
4. Careful screening and background checks on applicants to weed out potential thieves.
5. Investigation of all losses quickly and efficiently to determine “modus operandi” or obtain clues.
6. Alert all patrols to check areas and buildings for possible concealment of stolen properties.
7. Install mechanical, electrical, electronic detection and alarm devices where needed and applicable.
8. Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking facilities and areas for vehicles and
persons.
10. Store bulk quantities of pilferable items in enclosed security areas and distribute them to using section
in limited quantities.
11. Establish accurate inventory and accounting methods for procurement, use and disposal.
12. Establish close liaison with governmental law enforcement and intelligence agencies.

SECURITY SURVEY AND INSPECTION

What is Security System?

→ The information pertaining to one of the most important security services offered to a head of office is the
conduct of security surveys and security inspections. Every unit chief desires a security system that will
reduce to an absolute minimum the possibility of espionage, sabotage and compromise of classified

33
information on his office or unit. Since there are many security countermeasures to be considered, heads
of offices should utilized specially trained personnel, if the efforts of espionage and sabotage agents and
other criminal elements are to be negated. Security is an extremely complex program an objective analysis
of an office head’s security program by security survey and inspection personnel can be of great
assistance in determining the efficiency of any established security program.

What is a Security Survey?

→ It is an estimate of the security standards of a unit, and is conducted to enable the responsible officer to
recognize and evaluate security hazards and determine protective measures necessary to the prevention
of sabotage, espionage, subversive activities and other criminal acts inimical towards the interest and/or
mission of the unit and/or command.

What is Security Inspection?

→ It is a check of how well existing security measures and regulations are being carried out within a
command. A security inspection may also include an investigation of alleged or suspected security
violations. Physical security is concerned with forces, entrances and exits, guards, traffic control, lighting,
fire control, and with such other physical measures, which, if properly established and maintained, will deny
access to, unauthorized persons.

Security Survey Distinguish with Security Inspection

The terms “Security Survey” and “Security Inspection” to accentuate the particular differences between the two types
of services, are defined as follows—

Security Survey is defined as a counterintelligence service to assist heads of office in determining the security
measures required to protect key installations from possible sabotage, espionage, subversion, and unauthorized
disclosures of, or access to, classified information or material contained therein.

Role of Security Officer in Offices

→ With the exception of the office head, the security officer is more interested in the survey that any other
individual of the office. It is the security officer who is directly responsible to the head of office for proper
maintenance of security of the security program of the office.

→ A survey Specialist must be cognizant of established security procedures relative of the office since much
of the survey including the resulting recommendations will be affected by these measures.

Authority in Conducting Security Survey

→ The Unit head may request a survey of his entire office or of specific function of a unit within the office.
When higher authorities directs a security survey to be conducted for one of its subordinate office, an
information copy of the correspondence may also be forwarded to the unit to be surveyed. It must be
remembered that a security survey is not conducted solely for the purpose of establishing a security
program of an office. The head of office is directly responsible for establishing a security system for his
office after which a survey may be conducted to determine if the program is adequate in comparison with
the importance of the office to the overall national objective.

34
EXECUTIVE/VIP PROTECTION

Executive/VIP Security

→ Are those measures taken by Agents, Security Officers, Law Enforcement officers or an Agency /officers to
protect heads of state, foreign, national or local dignitaries, civilian or military against any personal injury,
assassination, sabotage, and espionage. These may include the protection of any government or civilian
officials and individual utilized as government witnesses.

Basic Security Principles in VIP Security

▪ Every phase of security must be carefully in advance, to include the importance of the individual to be
protected, political attitude of the population, obstacles involved, means of transportation, and duration of
the security mission.

▪ Physical protection should consist of a series of protection cordons. These protective cordons may be
composed of a combination of personnel or physical security barriers.

Central direction and unity of effort

▪ The officer in charge should be given full responsibility for all phases of the security mission.
▪ Close coordination must be established with all local military and civilian authorities. Civilian authorities will
include police and other interested city, municipal or other local officials.
▪ The agencies responsible for each of the security plan must be clearly defined. Arrangements should be
made for local police to control local inhabitants. All available intelligence channels should be used to obtain
information of potential danger areas, persons, or groups.
▪ Coordination must be accomplished by an advance party after the official itinerary is received.
▪ Protective measures must be through but inconspicuous and afford security without impending the
protectee/VIP’s performance of his functions. The degree of protection is dependent upon the degree of
contact with the general public desired by the protectee.
▪ A basic element of VIP/Executive protection is the identification and the elimination of possible sources of
danger against a VIP/Executive before the danger becomes real.
▪ Plans for a perimeter of protection must be surprise proof and flexible enough to allow a quick response to
any emergency.

Defense-in-Depth Theory

→ There is no impenetrable barrier. If an unfriendly individual, organization or government can devote time,
money, personnel, material or imagination to passing a barrier, he can succeed.
→ To achieve the ultimate results from a physical security system, it is necessary to add barrier to barrier,
delay time, until sufficient delay time has been accumulated to allow control of any foreseeable penetration.
→ Therefore, rather than attempting to achieve exclusion through the use of a single barrier, security must be
built upon accumulated time or a system of “Defense-in-Depth.

Contingency Planning

→ Security planning should be flexible. Weather conditions, mechanical failures and failure of lighting systems
are three- ever-present potential hazards. The unexpected arrival of large numbers visitors, audience is
another situation frequently encountered. Last-minute changes in the security plan or schedule of events

35
occur routinely. The security plan therefore must be sufficiently fluid to cover these and other eventualities,
all of which present hazards.

Mission Orientation

→ An orientation/briefing must be conducted by the officer in charge or the protection plan, during which he
explains fully the contents of the plan. Some topics to be emphasized are:

Conduct of Security Personnel

→ Police/Security personnel assigned to these duties are selected to the basis of the appearance, alertness,
and intelligence, as well as their ability to act quickly and correctly in unforeseen circumstances. Restriction
on the circulation of the individuals should be strictly enforced. Before any person maybe allowed getting
near the protectee or his effects, the person is checked carefully for identification and the authority for his
presence is established.
Use of Weapons

→ There is always the danger of accidental discharge and injury of innocent persons when weapons are
carried. All protective personnel must be qualified to fire the weapons with which they are armed.

Crowd Control

→ Protective personnel should understand the principles of crowd control. They should not show not show
prejudice or sympathy, or become involved in any grievances expressed by the crowd.

Security Preparation in Local/Foreign Travel

Advance Preparations

→ Advance preparation refers to the activities of arranging timetable/ itinerary and coordinating with those
concerned with visit local or foreign law enforcement security men. Conduct security survey and inspection
of routes, quarters, conference, luncheon and or inaugural site. Arrange for security measures for
motorcade routes, quarters, conference site, etc. Confer with local or foreign security men about potential
danger to the Executive, such as persons, organizations or obtain copies of photographs and place these
persons under surveillance.

Motorcades

→ Select and consider the best motorcade route, preferably the most direct route to destination. Select a route
which affords a chance to have alternate routes if something happened on the motorcade route.
→ Review or dry run the route and take notes on the requirements for controlling the crowd and traffic and
deployment of foot patrolmen and motorcycle police at various positions along the route. Arrange for police
or buildings custodian to inspect buildings along the motorcade routes.

Security in Inaugural/Conference/Luncheon sites—

1. Control access to the building/sites


2. Closing off and policing areas around it,
3. Securing rooftops and adjoining buildings.
4. Ensure the presence of numerous police officers inside and around the building/site.

36
Security in VIP Office/Quarters/Residence—

1. “Defense-in-Depths” Barriers – Concentric Patterns (any attack will have to penetrate layer after layer of
defenders, the heaviest layer of defense, being closest, being closest to the Executive/VIP.)
2. Outer ring- sidewalks, stationed in front of quarters/residence/office, covering all entrances, front, center,
side and rear \
3. Middle ring- inside quarters, office/residence, covering all stairways and elevators.
4. Inner ring- immediately outside executive/VIP’S door, or close to Executive/VIP if outside

VIP Security Measures in all Areas—

1. Establish screening points to allow only authorized persons access to the protected area/person and to
keep out those who have no valid reasons to enter same.
2. Duty stations or posts should be marked on a floor/ground plan or sketch/map.
3. If an unusually large crowd are expected along a parade route security men may call on the armed forces to
station troops along the line of march.
4. If the VIP travels by train, a pilot engine must run the trucks IN advance of the VIP train.
5. Every manhole and sewer along the route should be sealed.
6. Every single building and all its occupants along the route should be checked.
7. Bellboys, waiters, cooks should be cleared.
8. Food to be cooked must be examined and samples be sent to laboratory for analysis.
9. Inspect for time bombs, radio - active materials and fire hazards.
10. Inspect closets and under the tables.
11. Never allow the VIP to stop his car in a crowd if it can be avoided.
12. Drivers for the VIP can be competent, reliable, and well trained in protective driving and must be alert for
dangers and to take instant action.
13. While walking, it is necessary to increase the number of guards because the VIP becomes an easy target.
14. In case the VIP is going to speak at hasty made stage, its strength and capacity should be inspected to limit
the persons going up to stage.
15. During afternoon sessions, lightning facilities must be checked or installed. It is estimated that the program
may reach up to nighttime.
16. An alternate generator for emergency use is made available if source of electric power is from a central
source. Designate qualified electrician to watch main source or switch.
17. If traveling by air, close the door of VIP plane when parked and place constant guards every time.
18. If traveling by watercraft, select boats of type and size capable of facing danger at the ocean. Thorough
inspection should be made on the ship and check the adequacy of lifesavers and emergency facilities.
19. All non- uniformed men must wear signs or countersigns for identification.
20. Checklist of all security hazards noted in the course of security survey or inspection should be given to the
OIC for reference/planning.
21. Security plans and specific duties of men assigned or details must be stated.
22. All written instructions must be classified SECRET.

Other Guidelines for VIP Security

→ Security Formations assist in allowing the VIP to have the best possible protection and defensible position
even for the limited amount of manpower while protectee is mobile/in transit, or static.
→ Threat evaluation is to ascertain at varying times and function which will give the best formation sequence
or set. Other considerations are threat levels and type and advance planning for staff levels.

37
→ The Need for Close - in /Escort security officers, such as first aid requirements (which differs from
location to location) and special weapons (a real headache-the less you need to rely on them, the better),
and other logistical needs must be considered. One must have the ability to use a lot of common sense and
attention to detail, to give the possible protection, without overbearing or on top of the protectee/principal.
Fully aware with this information, the Close-in/Security Escort team will be well equipped, with an
understanding of their respective position, alternatives and functions.
→ These could be varied hourly, in response to current threat level, and areas of coverage or occasion in any
of the following—
✓ Crowds, restaurants, home, office
✓ Public transport, bus, taxi
✓ Friends of protectee/principal, business
✓ Movie theatre
✓ Functions: private, public, business
✓ Huge crowds: a tight-packed area of swirling bodies
✓ Elevators: opening a door to the unknown, stopping at unknown floors.
✓ Escalators: progressing into the unknown, Turn side on, so that you can see the front at one side and
the area behind you. As you rise with the escalator, you will become level with the floor behind before
you, giving you something to watch.
✓ Stairs: give way, standing, doors on way
✓ Doors: can’t see through them, an unknown reality.
✓ Street lights: workmen, doorways, shops you are walking past, hotels or clubs and doorways should
always be covered the protectee/Principal walks past

Threat Analysis and Reaction

1. Concentrate - concentration do not get loss or be left behind, it takes only a second or two {to get killed}
2. Anticipation - anticipate your fellow officer/Escort’s moves, you can keep the protective formation together
nice and well-coordinated. Because of obstacles, obstructions, and areas of threats, the movement of
Close-in security/Escorts will be spasmodic and spontaneous.
3. Relaxation/Observation- observation should be done in a relaxed manner. Be very attentive but looking
relaxed.
4. Common sense- common sense comes from using your brain, foresight, experience, and good training.
5. Participation within the Team- the team must train together and understand completely what their job is
and their responsibilities. There will be big gaps in the defenses if we do not have participation within the
team.

38

You might also like