Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
15 views23 pages

Lea 3

The document provides a comprehensive overview of industrial security management, defining key terms such as industry, security, and management. It outlines the legal bases for industrial security, including natural, constitutional, and statutory authorities, and discusses various types of security measures applicable to different sectors. Additionally, it details physical security measures, barriers, and the principles of protecting assets and personnel within industrial settings.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views23 pages

Lea 3

The document provides a comprehensive overview of industrial security management, defining key terms such as industry, security, and management. It outlines the legal bases for industrial security, including natural, constitutional, and statutory authorities, and discusses various types of security measures applicable to different sectors. Additionally, it details physical security measures, barriers, and the principles of protecting assets and personnel within industrial settings.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 23

Industry

The term denotes “earnest or constant application to work or business”, or “a


special branch of productive work, or the capital or workers employed in it (Webster,
1993).
It is likewise defined as a large-scale production or organized economic activity
connected with the production, manufacture, or construction of a particular product or
range of products. (Microsoft Encarta, 2001-2005)
Industrial
This is defined as “pertaining to or engaged in industry”. (Webster, 1993)
Security
It is the state or condition of being safe or free front fear, harm, danger, loss,
destruction or damages.
There is a need for adequate protection because of the prevailing action of man
against man that leads to unsecured and/or unsafe conditions due to economic reasons,
revenge, or just plain greed and avarice.
Management
This term means the “skillful use of means to accomplish a purpose. (Webster,
1993)
This is the process of properly utilizing available resources to achieve
organizational goals and objectives.
Industrial Security
The term may mean: (a) security measures applied to business industries
(Manwong and Delizo, 2006); or (b) the business of providing security and protection to
private individuals, business and enterprises, or government and non-government
industries.
Industrial Security Management
It is the skillful handling of the security and safety measures of business
enterprises and industrial establishments.

LEGAL BASES OF INDUSTRIAL SECURITY MANAGEMENT


A. Natural Authority
1. The highest law is the law of self-preservation.
Man naturally reacts to protect himself, his family, his honor, freedom, liberty
and property from danger, threat or hazard. It became an unwritten law of
the early Filipinos to protect themselves and their property against the natural
and man-made hazards.
B. Constitutional Authority
1. The prime duty of the Government is to serve and protect the people.
(Art. II, Sec. 4)
The government may call upon the people to defend the State and, in the
fulfillment thereof, all citizens may be required, under conditions provided
by law, or to render personal military service.
Although the defense of the States is the one contemplated here, people
being one of the elements of the State is directly affected in whatever
protection the state will receive from the government and the people.
Take note also that all citizens who are qualified, including the security
guards, may be required by law to render personal military or civil
services. The service required of the citizens is personal.
2. No person shall be deprived of life, liberty or property without due process
of law, nor shall any person be denied the equal protection of the laws.
(Art. III, Sec. 1)
This means the life, liberty, freedom and property can only be taken from
a person after the observance of due process of law. Due process of law
is of two aspects: substantive and procedural. Daniel Webster, in brief,
defines procedural due process as “one which hears before it condemns,
which proceed upon inquiry, and render judgment only after trial”. But if
the taking of life, liberty, freedom or property does not fall within the
framework of due process of law, available remedies under the law
should be resorted to.
3. Private property shall not be taken for public use without just
compensation. (Art. III, Sec. 9)
The Constitution protects not only ownership but also possession,
enjoyment, use and disposition of private property by their rightful owners
subject to such limitations imposed by law. In this regards, private
property to be taken by the government in its exercise of the power of the

2
eminent domain must satisfy two important conditions, namely: public use
and just compensation.
4. The right of the people to be secure in their persons, houses, papers, and
effects against unreasonable searches and seizures of whatever nature
and for any purpose shall be inviolable, and no search warrant or warrant
of arrest shall be issued except upon examination under oath or
affirmation of the complainant and the witnesses he may produce, and
particularly describing the place to be searched and the persons or things
to be seized. (Art. III, Sec. 2)
C. Statutory Authority
1. Revised Penal Code (Republic Act No. 3815, as amended)
The applicable provisions for the Code on Crime Against Persons,
Personal Liberty and Security and Property have bearing on the security
and protection of one’s life, liberty and property.
2. Private Security Agency Law (Republic Act 5487, as amended)
This law governs the operation, administration of security agency, and
activities, qualification, duties and licensing of security guards, watchmen
and private detectives. In short, it is the intention of this law to
professionalize the security services in order to upgrade the level of
security protection.
Types of Security
1. Industrial Security – a type of security applied to business groups engaged in
industries like manufacturing, assembling, research and development,
processing, warehousing and even agriculture.
2. Hotel Security – a type of security applied to hotels where its properties are
protected from pilferage, loss, damage, and the function in the hotel
restaurants are not disturbed and troubled by outsiders or the guest
themselves. This type of security employs house detectives, uniform guards
and supervisor and insures that hotel guests and their personal effects are
safeguarded.
3. Bank Security – this type of security is concerned with bank operations. Its
main objective is the protection of bank cash and assets, its personnel and
clientele. Security personnel are trained to safeguard bank and assets while in
storage, in transit and during transactions.

3
4. VIP Security – a type of security applied for the protection of top-ranking
officials of the government or private entity, visiting persons of illustrious
standing and foreign dignitaries.
5. School Security – a type of security that is concern with the protection of
students, faculty members, and school properties. Security personnel are
trained to protect the school property from theft, vandals, handling campus riots
and detecting the use of intoxicated drugs and alcohol by the students.
6. Supermarket or Mall Security – a type of security which is concern with the
protection of the stores, warehouses, storage, its immediate premises and
properties as well as the supermarket personnel and customers. Security
personnel are trained to detect “shoplifter”, robbery and bomb detection and
customer relation.
7. Physical Security – part of security concerned with the physical measures
designed to safeguard personnel and to prevent unauthorized access to
equipment, facilities, materials and the documents and to protects them from
espionage sabotage, damages or theft. This if the broadest type of security.
8. Document Security – protection of documents, classified papers and vital
record from loss, access to unauthorized persons, damages, theft and
compromise through proper storage and procedures.
9. Operational Security – this involves the protection of process, formula and
patents, industrial and manufacturing activities from espionage, infiltration, loss,
compromise or photocopying.
10. Communication Security – the protection resulting from the application of
various measures which prevents or delay the enemy or unauthorized person
in gaining information through communication. This includes transmission,
cryptographic and physical security.
Three Major Divisions of Security
1. Physical Security – this concern with the physical measures adopted to prevent
unauthorized access to equipment, facilities, material and document and to
safeguard them against espionage, sabotage, damage, loss and theft.
2. Personnel Security – this is as important as physical security. Personnel
security starts even before the hiring of an employee and remains to be
maintained for as long as the person is employed.

4
Its purpose is to insure that a firm hires those best suited to assist the firm
in achieving its goals and objectives and once hired assist in providing necessary
security to the work force while carrying out their functions.
3. Document and Information Security – this involves the protection of
documents and classified papers from loss, access by unauthorized persons,
damage, theft and compromise through disclosure.
Classified documents need special handling. Lack of indoctrination and
orientation among the personal handling them can result in the leakage, loss,
theft, and unauthorized disclosure of the documents.

UNIT II
PHYSICAL SECURITY

5
Physical measures are used to define, protect and monitor property rights and
objects; they consist of barriers and devices that are able to detect, impede, and deter
potential security threats. Physical security measures help to combat the crime-related
threats that both employees and outsiders pose to the organization (for example:
robbery, burglary, arson, assault, rape, theft and vandalism). If measures are properly
planned, most potential intruders, whether employees or outsiders, should see that the
risks of detection and punishment for attempting to penetrate a protected area are
significantly greater that whatever they may gain.

PROTECTIVE BARRIERS
BARRIER
Any structure or physical device capable of restricting, deterring and delaying illegal
access to any installation.
Any line of boundary and separation, natural or artificial, placed or serving as a
limitation or obstruction (Webster, 1993).
Purpose of Barriers
1. define the physical limits of an area
2. create a physical and psychological deterrent to unauthorized entry
3. prevent penetration therein or delay intrusion, thus, facilitating apprehension
of intruders
4. assist in more efficient and economical employment of guards
5. facilitate and improve the control of vehicular traffic
Types of Physical Barriers
1. Natural Barrier – ex. Geographical features like rivers, cliffs, canyons, or
any other terrain that is difficult to traverse.
2. Structural Barrier – these are features constructed by man regardless of
their original intent that tends to delay the intruder.
Examples: Fence, walls, grills, doors, roadblocks, screens or any
other construction that will serve as a deterrent to unauthorized entry.
3. Human Barrier – persons being used in providing a guarding system or by
the nature of their employment and location, fulfill security functions.
Examples: Security guard and employees of the establishment.
4. Animal Barrier – animals are used in partially providing a guarding system.
Examples: dogs, geese, turkey

6
5. Energy – it is the employment of mechanical, electrical, electronic energy
imposes a deterrent to entry by the potential intruder or to provide warning to
guard personnel.
Examples: protective lighting, alarm system and any electronic
devices used as barriers.
Three Line of Physical Defense
1. First line of defense – perimeter fences or barriers
2. Second line of defense – doors, floors, windows, walls, roofs and grills and
other entries to the buildings.
3. Third line of Defense – storage system like steel cabinets, safes, vaults and
interior files.
Principles of Physical Security
1. The type of access necessary will depend upon a number of variable factors
and therefore may be achieved in a number of ways.
2. There is no impenetrable barrier.
3. Defense-in depth is barrier after barriers.
4. Delay is provided against surreptitious entry.
5. Each installation is different.
Levels of Physical Security
1. Minimum Security. System designed to impede unauthorized external activity
such as simple intrusion to armed attack.
2. Low Level Security. Systems designed to impede and detect some unauthorized
external activity such as on small retail store.
3. Medium Security. System designed to impede, detect and assess most external
activity and some unauthorized internal activity that range from simple shoplifting
to conspiracy to commit sabotage.
4. High Level Security. System designed to impede, detect and assess most
unauthorized external and internal activities of certain prisons, defense
contractors, pharmaceutical companies and sophisticated electronic
manufacturers.
5. Maximum Security.
PERIMETER BARRIER – a medium or structure, which defines the physical limits of an
installation or area to restrict or impede access thereto. It refers to any physical barrier
used to supplement the protection of an inside perimeter.

7
a. Inside Perimeter – A line protection adjacent to protected area and passing
through points of possible entry into the area such as doors, windows,
skylights or other points of access.
b. Outsider Perimeter – A line of protection surrounding but somewhat
removed from a protected area, such as a fence.
Type of Perimeter Barrier
1. Fences – independent structures designed to control physical and visual
access between outside areas.
a. Solid Fence is designed in such a way that visual access through the
fence is denied. It is constructed with heavy materials such as bricks, stone
and concrete.
b. Full view Fence is constructed in such a manner that visual access is
allowed or permitted such as wire fence. Wire fencing can be barbed wire,
chain link or concertina. Wire fences are attractive and low in maintenance
cost; they offer fewer hazards to people because of the absence of barbs,
and the openings are small to prevent passage of pilfered article.
2. Building Walls – Walls, floors, roofs or their combination serve also as
barriers and they should be of such construction to provide uniform protection
just like the wire fencing.
Masonry walls as perimeter barrier should have the same height as the
chain-link and surmounted by the barbed wire top guard; if the height of the
masonry is less than the prescribed, additional chain-link should be placed as
“topping”.
Walls can be made of stone slabs like adobe or hollow blocks bound by
concrete with post at regular intervals to prevent the walls from toppling due
to wind or scouring facilities, security must sit down with design engineers so
that the area where sensitive activity will be done should be given special
emphasis in protective walls.
3. Bodies of water like river, lakes, marsh cataract, sea pond or any other
bodies of water forming a part of the wall, building or fencing should never be
considered adequate natural perimeter barrier. Additional security measures
like wire fence, concrete walling, security patrolling and floodlighting at night
may be necessary for the portions of the perimeter.
Types of Full-View Fence

8
1. Chain link fence
 It must be constructed of 7 feet material excluding the top guard.
 It must be of 9 gauge or heavier.
 The mesh openings are not to be larger than 2 inches per side.
 It should be twisted and barbed selvage at top and bottom.
 It must be securely fastened to rigid metal or reinforced concrete.
 It must reach within 2 inches of hard group or paving.
 On soft ground, it must reach below surface deep enough to compensate for
shifting soil or sand.
2. Barbed wire fence
 Standard barbed wire is twisted, double-strand, 12-gauge wire with 4 point
barbs spaces in an equal distance apart.
 It should not be less than 7 feet high excluding the top guard.
 It must be firmly affixed to posts not more than 6 feet apart.
 The distance between strands must not exceed 6 inches at least one wire will
be interlaced vertically and midway between posts.
3. Concertina wire fence
 Standard concertina barbed wire is commercially manufactured wire coil of
high strength steel barbed wire clipped together at intervals to from a
cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter.
 Used as temporary roadblock or impediment during strikes and crowd control.
Types of Perimeter Barrier Openings
1. Gate and Doors – when not in active use and controlled by guard, gates and
doors in the perimeter should be locked and frequently inspected by guards.
Locks should be changed from time to time.
2. Sidewalk Elevator – these provide access to areas within the perimeter
barrier and should be locked or guarded.
3. Utilities Openings – like sewers, air tanks and exhaust channels
4. Clear Zone – unobstructed area should or a “clear zone” should be
maintained on both side of the perimeter barrier.
a. A “clear zone” of 20 feet or more should exist between the perimeter
barrier and exterior structure parking areas and natural or manmade
features.

9
b. A “clear zone” of 50 feet or more should exist between the perimeter
barrier and structure within the protected area except when building wall
constitute part of the perimeter barrier.
Additional Protective Barrier
1. Top Guard – a top guard is an additional overhang or barded-wire place on
vertical perimeter fences facing upward and outward with a 45-degree with
three to four strands of barbed-wires, 6 inches apart and must be stalled on
the supporting arms.
2. Guard Control Stations – this is normally provided at main perimeter
entrance to secure areas located outdoors, and manned by a guard on a
fulltime basis.
3. Tower – “Guard Tower” are house-like structure above the perimeter
barriers.
4. Signs and Notice – “Control Signs” should be erected where necessary in
the management of unauthorized ingress and preclude accidental entry.
Signs should plainly be visible and legible from approach and in under
standard language. Signs on entry should also be posted at all principal
entrance

PROTECTIVE LIGHTING
Protective lighting provides a means of continuing, during hours of darkness, a
degree of protection approaching that maintained during daylight hours. This safeguard
also has considerable value as a deterrent to thieves and vandals and may make the job
of the saboteur more difficult. It is an essential element of an integrated physical
security program.
Depending on the nature of the facility, protective lighting is designed to
emphasize the illumination of the perimeter. In the case, it must produce sufficient light
to create a psychological deterrent to intrusion as well as to make detection virtually
certain in the event an entry is made. It must avoid glared that would reduce the visibility
of security personnel, while creating glared to detect intruder. This is particularly
important where the facility is within streets, highways or navigable waterways.
The system must be reliable and designed with overlapping illumination to avoid
creating unprotected area in the event of individual light failure. It must be easy to

10
maintain and it must secure itself against attack. Poles should be within the barrier
power lines and the switch box must be protected.
It is the single most cost-effective deterrent to crime because it creates a
psychological deterrent to intruders.
Purposes of Protective Lighting
1. It provides sufficient illumination to the areas during hours of darkness.
2. Lighting can help improve visibility so that intruder can be seen and identified
and, if possible, apprehended.
3. It deserves as deterrent to would-be thieves.
4. Reduction of the need for security forces.
General Considerations in Protective Lighting
1. Lighting needs must be dependent upon threat, perimeter extremities,
surveillance capabilities, and available guard force.
2. Designed to discourage unauthorized entry and facilitate detection of intruders.
3. It must continuously operates during period of reduced visibility and that standby
lighting is maintained.
4. Cleaning and replacement of lamps and luminaries, particularly with respect to
costs and means required and available.
5. Weather Condition.
6. Fluctuating or erratic voltages in the primary power sources.
7. Requirements for grounding of fixtures and the use of common ground on an
entire line to provide a stable ground potential.
Requirements
1. It depends on each situations and the areas to be protected.
2. When lighting provisions are impractical, additional and other security means will
be necessary.
3. It should not be used as a psychological deterrent only.
4. It may be desirable for those sensitive areas or structures within the perimeter
which are under specific observation.

Characteristics
1. Lighting is inexpensive to maintain and, when properly employed, may reduce
the need for security forces.

11
2. It may also provide personal protection for forces by reducing the advantages for
concealment and surprise for a determined intruder.
3. Protective lighting usually requires less intensity than working light, except for
identification and inspection at authorized portals and in emergencies.
Principles of Protective Lighting
Protective lighting should enable guard force personnel to observe activities
around or inside an installation without disclosing their presence. Adequate lighting for
all approaches to an installation not only discourages attempted unauthorized entry, but
also reveals persons within the area. However, lighting should not be used alone. It
should be used with other measures such as fixed security posts or patrols, fences, and
alarms. Other principles of protective lighting are listed next:
a. Good protective lighting is achieved by adequate, even light upon bordering
areas, glaring lights in the eyes of the intruder, and relatively little light on
security patrol routes. In addition to seeing long distances, security forces
must be able to see low contrasts, such as indistinct outlines of silhouettes,
and must be able to spot an intruder who may be exposed to view for only a
few seconds. Higher levels of brightness improve all of these abilities.
b. In planning protective lighting, high brightness contrast between intruder and
background should be the first consideration. With predominantly dark dirty
surfaces or camouflage type painted surfaces, more light is needed to
produce the same brightness around installations and buildings than when
clean concrete, light brick, and grass predominate. When the same amount
of light falls on an object and its background, the observer must depend on
contrasts in the amount of light reflected. The ability of the observer to
distinguish poor contrasts is significantly improved by increasing the level of
illumination.
c. When the intruder is darker than his background, the observer sees primarily
the outline or silhouette. Intruders who depend on dark clothing and even
darkened face and hands may be foiled by using light finishes on the lower
parts of buildings and structures. Stripes on walls have also been used
effectively, as they provide recognizable breaks in outlines or silhouettes.
Providing broad lighted areas around and within the installation, against
which intruders can be seen, can also create good observation conditions.

12
d. Two basic systems or a combination of both may be used to provide practical
and effective protective lighting. The first method is to light the boundaries
and approaches. The second is to light the area and structures within the
general boundaries of the property.
e. To be effective, protective lighting should:
i. Discourage or deter attempts at entry by intruders. Proper illumination
may lead a potential intruder to believe detection is inevitable.
ii. Make detection likely if entry is attempted.
Types of Protective Lighting
A. Stationary Luminary (Continuous Lighting) – this is common type consisting
of a series of fixed luminaries to continuously flood a given area.
Types of Stationary Lighting
1. Glare Projection Type – the intensity is focused to the intruder while the
observer or guard remained in the comparative darkness. The lighting is toward the
entrance to an installation.
The glare projection lighting method is useful where the glare of lights directed
across surrounding territory will not be annoying nor interfere with adjacent
operations. It is a strong deterrent to a potential intruder because it makes it difficult
for him to see the inside of the area. It also protects the guard by keeping him in
comparative darkness and enabling him to observe intruders at considerable
distance beyond the perimeter.
a. Glare projection or other protective perimeter lighting may not be appropriate
in some instances. In combat tactical perimeter security considerations are
given first priority over security against pilferage. Generally, the tightening of
tactical perimeter security strengthens other physical security efforts. A
blending of tactical and physical security principles is required especially true
with regards to perimeter lighting.
b. Glare projection is not appropriate where security troop emplacements may
be silhouetted or illuminated for the enemy to see from the enemy’s
approach to the secured site. Where glare projection is desired, security
troops placed in front of the perimeter fence should be moved, but still be
able to take up effective fields of fire for defense of the perimeter. If such
blending of protective lighting and tactical security cannot be accomplished,
perimeter lighting should not be used. Floodlights that provide a band of light

13
with great horizontal angular dispersal and which directs the glare at a
possible intruder while restricting the downward beam, is preferred in this
application.
2. Controlled Lighting – the lighting is focused on the pile of items rather than
the background. The width of the lighted strip can be controlled and adjusted to suit the
security needs.
Controlled lighting is best when it’s necessary to limit the width of the lighted
strip outside the perimeter because of adjoining property or nearby highways, railroads,
navigable waters, or airports. In controlled lighting, the width of the lighted strip can be
controlled and adjusted to fit the particular need, such as illumination of a wide strip
inside a fence and a narrow strip outside; or floodlighting a wall or roof. This method of
lighting often illuminates or silhouettes security personnel as they patrol their routes.
B. Standby Lighting – this system is similar to continuously lighting but it is turned
on manually or by a special device or other automatic means.
C. Movable Lighting – this consists of stationary or portable, manually operated
searchlights. The searchlights may be lighted continuously during the hours of
darkness or only as needed, and are usually supplementary to other types of
security lighting.
D. Emergency Lighting – this type may be duplicative of existing systems. This is
at standby, which can be utilized in the event of electronic failure, either due to
local equipment or commercial power failure.
Types of Light Lamps
a. Incandescent Lamp – these are common light bulbs of the type found in
the home. They have the advantages of providing illumination when the
switch is thrown and are thus the most commonly used protective lighting
system.
b. Gaseous-discharge Lamp – the use of gaseous discharge lamps in
protective lighting is somewhat limited since they require a period from
two to five minutes to light when they are cold and even longer to relight
when hot or after a power interruption. This is very economical to use but
for industrial security, it is not acceptable due to long time in the lighting in
case it is turned off by accident or by low voltage or brown-out.

Type of Gaseous Discharge Lamps

14
a. Mercury Vapor Lamps – these lamps give a blue-green color light due to
the presence of mercury vapor. Its initial cost is higher than the incandescent
lamps of the same voltage but is more efficient and gives more light. This is
widely used for interior and exterior lighting.
b. Quartz Lamp – these lamps emit a very bright white light and snap on
almost as rapidly as the incandescent lamp. They are frequently used at very
high voltage, and they are excellent for use along the perimeter barrier and in
troublesome areas.
General Types of Lighting Sources
1. Incandescent Lamp – it is the least expensive in terms of energy consumed and has
the advantage of providing instant illumination when the switch is on.
2. Mercury Vapor Lamp – it is considered more efficient than the incandescent and
used widespread in exterior lighting. This emits a purplish-white color, caused by an
electric current passing through a tube of conducting and luminous gas.
3. Metal Halide – it has similar physical appearance to mercury vapor but provides a
light source of higher luminous efficiency and better color rendition.
4. Fluorescent – this provides good color rendition, high lamp efficiency as well as long
life. However, it cannot project light over long distance and thus, are not desirable as
flood type lights.
5. High-Pressure Sodium Vapor – this has gained acceptance for exterior lighting of
parking areas, roadways, buildings and commercial interior installations.
Constructed on the same principle as mercury vapor lamps, they emit a golden white
to light pink color and this provide high lumen efficiency and relatively good color
rendition.
Type of Lighting Equipment
1. Floodlights – these are wide beam units, primarily used to extend the illumination in
long, horizontal strips to protect the approaches to the perimeter barrier. These can
be used to accommodate most outdoor security lighting needs, including the
illumination of boundaries, fences and buildings and for the emphasis of vital areas
or particular buildings.
2. Street lights – these lighting equipments received the most widespread notoriety for
its value in reducing crime. These produce diffused rather than directional beam.
They are widely used in parking areas.

15
3. Search lights – these are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
4. Fresnel lights – these are wide beam units, primarily used to extend the illumination
in long, horizontal strips to protect the approaches to the perimeter barrier. Fresnel
projects a narrow, horizontal beam that is approximately 180 degrees in the
horizontal and from 15 to 30 degrees in the vertical plane.
General Considerations in Protective Lighting
1. The determination of lighting needs must be depending upon the threat,
perimeter extremities, surveillance capabilities, and available guard forces.
2. Protective lighting must be designed to discourage unauthorized entry and to
facilitate detection of intruders approaching or attempting to gain entry into
protected areas
3. The protective lighting must be continuously operates during periods of reduced
visibility, and that standby lighting is maintained and periodically tested for use
during times of emergency and mobilization alerts.
4. Cleaning and replacement of lamps and luminaries, particularly with respect to
costs and means required and available.
5. The effects of local weather conditions may be a problem in cases where
fluorescent units are used.
6. Fluctuating or erratic voltages in the primary power sources.
7. Requirements for grounding of fixtures and the use of common ground on an
entire line to provide a stable ground potential.

PROTECTIVE ALARMS
Another safeguard used to assist security to complement if not to supplement
physical security is an array of alarms. These alarms of various types and cost can be
installed indoors or outdoors. Basically, alarm systems are designed to alert security
personnel to consummated or attempted intrusion into an area, building or compound.
Each type of alarm is activated in the event that an intruder tampers the circuitry, a beam
or radiated waves. In short, intrusion alarms can be electrical, mechanical or electronic.
Types of Alarms System
1. Breaking an electrical circuit through metallic foil or wire. In building or compound,
all point of entry can be wired by using electrically charge strips of tinfoil wire. Any

16
actions that will move the foil or wire break the circuit and activate an alarm. Metallic
foil or wire is used in window or glass surfaces. Doors and windows can be
equipped with magnetic or spring activated contacts, which will sound an alarm when
the door or window is opened.
2. Interruption of light beam of photo-cell through a photoelectric or electric eye
device. An invisible light beam is transmitted at a frequency of several thousand per
second. It is connected by a wire to a control station and when an intruder crosses
the beam he makes contact with the photo electronic coil which thus activates the
alarm.
3. Detecting sound and vibration through an audio detection device. Supersensitive
microphone speaker sensor is installed in walls; ceiling and floors of the protected
area of any sound caused by attempted forced entry inspected by the sensor.
4. Vibration detection device. The vibration sensitive sensor is attached to walls,
ceiling or floors of the protected areas. The sensor detects any vibration caused by
attempted forced entry,
5. Space and motion detectors. These systems derive their operating principle
usually from a physical phenomenon known as “Doppler Effect”. Constant sound
waves in a cubicle disturbed by an object will cause change of frequency and wave
motion thereby causing an alarm to trigger.
6. Foot Rail Activator. Placing the front of their foot to engage the activation bar
places foot rail activator on the floor in such a position that tellers may activate the
alarm. Foot rails do not acquire any obvious use of the teller’s hand and their
hands may be kept in full view of the robbers for reason of safety. Because foot rail
can be activated very obtrusively and safety, it is frequently found in the banks where
tellers normally operate while standing up.
7. Bill Traps. Bill traps or currency activation devices are usually placed in the teller’s
cash drawer and connected to the alarm system using a wire connector. When
currency is removed from the devices, the alarm is activated. The advantage of
these devices is that the robbers frequently remove the currency and activate the
alarm. This is particularly helpful when the employees are immediately forced to
leave their station without having an opportunity to activate the alarm safely.
8. Knee or Thigh Button. These are installed inside the desk or teller station so they
can be activated by knee or thigh pressure. They are commonly found in location
where personnel usually perform their duties from a seated position

17
9. Foot Button. Like the foot rail permit alarm activation safety while both hands
remain clear in view of the robber.
10. Double Squeeze Buttons. Pressure is required on both side of the device and
therefore the probability of accidental alarm is reduced.
Type of Alarm Detection System
1. Central Station System – a type of protective alarm system where the central
station is located outside the installation. It can be located in an agency and the
installation is one of the subscribers. When alarm is sounded, central station notifies
police and other agency. A system in which the alarm signal is relayed to remote
panel located at the facilities of private owned protection. Service Company manned
by its personnel.
2. Proprietary System – this function in the same way as central system except that it
is owned by, operated and located in the facility. Response to all alarms is by
facility’s own security or fire personnel. Since this system is monitored locally, the
response time to an alarm is considerably reduced.
3. Local Alarm System – in this case, the sensor activates the circuit, which in turn
activates a horn or siren or even flashing light located in the immediate vicinity of the
alarmed area. Only guard within sound or hearing can respond to such alarms, so
their use is restricted to situations where guards are so located that their response is
assured.
4. Auxiliary System – in this system installation circuits are led into local police or fire
department by lease telephone lines. The dual responsibility for circuits and the high
incidence of false alarms have made this system unpopular with public fire and
police personnel.
5. Local Alarm-By-Chance System – this is a local alarm system in which a bell or
siren is sounded with no predictable response. These systems are used in
residence or small retail establishments, which cannot afford a respond system. The
hope is that a neighbor or passing will reach to the alarm and call for police
assistance, but such a call is purely a matter of chance.
6. Dial Alarm System – this system is set to dial a predestined number when the
alarm is activated. The number selected might be the police or the subscriber’s
home number, or both. When the phone is answered, a recording states that an
intrusion is in progress at the location so alarmed. This system is relatively

18
inexpensive to install and operate, but since it is dependent on general phone circuit,
it could fail if line were busy or if the phone connection were cut.
Three Parts of an Alarm System
1. Sensor or Trigger Device
2. Circuit which carries messages to the signaling apparatus
3. Signaling system, sometimes called the annunciator

FIRE ALARM SYSTEMS


Fire alarms are those devices installed to help detect fires or detect anything that
causes fire such as smoke or unusual rising of temperature. Today many communities
are served wither with a telegraph-alarm system or with telephone call boxes. Many
large cities have removed all or many of their street alarm boxes because of problems
associated with maintenance and with false alarm transmissions. Some boxes have
been replaced with telephones. All alarms are then transmitted to the fire stations.
In large cities, alarms are received at central dispatch office and then transmitted
to fire stations, frequently with the use of mobile teleprinters and computers. Apparatus
is dispatched according to the nature of the alarm and location of the fire . Many modern
departments are now equipped with computer-aided dispatch systems that can track the
status of all units and provide vital information about the buildings where the fires occur.
Types of Fire Protection System
1. Automatic Sprinkler System. An integrated network of hydraulically designed
piping installed in a building, structure or area with outlets arranged in a
systematic pattern which automatically discharges water when activated by heat
or combustion products from a fire.
2. Fire Pumps. Mechanical device of supplying water which can be manual or
motor-driven. These pumps are ideal when natural supplies of water are readily
available like a river, lake or stream.
3. Standpipes. Galvanized iron steel or plastic pipes located inside a building from
the lowest to the top floor with water under pressure for use in case of fire.
4. Fire Hydrant. Mechanical device strategically located in an installation or street
where fire hose is connected so that water with pressure will be available to
extinguish a fire.

19
5. Portable Hand Extinguishers. A fire fighting equipment which can be portable
or in a cart that is used to put out fire depending on the contents to extinguish
certain types of fire.
6. Alarm systems. Buildings may also be equipped with detection systems that
will transmit an alarm. Some detectors are designed to respond t smoke and
others to heat.

PROTECTIVE LOCKS AND KEYS


The best defense against lock picking and making of key by impression is the
installation of special pick-resistant, impression-resistant lock cylinders. Generally
speaking, locks are the cheapest security investment that can be made. Locking device
is simply a mechanism that extends the door or window into a wall that hold them. If,
therefore, the wall or the door itself is weak or easily destructible, the lock cannot be
effective. It must be recognized that any lock will eventually yield to attack. They must
be thought of only as delaying devices. But this delay is of primary importance. The
longer the intruder is stalled in an exposed position while he works to gain entry, the
greater the chances of discovery. Even the highest locking devices are only one part of
door and entrance security locks, cylinders, door and frame construction, and key control
are inseparable element; all must equally be effective. If one element is weak, the
system will breakdown.
Lock – a mechanical, electrical, hydraulic or electronic device to prevent entry into a
building, room, container or hiding place and to prevent the removal of items without the
consent of the owner.
Key – an instrument used for locking and unlocking.
Padlock – a portable and detachable lock having a sliding hasp which passes through a
staple ring or the like and is then made fast or secured.
Peterman – An English term used to describe a lock picker.
TYPES OF LOCKS
Warded Locks – Offer very little security. This type of lock must therefore be used only
to have privacy but not to provide a high degree of security.
Disc Tumbler Locks – designed for the use of automobile industry and are in general
used in car doors today. Because this lock is easy and cheap to be manufactured, its
use has expanded to other areas such as desks, files and padlocks. The delay afforded
is approximately ten minutes.

20
Lever Locks – are difficult to define in terms of security since they vary greatly in their
effectiveness. They are used in safe deposit boxes and are for all practical purposes,
pick-proof. The least of these locks are used in desks, lockers and cabinets and
generally less secure than pin tumbler lock.
Combination Locks – are difficult to defeat, since they cannot be picked because few
experts can manipulate the device to discover the combination. Most of these locks
have three dials, which must be aligned in the proper order before the lock will open.
Some locks may have four dials for greater security.
Code Operated Locks – these are combination-type locks and that no key is used.
Pressing the series of numbered button in the proper sequence opens them. Some of
them are equipped to alarm if wrong sequence is pressed. These are high security
locking device.
Electromagnetic Locks – these are devices holding a door by magnetism. These are
electrical units consisting of the electromagnetic on metal holding sequence. When the
power is secured on the door, they will resist pressure of up to 1000 pounds.
Card Operated Locks – are electronically or more usually magnetic. Coded card
notched, embossed or containing an embedded patter of copper locks are used to
operate such locks. These are frequently fitted with recording device, which registers
time of use and the identity of the user.

TYPES OF KEYS
Change Key - a specific key, which operates the lock and has a particular combination
of cuts, or bittings, which match the tumblers of the tumblers in the lock.
Sub-Master Key – a key that will open all the lock within a particular area or grouping in
a particular facility.
Master Key – A special key that will capable of opening a series of locks.
Grand Master Key – a type of key that will open everything in a system involving two or
more master key groups.

KEY CONTROL
Once an effective key control has been installed, positive control of all keys must
be gained and maintained. This can be accomplished only if it is in conjunction with the
new locking devices. The following can be utilized to maintain effectively key control:

21
Key Cabinet – a well-constructed cabinet will have to be produced. The cabinet will
have to be of sufficient size to hold the original key to every lock in the system. It should
be locked at all times.
Key Records – some administrative means must be set up to record code number of
the locks and to whom the keys of a specific locks was issued.
Inventories - periodic account must be made of all duplicates and original keys in the
hands of the employees whom they have been issued.
Audits – in addition to periodic inventories, an unannounced audit should be made of all
the key control records and procedures by a member of the management.
Daily Report – a regular report must be made to the person responsible for the key
control from the personnel department indicating all persons who have left or will be
leaving the department or the company. In the event that a key was issued, steps
should be made to recover the key.

PROTECTIVE CABINET
The final line of defense at any facility is in the high security storage area where
records, papers, plans or cashable instruments, previous metals or other especially
valuable assets are protected, these security cabinets will be of a sized and quantity
which the nature of the business dictates.
SAFE - A metallic container used for the safekeeping of documents or small items in an
office or installation. Safe can be classified as either robbery or burglary resistance
depending upon the use and need.
Its weight must be at least 750 lbs. and should be anchored to a building
structure and its body should at least be one inch thick steel.
VAULT - Heavily constructed fire and burglar resistance container usually a part of the
building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than safe but smaller than a security file room.
The vault door should be made of steel at least 6 inches in thickness. Vault
walls, ceiling, floor reinforce concrete at least 12 inches in thickness and the vault be
must resistive up to 6 hours.
FILE ROOM - A cubicle in a building constructed a little lighter than a vault but bigger
size to accommodate limited people to work on the records inside.
The file room should at most be 12 feet high and it must have a watertight door
and at least fire proof for one hour.

22
2

You might also like