28
And other security hazards

ISM - Pilferage

Embed Size (px)

DESCRIPTION

industrial security managementpilferage

Citation preview

Page 1: ISM - Pilferage

And other security hazards

Page 2: ISM - Pilferage

What is pilferage? Act of stealing small items of little value

Why does it become a security hazard? These little items when accumulated

become a great loss to a business

Page 3: ISM - Pilferage

CASUAL PILFERERS

One who steals due to his inability to resist the unexpected opportunity

Has no plan or premeditation and usually alone on the job a “loner on the job.

Temptation to pick up article due to poor security measure

SYSTEMATIC PILFERERS

Steals with preconceived plans

Takes away any or all type of items or supplies for economic gain

Can be employees or outsiders of the establishment

Page 4: ISM - Pilferage

Location of items

Access to items

Removal of items

Disposal of items

Page 5: ISM - Pilferage

“spot check”

Aggressive security education and indoctrination programs

All employees must be encouraged to report any loss to security

Control of tools equipment and sets

Page 6: ISM - Pilferage

Guard and electronic surveillance on all exits

Package and material control system Parking area outside perimeter fence of

establishment Careful screening and background checks Investigation of all loses quickly and

efficiently Check areas & buildings for possible

concealment of stolen properties

Page 7: ISM - Pilferage

Install mechanical, electrical, electronic detection and alarm system where needed and applicable

establish an effective lock and key control system

Use appropriate perimeter fencing and lighting for parking facilities and areas fir vehicles and persons

Page 8: ISM - Pilferage

Store bulk quantities of items in enclosed security areas and distribute them to using section in limited quantities

Establish accurate inventory and accounting methods for procurement, use and disposal

Establish close liaison with governmental law enforcement and intelligence agencies

Page 9: ISM - Pilferage
Page 10: ISM - Pilferage

What is sabotage? Is the deliberate destruction or the

deliberate damaging or destroying of property or equipment

Page 11: ISM - Pilferage

Most dangerous foe that security will have to deal with

Ordinary looking but in his/her mind, he has the training in deception, knowledgeable incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.

He can work alone or in groups simultaneously in several places

Page 12: ISM - Pilferage

Armed forces installationNatural resources – mines, forest,

farms and farm products Industries like the buildings, power

sources, machinery, fuel, etc.Warehouse depots, communications,

public utilities etc.

Page 13: ISM - Pilferage

Efficient, alert and trained guard force Physical security aids like barriers,

personnel and vehicular control, intrusion devices, communication systems, and electric aids

Proper screening of personnel Identification and movement control

system Searches on incoming vehicles

Page 14: ISM - Pilferage

Safeguarding classified informationDesignation of restricted areas Investigation of security breachesSecurity education and indoctrinationGood housekeeping methodsEffective and compatible emergency

planningRegular auditContinuing background check

Page 15: ISM - Pilferage
Page 16: ISM - Pilferage

What is espionage? the practice of spying or using spies to

obtain information about the plans and activities especially of a foreign government or a competing company

Why is espionage a hazard? May cause unauthorized disclosure of

company information, processes and procedure

Page 17: ISM - Pilferage

He is very dangerous adversary and his skills in deception and his cunning should never be underestimated

Usually a Person of extensive training and will be highly effective in gaining the confidence of people and of extracting information of value to be relayed to his employer or handler

Page 18: ISM - Pilferage

Even how well-trained an espionage agent could be, he is human like the saboteur and he can be defeated in his own game if proper methods and techniques are undertaken

Page 19: ISM - Pilferage

Stealing information from employees Stealing information from records or

other sources Using various methods or reproducing

documents, products, equipments or working models

Using “front” as commercial concern, travel agencies, associations, business groups and other organization to obtain confidential info or data

Page 20: ISM - Pilferage

Using various form of threats to obtain information

Using blackmail techniques by exposing intimate and personal details concerning an individual or organization

Picking or securing information in social and other gatherings

Penetration and operational tactics

Page 21: ISM - Pilferage

Careful and complete pre-employment measures designed to control threats of industrial espionage

Continuing personnel check on employees and particularly personnel check on sensitive positions even already employed.

Page 22: ISM - Pilferage

Prevention of un authorized to the plant or industrial installation

Restricting of movement of personnel in the premises of the plant

Controlled disposal of waste papers including carbons in classified work

Only properly cleared personnel should handle classified document

Page 23: ISM - Pilferage
Page 24: ISM - Pilferage

Disrupts normal operation within a certain organization or institution

Page 25: ISM - Pilferage

It can be local or national in nature and their mission is to undermine the authority weaken the organization, and eventually take over. This can be in business or any activity

Can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist attitude, and other emotional approaches.

It is n activity not easy to detect

Page 26: ISM - Pilferage

The spreading of rumors, written materials, slogans or any other devices to confuse the work population and discredit the government should be immediately reported.

Labor and other company unions can be infiltrated so that strikes and “slow downs” can be called to disrupt the normal operation of a plant or installation

Page 27: ISM - Pilferage

Security force should be alerted for person trying to recruit others in organizing movements for peace, anti-colonials, anti-trade and anti-imperialism

Employees or outside personnel seeking memberships in “paper organizations” should report this activity to security

Other methods of subversion like united fronts, mob action, terrorism and sabotage will be done to gain the subversive ends

Page 28: ISM - Pilferage

Thank you for listening!