0% found this document useful (0 votes)
9 views9 pages

Indstrl Sec. 1

Law Enforcement and Administration: Industrial Security System Part 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views9 pages

Indstrl Sec. 1

Law Enforcement and Administration: Industrial Security System Part 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 9

INDUSTRIAL SECURITY MANAGEMENT

By:

PROF. OSCAR GATCHALIAN SORIANO, RC


BSCrim, MSBA, MACrim, PhDCrim

===========================================================

Introduction

Security from a layman�s point of view refers to the security guards whose
main function is to protect an office, building, installation or equipment against
trespass, theft, arson, and other inimical acts. As a security officer, the job
includes the implementation of a viable security education program which will sell
security measures to the customer-clientele of the private policing activities. It
is also a must to improve the knowledge, and adopt an open mind regarding the many
faceted problems involved in industrial security management.

What is a Security?

It is the state of quality of being secure; freedom from fear or danger;


assurance of certainty. To secure is to make safe or be protected.

Types of Security

1. Physical Security

Is the broadest branch of security which is concerned with the physical


measures adopted to prevent unauthorized access to equipment, facilities, materials
and document and to safeguard it from espionage, sabotage, damage and theft.
Physical security does not only cover types of security to protect equipment,
document, facilities and materials against damage, sabotage or espionage. It also
encompasses protection of personnel from criminal act.

2. Communications Security

Is the protection resulting from the application of various measures which


prevent or delay the enemy or unauthorized persons in gaining information through
the communication system.

3. Hotel Security

The protection of assets, guests, personal effect and other properties in a


hotel.

4. Bank Security

A specialized type of physical security in protecting the assets, personnel


and operation of a bank, with special emphasis on the precaution and measures to
safeguard the cash and assets while in storage; in transit, and during
transactions.

5. Document Security
Is a physical security involving the protection of documents and classified
matters from loss or access by unauthorized persons, damages, theft and compromise
through disclosure.

6. Personal Security

It is the protection of personnel, especially the ranking officials of the


company from any harm, kidnapping and other criminal acts. VIP security is also a
type of personal security.

7. Crises Security

A part of VIP security involving hostage taking and kidnapping of VIPs.

8. Industrial Security

It is a physical security applied to business groups engaged in industries


like manufacturing, assembling, research and development, processing, warehousing
and even agriculture. It is a form of physical security involving industrial plant
and business enterprises where the personnel, processes, properties and operations
are safeguarded. Use of protective barriers, and security lighting, personnel
movement control, locks and key management, guard forces, communications and
electronic hardware are essential, aside from fire prevention and control programs,
emergency plans, industrial safety and security education programs.

9. Operational Security

It is part of physical security that deals primarily with the protection of


processes, formulas, patents, and other industrial and manufacturing activities
from espionage, infiltration, loss, compromise, or photocopying.

10. Other Special Types

Air Cargo security, school security, supermarket security, and personnel


security.

What is a Security Hazard

Is an act or conditions which results in a situation conducive to a breach of


the protection system and the subsequent loss or compromise of defense information,
company secrets, or damage to personnel, property or facilities.

Kinds of Security Hazards

1. Human Hazard

Are the acts or conditions affecting the safe operation of the facility
caused by human action, accidental or intentional. It includes sabotage, espionage,
pilferage and theft, disloyalty, disaffection and subversive activity.

2. Natural Hazards

Are those caused by natural phenomena which cause damage, disturbance and
problems of the normal functioning of human activities, including security. It
includes floods, typhoons, earthquakes, lighting storms, volcanic eruptions, high-
velocity winds, tidal waves, etc. It should be noted that the real problems
actually in industrial plants are the human or man-made hazards, the most common of
which are pilferage, theft, arson, accidents through carelessness, and sabotage.

Extent and Degree of Risks to Security will be Dependent on


the Following

1. Relative Criticality

It is the importance of the firm with reference to the national economy and
security.

2. Relative Vulnerability

It is the susceptibility of the plant or establishment to damage, loss or


disruption of operation due to various hazards.

Types of Pilferers

1. Casual Pilferer

One who steals due to his inability to resist the unexpected opportunity and
has little fear of detection.

2. Systematic Pilferer

One who steals with preconceived plans and takes away any of all types of
items or supplies for economic gain.

What is a Perimeter Barrier

A medium or structure which defines the physical limits of an installations


or area to restrict or impede access thereto. It is any physical barrier used to
supplement the protection of an inside or outside perimeter.

Two General Types of Physical Barriers

1. Natural Barrier

Include mountains, cliffs, canyons, rivers, seas, marshes, deserts or terrain


difficult to traverse.

2. Man-Made Barrier

Are structural constructions like fences, walls, floors, roofs, grills, bars,
road blocks, or other physical means to deter or impede penetration.

Types of Perimeter Barriers

1. Wire Fences

Is a type of perimeter barrier made of chain link design with mesh openings
not larger than two inches square, and made of #9 gauge wire or heavier, minimum
height of which is 8 feet.

2. Building Wall
Masonry wall should have the same height as the chain link and surmounted by
the barbed wire top guards; if the height is less than the prescribed, additional
chain-link as �topping� is placed to attain the minimum height requirement.

3. Bodies of Water

It is an additional security measures, surrounding the establishment.

Kinds of Perimeter Barrier Openings

1. Gates and doors, it must be guarded and locked.

2. Sidewalk elevators, it provides access to areas within the perimeter


barriers and should be locked or guarded.

3. Utility openings, it may be composed of sewers, air intakes, exhaust


tunnels which penetrate the barriers and which have cross-sectioned area of 96 sq.
in. or more should be protected by bar grills, etc.

4. Clear Zones, it is an unobstructed area maintained on both sides of the


perimeter barrier. A clear zone of 20 ft. or more is desirable between the barrier
and extension structures and natural covers which may provide concealment or
assistance to a person seeking unauthorized entry.

Additional Protective Measures

1. Top Guard

It is an additional overhang or barbed wire placed on vertical perimeter


fences facing upward and outward with a 45 degrees angle with three to four strands
of barbed wires spaced 6� apart. This will increase the protective height and
prevent easy access.

2. Sentry Stations

Normally provided at the main perimeter entrances to secure areas located out
of doors, and manned by guards on a full time basis. Sentry Stations should be
near at the perimeter for surveillance at the entrance.

3. Guard Towers

Are house-like structure above the perimeter barriers. It gives a


psychological effect to violators.

4. Protection in Depth

In large open areas or ground where fencing or walling is impracticable and


expensive, warning signs should be conspicuously placed. The dept itself is
protection. Reduction of access roads and sufficient notices to warn intruders
should be done. Use of animal guards and intrusion devices can also be done.

5. Signs and Notices

Control signs should be erected where necessary in the management of


unauthorized ingress, and preclude accidental entry, ID, prohibition, and exclusive
areas signs.
Security Lightings

Security Lighting provides sufficient illumination to areas during hours of


darkness. Among its other purpose are:

1. It improves visibility so that intruders can be seen, identified or


apprehended.

2. It gives psychological fear which serves as a deterrent to thieves,


pilferers, trespassers, and saboteurs.

3. It makes the routine work of guard easier of identifying employees,


vehicles, etc. during nighttime.

4. If placed in certain areas, may even reduce the number of stationary


guards, and instead, may require roving patrol only at night.

Security Lightings Techniques

1. Security lighting should enable a guard to observe clearly the


activities around, and inside the premises within his jurisdictions.

2. In planning, high contrast between intruder and background should be


provided. When contrast is poor, increase intensity will improve guard�s ability
to see.

3. Lighting boundaries and approaches, as well as the area and structure


is useful to discourage unauthorized entries and reveal identity of persons. Good
lighting should reveal well boundaring areas, glaring to intruders and adequate for
the guard to observe his positions.

4. Effective lighting should: 1) discourage attempts to enter the premise;


and 2) detection were likely if entry is attempted.

5. If lighting at night cannot be provided due to impracticability, other


means of protection have to be made like additional guard posts, roving patrols and
animal guards.

Types of Security Lightings

1. Stationary Luminary

Most common type, consisting of series of fixed luminous to light a given


area continuously with overlap. These two types are used on the entry gate of
employees and vehicles. It may either be:

1) Glare Protection Type

The intensity is focused to the intruder while the observer or guard


remains in the comparative darkness. The lighting is toward the approach of an
entrance to an installation. Lights with reflectors increase glare.

2) Controlled Lighting

The width of the lighted-atop can be controlled and adjusted to suit


the security needs. The lighting is focused sag on a pile of items rather than on
the background.

2. Stand-by Lighting

Similar to continuous lighting, in can be turned on manually or by special


devices or other automatic means, when there is suspicion of entry.

3. Movable Lighting

Consist of stationary or portable, manually operated search lights which may


be lighted continuously during hours of darkness or only as needed, and usually
supplementary to either of the first two types.
4. Emergency Lighting

A stand-by lighting which can be utilized in the event of electrical failure,


either due to local equipment or commercial power failure.

Types of Light Lamps

1. Incandescent Lamps

Common light bulbs in which light is produced by the resistance of a filament


to electric current. For better concentration of light, metal reflectors are used,
and directed on areas to be lighted.

2. Gaseous Discharge Lamps

Economical to use but take two or five minutes to light which may be a
disadvantage in industrial security lighting. Examples are as follows:

1) Mercury-Vapor Lamps � blue green color light due to the presence of


mercury vapor.

2) Sodium-Vapor Lamps � emits yellow light, placed usually in areas to


connote special concern, like bridges and streets.

3) Quarts Lamps � very bright light.

Protective Alarms

Alarm, aural or visual signal given by the annunciator to security when


intruder actuates device in a protected area. An annunciator is a visual or
audible signaling device which initiates conditions of associated circuits.

Basically, alarm system was designed to alert security personnel to


consummated or attempted intrusions into an area, building or compound. Each type
of alarm is activated in the event that an intruder tampers with the circuitry, a
beam, or radiated waves; intrusion alarm can be electrical, mechanical, or
electronic. Alarms are also used for fire, smoke or other emergencies and presence
of other hazards.

Types of Protective Alarm Systems

1. Central Station System


Several separate compounds tie their alarm system to a central station so
that in case of need, the central station calls for assistance to the police, fire
department, hospital or with other government assisting units.

2. Proprietory System

Similar to the central station type except that the proprietory console is
located inside the subscriber�s installation who owns or base the system.

3. Auxillary System

An installation owned system which is a direct extension of the local


enforcement agency and/or fire department by special arrangement.

4. Local Alarm System

Consist of ringing up of visual or audible alarm near the object to be


protected. In case of alarm, response will be made by the local guards and other
personnel within sight or hearing.

Desirable Characteristics of Intrusion Alarm System

Intrusion alarm devices are designed to �detect� and not to prevent criminal
acts and should be used normally as an adjunct and not a replacement of the human
guard forces.
The primary considerations on the choice of a particular alarm system include
stability, durability and reliability. Desirable characteristics, furthermore,
should include:

1. A detection unit should initiate the alarm upon intrusion of a human


being in the area or vicinity of the protected object.

2. Panel board central annunciator or operating console monitoring


activities should be removed at all times. Transmission can be by physical wires
or by radio.
3. An annunciator console indicating the audible and/or aural signal and
the specific location of incident so that proper action can be made by security and
other units.

4. Fail-safe features give alarms in the annunciator when something is


wrong with the system.

5. System should be difficult to tamper or render ineffective by


outsiders, competitors or saboteurs.

Operation of Intrusion Alarm System

Intrusion devices emit certain signals to the annunciator and operate on the
following principles:

1. Breaking an Electric Circuit

In a building or compound, all possible points of entry can be wired by using


electrically charged strips of tinfoil or wire. Any action that will move the foil
or wire breaks the circuit and activate an alarm. The alarm can be local, or near
the area where circuit is broken, or can be monitored in a distant annunciator or
both.
2. Interruption of a Light Beam

This system uses a photo-electric cell or the �electric eye� which operates
on the principles of light rays. In this system, an invisible light beam is
transmitted to a special receiver. An infrared filter over the light source makes
the beam invisible to intruders. The source of beam is hidden, and the rays criss-
cross a room by the use of reflecting mirrors until they contact sensitive cells in
the receiver. This device terminates by wire to a console in the security control
room. When an intruder breaks the beam, an alarm is activated.

3. Detection of Sound and Vibration

This can be utilized effectively to safeguard enclosed areas vaults, safes,


storage bins, file rooms, warehouses, and similar enclosures. Supersensitive tiny
microphones are embedded in the walls, ceilings and floors of the enclosure to be
protected by sound or vibrations. These microphones distributed evenly can detect
sound or vibrations of sound caused by attempts to force entry into the protected
area.

4. Space, Motion and Vibration

These systems usually derive their operating principle from a physical


phenomenon known as �Doppler Effect.� Constant sound waves in a cubicle disturbed
by an object will cause change of frequency and wave motion thereby causing an
alarm to trigger.

5. Electromagnetic Fence

Is an electronic fence consisting of 3 to 5 strands of wire spaced from 9 to


24 inches above one another which serves as an antenna, a monitor panel, and an
electric circuitry. When power is put on, an electro-magnetic field is set among
the wires from the top to the ground. An intruder about two feet from this field
will trigger an alarm. The fence is zoned to pinpoint areas of intrusion to a
monitor located in the operation room of security. This system is suggested to be
located inside the chain-link fencing to minimize nuisance alarms caused by
animals, debris blown by the wind, and harmless trespassers.

Security Communication System

In any plant or industrial complex, inter and intra communications is


indispensable not only in security work, but also in the plant operation itself.
It is a good management policy that security should have its own communication line
officers within the installations and to the outside.

The security force needs a communication landline to call local law


enforcement agencies, the fire department, ambulance, mobile patrol and other
governmental agencies. Telephone is also needed to contact the agency�s main office
or security force outposts. The following are some means of communication that can
be a useful part of the protective system: local telephone exchange, commercial
telephone service, inter-communication, two-way radios for security, i.e., base,
portable, and mobile, security supervising system and �beep-beep,� paging and
recall system, �bull-horns� or megaphones, and amplifier or loud speaker system.

Identification and Control

Identification and control objective include precluding unauthorized entry


and facilitating authorized personnel to enter specific areas, as well as
preventing the introduction of material components of harmful materials,
misappropriation, pilferage of installation properties and recorded classified
information. Identification and control objectives are achieved by:

1. Initially determining who has valid right in the areas;

2. Limiting access to those persons who have a right and need to be there;

3. Establishing procedures for positive identification of persons


authorized access into areas;

4. Issuing passes or badges to those authorized to enter restricted areas;

5. By using access list, identification codes, and duress code.

What is a Pass System

A pass or badge is issued by security for personnel to be admitted in the


installation. This system precludes those visitors with escorts and personnel in
the access list. The pass system is for general use and not for restricted areas
like exclusive, limited and controlled areas. The following are systems
recommended:

1. Single Pass or Badge System

Pass is issued for permission to enter different specific areas by letters,


numerals, or colors. For example, green backgrounds of current passes in the
general area, or white pass with overprinted blue symbols for a certain specific
areas.

2. Pass of Badge Exchange System

Multiple copies of passes are issued to an individual with the same


photograph. The individual exchange his badge for another color or numeral at the
gate. Once inside, if he needs to enter a restricted area, he exchanges it for one
of another color acceptable in that area.

Visitor, Property, Movement and Vehicle Control

A visitor is any person not regularly employed in a plant or firm. Strict


precautions are taken with visitor against pilferage, sabotage and other crimes.
Plant visitors can be suppliers, promoters, collectors, customers, government
inspectors, contractors, job-seekers, group visitors, guided tours, and others.

Passes or badge may be issued to visitors indicating area to be visited and


escorts requirements. Likewise, movement of packages should be controlled, closely
inspecting all incoming and outgoing packages, with inspection to all the vehicles.
Trucks entering and leaving the area should be inspected. Trucks have been found to
have special components, items placed inside the spare tire, tool boxes, and even
in fake gasoline tanks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy