Ims preview

15

Click here to load reader

Transcript of Ims preview

Page 1: Ims preview

Copyrighted Material.

Page 2: Ims preview

Copyrighted Material.

Page 3: Ims preview

Industrial Security ManagementFirst Edition

Philippine Copyright, 2013By: ChapterHouse Publishing Incorporated

All Rights Reserved.

The text of this book or any part hereof, may not be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying, recording, storage in any informational retrieval system, or otherwise, without the prior written permission of the publisher.

Any unauthorized copying, reproduction, or dissemination of any portion of this book shall be prosecuted in accordance with law.

Published and Distributed by:ChapterHouse Publishing IncorporatedNovaliches, Quezon City

Edited by:The English Factorwww.englishfactor.com“Providing international-quality editorial services at reasonable costs.”

ISBN: 978-971-95775-2-2

Copyrighted Material.

Page 4: Ims preview

TABLE OF CONTENTS

DEDICATION V

PREFACE VII

PART ONE: FUNDAMENTALS OF SECURITY 1

Chapter 1: The Concept of Security 3Definitions of Security 4Related Concepts 5Categories of Security 5Security Management in Organizations 7

Chapter 2: History of Security 9Historical Roots of Security 9Security in Philippine History 10Security in the Present Time 11

Chapter 3: Legal Context of Security 13Universal Declaration of Human Rights 131987 Constitution of the Republic of the Philippines 14The Revised Penal Code (RA 3815) 15Private Security Agency Law (RA 5487 as Amended) 15Presidential Decree No. 1919 (Amending RA 5487 and Pd 100) 16Presidential Decrees No. 11 and No. 100 (Amending RA 5487) 16

Copyrighted Material.

Page 5: Ims preview

PART TWO: CATEGORIES OF SECURITY 17

Chapter 4: Physical Security 19Principles of Physical Security 20Factors in Selecting Security Safeguards 20Physical Barriers 21

Advantages of Physical Barriers 22Purpose of Physical Barriers 22General Types of Physical Barriers 22Other Types of Physical Barriers 22

First Line of Defense: The Perimeter Barrier 23Purpose of the Perimeter Barrier 23Types of Perimeter Barriers 24

Second Line of Defense: Building Exteriors 27Roofs 27Exterior Walls 27Concrete Structures 28Floors 28Interior Walls 29Ceilings 29Doorways 30Windows 31Other Openings 32

Third Line of Defense: Interior Controls 32Locks 33Telephone Entry Systems 33Identification Systems 34

Protective Alarm Sensors 34Protective Lighting 35

Purpose of Protective Lighting 35General Characteristics of Protective Lighting 36Types of Protective Lighting 36

Chapter 5: Personnel Security 39Purpose of Personnel Security: 41Pre-Employment Screening 41

Pre-employment Screening Policy Checklist (CPNI, 2011) 42 Application Form 43 Interviews 43 Identity Verification 43 Qualification and Employment Checks 45 Media Searches 46

Ongoing Personnel Security during Employment 46Purpose of Ongoing Personnel Security (CPNI, 2010) 47Importance Ongoing Personnel Security 47Security Training and Awareness 48Addressing Behaviors of Concern 49Controlling Employee Access 49Screening for the Insider Threat 50

Copyrighted Material.

Page 6: Ims preview

Exit Procedures 50The Exit Interview 53

Chapter 6: Document and Information Security 55Types of Documents 56Factors to Consider 57Stages of Information Cycle 57Characteristics of Information 58Sensitive Information 60

Classification of Sensitive Information 60Proprietary Information 61Information Security Measures 62

PART THREE: TECHNICAL SECURITY MANAGEMENT 65

Chapter 7: Security Survey and Inspection 67The Security Survey 67

Importance of Security Survey 68The Value of a Security Professional 70

Security Inspection 70Purpose of Security Inspection 71Phases of Security Inspection 71Importance of Security Inspection 71Steps in a Security Inspection 72

Safety Inspection 72Objectives of Safety Inspection 72Purpose of Safety Inspection 72Phases of Safety Inspections 73Importance of Safety Inspection 73Steps in Safety Inspection 74

Security Survey Format 75Security Inspection Report Format 77Industrial Security Survey Checklist 78

Chapter 8: Security Risk Analysis 89Security Analysis 90

Defining the Problem 90Security Hazards 93

Types of Hazards 93 Major Risks 94

Risks Management Alternatives and Strategies 95

Chapter 9: Security Investigation 97Elements of Investigation 98The Three I’s of Investigation 98Purpose of Investigation 99Qualities of Effective Investigation 99

Copyrighted Material.

Page 7: Ims preview

Characteristics of a Successful Investigator 100Systematic Approach to an Investigation 101Guidelines in Investigation 102Investigation Report 103

Purpose of the Investigation Report 103Qualities of an Investigation Report 104Parts of the Report 104Sample Report Format 105

Incident-Type Investigation/Complaint-Type Investigation 106Sequence of Investigative Leads 107Interrogation and Interview 108

Interview of Non-Hostile Informants 108The Interrogator and the Science of Psychology 108Interrogation of Suspected Individuals 109Types of Suspects in Terms of Attitude and Personality 110Different Interrogation Schemes 110Interrogation Proper 111

PART IV: SECURITY AGENCY MANAGEMENT 113

Chapter 10: Management and Planning 115MANAGEMENT IN GENERAL AND PLANNING FUNCTION 116

Security Management and Cost Effectiveness 116Security Planning 116Development of Security Polices 117Illustrations of Security Policies 117Operating Level Policies 118

FINANCING 118BUDGETING 118

The Process of Budgeting 118Budget Costs and Justification 119

ORGANIZING 119Organizational Relationship 120Organizational Principle 120Reporting Levels 121Typical Security Organization 121The Agency Operator/Security Director 121

STAFFING AND ADMINISTRATION 122Ranks and Positions 122Staffing Pattern 123Position Standards 124Hiring 124Training and Professional Development 125Discipline 125Appraisal of Results 125Promotions 125Morale and Welfare 126Communication 126Some Management Principles 126

Copyrighted Material.

Page 8: Ims preview

Chapter 11: Implementation, Problem-Solving and Audit/Inspection 129

Program Implementation 130Top Management’s Responsibility 130Involvement of Others 130Setting Priorities and Meeting Schedules 130Drills and Rehearsals 130Validation and Updating of Plans 130Program Evaluation 131

Problem Solving and Decision-Making 131Problem Solving Techniques 131Some Pitfalls in Decision Making 132Factors Affecting a Decision 132

Security Audit/Inspection 133Rationale for Security Audit 133Conduct of the Audit 134Formal and Informal Security Audit 134Structured and Unstructured Audit 134Ascertaining Compliance 134

Chapter 12: Security Personnel 137DEFINITION 138Types of Security Guards 138

Advantages and Disadvantages ofCompany Guards versus Agency Guards 139

GENERAL FUNCTIONS OF A SECURITY GUARD 140Categories of Private Security Training 140Qualifications, Functions and Attributes 141Powers and Duties of Security Guard 143Functions of a Private Detective 144Functions of Security Supervisor from the Security Guard’s Point of View 145Functions of Security Supervisor from the Management Point of View 145Duties during Strikes and Lockouts 145Attributes of Security Guard/Private Detective 146Desirable Qualities of Security Guard 147Desirable Qualities of Security Supervisor 147Basis for Disqualification 149Grounds for Cancellation of Security Guard License 149Private Security Agency Law (RA 5487 as amended) 150

Organization 150Management 151Operations 154Limitations and Prohibitions 156Administrative Sanctions 158

Copyrighted Material.

Page 9: Ims preview

Chapter 13: CODE OF ETHICS AND CONDUCT 161PRIVATE SECURITY AGENCIES 161

Private Security Agency’s Creed 161Ethical Standards for Private Security Agencies 161Code of Conduct for Private Security Agencies 162

SECURITY GUARDS 164Security Guard’s Creed 164The 11 General Orders for Security Guards 165Code of Ethics for Security Guards 166Code of Conduct for Security Guards 167

Chapter 14: GUARD FORCE ADMINISTRATION 171Leadership and Command 172

Leadership: the Concept 172Goals of a Leader 173Types of Leadership 173Leadership Traits 173Leadership Principles 175Leadership Indicators 175

Operations 176Administration 176Technical Services 177

GLOSSARY OF TERMS 179

BIBLIOGRAPHY 185

IMAGE CREDITS 187

Copyrighted Material.

Page 10: Ims preview

1

PART ONEFUNDAMENTALS

OF SECURITY

Copyrighted Material.

Page 11: Ims preview

2The ConCepT of SeCuriTy

CHAPTER 1 THE CONCEPT OF SECURITY

Security is important to everyone. It is important to individuals such as a homeowner who wants to protect valuable items in his house, a parent who does not want her child to be harmed while in school, an employee who wants to save for a comfortable retirement, or an online shopper who wants to purchase a gadget via the internet. It is also important to private companies such as a jewelry store that keeps diamonds in storage, a law firm that holds incriminating evidence against a drug lord, or an internet company that requires personal information and passwords from its users. Of course, it is also very important to governments that maintain military forces, use intelligence services, legislate civil defense policies, and implement emergency preparedness measures to serve and protect its citizens.

Learning Objectives

At the end of this chapter, the student will be able to:

• Define security

• Explain the concepts of asset, risk, threat and vulnerability

• Enumerate the categories of security

• Discuss the importance of private security in organizations

Copyrighted Material.

Page 12: Ims preview

3 INDUSTRIAL SECURITY MANAGEMENT

Definitions of Security

The word secure is derived from the Latin securus which means “safe” or “without care,” or from se cura, wherein se means “free from” and cura means “care.”

To be secure could mean many different things. It could mean being free from danger, risk, injury, fear, trouble, doubt or anxiety. Being secure could also refer to being dependable, strong, good, impregnable or inviolable. Or simply, it could mean having peace of mind.

Security can be defined as the degree of protection or resistance against harm, danger, loss, and criminals. As a form of protection, it includes structures and processes that provide or improve security as a condition.

The Institute for Security and Open Methodologies (ISECOM) is an open community and a non-profit organization that published in 2001 the Open Source Security Testing Methodology Manual (OSSTMM), a peer-reviewed manual of security testing and analysis. OSSTMM 3 was released in 2010, defining security with the following explanation:

“For a threat to be effective, it must interact either directly or indirectly with the asset. To separate the threat from the asset is to avoid a possible interaction. Therefore it is possible to have total (100%) security if the threat and the asset are completely separated from each other. Otherwise what you have is safety of the asset which is provided by the controls you put on the asset or the degree to which you lessen the impact of the threat.

For example, to be secure from lightning, one must move to where lightning can’t reach such as deep in a mountain. Threats which can’t be separated from the assets must be made safer so that their interactions and any effects from interactions do little or no harm. In this same example, to be safe from lightning, one must stay indoors during storms, avoid windows or other openings, and use lightning rods on the roof. Therefore, under the context of operational security, we call security the separation of an asset and a threat and safety the control of a threat or its effects” (ISECOM, 2010, emphasis supplied).

Copyrighted Material.

Page 13: Ims preview

4The ConCepT of SeCuriTy

Related Concepts

Understanding the concept of security requires further definition of other related concepts such as asset, risk, threat and vulnerability.

An asset is anything tangible or intangible that is capable of being owned or controlled to produce value. If it has positive economic value, it is considered an asset. Or more simply, if its value can be converted into cash, it is an asset (Sullivan & Sheffrin, 2003).

Risk is the uncertainty of financial loss, the probability that a loss has occurred or will occur, the variations between actual and expected results, or the possible occurrence of an undesirable event. The end result of risk is loss or a decrease in value (Sennewald, 2003).

Threat and vulnerability are sometimes interchangeably used with risk. A threat is anything that could adversely affect assets; it can be classified into natural hazards (such as floods), accidents (chemical spills), or intentional acts (domestic or international terrorism). Vulnerability means weakness, flaw, or virtually anything that may conceivably be exploited by a threat; examples are holes in a fence, an out-of-date key system or the introduction of a computer virus (Sennewald, 2003).

Categories of Security

The concept of security is so wide that categorization is necessary for better understanding and analysis. The three main categories covered in this book include:

1. Physical Security - pertains to all physical barriers employed or installed to secure assets

2. Personnel Security - refers to the procedure followed, inquiries conducted, and criteria applied to determine the work suitability of a particular applicant or the retention of a particular employee

3. Document and Information Security - refers to policies, regulations, doctrines, and practices enforced to safeguard the contents and integrity of any classified information or document from compromise or loss

Copyrighted Material.

Page 14: Ims preview

5 INDUSTRIAL SECURITY MANAGEMENT

The three main categories enumerated will be discussed more lengthily in Part Two of this book.

Political security is another category that relate to social relationships involving governments or entities that hold authority or power. This includes issues of security in the public, national or international level, as enumerated below.

1. Public security refers to the way governments are ensuring the protection of its citizens, organizations and institutions against threats to their well-being, as well as maintaining the general security and peace in public places. This includes security against problems that have a direct impact on people’s lives, such as gang violence, cybercrime, or trafficking of illegal drugs and firearms.

2. National security is the requirement to maintain the survival of a state through the use of economic power, diplomacy, and political power. Security threats include military foes from other nations, big drug cartels, or even national disasters that cause severe environmental damage.

3. International security consists of the measures taken by nations and international organizations to ensure mutual survival and safety. Examples of measures are military actions and diplomatic agreements.

In the private sphere, security can be even further categorized, as shown below.

1. Industrial security is a form of physical security involving industrial plants and business enterprises. This involves the safeguarding of personnel, processes, properties and operations.

2. Bank and armor security involves the protection resulting from the application of various measures which safeguards cash and assets in storage, in transit, or during transaction.

3. Hotel security involves using various measures of protection for the guests, personnel properties and functions in hotels, restaurants, bars and clubs.

Copyrighted Material.

Page 15: Ims preview

6The ConCepT of SeCuriTy

4. V.I.P. security involves the protection of top-ranking officials of the government, visiting persons of illustrious standing and foreign dignitaries.

5. Operational security involves the protection of processes, formula, patents and industrial and manufacturing activities from espionage, infiltration, loss, compromise or infringement.

6. Communication security involves the safeguard resulting from the application of different measures which prevent or delay the enemy or unauthorized person from gaining information through communication including transmission and cryptographic.

7. Mall/commercial security is the degree of protection against danger, loss, and crime inside malls. As a form of protection, it refers to systems, structures and processes that provide or improve mall security as a condition.

Security Management in Organizations

Security management has become an essential feature of corporate activity; there is almost no organization without a team dedicated to managing issues of security. We usually see shopping malls, entertainment venues and banks policed by private armies which we call security guards. The presence of these uniformed staff represents the company’s ability to respond to or deter threats. This, however, is only part of the security measures employed by companies against threats posed by opportunistic criminals, its rival organizations, or even its own saboteur employees. Other security measures may include the installation of CCTVs, sophisticated alarm systems, policies against workplace bullying and harassment, employee screening, emergency planning, and other measures that enable individuals and organizations to carry on with their business free from danger.

Indeed, security has a policing function in organizations. In fact, illegal practices in the workplace have become an established theme in criminology studies. These crimes involve not only the robberies and shootouts inside malls or kidnappings in schools that we hear in the news. It involves high-stakes corporate crimes such as tax evasion and money laundering, fraud, bribery, workplace harassment, or even those similar to street crimes such as thieves sneaking inside offices.

With corporate crime becoming a growing area of concern, the increasing role of private security in crime prevention is becoming more evident. This further highlights the need for increased competence and

Copyrighted Material.