Physical Security
Physical Security
Physical Security
CHAPTER 3
PHYSICAL SECURITY
This chapter describes the basic concepts of physical security as used in any installation
or physical system. Physical security is a major division in industrial security, hence it is hereby
described.
A. Definition
1. Enemy Agents Must Not Access - Acquisition of information is the ultimate results,
and the means and form in which the information is obtained.
3. Defense in Depth Means Barrier after Barrier – In order that barrier could prevent
unauthorized access and serve its purpose very well, there should be an integration of
all barriers adopted in the installation.
Page 1
INDUSTRIAL SECURITY MANAGEMENT
5. Each Installation is Different - Since each installation is different, each will have
different problems to overcome. The security procedures will not be adequate for all
installations.
C. Barrier System
1. Definition
2. Types of Barriers
Natural Barrier – These are offered by nature which could obstruct or delay
the passage way of potential intruders. These also refer to natural structures
that serve as deterrents or obstructions to intruders such as high cliff, canyon,
desert, or bodies of water.
Natural Barrier – are those natural features that delay or make more difficult
the entry of intruders.
Structural Barrier – these barriers are features constructed by men that tend
to delay entry of intruder.
Human Barrier – these are guards, office and shop workers, who stand
between the intruders and the matters to be protected.
Page 2
INDUSTRIAL SECURITY MANAGEMENT
D. Perimeter Barriers
Most of the Industrial companies, however, are required to have a wide space for
warehousing, manufacturing etc.
Security managers and security personnel also consider the various lines of
defense that could help delay or stop intruders. These are:
First Line includes all perimeter barriers;
Second Line includes the building exterior; and
Third Line includes those internal control measures.
a. Gates and Doors – when not in use and controlled by guards, gates and doors
in the perimeter should be locked and frequently inspected by guards. Locks
should be changed from time to time and should be covered under protective
locks and key control.
c. Utilities Opening - Sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of
96 square inches or more should be protected by bars, grills, water filled traps
Page 3
INDUSTRIAL SECURITY MANAGEMENT
1. Solid Fence –is made of opaque material in such a way that visual access
through the fence structure is denied. Solid fences are constructed with
heavy materials such as bricks, stone and concrete, and usually extended
down into the ground to a point view below the frost line.
Page 4
INDUSTRIAL SECURITY MANAGEMENT
c. BODIES of WATER – like river, lake, cataract, sea, pond, or any bodies of
water forming part of the wall, building or fencing should not be considered
an adequate perimeter barrier. Additional security measures like wire fence,
concrete walling, security patrolling and flood lighting at night may be
necessary for the portions of the perimeter.
c. Tower Guard – this is a housed-like structure above the perimeter barriers. The
higher the tower, the more visibility it provides. It gives a psychological
unswerving effect to violators. By and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need.
f. Signs and Notices – “Control Signs” should be erected where necessary in the
maintenance of preclude accidental entry.
E. Protective Lighting
This safeguard also has considerable value as a deterrent to thieves and vandals
and may make the job of the saboteur more difficult. It is an essential element of an
integrated physical security program.
Page 5
INDUSTRIAL SECURITY MANAGEMENT
The system must be reliable and designed with overlapping illumination to avoid
creating unprotected area in the event of individual light failure. It must be easy to
maintain and it must secure itself against attack. Poles should be within the barrier power
lines and the switch box must be protected.
Listed below are the general lighting sources that are mostly used in providing
indoor or outdoor lighting:
Page 6
INDUSTRIAL SECURITY MANAGEMENT
d. Fluorescent – this provides good color rendition, high lamp efficiency as well
as long life.
b. Street Lights – these are lighting equipment received the most widespread
notoriety for its value in reducing crime.
c. Search Lights – these are highly focused incandescent lamp and are designed
to pinpoint potential trouble spots.
d. Fresnel Lights – these are wide beam units, primary used to extend the
illumination in long, horizontal strips to protect the approached to the
perimeter barrier.
a. Fenced Perimeter Lighting – is used to illuminate the fence itself and the
area beyond it (“the detection zone”). Its objective is to reveal an intruder’s
approach and produce glare towards him, it can be difficult to apply because it
may create nuisance or hazards.
Page 7
INDUSTRIAL SECURITY MANAGEMENT
6. Areas to be Lighted
Perimeter fence
Building face perimeter
Pedestrian and vehicle entrance
Parking area
Storage, large opened working areas, piers, docks, and other sensitive
areas.
Basically, its function is to alert the security personnel for any attempt of intrusion
into a protected area, building or compound. Once an intruder tampers the circuitry, the
beam or radiated waves of the alarm system, it will activate an alarm signal.
On the other hand, the use of communication equipment in the installation helps
security in upgrading its operational efficiency and effectiveness.
Generally all alarming devices have these three (3) basic parts:
a. Sensor or Trigger Device – it emits the aural or visual signal or both.
b. Transmission Line – Circuits which carries messages to the signaling
apparatus.
c. Enunciator – it is a signaling system that activates the alarm.
a. Central Station System – a type of alarm system where the control station is
located outside the plant or installation.
Page 8
INDUSTRIAL SECURITY MANAGEMENT
c. Local Alarm – this system consist of ringing up a visual or audible alarm near
the object to be protected.
3. Kinds of Alarms
a. Metallic Foil or Wire – it will detect any vibration caused by attempted force
entry.
c. Audio Detection Device – it will detect any sound caused by attempted force
entry.
e. Space and Motion Detectors –these systems derive their operating principle
usually from a physical phenomenon known as “Doppler Effect”. A constant
sound waves in a cubicle disturbed by an object will cause change of
frequently and wave motion thereby causing an alarm to trigger.
g. Foot Rail Activator – placing the front of their foot to engage the activation
bar placed on the floor in such a position that tellers may activate the alarm.
h. Bill Traps - bill trap or currency activation devices are usually placed in the
teller’s cash drawer and connected to the alarm system using a wire connector.
i. Knee or Thigh Button – these are installed inside the desk or teller station so
they can be activated by knee or thigh pressure. They are commonly found in
location where personnel usually perform their duties from a seated position.
j. Foot Button – like the foot rail permit alarm activation safety while both
hands remain clear in view of the robber.
k. Double Squeeze Buttons – pressure is requires on both side of the device and
therefore the probability of accidental alarm is reduced.
Page 9
INDUSTRIAL SECURITY MANAGEMENT
1. Definition
Fire Alarms – are those devices installed to help detect fires or detect anything that
causes fire such as smoke or unusual rising of temperature.
In large cities, alarms are received at central dispatch office and then transmitted to fire
stations, frequently with the use of mobile teleprinters and computers. Apparatus is dispatched
according to the nature of the alarm and location of the fire. Many modern departments are now
equipped with computer-aided dispatch systems that can track the status of all units and provide
vital information about the buildings where fires occur.
Private companies and business establishments install fire alarms and automatic fire
extinguishers to avert possible occurrence of fire.
b. Dry Pipe System – the pipes are filled with air under pressure which holds
the water at a value located in a room. When sprinklers head goes, into
operation, air is released, trapping the dry pipe value and allowing water to
flow through the system.
Fire Pumps – are mechanical device of supplying water which can be manual or
motor-driven. These pumps are ideal when natural supplies of water are readily
available like a river, lake or stream.
Standpipes are galvanized Iron (GI) steel or plastic pipes located inside a
building from the lowest to the top floor with water under pressure for use in case
of fire. Located near the standpipe is a fire hose usually enclosed in a glass box
handy for use. In case of fire, the hose is screwed into the standpipe outlet and
Page 10
INDUSTRIAL SECURITY MANAGEMENT
valve is opened to release the water. The water for the standpipe can come from a
storage tank at the roof or from a series of water pumps.
Alarm System in buildings may be also be equipped with detection system that
will transmit an alarm. Some detectors are designed to respond to smoke and
others to heat.
1. Definition of Terminologies
2. Types of Locks
Page 11
INDUSTRIAL SECURITY MANAGEMENT
b. Padlock - it is a portable and detachable lock having a sliding hasp which passes
through a staple ring or the like and is then made fast or secured.
c. Combination Lock – instead of using the key to align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference point
which enables an operator to align them manually.
e. Electrical Lock - a type of lock that can be opened and closed remotely by
electrical means.
3. What is a Key?
A key is a device which is used to open a door. A key consist of two parts: the
blade, which is inserted into the lock, and the bow, left protruding so that torque can be
applied. The blade of a key is normally designed to open one specific lock, although
master keys are designed to open sets of similar locks.
4. Types of Key
a. Change Key – it is a specific key, which operated the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
b. Sub-master Key – it is a key that will open all the lock within a particular area or
grouping in a given facility.
d. Grand Master Key - it is a key that will open everything in a system involving
two or more master key group.
5. Key Control
Once an effective key control has been installed, positive control of all keys must
be gained and maintained. This can be accomplished only if it is established in
conjunction with the installation of new locking devices.
Page 12
INDUSTRIAL SECURITY MANAGEMENT
b. Key Record – some administrative means must be set up to record code numbers
and indicates to whom keys to specific locks have been issued.
e. Daily Report – a daily report should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
be leaving the company. In the event that a key has been issued, steps should be
initiated to insure that the key is recovered.
I. Security Cabinet
The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or other especially valuable
assets are protected. These security containers will be of a size and quantity, which the
nature of the business dictates.
c. File Room – it is a cubicle in a building constructed a little lighter than a vault but
of bigger size to accommodate limited people to work on the records inside.
The file room should at most be 12 feet high.
It must have a watertight door and at least fire proof for one hour.
Page 13
INDUSTRIAL SECURITY MANAGEMENT
Page 14