Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lea 213 Module 3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Republic of the Philippines

Southern Philippines Agri-business and Marine and Aquatic School of Technology


Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim

LEA 213- MODULE 3

Learning Content:
: Protective Lighting
: Protective Alarms
: Protective Lock and Key Control
: Security Cabinet
: Control of Personnel in the Physical Facility
: Package Movement Control
: Control of Vehicle in the Installation
: Building Access Control

What is Protective Lighting?

- The idea that lighting can provide improve protection for people and facilities is as
old as civilization. Protective lighting is the single most cost-effective deterrent to
crime because it creates a psychological deterrent to the intruders.

Types of Protective Lighting

1. Continuous lighting - the most familiar type of outdoor security lighting, this is
designed to provide two specific results: glare projection or controlled lighting. It consists
of a series of fixed luminaries at range to flood a given area continuously during the hours
of darkness.

a. Glare projection type- it is being used in prisons and correctional institutions to


illuminate walls and outside barriers.

b. Controlled lighting- it is generally employed where, due to surrounding property


owners, nearby highways or other limitations, it is necessary for the light to be more
precisely focused.

2. Standby lighting - it is designed for reserve or standby use or to


supplement continuous systems. A standby system can be most useful to
selectively light a particular area in an occasional basis.

3. Movable or Portable lighting- this system is manually operated and is usually made
up of movable search or floodlights that can be located in selected or special locations
which will require lighting only for short period of time.

4. Emergency lighting - this system is used in times of power failure or other


emergencies when other systems are inoperative.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim

General Types of Lighting Sources


Listed below are the general lighting sources that are mostly used in providing indoor or
outdoor lighting.

1. Incandescent lamp - it is the least expensive in terms of energy consumed


and has the advantage of providing instant illumination when the switch is on.

2. Mercury vapor lamp - it is considered more efficient that the incandescent and used
wide spread in exterior lighting. This emits a purplish-white color, caused by an
electric current passing through a tube of conducting and luminous gas.

3. Metal halide - it has similar physical appearance to mercury vapor but provides a light
source of higher luminous efficiency and better color rendition.

4. Fluorescent - this provides good color rendition, high lamp efficiency as


well as long life. However, it cannot project light over long distance and thus are not
desirable as flood type lights.

5. High-pressure sodium vapor - this has gained acceptance for exterior lighting of
parking areas, roadways, buildings and commercial interior installations. Constructed on
the same principle as mercury vapor lamps, they emit a golden white to light pink color
and this provide high lumen efficiency and relatively good color rendition.

Types of Lighting Equipment

Lighting equipment are generally used or associated with security lighting. These are:

1. Floodlights - These can be used to accommodate most outdoor security


lighting needs, including the illumination of boundaries, fences and buildings and for the
emphasis of vital areas or particular buildings.

2. Street lights - This lighting equipment received the most widespread notoriety for its
value in reducing crime.

3. Search lights - These are highly focused incandescent lamp and are
designed to pinpoint potential trouble spots.

4. Fresnel lights- These are wide beam units, primary used to extend the illumination in
long, horizontal strips to protect the approaches to the perimeter barrier. Fresnel projects
a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from
15 to 30 degrees in the vertical plane.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim

What are Protective Alarms?

- Protective alarm is one of the important barriers in security. It assists the security
in detecting, impeding or deterring potential security threat in the installation.
Basically, its function is to alert the security personnel for any attempt of intrusion
into a protected area, building or compound. Once an intruder tampers the
circuitry, the beam or radiated waves of the alarm system, it will activate an alarm
signal.

- On the other hand, the use of communication equipment in the installation helps
security in upgrading its operational efficiency and effectiveness.

Three Basic Parts of Alarm System

1. Sensor or trigger device - it emits the aural or visual signals or both.

2. Transmission line - a circuit which transmit the message to the signaling apparatus.

3. Enunciator/annunciator - it is the signaling system that activates the alarm.

Types of Protective Alarm System

1. Central Station System - a type of alarm where the control station is located outside
the plant or installation. When the alarm is sounded or actuated by subscriber, the central
station notifies the police and other public safety agencies.

2. Proprietary system - centralized monitor of the proprietary alarm system


is located in the industrial firm itself with a duty operator. In case of alarm, the duty
operator calls whatever is the primary need; firefighters, police, an ambulance or a bomb
disposal unit.

3. Local Alarm – This system consists of ringing up a visual or audible alarm near the
object to be protected. When an intruder tries to pry a window, the alarm thereat goes off.

4. Auxiliary alarm - company-owned alarm systems with a unit in the nearest police
station so that in case of need, direct call is possible. The company maintains the
equipment and lines both for the company and those in the police, fire and other
emergency agencies by special arrangement. Radio, landlines, or cell phones can avail
of the auxiliary system.

Kinds of Alarms

1. Audio Detection Device - it will detect any sound caused by attempted force entry. A
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim

supersonic microphone speaker sensor is installed in walls, ceilings and floors of the
protected area.

2. Vibration Detection Device - it will detect any vibration caused by attempted force
entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the protected
area.
3. Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically
charge strips of tinfoil or wire is used in the doors, windows or glass surfaces of the
protected area.

4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when
this beam is disturbed by a physical object, an alarm is activated.

5. Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and when


this is disturbed or when intruder breaks contact with the beam, it will activate the alarm.

What is Protective Lock and Key Control?

- Lock is one of the most widely used physical security devices in the asset
protection program of an installation. It complements other physical safeguards of
the installation against any possible surreptitious entry. However, the owner of the
installation or his security officer needs to understand the weaknesses and
strength of each type of lock including the door, window or walls to be used to
achieve maximum benefit from its application. This is because highly skilled
burglars more often concentrate on the lock and its surrounding mechanism in
order to make a forcible entry. It is for these obvious reasons that locks are
considered as delaying devices which cannot really stop a determine intruder from
destroying the lock just to launch an attack. Hence, knowledge of the basic
principles of locking systems will enable the installation owner or the security
officer to evaluate any lock and determine its quality and effectiveness in a
particular application.

What is a Lock?

A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to


prevent entry into a building, room, container or hiding place.

Types of Locks

1. Key-operated mechanical lock - it uses some sort of arrangement of internal


physical barriers (wards tumblers) which prevent the lock from operating unless
they are properly aligned. The key is the device used to align these internal barriers
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim

so that the lock may be operated.

Three (3) Types of Key-operated Lock

a. Disc or wafer tumbler mechanism


b. Pin tumbler mechanism
c. Lever tumbler mechanism

2. Padlock - a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.

3. Combination lock - instead of using the key to align the tumblers, the combination
mechanism uses numbers, letters or other symbols as reference point which
enables an operator to align them manually.

4. Code-operated lock - a type of lock that can be opened by pressing a series of


numbered button in the proper sequence.

5. Electrical lock - a type of lock that can be opened and closed remotely by
electrical means.

6. Card-operated lock - a type of lock operated by a coded card.

Types of keys

1. Change key - a specific key, which operates the lock and has a particular combination
of cuts which match the arrangement of the tumblers in the lock.

2. Sub-master key - a key that will open all the lock within a particular area or grouping
in a given facility.

3. Master key - a special key capable of opening a series of lock.

4. Grand Master key - a key that will open everything in a system involving two or more
master key groups

Key Control
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim

Once an effective key control has been installed, positive control of all keys
must be gained and maintained. This can be accomplished only if it is established in
conjunction with the installation of new locking devices. The following methods can be
used to maintain effective key control;

1. Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have
to be of sufficient size to hold the original key to every lock in the system. It should be
secured at all times.

2. Key record- some administrative means must be set up to record code numbers and
indicates to whom keys to specific locks have been issued.

3. Inventories- periodic inventories will have to be made of all duplicate and original keys
in the hands of the employees whom they have been issued.

4. Audits- in addition to periodic inventory, an unannounced audit should be made of all


key control records and procedures by a member of management.

5. Daily report- a daily report should be made to the person responsible for key control
from the personnel department indicating all persons who have left or will be leaving the
company. In the event that a key has been issued, steps should be initiated to ensure
that the key is recovered.

What is a Security Cabinet?

The final line of defense at any facility is in the high security storage where papers,
records, plans or cashable instrument, precious metals or other especially valuable
assets are protected. These security containers will be of a size and quantity, which the
nature of the business dictates. In protecting property, it is essential to recognize that
protective containers are designed to secure against burglary or fire. Each type of
equipment has a specialized function and it will depend on the owner of the facility which
type ha is going to use.

Three (3) Types of Security Cabinet

1. Safe - a metallic container used for the safekeeping of documents or small items
in an office or installation. Safe can be classified as either robbery or burglary
resistance depending upon the use and need.
a. Its weight must be at least 750 lbs. And should be anchored to a building
structure.
b. Its body should at least one-inch-thick steel.

2. Vault - heavily constructed fire and burglar resistance container usually a part of
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim

the building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than safe but smaller than a file room.
a. The vault door should be made of steel at least 6 inches in thickness.
b. The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
c. The vault must be resistive up to 6 hours.

3. File room - a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside.
a. The file room should at most be 12 feet high.
b. It must have a watertight door and at least fire proof for one hour.

Control of Personnel in the Physical Facility

-In every installation, the use of protective barriers, security lighting, communication
and electronic hardware provides physical safeguards but these are insufficient to
maximize the effort of the guard force.

-A control point must be established for positive personnel identification and check
system. This is to ensure that only those persons who have the right and authority will be
given the necessary access to the area.

-The most practical and generally accepted system of personnel identification is the use
of identification cards badges or passes.

- Generally speaking, this system designates when and where and how
identification cards should be displayed, and to whom. This helps security personnel
eliminate the risk of allowing the access of unauthorized personnel within the
establishments.

Types of Personnel Identification

1. Personal recognition

2. Artificial recognition- identification cards, passes, passwords, etc.

Use of Pass System

1. Single pass system - the badge or pass coded for authorization to enter specific areas
is issued to an employee who keeps it in his possession until his authorization is
terminates.

2. Pass exchange system - an exchange takes place at the entrance of each controlled
area. Upon leaving the personnel surrenders his badge or passes and retrieve
back his basic identification
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim

3. Multiple pass system - this provides an extra measure of security by requiring that an
exchange take place at the entrance of each restricted area.
Visitors Movement Control

Security should establish proper methods of establishing the authority for admission of
visitors as well as the limitation thereat.
This security measure would depend on the sensibility of the installation, but could include
the following:

1. Visitor’s logbook – All visitors to any facility should be required to identify themselves
and should be given a visitor’s ID by the security. Visitor’s logbook should be filled up with
the name of visitors, nature and duration of visit.

2. Photograph - taking of photographs should also be considered. Extreme


caution must be exercised in areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation. If a visitor has camera and it is
prohibited to take picture, said camera should be left in the care of security with
corresponding receipt.

3. Escort - If possible, visitors should be escorted by the security to monitor their activity
within the establishment and guide them where to go.

4. Visitor entrances - separate access for visitors and employees of the establishment
should be provided.

5. Time- traveled - If there is a long delay or time lapse between the departure and arrival,
the visitors may be required to show cause for the delay.

Package Movement Control

-Every facility must establish a system for the control of package entering or
leaving the premises. However, desirable it might seem it is simply unrealistic
to suppose that a blanket rule forbidding packages either in or out would be
workable. Such a rule would be damaging to the employee morale and, in many cases,
would actually work against the efficient operation in the facility.
-Therefore, since the transporting of packages through the portals is a fact of life, they
must be dealt with in order to prevent theft and misappropriation of company properties.
Thus;

a. No packages shall be authorized to be brought inside the industrial installation, offices


and work area without proper authority. This basic precept help reduce if not eliminate
pilferage, industrial espionage or sabotage.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim

b. Outgoing packages carried by personnel should be closely inspected and


those in vehicles should also be checked as many pilfered items are hidden in the
surface of the vehicles leaving the compound.

c. Any personnel/visitor entering the installation with a package should deposit the same
to the security and in return receives a numbered tag, which he/she will use in claiming
his/her package upon departing.

Control of Vehicle in the Installation

Vehicular traffic within the boundaries of any facility must be carefully controlled for safety
as well as to control the transporting of pilfered goods from the premises. Thus;

1. Privately owned vehicle of personnel/visitor should be registered and are


subject to the identification and admittance procedure.

2. Vehicles should be subjected for search at the entrance and exit of the installation.

3. All visitors with vehicle should provide the security as to the complete details of their
duration of stay, person to be visited, and other information.

4. All vehicles of visitors should be given a sign/sticker to be placed on the windshield.

5. Traffic warning signs should be installed in all entrances in order to guide the visitors
in their destination as well to provide them with the necessary safety precautions while
they are inside the installation.

6. Security personnel must constantly supervise parking areas and make frequent spots
searches of vehicles found there.

Building Access Control

-At any physical barrier, a security system must possess the ability to
distinguish among authorized persons, unauthorized visitors, and other unauthorized
persons.
-This is to assist the security personnel protects sensitive are and information within the
installation.
-Appropriate warning signs should be posted at the building perimeter.
-Special restricted entry facilities to public access should be provided. This will be
dependent on the degree of security needed for the protection of property, activity and
other processes within the building.
- A clear-cut policy on the access control should be disseminated to all personnel of the
installation.

You might also like