LAW
ENFORCEMENT
ADMINISTRATION
COVERAGE:
SECURITY MANAGEMENT
www.criminologysolutions.com
ETYMOLOGY OF THE WORD
▪ The word 'secure' entered the English
language in the 16th Century.
▪ Derived from Latin word “securus” - freedom
from anxiety: se (without) + cura (care,
anxiety).
▪ The term also derives from the Latin
“securitas”, feeling no care or apprehension,
the safeguarding of the interests of a state,
organization, or persons; safe.
HISTORICAL BACKGROUND
▪ Physical Security Measures – dynamic
relationship of humans and its environment.
▪ Public Protection Forces – first duty of the
community to protect itself through
government and personal initiatives.
▪ Private Security Personnel – a commercial
enterprise influence to secure one’s business.
Guarding became a legal source of revenue.
▪ Protection and Order Maintenance –
general society need for mitigating security
risks in modern times.
KEY TERMS TO PONDER
▪ SECURITY, in a collective sense, is the same as
protection and safety; the state of being safe and
the condition of being protected against physical,
social, spiritual, financial, political, emotional,
occupational, psychological or other types or
consequences of failure, damage, error,
accidents, harm or any other event which could
be considered not desirable.
▪ Security is the relationship between a
security referent and its environment.
KEY TERMS TO PONDER
▪ SECURITY REFERENT may be SECURITY REFERENTS
persons or social groups, objects,
▪ IT DOMAIN
institutions, ecosystems, or any other ▪ PHYSICAL DOMAIN
phenomenon vulnerable to unwanted ▪ POLITICAL DOMAIN
change by the forces of its environment. ▪ MONETARY DOMAIN
SECURITY REFERENTS
IT DOMAIN PHYSICAL DOMAIN
• Communications security • Airport security
• Corporate security
• Computer security
• Food security
• Internet security
• Environmental security
• Application security • Home security
• Data security • Infrastructure security
• Information security • Physical security
• Network security • Port security/Supply chain security
• Endpoint security • Transportation security
SECURITY REFERENTS
POLITICAL DOMAIN MONETARY DOMAIN
• National security • Economic
security/financial security
• Public security
• Social security
• Internal security
• International security
• Human security
• Homeland security
SECURITY THREATS
▪ Threats against Persons and Properties
▪ Threats to Identity
▪ Threats to Confidentiality
▪ Threats to Integrity
▪ Threats from Intrusion
▪ Threats to Business Continuity
OTHER KEY TERMS TO PONDER
▪ SECURITY MANAGEMENT – proper use
of resources by a security organization in
meeting its goals and objectives.
▪ SECURITY SYSTEMS – application of
various methods or measures of
protection.
SECURITY SYSTEMS
CATEGORIES
▪ PHYSICAL SECURITY - protective security systems
▪ PERSONNEL SECURITY - human/workforce/employees/VIPs P
▪ DOCUMENT/INFO SECURITY – protection of classified matters or P
critical and sensitive information
▪ ENVIRONMENTAL SECURITY – protection of the ecological D
conditions, cultures and unique practices or traditions of the org. E
▪ OPERATIONS SECURITY – protection of systems and procedures,
policies and regulations. O
▪ REPUTATION SECURITY – protection of the image of the organization
against public perception and humiliation.
R
THREAT & SECURITY Dynamics
THREAT SECURITY SYSTEMS BUFFER ZONE ASSET
PROTECTION
▪ Natural PHYSICAL
Threats
PERSONNEL ▪ RESOURCES
▪ Human MANAGEMENT
P
Induced P DOCUMENT/INFO ▪ REACT
▪ SAFETY AND
SECURITY
D ▪ INVESTIGATE ▪ BUSINESS
O
DEGREE E OPERATION ▪ PREVENT CONTINUITY
▪ RESILIENCY
▪ Emergency R ▪ RECOVER ▪ PRESILIENCY
▪ Disaster ENVIRONMENT ▪ SUSTAINABILITY
▪ Crisis
REPUTATION
P.P.D.O.E.R SECURITY CONCEPT
PHYSICAL SECURITY - Natural, Structural, Man-made, Animal, Energy
T
PERSONNEL SCTY - Biodata, Due Diligence, Educ & Training, Supervision, Evaluation
H
R
DOCUMENT - Preparation, Classification, Handling, Transmittal, Safe Keeping, Destruction
E
A
OPERATIONS SCTY - Procedures, Policies, Systems, Rules, Regulations
T
S ENVIRONMENT SCTY - Natural, Physical, Social, Political, Industry
REPUTATION SCTY - Commitment, Brand, Contract, Quality Control, Service Support
PHYSICAL SECURITY
PHYSICAL SECURITY - a system of
barriers placed between the potential
intruder and the matter to be protected. It
is concerned with the physical measures
adopted to prevent unauthorized access to
equipment, facilities, material, and
documents, and to safeguard them against
espionage, sabotage, damage and theft.
PROTECTIVE SECURITY SYSTEMS
Protective Security - those measures
taken by an installation or unit to protect
itself against sabotage, espionage or
subversion and at the same time provide
freedom of action in order to provide the
installation of the unit with the necessary
flexibility to accomplish its mission.
Examples: Industrial, Banks, Hotel,
School, Supermarket, etc.
PROTECTIVE SECURITY SYSTEMS
Protective Security utilizes BARRIERS.
A barrier can be defined as any structure or physical device
capable of restricting, deterring, or delaying illegal access to an
installation.
Types of Barriers: Human, Animal, Energy, Structural, Natural
SPECIAL USE OF BARRIERS
RESTRICTED AREA – any area in an installation or facility
where personnel or vehicle is controlled by reason of security or
to promote efficiency of security operations.
• Exclusion Area – requires highest degree of protection
• Limited Area – lesser degree of control than that of an
exclusion area.
PROTECTIVE SECURITY SYSTEMS
Protective Security utilize LINES OF
DEFENSES.
• First Line of Defense - perimeter fences/
barriers
• Second Line of Defense - doors, floors,
windows, walls, roofs and grills and other
entries to the buildings
• Third Line of Defense - storage system like
steel cabinets, safes, vaults and interior files.
BARRIERS & SECURITY CABINET
Barriers delay or restrict access to:
SECURITY CABINET – the final
line of defense at any facility is in
the high security storage where
valuable assets are kept and
protected.
✓File Room – Cubicle or a room
✓Vault – Heavy Resistance Container
✓Cabinet – Light Resistance Container
✓Safe – small metallic container
PROTECTIVE SECURITY SYSTEMS
Protective Security also TAKE NOTE:
utilize the following:
✓Solid vs Full View Fence
1. Perimeter Fences ✓Uses of Protective Lightings
2. Protective Lightings ✓Parts of Alarm System
3. Protective Alarms ✓Locks & Keying System
4. Protective Locks and Keys
PROTECTIVE SECURITY SYSTEMS
Perimeter Fence
✓Solid fence – deny visual access
✓Full View Fence – permit visual access
Protective Lighting
✓Stationary Luminary Lighting
✓Standby Lighting
✓Emergency Lighting
PROTECTIVE SECURITY SYSTEMS
PARTS OF AN ALARM SYSTEM Examples of Alarm Devices
1. SENSOR OR TRIGGER DEVICE -
1. Dial Alarm such as a
sense an abnormal condition
2. CIRCUIT OR TRANSMISSION LINE recording voice
- channel that conveys the 2. Fire Alarm & Smoke Detector
information from all sensors in the 3. Audio or Motion Alarm
system 4. Vibration Detection Device
3. ANNUNCIATOR/ENUNCIATOR - a 5. Magnetic Door Contact
visual or audible signaling device,
6. Panic Button
may be audible or silent, a bell,
buzzer, phone ringing, or flashing of 7. CCTV Activated Alarm
light.
PROTECTIVE SECURITY SYSTEMS
LOCKS AND KEYS KEY CONTROL
✓ LOCK – a mechanical, ✓ CHANGE KEY – key to a single lock
electrical, hydraulic or ✓ SUB-MASTER KEY – key that can open
electronic device designed to all locks within a particular grouping.
prevent entry to a building or ✓ MASTER KEY – special key capable of
room. opening a series of locks; capable of
✓ PADLOCK – a portable and opening less number of locks than grand
detachable lock having a master key.
pivoted or sliding hasp ✓ GRAND MASTER KEY – a key that can
through a staple ring. open everything in a system involving two
or more master key groups.
INTEGRATED SECURITY SYSTEMS
Protective Security now Integrated Security System
employ I.S.S as modern
measures against modern ✓Road Barricade & Signal Jammers
✓Anti-ram Security Bollards
security threats. ✓Wedge & Razor Barriers
✓Security Laminate & RFID Badges
Lessons learned after the 911 ✓Integrated Alarm Systems
✓Integrated ID and Detections Systems
attacks have prompted every ✓Thermal Camera
government in rethinking and ✓Facial Recognition
polishing critical infrastructure ✓Debugging Devices
✓Perimeter Map
physical security procedures.
ADDITIONAL PROTECTIVE MEASURES
▪ TOP GUARD – Additional overhang of barbed wires, 45 degrees angle, 3-4 strands
▪ GUARD CONTROL STATION – Main perimeter entrance for surveillance
▪ TOWER GUARD – house-like structure above perimeter barrier
▪ SIGNS AND NOTICES – signs plainly visible to warn or give notification or warning
PERSONNEL SECURITY
PERSONNEL SECURITY is also known as people
or force security; a system of policies and
procedures that seek to mitigate the risk of workers
(insiders) exploiting their legitimate access to an
organization's assets for unauthorized purposes.
PERSONNEL SECURITY includes all security
measures to prevent unsuitable individuals of
doubtful loyalty from gaining access, or prevent
appointment, or retention as employees.
PERSONNEL SECURITY
Control of Personnel Core Purposes
1. ID and Badge System ✓ Anti-Subversion
2. Pass/Movement Control ✓ Counter Pilferage
3. Entry/Access Control ✓ Suitability for a role/function
4. Control of vehicle, guests, ✓ Anti-Fraud and misuse of
and or visitors assets
✓ Loyalty and Integrity check
**incoming and outgoing**
PERSONNEL SECURITY
PERSONNEL SECURITY employs the
following means:
▪ Personal Records Check (File Check)
▪ Background Investigation (CBI or PBI)
▪ Lifestyle Check
COVERAGE:
• LAC – Local Agency Check
• NAC – National Agency Check
PERSONNEL SECURITY INVESTIGATION
Points of Analysis for Security
Personal Records Check ✓ Biodata/Resume/CV
Background Investigation ✓ Contracts/Due Diligence
✓ Regulatory Documents and
LAC – Local Agency Check Clearances
NAC – National Agency Check ✓ Other records
✓ Interview
✓ Appraisal/Performance Eval
✓ Overall Reputation
PERSONNEL SECURITY
Factors Considered in BI and PSI
✓ Loyalty - faithful allegiance
✓ Integrity - uprightness in character
✓ Discretion - sound judgment/ decide with prudence
✓ Moral - personal traits/moral habits
✓ Character - sum of all traits/intrinsic nature
✓ Reputation - estimation which one is generally held
PERSONNEL SECURITY
Factors Considered in BI and PSI
✓ Loyalty - faithful allegiance
✓ Integrity - uprightness in character
✓ Discretion - sound judgment/ decide with prudence
✓ Moral - personal traits/moral habits
✓ Character - sum of all traits/intrinsic nature
✓ Reputation - estimation which one is generally held
DOCUMENT/INFO SECURITY
▪ DOCUMENT AND INFORMATION
SECURITY – involves the protection of COMPARTMENTATION – the
documents and information from loss, grant of access to classified
access by unauthorized persons. It matter only to cleared
prescribed the policies and establishes the
persons when such classified
standard basic procedures governing the
classification and security of official matter. information is required in the
▪ SECURITY CLEARANCE – is an performance of their official
administrative determination that an duties, and restricting it to
individual is eligible from a security
specific physical confine when
standpoint for access to classified matter
of a specific category. feasible.
DOCUMENT/INFO SECURITY
NEED TO KNOW – the requirement that the dissemination of classified
matters be limited strictly to persons whose official duties require
knowledge thereof.
CLASSIFIED MATTERS
✓ TOP SECRET (Code Green) - information, the unauthorized disclosure of
which would cause exceptionally grave damage to the nation politically,
economically, or military.
✓ SECRET (Code Red) – information, the unauthorized disclosure of which
would endanger national security, causes serious injury to the interest or
prestige of the nation or any government activity.
DOCUMENT/INFO SECURITY
CLASSIFIED MATTERS
✓ CONFIDENTIAL (Code Blue) - Any information and
materials, the unauthorized disclosure of which
would be prejudicial to the interest or prestige of the
nation or government activity or would cause
administrative embarrassment or unwarranted injury.
✓ RESTRICTED (Code Black) - Any information and
material which requires special protection other than
those determined to be confidential, secret and top
secret.
DOCUMENT/INFO SECURITY
METHOD OF METHOD OF
TRANSMISSION CLASSIFICATION
1. By direct contact of 1. Upgrade
officer or personnel
concerned. 2. Downgrade
2. By official courier 3. Reclassify
3. Electrical means in 4. Declassify
cryptographic form METHOD OF
4. Registered mail. DESTRUCTION
1. Burning
2. Shredding
COFFEE BREAK