Vous êtes sur la page 1sur 93

PHILIPPINE COLLEGE OF SCIENCE AND TECHNOLOGY

COLLEGE OF CRIMINOLOGY

HUMAN BEHAVIOR

What is Psychological Criminology?

Within the psychological-psychiatric perspective, it has been psychiatry, and primarily


psychoanalysis, that has made the most inroads into criminology. Psychiatry is the older
profession, going back the earliest days of medicine in dealing with the problems of mental
disease. Psychoanalysis emerged out of psychiatry with the work of Sigmund Freud.
Psychology, particularly that branch of- it with the most relevance for criminology, abnormal
psychology, has come into its own during the twentieth century. What they all have in common
is the idea that the causes of criminal behavior originate in the causes of criminal behavior
originate in the personality. Personality is defined as the complex set of emotional and
behavioral, attributes that tend to remain relatively constant as the individual moves from
situation to situation.

What is called the Freudian Approach?

The central concept of psychoanalysis, and the one that Freud first put forth, is the
unconscious. The concept had been around before Freud, but he was the one that made the
most out of it, arguing that traumatic experiences in early childhood left their mark on the
Individual was not aware of these experiences. The idea of unconscious determination of
behavior flew headfirst against the idea The next most important idea conflict and Freud
postulated the existence of a three-part personality (an idea going back to Plato) consisting of
id, ego, and superego 'which operated in constant conflict with one another (primarily between
the id and superego)producing the basic problem of guilt which required the use of one or more
defense mechanisms. The idea of personality conflict as a cause of crime became quite popular
among both scientists and the general public.

The id is a part of the unconscious that contains all the urges and impulses including what we
called libido, a kind of generalized sexual energy that is used for everything from survival
instincts to appreciation of art. The id is also kind of stubborn, for it responds
only to what. Freud called the pleasure principle (if it feels good, do it), and nothing else.

The ego is the only part of the conscious personality. It’s what the person is aware of they think
about themselves, and is what they usually try to project toward others. The ego is dominated
by what Freud called the reality principle (an orientation to the real world which the person
lives). It is continually trying to mediate the demands of the id and prohibitions of the superego.

The superego is a part of the unconscious that is the voice of conscience (doing what is right)
and the source of self-criticism. It reflects society's moral values to some degree, and a person
is sometimes aware of their own morality and ethics, but the superego contains a vast number
of codes, or prohibitions, that are issued mostly unconsciously in the form of commands or
"don't" statements.
The superego is also somewhat tricky, in that it will try to portray what it wants the person to do
in grandiose, glowing terms, what Freud called the ego-ideal, which arises out of the person's
first great love attachment (usually a parent). The assumption is that children
raised by parents experience love conditionally (when they do something right), and the child
internalizes these experiences as a series of real or imagined judgmental statements.

Guilt is a very common problem because of al drives coming from the id and all the prohibitions
and codes in superego. There are a variety of ways an individual handles guilt, and
these are called defense mechanisms (see complete list below).

Sublimation Desires of the id are diverts to healthy outlets


approved the superego

Repression Deserves of the id are stuffed back into


subconscious and person denies they exist or
engages in Freudian slips
Regression Desires of the id are followed impulsively to escape
from hearing the superego (reality)

Denial/Intellectualization Anxiety about following desires of the id goes


unacknowledged or treated unemotionally

Project Prohibitions of the superego are applied as


standard for judging others and not oneself

Fixation Prohibitions of the superego are


so strong that the person
develops fears/phobias
Undoing Superego is so strong that the
person continually makes amends
or apologies for what they do

Reaction formation Both id and superego are so


strong that person does the
opposite of both, sometimes
identifying with aggressors

Displacement Both id and superego are so


strong and ego is so weak that
person settles for seconds best
or any available substitute
(something better than nothing)

Of the defense mechanisms, psychoanalysts have put forward replacement as their number one
choice for explaining crime. A few have explored the others, most notably, reaction
formation, but the list remains largely unexhausted because, essentially, the ideas are
untreatable.

Freud also provided a theory of human development. These ideas revolved around his terms for
the three stages of early childhood. The oral. stage (age 0-2) is when a person develops their
sense of satisfaction or satiation, cf figuring out how is enough (e.g. of food and drink) which
has implications for much of an eater, drinker, or smoker a persons is in adulthood. The anal
stage of orderliness, of figuring out their referred levels of cleanliness (e.g. as in toilet training).
The genital stage (age 3-4) is when a person develops there , of figuring out their sexual
preferences and whether they are capable of real love or not. <ale children go thru what is
called an Oedipus complex (with a comparable Electra complex in females) Both complexes
involve sexual feelings for the parent of .the opposite sex (and are called "inverted" complexes
in cases of homosexuality), and hew these feelings are resolved determines how capable the
person is of real love later in life.

The primary technique of psychoanalysis is transference, the process of the patient, through
free association and "talk therapy", re-enacting or relieving their early childhood experiences
with the therapist. The therapist, in short, becomes a love object, for the patient, but without the
therapist going too far or becoming too involved, which is called counter transference, without
therapy, person will engage in amateur transference with other people, a process whereby they
play out a "script" or replay the same failed relationships over and over again.

What is Abnormal Psychology Approach?


While Freudians continued to view criminals as id-dominated individuals, there were those
psychodynamic model that frustrations build up from experiences in early childhood. The
abnormal psychologists were one such group, preferring to replace terms like neurosis and
psychosis with various disorders, anxiety disorders, mood disorders, and conduct disorders.
Abnormal psychology is concerned with mental health, defined as the capacities to think
irrationally, cope effectively and demonstrate stability and growth. Mental disorders exist on a
continuum, like blood pressure or cholesterol levels. The cut-off between health and disease is
somewhat arbitrary. Many people who have diagnosed mental illness are far better off than
undiagnosed persons presumed to be mentally healthy

The current approach to classification and diagnosis of the mentally ill is multiaxial. Rather than
using a single term, such as schizophrenia, to label a person, the American Psychiatric
Association (APA) prefers to describe a person in terms of clinically important factors or axes.
The first multiaxial system was developed in 1980 as the DSM-III (diagnostic and statistical
Manual of Mental Disorders).,revised in 1987 as DSM-III-R, and revised again in 1994 as DSM-
IV. It's a multiaxial system with five axes.

Axis Any disorder or condition


other than personality
disorders and mental
retardation
Axis II Personality disorders, mental
retardation, and maladaptive
defense mechanisms
Axis III Medical conditions relevant
to the case
Axis IV Psychosocial and
environmental problems,
stressful life events,
adjustment difficulties
Axis V Global assessment of functioning (GAF)on a
scare from 1 -100, a low score in indicating
danger to self or other

The area that has received the most criminological attention is Axis II, the personality disorders,
specifically, the antisocial personality disorder. It has been associated with criminal behavior as
far back as the Freudians who believed that there childhood behaviors were associated with it:
(1) bedwetting; (2) fascination with fire; and (3) cruelty to animals. As such, it's the one disorder
that can be detected earliest in childhood.

However, the APA does not recommended labeling anyone antisocial until they have reached
the age of 18, and to use not only behaviors committed before the age of 15 (chronic conduct
disorders before the age of 15 are considered under Axis I). From the standpoint of abnormal
psychology, antisocial personality is not so much a matter of behaviors as it is a deeply
ingrained pattern to life. They always seem to be using other people as game pieces, and they
seldom show anxiety or feel guilty.
We will further have better understanding on these views and perspectives as can start to learn
the basic concept of criminal psychology.

CRIMINAL PSYCHOLOGY

In general, psychology is the science of behavior and mental processes. This means that
psychologists use the methods of science to investigate all kinds of behavior and mental
processes, from the activity of a single nerve cell to the social conflict in a complex
society (Bernstein, et al, 1991) .

In particular, criminal psychology is a sub-field of general psychology where criminal behavior is


only, in part by which phenomena psychologists choose to study. It may be defined as the study
of criminal behavior, the study of criminal conduct and activities in an attempt to discover
recurrent patterns and to formulate rules about his behavior.

A major description of criminal psychology is the word behavior. Behavior refers to actions or
activities (Kahayon, 1985). To the criminologists, behavior is the observable actions because he
is more interested in actions and reactions that can be seen and verified that in concepts, which
cannot be directly verified.

CLASSIFICATION OF BEHAVIOR

1. Normal behavior (adaptive or adjusted behavior)-the standard behavior, the totality


accepted behavior because they follow the standard norms of society.

Atkinson (1993) also presented that understanding criminal behavior includes the idea of
knowing what characterized a normal person from tr. abnormal one. A normal person is
characterized by:

a. Efficient perception of reality


b. Self-knowledge
c. Ability to exercise voluntary control over his behavior
d. Self-esteem and acceptance
e. Productivity
f. Ability to form affectionate relationship with others

2. Abnormal behavior (maladaptive/maladjusted behavior)-A group of behaviors that is


deviant from social expectations because they go against the norms or standards
behavior of society.

A maladaptive (abnormal ) person may be understood by the following


definitions.

a. Abnormal behavior according to deviation of statistical norms based in statistical


frequency.
Many characteristics such as weight, height, an intelligence cover a range of values
when, measured over a population. For instance, a person who is extremely intelligence or
extremely happy would be classified as abnormal.

b. Abnormal behavior according to deviation from social norms

A behavior that deprives from the accepted norms of society is considered abnormal.
However, it is primarily dependent on the existing norm of such society.

c. Behavior as maladaptive

Maladaptive behavior is the effect of a wellbeing of the individual and or the social group.
That some kind of deviant behavior interferes with the welfare of the individual such as a man
who fears crowd can't ride a bus. This means that a person cannot adopt himself with the
situations where in it is beneficial to him.

d. Abnormal behavior due to personal distress

This is abnormally in terms of the individual subjective feelings of distress rather than the
individual behavior. This includes mental illness, feeling of miserably, depression, and loss of
appetite or interest, suffering from insomnia and numerous aches and pains.

e. Abnormality in its legal point

It declares that a person is insane largely on the basis of his inability to judge between right
and wrong or to exert control over his behavior (Bartol, 1395)'.

Views on Normal and Abnormal Behavior

The view that normal and abnormal behaviors are different in kind simply does not exist.. There
are not "normal" people in the one hand and "abnormal" people on the other. Rather,
adjustment seems to follow what is called Normal Distribution-most people are moderately well,
adjusted, with minor maladaptive patterns, a few at one other extreme enters mental clinics and
a few at the other extreme lead satisfying and effective lives ^Coleman, 1980)

Another consideration in understanding normal and abnormal

behaviors is that, they depend relat ively on the existing social


practice or culture of people in the society. since an acceptable
behavior to one society may not be accepted or allowed to other
societies or individuals.

Kinds of Behavior
As mentioned earlier, the important element in the definition of psychology is behavior. As cited
by Alicia Kahavon, behavior may be:

1. Overt or covert Behavior

Behaviors that are outwardly manifested or those that are directly observable are overt
behaviors. On the other hand, covert behaviors are behaviors that are hidden-not visible to
the naked eye.

2. Conscious or Unconscious Behavior

Behavior is conscious when acts. are within the level of awareness. It is unconscious when
acts are embedded in one's subconscious-unaware.

3. Simple or Complex Behavior

These are acts categorized according to the number of neurons while complex behavior
involved more number of neurons, a combination of simple behaviors.

4. Rational or Irrational Behavior

There is rational when a person acted with sanity or reason and there is irrational behavior
when the person acted with no apparent reason or explanation-as when a man loses his
sanity and laugh out loud at nobody or nothing in particular.

5. Voluntary or Involuntary Behavior

Voluntary behavior is an act done with full volition or will such as when we discriminate,
decide or choose while involuntary behaviors refers the bodily processes that foes on even
when we are awake or asleep like respiration, circulation and digestion.

Aspects of Behavior

a. Intellectual Aspect - this aspect of behavior pertains to our way of thinking, reasoning,
solving, problem, processing info and coping with the environment.
b. Emotional Aspect - this pertains to our feelings, moods, temper, and strong motivational
force.
c. Social Aspect - this pertains to how we interact or relate with other people.
d. Psychosexual Aspect - this pertains to our being a man or a woman and the expression
of love
e. Value/Attitude - this pertains to our interest towards something, our likes and dislikes

Criminal 'Formula

In explaining the birth of criminal behavior, we must consider


the three factors: criminalistics tendency (T) , the total situation (S) ,
and the person's mental and emotional resistance to temptation (R) .
these factors then can be put into formula as:
C= T+S

Where:

C - Crime/Criminal Behavior (the act)

T - Criminal Tendency (Desire/Intent)

S - Total Situation (Opportunity)

R- Resistance to Temptation (Control)

The formula shows that a person's criminal tendency and his instance to them may either result
in criminal act depending upon, which of them is stronger. This means that a crime or criminal
behavior exists when the person's resistance is insufficient to
withstand the pressure of his desire or intent and the opportunity (Tradio, 1983).

In understanding this, the environment factors such as stress and strains are considered
because they contribute in mobilizing a person’s criminal tendency and the individual's
psychological state while resistance temptation arises from the emotional, intellectual and social
upbringing and is either manifestation of a strong or weak character.

Determinants of Behaviors

The questions why do people become heterosexual and others homosexuals, some are
alcoholics, some are law abiding and others are criminals, come are well adjusted and others
mentally ill? What will enable us to understand these extremes of behavior?

The answer to these questions requires the study and understanding of the influences of
HEREDITY and ENVIRONMENT. As cited by Tuason:

1. Heredity (Biological Factors)

This refers to the genetic influences, those that, are explained by heredity, the
characteristics of a person acquired from birth transferred from one generation to another. It
explains that certain total aggression, our intelligence, ability and potentials and our
physical appearance are inherited.

It influences all aspects of behavior, including I capabilities, reactions, tendencies and


stress tolerance. explain the conditions that genes, diseases, malnutrition injuries and other
conditions that interfere with normal potential causes of abnormal/criminal behavior.

It is the primary basis of the idea concerning criminal behavior, the concept that "criminals are
born"
It also considers the influences of genetic defects and faulty genes, diseases, endocrine
imbalance, malnutrition, and other physical deprivation that can be carried out from one
generation to other

2. Environmental Factors
This is refers to anything around the person the influences his action. James Coleman
in his Book mentioned some environmental factors such as:

a. Family Background – it his is a basic consideration because it is in the family


’whereby an individual first experiences how to relate and interact with another. The
family is said to be the cradle of harmonious relationship or a pathogenic family
structure: the disturbed family, broken family separated or maladjusted
relations.
b. Childhood Trauma - the experiences, which affect the feeling of security of a child
undergoing developmental processes. The development processes are being
blocked sometimes by parental deprivation as a consequence of parents or lack . of
adequate maturing at home because of parental rejection, overprotection,
restrictiveness, over permissiveness, and faulty discipline.
c. Pathogenic Family Structure - those families associated with high
frequency of problems such as:

 The inadequate family - characterized by the inability to


cope with the ordinary problems of family living. It lacks the resources,
physical or psychological, for meeting the demand of family satisfaction.

 The anti – social family – those that espouses unacceptable values as a


result of the influence of their parents to their children

 The discordant/ disturbed family – characterized by non – satisfaction of


one or both parent from the relationship that way express feeling of
illustration. This is usually due to value differences as common sources of
conflict and dis – satisfaction.

 The disrupted family - characterized by in completeness whether as a


result of death, divorce, separation or other circumstances.
3. Other Factors

In the environment, the following are also factors that are influential to one’s behavior:

a. Institutional influences such as peer group mass media, church, and school,
government institution, NGO’s, etc.
b. Socio – cultural Factors – such as war and violence, group prejudice and
discrimination, economic and employment problems and other social changes.
c. Nutrition or the quality of food that a person intake in also a factor that influences
man to commit crime because poverty is one of the many reasons to criminal
behavior.

Other Determinants of Behavior

In order to further understand and provide answers on the question that why do some
people behave criminally, it is important to study the other determinant of behavior. These are
need, drives and motivation

1. Need and Drives


Need, according to a drive reduction theory, is a biological requirement for well-
being of the individual. This need creates drives - a psychological state of
arousal that prompts someone to take action (Bernstein, et al, 1997). Drive
therefore is an aroused stated that results from some biological needs.

The aroused condition motivates the person to remedy the need. For example, if
you have had no water for some time, the chemical balance of the body fluids is
disturbed, creating a biological need for water. The psychological consequence
of this need is a drives – thirst – that motivates you to find and drink water. In
others words.

Motivation

Motivation on the other hand refers to the the influences that govern the initiation,
direction, intensity, and persistence of behavior(Bernstein, et al 1991). Thus motivation
refers to the causes and as required by a need

Motivation is the hypothetical concept that stands for the underlying force impelling
behavior and giving its direction (kahaiyon, 1975) .

Drives are states of comfortable tension that spur activity until a goal is reached. Drive
and motivation are covered in the world of psychology, for they energize behavior and give
direction to man’s action. For example, a motivated individual is engaged in a more active, more
vigorous, and more effective that unmotivated ‘one, thus a hungry person directs him to look for
food.
A. Biological needs Motivational Systems

Food Hunger - the body needs adequate supply of


nutrients to function effectively. "An empty
stomach sometimes drives a person to steal."

Water * ^, yy. Thirst


y" j - just like food, the body needs i
water.

Sex S’ powerful
A 'j motivator but unlike food and
1 water, sex is not vital for survival but
i essential to the survival of species.
Fain Avoidance The need to ^ avoid tissue damage is
essential to the survival for the organism.
Pain will activate behavior to reduce
discomfort.
Stimulus Curiosity
t, is most people and animal is
motivated to explore even when the
activities satisfies no bodily needs.

B. Psychological Needs

Psychological needs are influenced primarily by the kind of society in which the individual is
raised. Psychological motives are those related to the individual happiness and well being, but
not for the survival, unlike the biological motives that focuses on basic
need the primary motives.

Relation among Motives

Bernstein, et al (1991) offered that at any time, many motives might guide a person's behavior.
What determines which ones will?
Abraham Maslow/ (1970) have given a perspective that addresses this question. He suggested
basic classes of needs, or motives, influencing human behavior. These motives are organized in
a hierarchy. Abraham Maslow has suggested that human needs form a hierarchy from the most
basic biological requirements to the needs for self-actualization -
highest of all needs.

Maslow’s Hierarchy of needs

1. Biological or Physiological Needs - these motives include the need for food, water,
oxygen, activity, and sleep.
2. Safety Needs - these pertains to the motives of being cared for
and being secured such as in income and place to live.
3. Love/Belongingness - Belongingness is integration into various
kinds of social groups of social organizations. Love needs means
need for affection
4. Cognitive need - our motivation for learning and exploration
5. Esteem Needs. - Our motivation for an honest, fundamental respect
for a person as a useful and honorable human being.
6. Aesthetic Needs - our motivation for beauty and order.
7. Self- actualization - pertains to human total satisfaction, when
people are motivated not so much by unmet needs, as by the desire
to become all they are capable of (self-realization).

According to the Maslow's formulation, the level that commands the individuals' attention and
effort is ordinarily the lowest one on which there is an unmet need. For example, unless needs
for food and safety are reasonably well-met behavior will be dominated by these needs and
higher motives are of little significant.' With their gratification, however, the individual is free to
devote time and effort to meet higher level. In other words, one level must at least be partially
satisfied before those at the next level become determiners of action.

Frustration, Conflict and Anxiety

1. Frustration - refers to the unpleasant feelings that result from the blocking of motive
satisfaction, It is a feeling that is experienced when something interferes with our hopes,
wishes, plans expectations (Coleman 1980)

The common sources of frustration are:

a. Physical obstacles - are physical barriers or circumstances that prevent a person from”"
doing his plan or fulfilling his wishes
b. Social Circumstances - are restrictions circumstances imposed
by other people and the customs and laws of social living.
c. Personal Shortcoming - such as being handicapped by, diseases,
deafness, paralysis, etc. which serves as a barrier to the
things one ought to do.
d. Conflicts between motives

2. Conflict - refers to the simultaneous is arousal of two or more incompatible motives


resulting to unpleasant emotions. It is a source of frustration because it is a threat to
normal behavior (Bernstein, et al 1991)
Types of Conflicts

a. Double Approach Conflict - a person is motivated to engage in


two desirable activities that cannot be pursued
simultaneously.
b. Double Avoidance Conflict - a person faces two undesirable
situations in which the avoidance of one is the ' exposure to
the other resulting to an intense emotion.
c. Approach-Avoidance Conflict - a person faces situations having
both a desirable ana undesirable feature. It is sometimes
calied "dilemma", because some ' negative and some positive
features must be accepted regardless which course of action is
chosen.
d. Multiple Approach-Avoidance Conflict - a situation in which a
choice must be made between two ..or more alternatives each has
both positive and negative features. It is the most difficult,
to resolve because the features of each portion are often
difficult to compare.

3. Anxiety -is an intangible feeling that seems to evade any effort to resolve it. It is also
called neurotic fear. It could be intense; it could be low and can be a motivating force
(Coleman, 1980).

4. Stress – is the process of adjusting to dealing with circumstances that disrupts, or


threatens to disrupts a person's physical or psychological functioning (Bernstein, et al
,1991)

The Ego Defense Mechanisms

As introduced in the preliminary regarding the Freudian view, the defense Mechanisms are the
unconscious techniques used to prevent a person’s self-image from being damaged. When
stress quite defeat -We all use ego defense mechanisms to us from anxiety and maintain our
feeling of personal worth. We consider them normal strong, an individual strives to protect his
self-esteem, integrity (Bernstein, et al, 1991)

Robert Wicks (1974) cited the following ego defense mechanisms

 Denial of Reality – protection of one – self from unpleasant reality by reality by refusal to
perceive or face it. Simply by avoiding something that is unpleasant
 Fantasy- the gratification of frustration desires imaginary achievement. Paying attention
not to what is going on around him but rather to what is taking place in his thought
 Projection - placing blame for difficulties upon others attributing one's own unethical
desires to others in effort to prevent ourselves being blamed.
 Rationalization – the use of excuses an individual to him and to others. Attempting to
prove that one's behavior is justifiable and thus worthy of self and social approval
 Reaction and Formation - it occurs when someone tries to prevent his submission to
unacceptable impulses by taking opposite stand. Preventing dangerous desires from
expresses by exaggerating opposed attitudes and types behavior and using them as
barriers
 Displacement- --discharging pent-up emotion on objects less dangerous than those that
with the emotion.
 Emotional Insulation - withdrawal is passivity to protect self from hurt.
 Isolation/Intellectualization - series to cut off the emotion from emotion a situation, which
is normally, is full of feeling
 Regression - revert from a past behavior to retreating to earlier development level
involving less mature responses and usually a lower level of aspiration.
 Sublimation - gratification of frustrated sexual desire in substitutive men sexual activities
 Identification - increasing feeling of worth by .identifying
self with person or institution. The person can associate himself with something or
someone to elevate position.
 Introjections - incorporating external values and standards into ego structures so
individual is nor. at their mercy as external threats. The acceptance of other's values
even are contrary to one's own .assumption.
 Undoing -.apologizing for wrongs, repentance, doing penance and undergoing
punishment to negate, a disapproval act
 Sympathism - striving to gain sympathy from ’others. The person seeks to be praised by
relating faults or problems
 Acting out - reduction of the anxiety aroused by forbidden

The Human Values

Human values are relevant understanding human behavior. They are the standards
which people use to cognize, express and evaluate behavior as .right or wrong, just or unjust,
appropriate or inappropriate. Values are also guides that people use to evaluate
their behavior thus give direction to their lives. They are the enduring preferences for mode of
conduct or state of existence.

How are values acquired? They are acquired through the influence of the rewards and
punishments meted out by our parents, teachers and peers. For instance, at home - there is the
teaching of control, cleanliness and good manners, in. school - there is competition and
earning in conformity with a bigger group, morality and the teachings of the church, the
exposure to mass media and. the government influences. The accumulations of these values
continue to change as we continue to face different experiences.
Feeling, aspiration., attitude and belief a're also considered values if they are chosen
freely, chosen from alternatives, prized and cherished, publicly affirmed, and acted upon
repeatedly.

Common sense

The science of behavior has one of its goals the culmination of widespread
misconceptions that are now considered valid such as numerology and palmistry, although still
accepted by some people today predict events and conditions (Wicks 1974).

Common Sense is a commonly health notion where .truth is not dependent on judgment
which is based purely on observation, thus it luck organization of thoughts and jumps to
conclusion immediately

Common sense is worthy of particular attention. Moreover, a deeper understanding of


the psychological principles and their application to the field of law enforcement and in
understanding criminal behaviour would indeed be of assistance to police officers.

Criminal psychology requires the study of common sense. The development of the
ordinary good senses is important in the examination of existence of a fact before a conclusion
is drawn. In psychology, scientific method must be made and therefore judgment is suspected
until all facts had been analyzed. This is not true in the common sense.

Of course, common sense is useful in understanding criminal


behaviour because it can provide, the opportunity to reflect on how it affects the person's
present view to life particularly in decision making as in the case of police use of discretion.

Perspective on the cause of Criminal Behavior

The commission of a crime may be the result of complicated factors and causes. The
following are some of the perspective about the causes of criminal behavior.(Coleman, 1980).

a. Anxiety (Psychological Perspective) - Stressful situation that become extreme may result
to maladaptive behavior.
b. Faulty Learning (Behavior Perspective) - The failure to learn the
necessary adaptive behavior due to wrongful development. This
usually results to delinquent behavior based on the failure to
learn the necessary social values and norms.
c. Blocked of Distorted Personal Growth (Humanistic Perspective) - presumably, human
nature tends towards cooperation and conductive activities; however, if we show
aggression, cruelty or ether violent behavior, the result will be an unfavorable
environment.
d. Unsatisfactory interpersonal relationship- self-concept in early childhood by over critical
parents or by rigid socialization measures usually causes deviant behaviors among
individuals because they are not contented and even unhappy to the kind of
:trial dealings they are facing.
e. Pathological social conditions- poverty, social discrimination, ate destructive violence
always results to deviant behavior.

Classification of the Criminal Behavior

Coleman (1980) stated that regardless of one's theoretical, orientation, several terms is in
common usage regarding causes of abnormal or criminal behavior, the following are used:

a. The Primary Cause- Used to designate the condition without which


the disorder would not have occurred. The main reason of the
existence of the disorder.
b. The Predisposing Cause- a condition that comes before and paves
the way for a possible later occurrence of disorder under certain
conditions.
c. The Precipitating Cause- a condition that proves toe much for the
individual and triggers the disorder,
d. The Reinforcing Cause- a condition that tends to maintain
maladaptive behaviour that is already occurring.

Patterns of Criminal Behavior

Neurosis and Psychosis are terms used to describe the mental status of a certain
psychologically unstable person. They are frequently used in reports and articles and even in
every day conversations, so today's criminologists and law enforcement personnel
are expected to be familiar with them (Wicks, 1974).

The American Psychiatric ‘Association or APA as mentioned in the preliminary discussion,


published in 1917 the Diagnostic and Statistical Manual of Mental Disorders (DSM-) which
provided a diagnostic classification system of disorders. The system allows theevaluation of
disorders on five dimensions, or axes, which together provide a picture of a person's problem. In
its editions, the DSM has included more categories (Bernstein, et al, 1991).

For purposes of discussion, the DSM III has been selected as the reference in grouping what
criminologist call pattern of criminal behavior.

Criminal behaviour may be patterned from the three main group of maladaptive/ criminal
behavior, which are the Neurotic/ Psychoneurotic behaviors, psychopathic behaviors, and the
Psychotic behavior.

1. Neurotic/ Psychoneurotic Behavior


Neurotic/ Psychoneurotic Behavior are group of mild functional personality
disorders in which there is no gross personality disorganization, the individual
does not lost contact with reality and hospitalization is not required

Neurosis embraces a wide range of behaviours that are the core of most maladaptive life
style. Basic to this neurotic life style are:
1. Neurotic Nucleus – the faulty evaluation of reality and tendency avoid rather that to
cope with stress. It is characterized by anxiety, avoidance instead of coping, and blocked
personal growth
2. Neurotic Paradox- the tendency to maintain the life style despite its maladaptive nature.
It is characterized by unhappiness and dissatisfactions.

I. Anxiety disorders

Anxiety disorders are commonly known as "neurotic fear" when it is occasional but
intense, it is called "panic". When it is mild but continuous, it is called "worry" which is
usually accompanied by psychological symptoms such as sustained muscular tension,
increases blood pressure, insomnia, etc.' they are considered as the central feature of all
neurotic patterns. These disorders are characterized by mild depressions, tear and tensions,
and mild stresses

Classification of Anxiety disorders

1. Obsessive- compulsive disorders

Obsession usually centered on fear that one valuable to do something wrong.


Compulsion on the other hand resulted from repetitive acts (Wicks 1974). An obsessive-
compulsive disorder is characterized by the following: When an individualist compelled
to think about something that he do not want to think about to carry some actions
against his will, and the experience of persistent thoughts that we cannot seem to get
out of our mind such ‘as thoughts about haunting situations.

2. Asthenic Disorders (Neurasthenia)

An anxiety disorder is characterized by chronic mental and physical fatigue and


various aches and pains. Symptoms include spending too much sleep to avoid fatigue but to
no avail, even feel worse upon awake, headaches, indigestions, back pains, and
dizziness.

3. Phobic Disorders

These refer to the persistent fear on some objects or situation that present no actual
danger to the person. The following are examples of phobia;

Phobia Object of Fear


Acrophobia High Places
Agoraphobia Open Places
Anglophobia Pain
Astraphobia Storms/ Lightning
Claustrophobia Closed Places
Dematophobia Blood
Mysophobia Contamination/ germs
Hydrophobia/ Aqua phobia Water
Monophobia Being Alone
Nyctophobia Darkness
Ocholophobia Crowds
Patholophobia Disease
Pyrophobia Fire
Syphilophobia Syphilis
Zoophobia Animals

There are many phobic disorders of persons. Many of us experience fear in different levels and
at different times. Unaware, we are actually in the state of suffering phobic
disorders.

II. Somatoform Disorders

Complaints of bodily symptoms that suggest the presence of physical problem but no organic
basis can be found. The individual is pre-occupied with his state of health or diseases.

Classification of Somatoform Disorders

Hypochondriasis

Refers to the excessive concern, about state of health or physical condition (multiplicity about
.illness)

A hypochondriacal person tends to seek medical advises, but his fear is not lessened by
his doctor's reassurances, and he may be disappointed when no physical problem is
found.

Psychogenic Pain Disorder

It is characterized by the report of severe and lasting pain. Either no physical basis is
apparent reaction greatly in excess of what would be expected from the physical abnormality

Conversion Disorder (Hysteria)

It is a neurotic pattern in which symptoms of some physical malfunction or loss of control without
any underlying organic abnormality.
Sensory Symptoms of Hysteria

a. Anaesthesia – loss of sensitivity


b. Hyperesthesia – excessive sensitivity
c. Hypesthesia – partial loss of sensitivity to pain
d. Analgesia – loss of sensitivity to pain
e. Paresthesia – exceptional sensation

More Symptoms of Hysteria

a. Paralysis- selective loss of function


b. Astasia-abasia- inability to control leg when standing
c. Aphonia- partial inability to speak
d. Mustism- total inability to speak

III. Dissociative Disorders

A response to obvious stress characterized by amnesia, multiple personality, and


depersonalization.

Amnesia

It is the partial or total inability to recall or identify past experiences following a traumatic
incident.

1. Brain pathology amnesia- total loss of memory and it cannot be retrieved by simple
means. It requires long period of medication.
2. Psychogenic amnesia- failure to recall stored information and
still they are beneath the level of consciousness but
"forgotten material".

Multiple Personality

It is also called "dual personalities." The reason manifests two or more symptoms-of
personality usually dramatically different.

Depersonalization

The loss of sense of self or the so-called out of the body experience. There is a. feeling of
detachment from one's mental processes or body or being in a dream state. Cases of
somnambulism -(sleep walking) may fall under this disorder.

IV. Mood Disorder (.Affective Disorder)

Mood disorder often referred to as effective disorder however the critical pathology in this
disorder is one of mood which is the internal state of a person, and not of affect, the external
expression of emotional content (Manual of Mental disorder).
Mood disorder are group of clinical condition characterized by a loss of sense of control of
their moods ‘and affects, and a subjective experience of great distress, mood may be elevated
on depressed. These disorders always result in impaired interpersonal, social and occupational
functioning.

Classification f Mood Disorder

Depressive Disorders

Major depressive Disorders- Patients with-depressed mood have a loss of energy and
interest, feeling of guilt, difficulty in concentrating, loss of appetite, and thoughts of dearh or
suicide, they are not affected with manic episodes.

Dysthymic Disorder-

A mild form of major depressive disorder.

Bipolar Disorders-

Those experienced by patients with both manic and depressive episodes.

Cyclothymic Disorders

A less severe form of bipolar disorder

:
Psychopathic Behavior

This pertains to the second group of abnormal behavior, which typically stemmed
from immature and distorted personality development, resulting in persistent
maladaptive ways of perceiving and thinking

They are generally called "personality or character disorders." groups of disorders are
composed of the following:

1. Personality Disorders

They are called disorders of character; the person here is characterized as a "problematic"
without psychoses. This disorder is characterized disrupted personal relationship, dependent pr

passive aggressive behavior.

The classification of personality disorders as cited by Coleman


 paranoid Personality Disorder

It is characterized by suspicious, rigidity, envy, hypersensitivity, excessive self-importance,


argumentativeness and tendency to blame others of one's own mistakes.

 Schizoid Personality Disorder

This is characterized by the inability to form social relationship and lack of interest in doing so.
Thee person seem to express their feelings, they lack social skills, they are the so-called
"loners."

 Schizotypal Personality Disorder

This is characterized by reclusiveness, over sensitivity avoidance of communication and


superstitious thinking is

 Histrionic Personality Disorder

it is characterized by immaturity, excitability, emotional instability and self-dramatization.

 Narcissistic Personality Disorder

It is characterized by an exaggerated sense of self- importance and pre-occupation with


receiving attention. The person usually expects- and demands special treatment from others
and disregarding the rights and feelings of others.

 Borderline Personality. Disorder

It is characterized by instability reflected in drastic mood shifts and behavior problems. The
person usually displays intense anger outburst with little provocation and he is
impulsive, unpredictable, and periodically unstable.

 Avoidant Personality Disorder

It is characterized by hypersensitivity to rejection and apprehensive alertness to any sign of


social derogation. Person is reluctant to enter into social interaction

 Dependent Personality Disorder

It is characterized by extreme dependence on other people- there is acute discomfort and even
panic to be alone. The person lacks confidence and feels helpless.

 Passive-aggressive Personality Disorder

It is characterized by being hostile expressed in indirect


and non-violent ways. They are so called "stubborn.."
 Compulsive Personality Disorder

It is characterized by excessive with rules, order, and efficiency that everyone does things their
ways and an ability to express warm feelings. This person is over conscientious,
serious, and ‘with difficulty in doing things for relaxation

 Anti – social Personality Disorder

It is characterized by continuing, violation of the right of others through aggressive, anti-social


behavior without remorse or loyalty to anyone.

Anti-social Personality is actually the "psychopathic personality disorder". The person lack
ethical or moral development and the inability to follow approved models of behaviour. They are
the socialized people, which often bring them conflict with society. They may be refer to mixed
groups of individuals such as unprincipled business people crooked politicians, imposters, drug
pushers, quack doctors, prostitutes, etc.

Common Characteristics of Anti-social personalities

a. Inadequate conscience development and unable to accept ethical values.


b. Irresponsible and impulsive behaviour; low frustration tolerance,
c. ability to impress and exploit other; projecting blame unto other of their own anti-social
acts.
d. Rejection of authority.
e. Inability to maintain good interpersonal relationship.

2.Criminal Behavior

The disorder used to describe the behaviour of a person who serious crimes from individual to
property crimes and the disobedience of societal rules in general.

"Dyssocial Personality" is the term used to refer to these individuals (not anti-social) but
particularly those who violate law and practice "crime it's a profession". They are not normally
associated with any significant personality disturbances. As a study, criminal behavior refers to
the human conduct focused on the mental processes of the criminal; the way he behaves or
acts including his activities and the causes and
influences of his criminal behaviour.

The Psychotic Behaviors

The psychotic behaviors are group of disorders involving gross structural defects in the brain
tissue, severe disorientation of the mind thus it involves loss of contact .with, reality.

A. Organic mental Disorders

A diagnosis of organic mental disorder is associated with specific, identified organic


causes such as abnormalities of the brain structure. These are mental disorder that occurs
when the normal brain has been damage resulted from any interference of
the functioning of the brain.

Types of Organic Mental Disorder's

Acute brain disorder- caused by a difficult impairment of the brain function. Its symptoms range
from mild mood changes to acute delirium.

Chronic brain disorder- the brain disorder that result from injuries diseases, drugs, and a variety
of other conditions. Its symptoms include impairments of orientation (time, place and
person), impairment of memory, learning, comprehension and judgment emotion and self-
control.

Group of Organic Mental Disorders

a. Delirium- the severe impairment of information processing


in the brain affecting the basic process of attention,
perception memory and thinking.
b. Dementia- deterioration in intellectual functioning after
completing brain maturation. There is defect in the process of
acquiring knowledge or skills, problem solving, and judgment.
c. Amnestic Syndrome- is the inability to remember on going
events more than a few minutes after they have taken place.
d. Hallucinosis the persistent occurrence of hallucinations,
the false perception that arises in full wakefulness scare. This
includes haIIucinations on visual and hearing or both.
e. Organic Delusional Syndrome- is the false belief arising in
a setting of known or suspected brain damage.
f. Organic Affective Syndrome- is the extreme/ severe manic or
depressive state with the impairment of the cerebral function.
g. Organic Personality Syndrome- the general personality
changes following brain damage.
h. General Paresis- also called "dementia paralytica", a syphilitic infection of the brain and
involving impairment of the CNS.

Disorders Involving- Brain Tumor

A ~tumor is a new growth involving abnormal enlargement of body issues. Brain tumor can
cause a variety of personality alterations, and it may lead to any neurotic behaviour and
consequently psychotic behaviour.

Disorders Involving Head Injury

Injury to the head as a result of falls, blows and accidents causing sensory and motor disorders
and metal disorder such as:
1. Retrograde Amnesia- the inability to recall events immediately proceeding the injury in the
site of damage
2. Petechial Hemorrhage- small spots of bleeding at the site of damage

These injuries may also impair language and other related sensory motor functions and may
result to brain damage

 Auditory Asphasia-- loss of ability to understand spoken


words
 Expressive-Aphasia- loss of ability to speak required words
 Nominal Asphasia- loss of ability to recall names of
objects
 Alexia- loss of ability to read
 Apraxia- loss of ability to perform simple voluntary act

Senile Dementia and Presenile Dementia

1. Senile Dementia- mental disorder that accompanied by brain


degeneration due to old age
2. Presenile Dementia- mental disorder associated with earlier
degeneration of the brain

Mental Retardation

Metal retardation is a mental disorder characterized by sub - average general functioning


existing concurrency with deficits s in adaptive behaviour. It is common mental disorder before
the age of 18. The person is suffering from low I.Q. difficullty in focusing attention and deficiency
in fast learning.

a. Mental Retardation (I.Q. 52-67) "Educable"


b. Moderate Mental Retardation (I.Q. 36-51) "Trainable"
c. Severe Mental Retardation (I.Q. 20-35) "dependent retarded"
d. Profound Mental Retardation (I.Q. under 20) "life support

Schizophrenia and Paranoia

Schizophrenia- refers to the group of psychotic disorders Characterized by gross distortions of


reality, withdrawal of social interaction, disorganization and 'Fragmentation of
mention, thoughts and emotion. It also refers to terms such as mental deterioration", "dementia
praecox", or "split mind”
1. Simple Schizophrenia (undifferentiated type) – the schizophrenia in which symptoms are
rapidly changing mixture of all primary indicators of schizophrenia. The varying
combinations of dilutions, hallucinations, thought disorders,
and gross bizarreness

2. Paranoid Schizophrenia – it is the illogical, changeable delusion frequently


accompanied by vivid hallucinations, with a resulting impairment of critical judgment,
unpredictable and occasionally dangerous behavior

3. Catatonic Schizophrenia- it is the altering period of extreme withdrawal and extreme


excitement. The individual may talk or shout incoherently and engage uninhibited,
impulsive behavior.The person may be dangerous.

4. Hebephrenic Schizophrenia- (Disorganized Type)- there is emotional distortion


manifested in inappropriate laughter, peculiar mannerism, and bizarre behavior.

5. Residual Schizophrenia- is used for persons who have had a prior episode of
schizophrenia but currently are not displaying active delusions, hallucinations, or overall
organization of behavior

Paranoia – is as psychosis characterized by a systemized delusional system. A delusion is a


firm belief opposed to reality but maintained in spite of strong evidence to the contrary. It is
also a psychosis characterized by delusion of apprehension following a failure or frustration

Symptoms of this disorder include feeling of being mistreated, ignored, stolen from, spied upon,
and over suspicious

The disorder is characterized by:

(Sequence of events in person)

a. Suspiciousness- the individual mistrust the motives of others


and fear that he will be taken advantage.

b. Protective Thinking- blame others for one's own mistake

c. Hostility- response to alleged mistreatment with anger and


hostility, the person become increasingly suspicious.
The Addictive Disorders

Psychoactive Disorders substance-use disorders such as alcohism affect millions of people.


Addiction and psychological dependence on these substances create disastrous personal and
social problems (Bernstein, 1991).

The addictive group of disorders includes substance use, obesity and pathological gambling.

Substance Use

Alcohol and Drug Abuse)

Alcoholism or "problem, drinking" is an addictive source of human disorders. It is evident by its


general effects as follows:

a. It serves as a depressant
b. It numbs the higher brain center
c. It impairs judgment and other rational
d. It lowers self-control
e. Deterioration of perception.

Drug abuse or the inappropriate misuse is a threat to normal behaviour. It is an addictive


disorder, the fact that causes both physical and psychological dependency to the drug

Pathological Gambling- It is an addictive form of disorder, which


does not involve chemically addictive.

The Sexual Deviations/ Disorders

The sexual deviations are impairment either the desire for sexual gratification or in the ability to
achieve it (Coleman, 1980)

The sexual disorder is common causation of sex crimes. Solis (1987) presented the
criminological characteristics of sex

Crimes as:

a) ancient and universal crime.


b) There is close contact between offender and victim,
c) It is committed by one sex against the opposite sex,
d) Sex is an inborn instinct,
e) Sex act as crimes are committed and not reported,
f) Many sex crimes are committed and not reported,
g) It is committed in strict privacy
h) It is common crime among the lower class of society,
i) Unlike other crimes, sex crimes can be pardoned by marriage
j) There is a seasonal variation in the frequency of its commission,
k) Severity of punishment does not deter commission,
l) Its consequence(pregnancy) becomes a legal problem
m) The usual victims are children,
n) Psychic trauma suffered by the victims varies with the standard of the victim.

Those Affecting Males

1. Erectile Insufficiency (Impotency)- it is a sexual disorder characterized by the inability to


achieve or maintain erection for successful intercourse.

2. Pre-mature Ejaculation- it is the unsatisfactory brief period of sexual stimulation that


results to the failure of the female partner to achieve satisfaction.

3. Retarded Ejaculation- it is the inability to ejaculate during


intercourse- resulting to worry between partners.

Those Affecting Women

1. Arousal Insufficiency (frigidity)- a sexual disorder characterized by partial or complete


failure to attain the lubrication or swelling response of sexual disorder characterized by
partial or complete failure to attain the lubrication or swelling response of sexual
excitement by the female partner
2. Orgasmic Dysfunction- a sexual disorder characterized by the difficulty in achieving
orgasm

3. Vaginismus- the involuntary spasm of the muscles at the entrance to the vagina that
prevent penetration of the male

4. Dyspareunia- it is called painful coitus/ painful sexual acts in women.

Sexual behavior loading- to Sex Crimes

As sexual Reversals

1. Homosexuality- it is a sexual behaviour directed towards the same sex. It is also called
"lesbianism/ tribalism" for female relationship.
2. Transvestism- refers to the achievement of sexual excitation by dressing as a member of
the opposite sex such a man who wears female apparel.
3. Fetishism- sexual gratification is obtained by looking at
some body parts, underwear of the opposite sex or other
objects associated with the opposite sex.

As to the Choice of Partner

1. Paedophilia- a sexual perversion where a person has the


compulsive desire to have sexual intercourse with a child
of either sex.
2. Bestiality- the sexual gratification is attained by having
sexual intercourse with animals
3. Auto-sexual (self-gratification/masturbation)- it is also
called "self-abuse", sexual satisfaction is carried out
without the cooperation of another.
4. Gerontophilia- is a sexual desire with an eider person.
5. necrophilia- an erotic desire or actual intercourse with a
corpse.
6. Incest- a sexual relation between people

As to Sexual Urge

1. Satyriasis- an excessive (sexual urge) desire of men to have sexual intercourse


2. Nymphomania- a strong sexual feeling of women with an
excessive sexual urge.

As mode of Sexual Expression

1. Oralism- it is the use of mouth or the tongue as a way of


sexual satisfaction.
2. Fellatio- male sex organ to the mouth of the women coupled
with the act of sucking that initiates orgasm.
3. Cunnilingus- sexual gratification is attained by licking
the external female genitalia.
4. Analism (anillingus)- licking the anus of the sexual
partner
5. Sado-Masochism (Algolagnia)- pain/ cruelty for sexual
gratification.
 Sadism- achievement of sexual stimulation and gratification
through the infliction of physical pain on the sexual partner.
It may also be associated with animals or objects instead of
Human beings.
 Masochism - infliction of pain to oneself to achieve sexual pleasure

As part of the Body

1. Sodomy- is a sexual act through the anus of the sexual partner.


2. Uranism- sexual gratification is attained through fingering, holding the breast of licking
parts of the body.
3. Frotrage- rhe act of rubbing the sex organ against body parts of another person.
4. Partiallsm- it refers to the sexual libido on any part of the body of a sexual partner.

As to Visual Stimulus

1. Voyeurism- the person is commonly called "the peeping Tom", an achievement of sexual
pleasures through clandestine peeping such as peeping to dressing room, couples
room, toilets, etc. And frequently the person masturbates during the peeping activity.
2. Scoptophilia- the international act of watching people undress or daring sexual
intimacies

As to number of participants in the sexual acts

1. Troilism- three persons participate in sex orgy such as two


women versus on man or vice versa.
2. Pluralism- group of persons in sexual orgie such as couple
to couple sexual relations. It is also called "sexual
festival

other Sexual Abnormalities

1. Exhibitionism- it is called "indecent exposure",


intentional exposure of genitals to members of opposite sex
under inappropriate conditions.
2. Coprolalia- the use of obscene language to achieve sexual
satisfaction.
3. Don Juanism- the act of seducing women as a career without permanency of partner or
companion
TIME AGAIN, THE AFP .AND PNP IS FACED WITH CRISIS SITUATIONS
BROUGHT BY NATURAL AND MAN-MADE DISASTERS, WHICH CAUSE PUBLIC ANXIETY,
LOSS OFDESTRUCTION OF PROPERTY AND EMBARRASMENT TO GOV'T, AND
THE ARNEDAND THE LAW ENFORCEMENT AGENCIES.

THESECRISIS SITUATIONS MAY BE PREDICTED, PREVENTED OR ITS


ADVERSE EFFECT MINIMIZED THROUGH ANTICIPATION, PREPAREDNESS AND
ISSUANCE OF APPROPRIATE GUIDELINES OR STANDARD PROCEDURES' TO EFFECT
IMMEDIAT ACTIONS IN HANDLING SUCH SITUATIONS."

Taken form: The Crisis management Doctrine (PNP - AFP)

CRISIS MANAGEMENT

CRISIS – is derived from the Greek "krisis" which means separate. It is the turning point
decision in a process of an affair or a series of events.

EMERGENCY – is derived from the Latin word "emergencia" which means dipping/plugging. A
sudden condition or a state of affairs calling for an immediate action.

Types of Crisis

1. Man Made Crisis – Strike, riot, demonstration – revolt such as mutiny and insurrection -
revolution, border incident- war conventional or nuclear crimes: kidnapping, hijacking,
hostage taking, etc.
2. Natural Crisis- fire, floods, earthquake, tidal waves- marine/air, disaster hazardous spills,
power failure, nuclear accidents – water/food shortage/scarcity, drought, volcanic
eruption, epidemic, etc.

CRISIS in general

It is a period of upset during which people attempts at arriving at solution of problems. It is a


state provokes when a person faces obstacles or hazards to an important life goal.

INDIVIDUAL CRISIS

It refers to the feeling that arises when a person faces unpleasant situation such as frustrations
and conflicts. This includes;

1. Physical Crisis- those that are related to health problems or bodily sickness/sufferings.
2. Economics Crisis- the deprivation of the basic necessities of life like food and material
things.
3. Emotional Crisis- when an individual is affected by negative feelings like emotional
disturbances, fear, etc.
4. Social Crisis- the experiencing lack of interest, confidence and social skills to relate
meaningful, harmonious relationship with others.
5. Moral Crisis- the person has an irrational or distorted concepts of what is right or wrong,
lack of moral values and integrity of the person.
6. Psychosexual Crisis- failure of the person to assume ones sex role and identify as a
man or woman. The person has an inappropriate sex objective, inadequate and distorted
expression of affection.

DIAGRAM OF DIFFERENCE

CRISIS EMERGENCY

Progressive state/sequence of event unforeseen/sudden events

Turning point decision of crisis mgt. planners immediate decision or remedy

Change/Continuity/Survival Recovery/restoration/Survival

CRISIS MANAGEMENT

crisis management is the proper utilization of all available resources and the formulation of all
available resources and the formulation of policies and procedures to effectively deal with the
progressive sequence of events (crisis) and sudden or unforeseen state (emergency)

PURPUSESE OF CRISIS MANAGEMENT

1. It sets concepts, policies and general procedures of handling


crisis situation.
2. It guides and assist law enforcers in the formulation of crisis management contingency
plans and Sop’s to address crisis situation nations.

PHASES OF CRISIS MANAGEMENT

A. PRO –ACTIVE PHASE


It is the stage of advance planning, organization and coordination and control in response to
an anticipated future crisis occurrence. This phase is designed to predict or prevent probability
or occurrence of the crisis while at the same time prepares handle them when they occur.

Threat Analysis of Threat Groups

I. PREDICTION
The first stage of anticipating future crisis occurrences through the following:

a. Political Terrorist- ideologically inspire individuals who


grouped together for a common purpose usually for change of gov't or political
power.
b. Criminals- these are people who commit terrorist acts for personal rather than
ideological gains. Some of the terroristic acts such as kidnapping are well-planned,
but happen as a result of the fast response time by LEAs to an ongoing crime. For
instance, a number of bank robberies nave evolved into unplanned hostage situation
when policemen arrived in response to an alarm robbery in progress.
c. Mentally Deranged Individuals- people commit terroristic is the most difficult terrorist
to deal with. Many of themare impulsive and unpredictable.

II. PREVENTION

This pro-active phase considers counter measures .as part of


total system of operation. Such counter measures involve the following;

a. OPERATION SECURITY- a counter intelligence measures where all aspects of


awareness and training must be considered to prevent threat groups from learning
the units plans methods of operations. It also refers to measures taken in conducting
operations or activities in secure and effective manner.
b. PERSONAL SECURITY- it considers that all personnel are susceptible to terrorist
attack so there is a need for securing them. All security measures designed to
prevent unsuitable individuals of DOUGHTFUL LOYALTY from gaining access to
classified matters or security facilities.

Considerations of Personnel Threat Assessment

a. Rank and Risk- higher ranking personnel have great risk level. In high risk areas, secure
high ranking officers because they maybe selected as terrorist targets by special
knowledge the possess
b. Threat Level (Potential Threats)
1. Primary Targets- these are high ranking military or police officers, gov't officials,
foreign ministries, other VIPs and person possessing sensitive information.
2. Secondary Targets- those selected as alternative terrorist targets to gain publicity.
3. Randomly Selected- these are military or police personnel who are not off duty or
engage in private activities and became targets of opportunity.
Steps in the Preparations of Personnel Security Program

o Planning -threat analysis and assessment of available personnel security


resources.
o Awareness- periodic briefing, public info drive, printed materials.
o Education - education on terrorist tactics, sparrow opens an: the like."

III. PHYSICAL SECURITY encompasses protection of info, material and people


including perimeter installation. A system of barrier placed between the potential
intruder and the material to be collected.

A. PREPASATION

This pro-active phase involves organizing training and equipment personnel of the
organization.

In general, military commanders and officers of the PNP must organized, train
and equip special reaction, security and negotiation elements and provide their
immediate activation when the need arises.

National Level Organization

NCCM National Committee on Crisis Management

Serves as the umbrella organization for crisis management

The primary concern is the formulation of crisis management policies, integration of mil/pol to
public efforts towards the prevention and control crises.

Organizational Structure

NCCM

.NACAH

PADSECOM PNSWG PASAG PNPSAGD

MCCM – National Committee on Crisis Management


PAFECOM- Philippine Air Force Security Command
PNSWG –Philippine Navy Special Welfare Group
PASAG – Philippine Army Special Action Group
PNPSAGSD – Philippine National Police Special Action Group
Regional Level

Organized in all regions headed by Regional Crisis Director in coordination with all
Government LEA’s

RCAG

RCMOC

OSCP

TACTICAL UNIT SUPPORT UNIT NEGOTIATION UNIT

RCAG – Regional Crisis Action Group


RCMOC – Regional Crisis Management Operation Center
-the point of all communications from the OSCP
OSCP – On Scene Command Post

The OSCP shall establish within the crisis incident site. It is a post or unit with in a
probable target to be headed by an
on – scene commander (OSC) whose responsibility is to take charge of every happening of a
crisis incident scene.

Composition of the OSCP

TACTICAL UNIT- composed of regular military or police placed under the command of the
OSC.

Reaction Element- Special action unit which are


specially organized equipped and deployed in the
crisis incident.
Security Element- military or police personnel task to
protect one area of perimeter security to prevent
occurrence of unnecessary incidents.
SUPPORT UNIT- it is a unit that provides the necessary administrative, operational and logistics
support of the OSC

 Intelligence Team- responsible for the collection and


processing Of all information needed by the OSC.
 Communication Team- responsible for ensuring effected^
communication between OSC and other units or sub-
units.
 Logistics Team- responsible for ensuring mess
services, supplies (clothing, equipment,
transportation) and other logistics services
 Medical Team- responsible for all medical supplies and
services in cases of crisis incidents
 Fire Fighting Team- responsible for all medical
supplies related to fire extinguishing fires
intentionally set by the perpetrators or during the
result of operations.
 Administrative Personnel- personnel assigned to OSC 10
keep written records of events, in coming or outgoing
communications
 Legal/Investigation Team- services of investigation,
preservation of evidence, documents and legal advice
to the OSC

NEGOTIATION UNIT – it is headed by chief negotiator and composed of two or more members.
Their primary concern is to serve life, prevent destruction and pave the way for a peaceful
resolution of crisis situation

It is the performance of the crisis management plan when a crisis situation occurs
despite of the pro-active effort.

When a crisis occur despite the pro-active effort, the organization concerned must be
prepare to perform the crisis
management in accordance with their plan.
PERPORMANCE

It is action stage, the implementation of the crisis management contingency plan.

The Initial Action

 Maintain control of the situations


 Report the matter to the RCAG through channels
 Secure the scene by establishing perimeter security
 Evacuate by standers if possible
 Prevent, escape of perpetrator
 Take maximum control

The initial action stage is taken by the Initial Action Unit, which is composed of police and
military personnel immediately organized into team to initially respond to take incident and begin
the containment effort.

The Action Stage

o The action stage starts as soon as the tactical, support


unit and the negotiation unit arrived and are deployed.
o The OSC discusses the incident with his commander and staff
and decides on the plans and actions to be taker.

Negotiation- the chief negotiator undertakes negotiation as soon he has been properly briefed
and received appropriate instruction from the OSC, He shall keep the OSCP informed of
process of the negotiations and shall take instructions only from the OSC. No further negotiation
shall be under take when the tactical unit commander initiates tactical operations.

Tactical Action- the tactical commander makes a complete estimate of the crisis situation and
plans his courses of action upon arrival at the scene while negotiation is in progress. He
shall maintain and continuous contact with the OSCP. He shall take over authority on reaction
element throughout the tactical operations. He shall take instructions only from the OSC and
coordinate all support requirements with the OSCP.

The Post Action Stage

These stages begin as soon as the perpetrator surrendered, captured or neutralized. OSC shall
ensure that the following are accomplished:

 Protection of the incident scene


 Investigation of the incident preservation of evidence
 Documentation
 SS- witnesses, hostage, perpetrators and other key
participants of the incident
 Recovered document, preserve evidence
 Pictorials, written reports
 Filing and prosecution of cases
 Damage Compensation and rehabilitation

He also initiates recommendation for the compensation and provide assistance to civilian killed
and killed and injured during tactical operations. He initiates recommendation for the
rehabilitation, construction of damage or essential infrastructures.

Training and re-training of unit personnel special units and negotiators shall continue with their
training to improve their proficiency and enhance their readiness.

CONCERNS OF CRISIS MANAGEMENT

TERRORISM

So much has been written in recent years about terrorism by eminent people. Terrorism means
many different things to different people independent upon individual perspective thus many
definitions exist.

Terrorism is.. .

 A threat or actual use of force or violence for political or other purpose to foster fear,
insecurity, distrust, and unrest among specific group or the general population
 Violence for effect... not primarily, sometimes not all for the physical effect on the actual
target, but rather for its dramatic impact on an audience."
 The calculated use of violence or the threat of violence to attain goals, often political or
ideological in nature."
 Is violent criminal behavior designed to generate dear in the community, or the
substantial segment of political purposes.

Disorders and Terrorism

A word terrorism is used to define almost all illegal acts violence committed for political
purposes by clandestine groups

 National Terrorist

A terrorist who operates and aspires to political power primarily within a single nation.

 Transnational Terrorist

A terrorist, who operates across national borders, whose actions and political aspirations may
affect individual or more than

 International Terrorist

A terrorist who controlled by, and whose actions represents the nation interest of sovereign
state.
Motivation and Group Classification

What causes a rational thinking human being to terrorize society?


Assuming that the terrorist think rationally (and most of them possess a high degree of
rationality), we must look to terrorist motivates if we are to understand them, to think like them,
and to ultimately them

a. Minority Nationalistic Groups-groups fighting the majority of the community where the
support base will depend one ethnic, religion, linguistic minorities a odd with the majority
community.
b. Marxist Revolutionary Groups- the terrorist movement that is characterized by its
possession of a coherent Marxist ideology and of a long term strategy for bringing about
the socialistic revolution.
c. Anarchist group- True anarchists are difficult to find since true anarchy bring lawlessness
and disorder, which is net a natural state which, the human race exists.
d. Pathological Groups- problematic individuals who are grouped
for some terroristic activities for emotional satisfaction.
e. Neo-fascist and Extreme Right Groups

TERRORISTS PROFILE (based on commonalties of international terrorists)

 Under 30 years of age


 Action oriented-some are college educated
 From affluent/class
 Often trained in medical, legal, engineering, teaching
professions
 Terrorism rarely full-time occupation
 Inward assurance of strength
 Paradoxically, basically lonely
 Believes he/she to be morally superior and in own mind is
right
 Indifferent to suffering of his immediate victims
 Looks to colleagues for acceptance
 Wants respects from victims
 Willing to sacrifice self
 Seek publicity
 Believes violence is morally justified to support cause

Nature of Political Terrorists

a. It’s a art of revolutionary strategy,


b. Manifest acts on socially unacceptable means.
c. Symbolic target selection.
d. Creates psychological effects on population to change behavior attitude.
e. It forces the government to take drastic measures.
f. Combines political and criminal terrorists' tactics
Aims Political Terrorists

1. Influence, discredit and destroy present system.


2. To break down social structure,
3. Erode trust in established government,
4. Foster insecurity and fears.
5. Show that the government is incapable of protecting the people,
6. Force the government to overact to use excessive measures of force.
7. destroy property,
8. disrupt law and order,
9. Propaganda.
10. Create a ripe climate to revolution

Characteristics of Terrorists

 Promote fear.
 Main objectives is publicity,
 Highly mobile.
 Fatalist they can create destruction affecting the whole nation.
 Undercover operations.
 Small groups mean security efficiency.

Immediate Goals of Terrorists

a. Local, national, worldwide recognition for a cause,


b. They cause government reactions.
c. Harass, weaken, embarrass governments and government force.
d. Demonstrates power and threat credibility.
e. Obtain money and equipment.
f. Destruction of communication.
g. Prevent and delay executive decisions.
h. Cause strike or prevent, free or prevent elections.
i. Satisfy vengeance.

Long range goals of Terrorists

a. Cause drastic changes in the government.


b. Turn the system favorable to their side.
c. Gain political recognition as a legal body representing an ethnic or national group
Cooperation of Terrorist Groups

1. Sharing resource (logistics support)


2. Sharing expertise
3. Sharing safe events.
4. Participating in joint operation

Organization of Terrorists Groups

They way terrorists group organized is determined by it’s the need of security and
number of people in the group.

a. Larger group less secured


b. Small group high degree of security but limited to the operational capabilities

As to group size, the large group can only succeed over a longer term in a week political
environment

Terrorists

a. Covert and well executed.


b. Carried out by specially well-trained and organize clandestine elements.
c. Weapons basic arms and explosive but continue to seek advance
weaponry.
d. Training they are trained on subversion, weaponry, negotiation
practices and espionage.
e. Members of clandestine elements are of above average
intelligence.

Methods of Operation

1. They operate in small bands.


2. They carry light automatic weapons, grenades, basic explosives, ammunition and
communication equipment
3. They mask their activities with the local populace.
4. Team includes assaults and security elements.
5. Leaders serve as negotiators.
6. They watch out for counter intelligence measures of the government force.
7. In hostage are usually separated in safe houses to prevent communications and escape,
planning, and intelligence gathering
Sequence Terrorist Action

a. Pre-incident phase reconnaissance mission,

 Rehearsal often reconnaissance team, planners, perpetrators do not need.


 Comm. Are through intermediaries or by message drop.

b. initiate Phase moves to their target covertly.

 They use false names, ID, passport,


 They use separate routes.
 Weapons and other items are separately to prearrange locations

c. Negotiation/Climax Phases'

They use negotiation to gain publicity.

 They used negotiation to gain publicity


 They used negotiation-often require inter-government negotiation at the highest level.
 When the government failed to give demands, they initiate more terror

d. Post incident Phase

 They learn from their failures and success


 Terrorist re-groups, criticize and give critique about the operation.

Terrorist Tactics

Bombing

Delivery to target is done through:

1. Vehicle bomb-body traps with attached devices.


2. Laid charges-bomb plate
3. Projected bomb-launched from riffles by a mortal device
4. Postal\mail bombs

Activation means.

a. Command activation by lead, full wire or mechanism


b. Action by the subject/top pressure device, light sense electric switch
c. Time delay clock/burning chemical.
Arson

This is use to destroy or to disrupt public utilities, political HQs and industrial facilities

Hijacking

Hijacking and skyjacking are commonly used by terrorist. The hijack supply ,
ammunitions , fuel cargoes, and vehicles to provide them to gain entry to a close military area,
hijacking of commercial aircraft to again publicity or to ask demands

Assassination

The oldest but the commonly used terrorist tactic where targets are often police or
military officials or political features and they always claim responsibility of assassination

Ambush

This is a well-planned, well though-out properly rehearsed and precisely executed


operation. The terrorists have time on his side and will spend considerable time preparing for an
operation. Terrorists have an advantage in that they can choose the time and palce of operation

Kidnapping

Kidnapping for ransom is the most common form of this tactic. The victim is normally
confined in secret hideout and kidnappers make material demands .

Hostage Taking

The hostage-taker confronts the authorities and openly holds the victims for ransom. His
demands are more than just material m nature. Political concessions are the frequency demand
in exchange for the hostage lives

Robberies/Extortion

Terrorists operations are expensive. To help finance their activities, terrorist rob bank
and armored vehicle carrying large of cash. Bank robberies are used as graduation exercise for
terrorist/training programs and viewed as a tactical operation.

The reconnaissance, plan escape routes and operates in the high degree of efficiency.

The progressive taxation shceme of the CPAA/NPA is a form of extortion through


coercion or use of force against the victim or his property.
TERRIORIST TARGETS

A. LITARY/POLICE
 MICOMMAND AND CONTROL FACILITIES
 LOGISTICS/STORAGE FACILITIES
 COMPUTER FACILITIES
 EXPLOSIVE, SENSITIVE WEAPONS, ARMS AND AMMUNTION DEPOTS.

ENGINEERING AND ENERGY SYSTEM

 Hydroelectric plants
 Offshore oil rigs
 Nuclear facility sites
 Gas pipelines
 Dams and electric power lines

COMMUNICATION AND SUSPLIES

 COMMUNICATION LINES AND FACILITIES


 CHEMICAL STORAGE SITES
 DOCK FACILITIES
 EQUIPMENT WAREHOUSE
 COMPUTER FACILITIES

TRANSPORTATION

 RAIL LINES AND CARS


 BUS DEPOTS
 AIRPORT AND AIRCRAPTS
 TRUCKING AND FACILITIES
 SHIPYARDS AND SHIP
 MAINLAND ROUTES AND BRIGES

HUMAN

 MEMBERS OF THE DIPLOMATIC CROPS


 GOVERNMENTS OFFICIAL
 COOPERATE EXECUTIVES.
 POLICE AND MILITARY FORCE
 DEPENDENTS/CLOSE RELATIVES OF THE ABOVE
VULNERABILITIES

Vulnerabilities are the weaknesses of the installation security and high risk targets with in
such installation. These vulnerabilities are normally identified through security surveys and
inspection conducted periodically or on the spot intelligence and security units staff.

The analysis of the treat to the certain installation is based on information with both static
and dynamic dimensions

A. STATIC DIMENSIONS

1. Terrain
2. nationality of population
3. Major industry in the area
4. Location of installations
5. Missions of the installations

B. DYNAMIC DIMENSIONS

1. Assignment of personnel
2. Secured measures used
3. Relations with civilian security
4. Demonstration within post location

C. DYNAMIC DIMENTIONS THAT ARE HARDLY CONTROLIABLE

1. Weather
2. Activities of hostile groups
3. Economic conditions
4. Local law enforcement
5. Off post demonstration

The vulnerability of installations can be determined to some extent through the consideration
of the following factors:.

Installation characteristics and its attractiveness as a target for the terrorist acts.

 Status of training personnel


 Availability of communications
 Non-military law enforcement resources
 Time and distance from military installation able to lend assistance
 Geographic region proximity to foreign borders
 Access to installation
 Terrain

This is termed as crisis by the law enforcement officers and behavioral professional. This
situation exists.

When one or more individual are held captive by other person or person against their will
for purposes of demanding material things or due behavioral maladies criminal types hostage
takers may direct their demand toward the government or to other private individuals mentally or
emotionally disturbed may take hostage out of nothing or due uncontrollable forces

In dealing with hostage situation, the priorities are to


1) preserve lives, 2) apprehended the captors, and 3) recover or protect properties. Negotiator
should be prepared for this kind of situating of situation since it will take them a long period of
time contain the situation since it will take them a long period of time contain situation.
According to experts, a hostage taking may last for an hour to more than forty hour. Hostage
takers and hostage and even the negotiators become tired and stressed out of the long period
of the crisis intervention. Hostage become impatient waiting for their safe release or rescue.
With this, there is a great possibility of the birth the Stockholm's Syndrome. This is
characterizing by transference of attention between the captors and captives. The hostage
towards his captors may generate positive feeling

 Negotiators can have enough time to contain isolate scene.


 The initial sate of high emotion is given time tc subside in
rational thinking return
 The lives of the hostage becomes more secure as the holder
realize is the value of the continue safety.
 Fatigue will set in alertness will fade.

It was research by the experts that passage of time is in favor its hostages and to the
negotiators. In the first hour of the situation, the hostage taker is at rage and tension is at peak.
As time passes mental, emotional, and physical fatigue will be increased and will operate
against hostage taker. As this happen, the above- enumerated benefits of slowing time operate.

Crisis Management

Stages of a Hostage Situation

Alarm stage

This stage is the most traumatic and dangerous. In the alarm stage, the emotion of the
hostage taker is exceedingly in its highest peak, is rationalization and proper thinking is low. He
may be extremely aggressive in his reaction to any perceived threat. E.g. . escape of hostage,
tactical assault trickery etc.
In order for the perpetrator gain cooperation from the hostages, he usually terrorizes the
hostages into submission. At this hostage may also inclined to physical harm or even kill
everyone who interfere with their attempts. (Strentz, 1984, p. 190)

The same is the situation in the part of the hostages. Since no known as when or does
not want that they will be held hostages. This is considered traumatic stages as they fear much
for their lives. From a peaceful situation, turns into a life and death situation ticking every
mimute of the lives of the hostages depend on the hostage (Herman, 1995, p. 92)

Person taken as a hostage becomes impatient; denial of reality sets in them, particularly
when those they expect to help seems to be doing nothing

In order to cope immediately with this agitated feeling, one must put into place a will to
survive since panic may cause over reaction in the part of the hostage taker and diminishes the
chances of survival. It is also important that hostages should disregard any of being a hero.
(Strentz, 1984, p, 196)

Crisis stage

In this stage, when negotiation attempts are being initiated by the crisis negotiator.
Outrageous demands and unpredictable emotion is marked or commonly noted in the hostage
taker. There is still a great deal danger since hostage taker try to consolidate their positions, to
do these, they try to move hostages to a safer ground area.

On the part of the captive, this is most critical because the stage may predict remainder
of the situation. Chances of survival may be enhanced or reduced during this stage through the
hostage hostages' taker interaction

It is advisable that hostages must control their fear as it increase unpredictable outburst
of anger and violence on the captor. The hostage taker may inconsistently enforce numerous
demands and pretty rules and this may result to unsuccessful negotiation. In additional, the
perpetrator seeks to destroy the victim's sense of the autonomy by depriving him of his basic
needs

At this stage hostages may start to feel three (3) problems: 1)isolation, 2)
Claustrophobia, and 3) Sense of time. Sense of time becomes important on hostages who are
hoping for rescue. This situation may also in favor of the hostage taker as they earn
compliance from their captives

Accommodation Stage

This is distinguished by boredom, and with moments of terror. Through is considered as


the longest yet is the most tranquil. In the crisis stage, and even in the alarm stage, hostages
are considering escape options but in the accommodation stage., their initiative and planning
are narrowed since captors has increased control, over them, the hostage's sense of life
preserving has increased and even tries to obey the orders. Stockholm syndrome will likely to
occur between the captors and the victims. One lock into this phenomenon in the negative the
one must say that cooperation of hostages to the negotiator is constricted

In the right manner, the hostages in good effect can make use of this phenomenon. It
lessens tension and openness is generated. It is advisable that hostages must avoid political
discussion as it accentuates differences with captors and hostages. (Miron and Goldstein)

Resolution Stage

This is the stage when the hostage taker is being stressed out or fatigued of the
situation. He is seemingly losing interest of the situation and lost most of his bargaining points.
Tension between the hostages, hostage taker and the crisis negotiator is notably low. It should
be regarded also that the crisis intervention techniques negotiation team have.

Paranoia - is a set of fixed delusional beliefs that are accompanied by clear and orderly thinking
outside the delusion system. paranoia manifests itself. A paranoid has been described as
"vigilant suspicious, distrustful, insecure and chronically anxious ". The are two types of
paranoid individuals:

 The true paranoid or the classical paranoid as psychologists


prefer, may be of high level of intelligence and so persuasive
that he will successfully recruit persons to help him in his
war against enemy.
 Individual with Paranoid reaction do not handle the problem in
as much logic or intelligent as the true paranoid.

Schizophrenia is a thinking disorder. Expert says that, approximately 80 percent of the mentally
ill of the population are schizophrenic. There are subcategories of this kind of mental disorder,
the catatonic state and the hebephrenic state.

 Catatonic state is demonstrated by the patients rigidly held


position for some interminable period of time, while
 Hebephrenic state is when the subject acts. Childlike and silly.

The signs and symptoms of the schizophrenic condition may appear in three. The signs and
symptoms of the schizophrenic condition may appear in three (3) different way such as the
following:

a. The subject’s language may be rambling and tangential: he may make


up meaningless rhymes, or echo anything h hears;
b. The subject may show his split personality incongruent between
his expressed ideas and emotional responses. This indicates that
two thought operate simultaneously.
c. The subject may isolate or alienate himself from the rest of the
society and pull himself into his personal shell (Schizotype personality).
Neurosis is suffered by the person if most likely to be observed in a continuous state of anxiety.
Erratic behavior would more than likely be displayed by reaction to anxiety in the form of ego
defense mechanism such as rationalization, projection or displacement. The signs and
symptoms are shaking uncontrollably and depression without explanation.

In general, they are characterized by being out of' touch with reality and being recognized by
their false belief. Hostage taking is done in order for them to carry out plans for someone who
compels them to do. Their routine is to accomplish something but there is no accomplishment.
Most of the paranoid schizophrenics are in conflict and with difficulty in coping even in a minimal
stress situation.

Male paranoid may have problems with gender identity are religious beliefs. It is so noted that
frustration and conflict is involved. When these two combines, severe anxiety will surface that
makes a person so sensitive and volatile. Lack of interpersonal trust, religious conviction, and
sexual dysfunction, persecutory beliefs about family or significant individuals or even distrust to
the negotiator or police may lie in the person's behavior. This variety of Issues may cause the
negotiation difficult and dangerous (1986) .

The first thing a negotiator should do is to keep the dialogue at an even pace. Since paranoid
schizophrenic are out of touch with reality. It is must that the hostage taker should be kept calm
enough to stay in touch with while the negotiation process is going on. A good negotiation
strategy is suggested below:

 Reduce anxiety at the same time create problem solving atmosphere


 Do not trick the captor
 Accept the statement as true but do not agree
 Do not convince that is wrong
 Emphatic understanding is needed

Manic depressive personality

Depressed individuals are in an incapacitated mental state. He may frequently know the
hostages and the latter might e the cause of his depression. Negative outlook in life, felling
unworthy, slow speech, suicidal and unpredictable and extremely dangerous are the
characteristics of this type of mentally disturbed. To a one who is a suicidal type, he might inflict
harm or even kill one of the hostages and the police will increased.

In this stage, reactions of the hostages are mixed either blaming their captors or may become
hostile and uncooperative to their rescuers and even accusing them to be the responsible for
the whole situation. They might even appraise their captors for taking care

Released victims become paranoid and often experience post trauma attacks their liberation.
These may even last for a long period of time. Such experience becomes part of their lives and
haunts from time to time if not being properly treated. They, being a paranoid, continue to
monitor their captors if taken away from them or safely put behind bars.
THE HOSTAGE TAKER

It is a must that a police officer who first arrived at the scene has the necessary skill to
determine what type or personality of the hostage taker is. This does not mean that he must
diagnose the perpetrator. In assessing the situation, one must be able to determine
and know the two kinds of behavior.

1. Instrumental behavior- those who are engaging in this kind of


behavior are having goals to obtain or to be fulfilled. Generally, hostage takers of
instrumental behavior are criminal types and intervention usually needs bargaining. E.g.
barricaded criminals, or other organized crime groups
2. Expressive behavior- this kind of behavior is characterized by
their attempt to display power. Those who engage in this kind are
emotionally distributed individuals, e.g. mentally insane, etc.

In may hostage situations committed, statistic reveals that’s most of those involve are mentally
disturbed individuals and the remaining are results of instrumental behaviors. According to
research, twenty five (25%) percent of all hostage situations are instigated by expressive acts.
With this data, it is important that we learn the different types of hostage takers and will begin
the emotional aspect.

Mentally disturbed

This group suffers from different kinds of psychological maladies. They may or may not in touch
with reality. A mentally disturbed individual may be a loner, act in accordance with a non-
existing irresistible force, or on a false belief or a stimulus (cooper, 1981). Symptoms may
include such thing as dramatic and sudden changes of behaviors, loss of memory, mistreatment
of a loved one, a sudden, and impulsive act of theft, extreme depression, or anxiety that is out of
proportion to the circumstances that appears to be causing the anxiety.

The individual may talk to himself of hear voices, or may be his displaying dangerous behaviors
without any apparent reason. Mentally or emotionally disturbed individual may be in a very
docile rood for awhile and become extremely violent without any apparent cause. (Adams).

International groups. In the United States alone, it has been reported that there are local
terrorists sowing fear. They create chaos through assassinations, bombing, arson and other
forms of malicious destruction of properties.

Though global terrorism is seemingly increasing and alarming, the international law
enforcement community is trying its best to address to this kind of problem, (the international
police organizations, other enforcement, religious and civic organization team up together in
fighting these terrorists.)

Regardless of their cause, their terrorist activities are condoned by most of the people.

Characteristics. Modus Operand And Causes


In order for them to attain their goal, careful planning is involved. They employ
professional members most of the planning team members are educated enough on political
matters to outwit and deceive the authorities. They also employ undercover agents and divide
into groups.

Hostages are in serious jeopardy when their demands are not met immediately or if the military
pressure hovers them (i.e. development of troops, hovering choopers). The local police may be
not be able to meet the demands immediately and only serve as perimeter security as
they need government attention. They use media to get attention from the government.

Since most of the longest running crisis situation involves political terrorists, they want to
negotiate directly to the government and pay less attention to the agents or crisis management
teams. Terrorists also try let the. Government overreach in "the situation so when worse come,
they, the hostage and the rights group ‘will turn ire and blames on the government.

The common question asked is what causes them to do such. Evidently, hostage taking is their
means to get the much – needed attention from the government or private individuals just like
other types of hostage. In this way, the authorizes will initiate actions to negotiate for the safe
release of the hostage on the fear that the latter 'will end killed or harmed.

On the issue on ransom, according to them are just demanded to cover their expenses while
hostage are at their custody, nut in sense, will serve as their resources tc buy additional
firepower or in the recruitment for additional manpower in preparation for the anticipated
military or police pressures.

Just like other type of hostage takers, they need to be negotiated with. The only difference is
that a mentally deranged, inadequate and antisocial personality needs more the help of mental
health professional and rapid police response as the last resort to rescue hostages away from
gander. While on terrorist hostage takers, Plain staking bargaining on social and political
demands is traditionally used. Government negotiators are utilized to the fullest renegotiate and
bargain issues with the kidnappers.

Barricaded Criminals

This type might be robber cornered by the police while in the act of committing their crime e.i
bank robbers. Either barricaded in a building, road block or on gateway cars. Hostages are may
be employees, bystanders or both caught in the process of escaping. The hostage taking is a
spontaneous reaction of the criminal when cornered. Some law enforcement officers consider
barricaded criminals as attention weekers, but other describe then in the contrary as they avoid
being identified. Their primary aim is to escape safely taking with them the hostages as shield to
prevent being shot by the police. Usually barricaded criminals are engaged instrumental acts as
they demand for material things such as getaway cars, firearms, money, and safe escape.

Barricaded criminals may initiate bargaining negotiation as the police closely monitor them. As
earlier presented they might ask safe conduct pass for the release of the hostages, or they
might ask for additional money or gateway car and leave the hostages immediately. The
negotiator, upon gathering all the facts and assessment of the situation, including the mental d
faculties, he may use his own discretion in the negotiator process, whether to grant the demand
or not

Prisoners

While most prisoners spend most of their time inside the correctional institutions, some are
concentrated on penal colonies under light guard' and to those who are completely secluded
inside their prison cells; they are haunted by boredom, get tired and hostile. These may be due
to the strict implementation (lack of recreational activities and inadequate facilities, poor
structuring etc.)

These conditions may largely contribute to the occurrence of priors and crisis [hostage taking]
situations in our correctional institutions. Most probably, the hostages are the prison authorities
and staffs or even some of the inmates. For some institutionalized individuals, hostage taking is
there is means of effecting escape hostage serve as their shield against assault of authorities]
to stay away from the harsh prison condition. Another group of prisoner – hostage takers are
those who do not consider escape but a rather total improvement of the conditions and services
of the prison institution.

Prisoners who initiate hostage taking may be involved on either instrumental or expressive acts
or both. Instrumental behavior involves those situationaly related, substantive and objective
wants and commonly known as the commodity and of the hostage taker (Roloff and Jordan,
1992). An examples of this is the demeaned for prison condition as these are the causes of the
situation

Additionally the first group has similar purpose to the barricaded criminals as they inhibit
instrumental acts or behaviors.

The negotiation approach in this situation based on the acts involved is bargaining approach.
They need to be bargained 'with at the possible time as the lives of the hostage are in great
danger. This is possible, as the hostages are the main cause of the problem.

NEGOTIATION MODELS

In Crisis Situations

Whenever a crisis [hostage] situation is reported to the police or other law enforcement
professional, the initial action being taken is the activation of tactical assault or initial action
team and the coordination of trained crisis negotiators within their departments.

In cases where the hostage taking is initiated by a perpetrator, purely engaged in expressive
acts, the services of a mental health professional trained in crisis management is indispensable.
On cases of instrumental behaviors, tactical assault team are mobilized to contain and isolate
the area and on standby when worst come along as the negotiator/s enter the situation.
However, the services of mental health professionals are sought since most of hostage takers
with instrument behaviors are partially engaged in expressive acts.
In assessing a crisis situation, one must understand and be able to determine the two kinds of-
behavior. Firstly, instrumental behavior refers to actions on the part of the perpetrator and
negotiators that facilitate some of substantive outcome in terms of instrumentation issues.

(Situationally related. Substantive and object wants of each party). Additionally, those who are
engaging in this kind of behavior are having goals to obtain or to be fulfilled. Generally, hostage
takers of instrumental behavior are criminal types and intervention usually needs bargaining.
E. g. barricaded criminals, or other organized crime groups. Expressive kind of behavior on the
other hand refers to the various forms of perpetrator's and negotiator's behavior that serves to
communicate power or significance of the individual and his/her emotional state. Simply, it
involves the behavior of the perpetrator (Hammer and Rogan). This is characterized by the
hostage taker's attempt to display power. Those who engage in this kind are mostly emotionally
disturbed individuals. E.g. mentally insane, etc

Over the years there are approaches used by negotiators are devised to suit to these kinds of
behavior or acts.

Bargaining Negotiation Approach

Earlier discussed were the two types of acts. Bargaining negotiation approach is the model that
negotiator employ whenever instrumental issues come along way. In this approach, negotiation
is viewed in terms of an exchanged or distribution of resources. This approach is derived to the
Social Exchange Theory of Roloff, (1981), which accordingly has two premises;

1. Conflicts involve people who are independent which means that


each party cannot accomplish each own goals without agreement
from each party and;
2. Such conflicts involve rewards and cost from each other.

The Social Exchange Theory is obviously focused in the exchange of objects during the
negotiation. In order that the negotiation be successful, some authors of crisis management
books claimed that the communication approach involve the exchanged of one set of resources
for others or known as bargaining.

Bargaining is a powerful tool to resolve a conflict provided that the hostage takers focus on
instrumental concerns or issues that is negotiable. They are more likely to be engage with the
hostage negotiator in order to bargain and resolve the crisis.

Van Zandt, Rogan and Hammer reviewed and made critique on this approach and notes:

"The type of situation law enforcement usually encounter, often fall in several ways to match the
requirements of instrumental negotiation approach."

 First, crisis negotiation situation is not typically like others, more common forms of
instrumental dominated bargaining where the assumption is that, the parties come
with well thought out proposals and are willing to a bargaining process.
 Crisis (hostage) situations involve high levels on anxiety and uncertainty. They are
characterized by a pronounced level of emotional excitation precipitated by the hostage
takers motives and enhanced police response.
 Majority of hostage crisis occurs as a result of the mental and emotional inability of the
hostage takers to cope with life stressors. These procedures a situation where normative
rational actor bargaining is generally absent and its place exist an explosive dangerous
and volatile set of interaction dynamics where emotional excitation and relationships
issues (e.g. control, power, trust, liking and face) play a critical role.

Overall, the particular features of crisis situation discussed above suggest that negotiators often
face interaction dynamics that may not fully explained by the instrumentality focused bargaining
approach.

Expressive Negotiation Approach

This approach is mainly focused on the emotional state of the hostage taker as a powerful tool
to resolve the crisis situation. Expressive negotiation approach came to existence with the use
of psychology, human relations theory and research. Both assume that the nature and quality of
interpersonal relationships play a large role in resolving a conflict. (Folger, Poole and Stutman,
Schlossberg, Van Zandt, Rogan and Hammer)

Schlossberg has suggested three (3) assumptions of the expressive negotiation model.

 Hostage has no instrumental value. This explains that the


hostage is a tool or device used in gathering audiences or
attracting attention (attention-seeking behavior) to the
hostage taker may initiate a crisis to demonstrate his
ability to control others.
 Both interactants have the interest to prevent the escalation of the situation into violence
or death. The hostage taker has some minimal level of awareness that when he kill's his
hostages, he will later suffer the consequences.
 Hostage taker and negotiators are confronted with high level of emotional excitation.
Increased emotional arousal prepares the perpetrator from reacting with either fight or
flight response rather than a problem-solving mode.

In this approach, negotiators must be knowledgeable on "crisis intervention therapy"; listening


skills as it contributes a lot in decreasing anxiety and a problem solving can emerge later during
the negotiation process. (Schlossberg, 1979, Van Zandit, Rogan and Hammer, 1998)

In addition, relationship development and confidence building strategies are viewed as critical to
resolution of crisis [hostage] incidents. The negotiator must have enough training in listening,
paraphrasing, self - disclosure, open ended questioning to reduce perpetrator' s anxiety.

Van Zandit, Rogan and Hammer discussed in their book three (3) recent additions to the
expressive negotiation approach.
 Under intense stress, the Stockholm syndrome may likely to occur.
This phenomenon has been carefully studied and recorded by
psychologists.
 The impact of the incident stress on negotiator's psychological
well-being. More so on unsuccessful negotiations. Negotiators
should also deserve attention like professional help.
 Explications of emotional and personality disorders and their
impact on crisis negotiation. Most of the hostage situations are
committed by paranoids, depressed, antisocial and inadequate
personality typologies.

Hostage negotiations depends on the psychological characteristics of the hostage taker and the
identification of the effective communication strategies when negotiating with perpetrators who
exhibit behavioral patterns consistent with specific mental and emotional disorders.

This model of negotiation is used to lessen the perpetrator's emotional tension to give way for a
rational problem –solving atmosphere. (Hammer and Rogan)

Communication-Based Negotiation Approach

This approach is founded on an interactive assessment if the crisis [hostage] situation as it


unfolds and is created through the interaction of the negotiator and the perpetrator. Therefore,
communication based approach is in interactive process wherein negotiators and hostage
takers react to each message behavior.

In fundamental communications theory communications is composed of content and relational


dimensions. Content dimension of communication represents the instrumental focus of person's
message, while the latter conveys the expressive features (as trust, power, and respect)

There are three (3) interaction concerns relative to. The communication - based negotiation
approach, which may tend to escalate or deescalate the conflict. (Hammer and Rogan)

Instrumental concerns; Hammer and Rogan notes:

"Instrumental message behavior arises in crisis negotiation as the hostage takers and the
negotiators bargain with one another regarding with the incompatibility on their objective
concerns."

In this concern, there. Are two broad types of issues involved, the substantive issues and non-
substantive issues or the situationally related and the situationally unrelated respectively?

Relational concerns

Relational, message behavior denotes when an individual's concern is more on the nature of
the relationship to other individual. There are three (3) core elements that represents relational
message behavior.
a. Power - this concerns the degree the agreement between the two interact ants along a
dominance submission dimension.
b. Trust - revolve around the degree to which each party is willing to
accept the premise that no one shall be hurt or no act shall be
detrimental to self.
c. affiliation - refers to belongingness and acceptance between the
perpetrator and the negotiator (respect, liking and caring for the
well-being) .

Identity concerns

Identity concerns refers to an individual's concern for self - presentation, reputation or face.
These are then important to both parties.

According to Tajfel's Social Identity Theory as discussed by hammer and Rogan, personal and
social identities are the two dimensions of a person's self image and are best to be known by
the negotiator when dealing with conflict situation, noted as:

Personal identity is based on an individual's unique perception of his or her own attributes' (the
person perceives himself either weak, strong, or intelligent). Hammer and Rogan also
suggested that a suicidal emphasis is on personal identity concerns, and social identity consists
of those characteristics and their emotional significance that is attached to one's membership in
social groups...' (Nationality, gender, ethnicity, social group/ cult).

Rogan and Hammer further discussed that face message behavior varies along three (3)
dimensions and the first denotes the locus of a communicator's interest -( is the face message
directed to one's self or to other?); Face valence is the second dimension, a behavior either to
attack or honor face. Finally, ' face - honoring entails a dimension which relates to whether the
message behavior functions to proactively protect against potential future threats to face or to
retroactively restore perceived loss of face'.

When these three (3) dimensions are combined together, there are six (6) types of face
message behavior being produced

Defend Self's Face

This behavior is self-honoring and self-directed messages. More often, the hostage taker this
when he is asked about the condition of the hostages and replied ("I don't know but I think
they're all OK!")

Attack Self’s Face

Is a behavior that tend to attack or is directed to one’s self. The statement/(“I know this is all my
fault”)fits to this

The perpetrator directs criticism or attacks to himself when he fell remorse of his act and this
usually occur during the accommodation stage.
Restore Self's Face

This is used to restore one's face/ reputation. ("I’m not as crazy as you think...")

A hostage taker with psychological maladies uses this face message behavior to restore his
reputation.

Restore Other's Face

A face message behavior that is directed towards the other party. ("You're such an intelligent
guy...") or (" You've got a lot of people who cares about you ...") The negotiator tries to restore
the perpetrators face by attempting to gain cooperation and lessen the letter's psychological
burden.

Defend Other's Face

Known as the traditional message behavior utilized to protect other's face from future attack or
loss. ( " I know you can overcome these odds in your life...")

Attack Other's Face

This represents the traditional, more limited view of face attack behaviors. ("These people
causes me to do this ../') When a negotiator shifts the blame to others, it does not really mean
that hostages are not prime importance. It is more likely that the hostage taker fell sense of
understanding and belongingness. However, if the hostage taker is the one who uses this, he is
trying to imply that the main cause of the situation are the people involved [hostage].

THE STOCKHOLM SYNDROME

In the event of hostage crisis, the Stockholm syndrome will likely to occur. This phenomenon is
referred to as the process of transference in which the hostages begin to identify their captors
and the following may occur.

a. Positive feelings from the hostages to the captors


b. Negative feelings toward the authorities by both hostages and
captors
c. Positive feelings returned by the captors to the hostages

This phenomenon got its name after one of the hostages in an aborted bank robbery in Sweden
fell in love with the perpetrator (Strentz, 1994). In some instances, hostages may even help the
perpetrator consummate the crime either by providing cover fire during the escape process or
actually joining the heist or become an instant-member of the group.

Stockholm syndrome with operate when there is an extended period of time, not being isolated
from one's captor and the positive contact between the hostages and the hostage taker
(Fuselier, 1981).

Variety of issues may possibly cause the occurrence of this phenomenon such as:
Pity - In the case of mentally disturbed individuals, hostages may pity them, as they believe
these individuals need to professional help. The hostages may offer advises (i.e. not advisable)
or even instruct the police not to launch a tactical assault against the defenseless and sick
hostage taker. Personal feelings - the hostage may feel affection towards the hostage more
when the hostage is female, with pleasing personality and cooperative.

Indoctrination - barricaded political terrorists tend to indoctrinate their hostages to force them
agree and believe with their stand or political ideology. It is not so surprising that a son of a
slain scout ranger sergeant in Mindanao joined his Abu Sayyaf captors daring the siege in 2000.

Poor inaction of the authorities - the hostages in the alarm and crisis stages of hostage taking
want to be speedily rescued before they will be killed or harmed.

In a crisis [hostage] situation, negotiators consider staling of time the number one rule in dealing
with hostage crisis. On scene negotiators state time to decrease tension among themselves and
the hostage as they feel neglected. They will end up sympathizing with their captors and
uncooperative to their rescuers.

It should be corrected that providing assistance to the hostage taker not a conclusion that
Stockholm syndrome has occurred. Hostages nay carry the moneybag or the clerk opens the
vault due to continues threat of the hostage taker.

As Stockholm syndrome continue to develop among the hostages and their captors, the latter
will make increase awareness of the safety of the hostages for fear of losing a shield. The
negotiators and the hostages however may benefit from this phenomenon since the safety of
the hostages is increased. This happens during the accommodation period as hostages may
tend to obey every command of their captors and the latter will decrease or lessen the degree of
security, control and the introduction of physical harm among the hostages.

REACTIVE MEASURES IN HOSTAGE TAKING INCIDENTS


OPERATIONAL PREMISES OR AREA:

Principal Participants: First responding officers, Field supervisors,


Threat Management Force Commander Tactical Unit Commander

Duties and Functions


First Responding Officers:

a. Proceed to the scene discreetly


b. Do not return fire except:
i. When loss of life is imminent
ii. When hostage-taker is visible, armed, identifiable and no
iii. Third party will be caught in the crossfire.
c. Contain the suspect - condor or isolate the area
d. Request assistance
e. Evacuate - care of critically injured persons if any
f. Retain witnesses- gather information attempt to communicate their
telephone, megaphone or other means
g. Deploy responding officers
Develop required police informed-periodic, assessment of situation
relayed from time to time
h. Field officers-assumes command upon reaching scene
i. Evaluate situation
j. Prescribed containment procedures until the TMF Commanders
arrives
k. Establishment of command post
l. Coordinate / direct Commander of Tactical Unit Team
m. Plans / promulgate aggressive operational activities if
required by the Tactical Unit Commander
n. Ensure that suspect is under constant surveillance
o. Maintain well - planned assault; operation, upon order

OPERATIONAL PROCEDURES

1. Stabilization and Containment


2. Establish Rapport: get to know the suspect
3. Operational Activities
4. Clear area/scene of pedestrians
5. Required innocent persons to evacuate - this can be done
throughout non-verbal language
6. Gather information about the suspect
7. Submit initial report
8. Request for additional resources, if needed
9. Consolidation and negotiation
10. Negotiation and qualities
11. Civilian volunteer preferred depending upo
incident
12. Demonstrate sympathy without being emotionally involved
13. Ability to accept tension between conflicting views
14. Maintaining self-control
15. Possess moral courage and integrity
16. Patient and good listener
17. Should not be a decision maker
18. Possess certain language skills or background which will
lend insight into the psycho of the hostage taker
19. Knowledge in psychology of aggressive human behavior
20. Ability to five minor rewards
21. Ability to without rewards

Steps in Negotiation
a. On initial contact - avoid hostile or antagonistic approach, introduce yourself- don't use
title or rank, sell yourself- sincere and honest, instill trust and confidence, minimize
tension soonest
b. Development - drawing a psycho profile or hostage taker, reinforce relationship
establishment at initial contact Alternative steps
c. Climax stage
d. Termination

RULE AND PROCEDURE ON NEGOTIATION

1. Stabilize and contain the situation


2. Select the right time to make contact with the hostage-taker take
time when negotiating, allow hostage-taker to speak
3. Don't offer the hostage-taker anything. What he will ask for will
be part of the negotiation
4. Avoid directing frequent attention to the victim when talking to
the hostage-taker
5. Do not call them hostages. Be as honest as possible; avoid
tricks; be sincere
6. Never dismiss any request from the hostage-taker as trivial or
unimportant
7. Never say "No", soften the demands
8. Never set a deadline; try not to accept a deadline
9. Do not make alternate suggestion not agreed upon in the negotiation
10. Do not introduce outsiders.(non-law enforcement officers) into the negotiation
process, unless their presence is extremely
necessary in the solution of the crisis; provide that they shall
be properly advised on the do's and don'ts of hostage negotiation
11. Do not allow any exchange of hostage, unless extremely
necessary; in particular, do not exchange a negotiator for a
hostage
12. Avoid negotiating face-to-face if possible
13. Law enforcement officers without proper training shall not
be allowed to participate in hostage negotiations; and
14. Never introduce ranks/possessions.

KIDNAPPING FOR RANSOM

KIDNAP FOR RANSOM is a criminal act, particularly described as the unlawful and carrying
away a person by force or fraud and against his will, or in any manner depriving him of his
liberty for the purpose of extorting ransom as payment for the release.

KIDNAP FOR RANSOM is a common term used describe a specific criminal act under ART.267
of the RPC entitled "Kidnapping and serious illegal detention."
KIDNAPPING, in general, possess a serious threat to the peace and order condition of the
country. Focus of concern, however, falls on so-called kidnap for ransom case, because they
exist a heavy tall not only on their victims and the victim's families, but also on society
as a whole. This is so because kidnap for ransom is by nature a syndicated crime perpetrated
by professional criminals groups capable of planning their nefarious trade that even a single
gruesome act of kidnapping expertly pulled by them could prove very alarming to the
public.

COMMON MODUS OPERAND! USED BY KIDNAPPING OR CRIMINAL GROUPS ENGAGED


IN KIDNAP FOR RANSOM ACTIVITIES.

A kidnap group initially scouts or a potential victim through an informer or spotter.

An informer or spotter could be a gang member or outsider whose participation is to locate


targets for the group.

After the would-be victim has been spotted, the kidnap group conducts a through study on his
background and his daily routine movements/activities.

Customary route taken by the would-be victim is particularly observed.

After careful surveillance and planning, they would kidnap the victim at an opportune time.

The victim is them brought in a pre-designated area, usually outside urban places where the
victim is held in captivity ransom for his release is being negotiated.

HOW DOES KIDNAPPERS AEDUCT THEIR VICTIMS?

How facilitate the kidnapping for the victim, a gang member is sometimes made to seek
employment with would-be victim's family, either as a diver r as household help. In coordinate
with an inside man, the group snatches the victim at on opportune from the public.

Although the manner of accosting the victim varies from one kidnap group to another, the most
common method of approach used by kidnap groups is by blocking the kidnap victim's car by
using military or police-like vehicles, sometimes with siren. At least one of the kidnappers is in
complete military or police uniform and armed with a long automatic weapon. The victim is
intercepted and accosted with alleged traffic violations.

HOW ARE RANSOM NEGOTIATIONS UNDERTAKEN?

Ransom negotiations are later than affected through various means of communications. The
most common is through telephone.

The kidnappers will call up the relatives of the victim ana demands for a ransom for the release
of the victim. An almost hysterical victim is sometimes made to speak over the telephone and
appealed to his bewildered relatives whose tendency to cooperate blindly with the kidnappers.
The kidnappers then indicate the amount, normally in cash payable on a date and a place
specified set by them. Threats on the life of the victim are also relayed to the one contacted in
case term of the ransom one not met which include, among others, non-disclosure of the case
to police authorities.

WHAT ARE THE BASIC OBJECTIVES OF THE SPECIAL UNITS OF THE FNP IN
DEALING WITH KIDNAP-FOR-RANSOM?

By priority, the basic objectives of the PNP special Unit handling kidnap-for-ransom cases are
the following: To insure safety of the hostage or victim is a paramount
consideration.

That takes precedence over all others. Utmost care is therefore exercised in the conduct of
rescue operations to understand and minimize the mental anguish and agony of the victim's
family and friends to achieve the early liberation/salvation of the hostage/ victim. To insure
successful cases against suspected kidnappers. To ensure successful case building and
prosecution of case against suspected kidnappers to prepare for any similar eventually that may
ultimately endanger the preservation of internal peace and order.

MOST IMPORTANT ROLE OF THE CITIZENS IN THE FIGHT AGAINST KIDNAP-FOR-


RANSOM.

The role of the citizens especially the families and relatives of kidnap Victims is to report
immediately any kidnapping incident to police authorities. Aside from this, they should extend
their outmost cooperation to the police not only in the rescue of the victim but also in the
effective prosecution of the suspect as well as in the efforts to locate, identify and arrest kidnap
gang members who remain at large.

TIPS TO BE UNDER TAKEN TO PREVENT ANY KIDNAPPING OR ABDUCTION

If you believe that you or members of your family are potential targets of kidnap-for-ransom
groups, the most logical thing to do is to be SECURITY CONSCIOUS always in your person
and in your day to day activities.

The following preventive measures are hereby suggested:

1. Develop a security system in your residence and in your place of


work
2. Be very selective in hiring your employees or your household
help. It is suggested that you let a trusted person secure the
necessary police clearance for them and check their background.
3. Watch out and report to the police questionable presence of
persons loitering near your home or office.
4. While on board your car, be very observant. If you notice you are
being followed or observed by doubtful characters, take note of
the vehicle's description, especially the plate number. If you
have seen the faces/ appearance of the persons falling you, try
to remember their descriptions.
5. In your daily trips from home to office or school and back, try
not to develop a pattern. Do not establish definite schedules and
routes in addition, avoid routes that are deserted.
6. If you are accosted or intercepted along the roadway for alleged
traffic violation and asked to pull over by questionable person,
stop only in a place where there is a policeman or there are
other persons around.

BEST THING TO DO WHEN YOU RECEIVE A KIDNAP NOTICE/CALL:

1. If you receive a kidnap note:


2. Be calm, don't panic,
3. Make written record of the delivery person's description
4. Take note of other circumstances of the delivery (time, manner, etc.)
5. Preserve the note for the submission to the police

During the call:

1. Try to signal someone else to listen on an extension.


2. Keep caller on line as long as possible.
3. Do not antagonize the kidnappers.
4. Give kidnappers a code word whatever identification.
5. Ask for Victim's name, Where and when seized, Victim's code name.

ASSASSINATION

What is Assassination?

Is it is the murder of prominent citizens particularly a head of a state or high official in


government or the killing an important person the violent means, usually from political or
religious motives.

What are the basic causes of assassination?

1. Revolutionary Causes Groups and individuals who become fanatic in


their desires to change an existing government or to establish a
new government often resort to violence by means of
assassination.
2. Economic Causes In some cases assassination are motivated by
beliefs that the victim is responsible for bad economic financial
conditions affecting the nation, a particular group of people,
the assassin or his family.
3. Ideological Causes Some assassination are motivated by beliefs
that the intending victim is impairing the principle of the.
assassin and his associates.
4. Psychological Causes Mental derangement, fanaticism, or
emotionally instability is motivated factors in most, if net ail,
assassination. One or more of these conditions are usually
present in addition to of the other basic causes of
assassination.
5. Personal Causes Revenge, jealousy, hate and rage or strictly
personal drives have motivated personal Causes of assassination.
6. Mercenary Causes Some assassinations have been committed for a
monetary reward. There is frequently a distinct difference
between the basic causes of an assassination and the motives
given by the assassins.

Objectives of VTP Protection


1. To protect, the lives of personalities, important citizens and
their country.
2. To protect those personalities from illegal pressure being put
upon them, such as terrorism, threats and blackmail.
3. To prevent insult on their honor-embarrassment to protected
persons, his government/’ country.

Basic Concepts of Protection

Protection is a buffer set-up thrown around a dignitary who will either prevent an attack or
absorb the shock to such an extent that the result will not be tragic.

It must strive to protect the dignitary wherever he is located but must always be able to move
him to a safer area if the need should arise.

Absolute protection is seldom possible. Therefore, the protective forces should always try to
operate in such a manner that any attempted attack will have the smallest possible chance to
succeed. Every element of protection must be thoroughly planed in advance and every the
protective detail must be scrutinized to make sure it is not playing into the hands of same
attackers

Protection must be surprised proof and flexible enough to instantly respond to any emergency.
There are usually advance clues of a planned attack and the protective system must secure this
intelligence from all possible sources resources and recognize the signs of danger.

METHODS OF ACTION USED BY THE ADVERSARY

1. Physical Assault - The inflicting of physical injury, with the nof disabling the object of the
attack, such as murder and trashing
2. Threats The objectives of threats are to frighten the person and bring about a change of
policy. The adversary may use anonymous letters; radio broadcast and in the adversary
happens to be from a foreign country, he will have additional means at his disposal, such
as the local press, international forum or assemblies.
3. Insult and Humiliation The adversary tries to ridicule the VIP in the eyes of the people,
and will use different means in order to achieve these objectives

INITIAL ASSASSMENT FOR DIGNITARY PROTECTION

Plan for protective operations to include a complete evaluation of the dignitary's level of threat
exposure of possible attackers and the vulnerabilities of the protected. Develop intelligence
profiling, likely scenarios and the projectile’s environment and routes of travel
and security measures already in place. Finally, the identification, selection, and implication of
protective counter measures shall be undertaken.

THE PROTECTION OF VERY IMPORTANT PERSONS (VIP.) IS BASED ON SEVEN


DIFFERENT METHODS

1. Physical Protection This refers to the protection of the VIP and


the installation he uses through the physical presence of his
2. Secrecy Information about the VIP, which might important to
the adversary, will be kept from him.
3. Deception The publishing of deceptive information concerning the
actions of the VIF.
4. Control -Control over the persons coming into the contact with
. the VIP over the object sent to him.
5. Intelligence The gathering of the adversary's intention as to as
assault from the VIP.
6. Instruction The VIP and his Colleagues have to coach as to the
necessary precautionary measures
7. Neutralization of Suspects' Neutralization of people who are
suspected of trying to liquidate the VIF. A good system of
protection will use all of the above mentioned methods. It is not
always necessary to use them at the same time, but generally, it
will be necessary o employ most of them in order to ensure and
efficient protection.

PROTECTION PROCEDURES AND PRINCIPLES

As recognized by most police agencies absolute and complete protection against assassination
of a dignitary is seldom possible. The goal is to minimize the chances of success of any
contemplated attack. The privacy of the dignitary must be considered, and under no
circumstances should he embarrass. Despite this, protection must be provided against hazards
caused by personal designs, accidents or negligence, Procedures are unknown to the public.

Every phase of security must be carefully planned in advance Pertinent factors considered in
this planning include importance the protected persons, political attitude of the local population
distance involved, means of transportation, and duration of the security
Physical protection consists of a series of protective cordons each compelled in itself. These
defensive maybe composed of security personnel, physical barriers, or a combination of both.
An example of this type of security is the protection established will begoverned by the factors
considered in the planning stage.

Security planning should be flexible. Weather conditions and mechanical failures (including
failure if lighting) are two ever- present potentials hazards. The unexpected arrival of a large
number of visitors is another situation frequently encountered. Last minute changes in the
schedule of events occur on occasion. The security must be sufficient trained to cover these
and many more eventualities

Central direction and unity of effort are of special importance because of the nature of this
assignment. The officer-in-charge should be designated with full responsibility for all phases of
the security mission. Close coordination must be established with all local military, police and
civilian authority. The security's responsibility for each phase must be clearly defined.
Arrangements should be made for the local civilian police to control local inhabitants. All
available intelligence channels should be utilized for information of potential danger areas.

The advance party can best accomplish much of this coordination after the official's itinerary is
received.

It is recommended that routes and means of transportation used by (the protected person not
be published It is recognized however that in many instances this is not possible. The itinerary
more of that not receives wide publicity. It is necessary that he address public Audiences,
farewell delegations at bus stations and airports. Careful security of the normal itinerary will
reveal many phases of the transportation that need not be made public. Routes to destinations
must not be revealed. If a series cf appointments is scheduled for a particular location, routes
should be varied. In this regard, close liaison with the Information Officer or individual acting in
this capacity should be maintained. No publicity should be given concerning the mission except
that which the Information Officer may release. Maintaining secrecy on the movements of the
dignitaries is one of the most effective means of minimizing the opportunity for attack.

Personnel for the security details should be outstanding in the performance of duty. They should
be mature and presentable. Normally, accredited military, police criminal investigators are best
qualified for this duty. They must be trained so that each individual, will exactly know what he is
to do in any emergency .Security personnel must sacrifice their lives whenever necessary to
prevent the success of an attack.

USE OF SECURITY PLAN An excellent format for preparation of a protective plan is the
standard operation plan used by the police. The requirements of the plan which are
coordination's or liaison, the itinerary defense area, personnel and equipment requirements post
designation , corporation, communication, public relations, and miscellaneous emergency
information, can all logically included in the normal five paragraphs of the operational plans.The
plan should be on -writing and procedures in sufficient copies, so that it can be staffed with
those officers with whom coordination is necessary. Only key personnel needed to provide a
complete protection are given an orientation on the events of the plan and should be familiar
with the whole operation. Each participant commits the requirement of his specific mission to
memory. For this reason, the plans contained detailed instruction for each post and mission.
The instruction should be simple to understand and easy to execute. The length of the plan will
depend upon the size of the mission to be performed. The itinerary consists of one or more men
stationed or in fixed post. Police should know the identity in the party of protected official. The
attitude of the protected official must be estimated by the police officer. In the most instances
the presence of security personnel, is unpleasant to the dignitary. This
is understandable in view of lack of privacy. The security must be aware of this. Natural
reaction, actually anticipate it, and they observed adherence to strict policies of non irritating
conduct.

In the initial planning stages, all potential embarrassments should be avoided. It is normally a
good policy to avoid direct contact with the dignitary on details of arrangements. The Officer-in-
Charge should coordinate with the member of the official party who designated for this purpose.
When appropriate, they offer suggestion tactfully. The chief of the escort acts exercises
enforcement power over the security of an important person only when necessary with caution
and diplomacy, any violation of the security measures for important persons is brought to the
attention of the chief of the escort or guard. The security police officer insures that the guards
comply with every detail of their instructions.

Restriction in the circulation of individuals should.be strictly enforced. Before any person is
allowed to approach the important person of his effects, he is checked. The security should not
enter into conversation between the dignitary and other individuals. Information should be given
only when solicited. In all dealings with the protected person and his associates never volunteer
for uncalled for personal favors. Deliberates attempts to ingratiate themselves only serve to
degrade the security mission and result in an undesirable relationships if the official members if
his party is bothered. Security personnel should react accordingly. The protected person should
set the standards of the relationship. In the absence of such standard actions of the security
detail should be formal.

THE USE OF WEAPONS

There is always a danger of undue alarm due to accidentals discharges, and the injury of
innocent persons, when weapons are carried. All personnel should carry a bolstered sidearm of
at least, 38 or 9mm caliber. Automatic pistol should contain a fully loaded magazine with a
round in a chamber and the safe on. In certain areas, when attackers are made in force by
armed mobs, the appropriate weapon or machine gun can be used. The machine gun can also
use when attacks are made from the vehicles, and when the attackers are behind the shields or
barricades. Riot or shotguns should be available when the attack is made in a congested area
where there is danger of injuring innocent people if long range weapon are used. They are also
effective against mobs using "Banzai" type of attacks. The use of police nightsticks and tear gas
will break up and confuse the crowd, making their movement by the protective force easier

CROWD CONTROL
The protective personnel should understand the principles of crowd control. They should not
show prejudice, sympathy, or become involved in grievances of the crowd. When force is
necessary, the protective force should move with the speed and surprises. At the first sign of
disorder all leaders should be apprehended. The real troublemakers are usually to the rear of
the crowd. Protective forces should not be fooled or deterred by the mob leaders who-arouse
and use women and children in front ranks to shield themselves from aggressive action by the
protective personnel. The crowd's retreat should never be hindered, it should be moved in the
direction where there is no space to disperse

AREAS AND BUILDING SURVEY

All areas to be occupied or visited by the protected person should be surveyed in advance. The
procedure to be prescribed of building inspection is complete and thorough. In many instances,
the dignitary is a state visitor of the nation; on other occasions he maybe the houseguest of
other high ranking government officials. At times, he may stay in hotel occupied by numerous
other guests.

Certainly, all the inspection listed in this section are feasible. The officer -in charge and his
advance party use common sense of sound judgment in establishing the best security possible
under existing circumstances. In some instances, the advance party can facilitate security
measures by arranging for a separate floor or wing of a hotel as a billet for the party. Normally,
billeting arrangements are included in the itinerary prior to the start of the security detail. Proper
building inspection entails a thorough examination from roof to basement. Blueprints of the
building should be obtained. Rooms and hallways are measured visually and compared with the
dimensions trained driver and the type of vehicles to be used should be given therefore better
protection for the dignitary recommended. Route survey should be conducted in advance before
actual travel and protective details should be equipped with radio communication processing
encoding-decoding "scrambling'' capabilities. All auto motive equipment should be excellent
mechanical condition and should be regularly inspected for signs of tampering and bullet proof
if possible. The driver should be well trained and reliable. Vehicles must be secured at all times
during security missions. Escort vehicles should precede the protected vehicle as closely as
possible consistent with driving safety. An advance car should precede the convoy by
approximately one-half kilometer to observe hazards and reports on unusual conditions. A
reserve vehicle should follow the convoy as a short distance from the rear for use in emergency.
The escort follow- up and all security vehicles should maintain radio contact. Whenever minutely
examined for cracks, evidence of recent repairs, or any
unnatural appearance. Suspicious areas should be .examined satisfactory by reliance on
operating or maintenance personnel. All furniture are carefully examined,. All doors opened and
drawers are removed as check for concealed compartments. All wires leading into or leaving the
indicated in the building plan to locate any hidden passage or alcoves. Each room is examined
systematically. Walls, ceilings, are mentally divided into the three - foot squares and each
square various rooms are traced and all devices connected with them identified. Heating
radiators, plumbing, pipes and.similar equipment are carefully examined for dummy
installations. All locks and locking mechanisms are inspected. After the inspection is completed,
the room or building is secured until used.
Protective Techniques

PROTECTION WHILE RIDING IN VEHCLE –the selection of security trained driver and the type
of vehicles to be used should be given thought, then a closed car provided with greater
concealment and therefore better protection for the dignitary recommended. Route
survey should be conducted in advance before actual travel and protective details should be
equipped with radio communication processing encoding-decoding "scrambling'' capabilities. All
auto motive equipment should be excellent mechanical condition and should be regularly
inspected for signs of tampering and bullet proof if possible. The driver should be well trained
and reliable. Vehicles must be secured at all times during security missions. Escort vehicle
should precede the protected vehicle as closely as possible consistent with driving safety. An
advance car should precede the convoy by approximately one-half kilometer to observe hazards
and reports on unusual conditions. A reserve vehicle should follow the convoy as a short
distance from the rear for use in emergency. The escort follow- up and all security vehicles
should maintain radio contact. Whenever possible, a member of the security detail is placed in
the protected person’s vehicle. In extreme conditions, when greater security is necessary, one
or two dummy vehicles, carrying individuals who are similar in appearance to the protected
person, may be included in the convoy. Fixed post and bridges, underpass, and traffic stops
must be secured when deemed necessary. An alternate route should be arranged for
emergency the convoy will confirm with the local traffic regulations. Evaluation of such situation
is made to determine the degree of security, which is practical and necessary.

TRAVEL BY TRAIN generally, the greatest potential security hazard exists at the points where
the escorted person boards or leaves the brain. Usually this is a congested area with numerous
individuals carrying all sorts' bags, packages, and containers. In the study of assassination
techniques, the large number of attempts in this location is not worthy. When possible the area
should be closed to the public or the dignitary's party, it should be attached to the rear of the
train where feasible. The members of the security details should be in control of all entrances of
the car. When the train is stopped, they assume position covering all avenues approach to the
car. If the protected person leaves the train for a temporary period constant security should be
maintained on the train until the protected person returns and the train departs. Prior
coordination should be made with railway officials for exact scheduling stop en enroute.
Railroad security and local police at scheduled stops can contracted for standby assistance.
When deemed necessary and rear guard train may be placed on the other cars of the seated
among passengers, as an additional safeguard.

TRAVEL BY AIR normally, a special plane is placed for transporting the dignitary and his official
party. The technical safety factors, such as clearance of operating personnel and control of
flight, are responsibilities of the operating agency when performed by military forces. The most
dangerous periods , as in train, movements are boarding and departure times. All structures
offering observation of the boarding shall be adequately secured either by- closing of when not
used or by strategic placement of security- details. When a large crowd is expected for takeoff
ceremonies, barricades and uniformed military or police force in sufficient number should be
included in the planning. The plane designated for the important person should be kept away
from contact with the plane. When the designation is another base, advance arrangement
should be made with the Air force office for additional security and transportation is normally
scheduled for the important person and his party. It should riot be forgotten however, that
arrangement must be made for the accompanying security personnel.

TRAVEL BY SMALL WATERCRAFT when planning for a cruise the boats selected should be of
types and sizes capable of withstanding weather and surf conditions that may be encountered.
A thorough inspection of the boat designated for the protected should be made in conjunction
with responsible ship personnel. The inspection is primarily for unauthorized persons stowing
away for any suspicious objects or packages. An additional check should be made for adequate
lifesaving and emergency facilities. Security personnel should be alert for either craft
approaching the dignitaries' boat. When feasible, arrangements should be made for beat to
follow the protected person's boat..

PROTECTION WHILE WALKING• one of the best protective measures is varying the selection
of walking times and routes. The security- details accompanying the dignitary should be
positioned to cover all avenue o' access, additional security personnel should cruise in the
immediate vicinity. Local police agencies can be of special value in adding background security
in these instances.

PROTECTION AT PUBLIC ASSEMBLIES a careful search and inspection of the area should be
made at the time protection is established. A physical defense zone should be set up
immediately around the dignitary, and additional concentric defense area should be added to
the greatest possible extent. Protection in the defense zone is provided by protective personnel,
permanent or temporary type barricades, and a combination of the above techniques. Screening
points to admit passage of authorized persons and material should be established. Observant
and inconspicuous personnel should be patrolled among the crowd. Maximum use should be
made of security' aid such as flood and spot lights, communications, emergency equipment,
special weapon, locks, barricaded area, and helmet proof equipment, and materials.

PROTECTION WHILE IN A RESIDENCE the protective details should occupy at least one
protective ring. At least two additional areas should be established in the outer perimeter. There
must be a pass system for the staff and frequent visitor. Food supplies should be checked and
food selection and handling should be controlled. Mail and packages should be fluoroscope.
Periodic inspection should be done on premises for safety hazards, lethal devices such as
bombs, traps and sufficiency of security equipment. Adequate communication should be
maintained, and all possible emergency situations should be considered.

PLANNING CONSIDERATIONS

The nature of the assassin

The assassin is a discontented individual who decides to kill the person whom he thinks is
responsible for his difficulties. He attempts to gain advantage by the use of surprise. A well
trained protective force that he likely to be caught does not discourage him. Assassins do not
have distinct features. They are not concerned about death. Many of them suffer from mental
disorders.

A mentally unbalanced person is not necessarily stupid and as a


I matter of fact they can be ingenious.

 Assassination of VIP normally features the following:The location of victim at a given


time will be known in advance
by the assassin.
 The assassin with his weapon will choose a position giving him
access to his victim
 The protection detail will be attracted by some diversionary-
interest or otherwise inattentive

Break down of planning

BEFORE: plan must be extensive ant thorough as follows:

 Plan should be in writing


 Plan should be specific - complete for each post and for each
person involved.
 Plan should be simple to understand and easy to execute.
 Plan should be carefully read and committed to memory.
 Coordination among the different agencies must be laid out.
 Details and schedule of activity contemplated should be in
advance.
 Define and establish the defense area.
 Number of personnel should be determined
 The accessory equipment should be itemized and the distribution
shown
 Mean of communication

DURING:

 Protective force should function as a team


 The aim should be that nothing occurs that might jeopardize the
safe of the VIP

AFTER

 Summarize things that happened in the operations.


 Evaluate individual performance, bring out the weak points and
suggestions for improvements.
 Encourage individual members to discuss their particular
assignments.
 Encourage group discussions
 Central summarization with outlook on succeeding operations.

'

BOMBING

(Incident Awareness)

IS BOMBING A SERIOUS SOCIAL PROBLEM?

Bombing is a very serious problem as when a bomb explodes,


casualties and destruction of property is very essential. When a bomb incident occurs, people
are affected directly and indirectly. Work stoppage (evacuation) , tension, fear or panic is
felt by the people within the area. Even if a person is not directly affected, just hearing or
reading the news about such incidents can make him apprehensive. Also, some people could
took the chance as leverage to scare or threaten would be victims for some reason like extortion
or just for pranks. Bomb incidents include bomb threat and actual bombings. It can happen
anywhere and anytime.

With the recent advancement of science and modern day technology, bombs becomes more
sophisticated, smaller in sizes, easy to handle

The tactics common to terror group is bombing. Of all terrorists incident records. 70 % were
attributed to terrorist.

1. The bomb is a popular weapon because it is cheap to produce, easy to make, has
variable uses and is difficult to detect and trace after the event. Investigations have
revealed that the targets for "terrorists bombing" are not selected at random. The modus
operandi for selecting the target and planting the explosives appears to follow this
pattern:
2. The target is selected because of political or personal gain to the terrorists. It is then
under surveillance to determine the entrances and exits most used Reconnaissance of
the building is made to locate an area where a bomb can be concealed, do the most
damage and here the bomber is least likely to be observed.
3. A test dry run of the plans is often made. After the dry run and at a pre-determined time,
the. Building is infiltrated by the bomber to deliver the explosive or incendiary device.
4. The device maybe partially pre-set prior to planting. If it is
fully set and charged, it is simple matter for one or two of the
group plan the device in a pre-selected concealed area.
a. This can be accomplished in a minimum of time. If the devices
is not fully set and charged, one member may act as lookout
while others arm and place the device.
b. Most devices used for the destruction of property are usually
of the time delay type. These devices can be set for
detonation to allow sufficient time for the bomber to be at a
considerable distance away before the bomb threat call is made
or the device is detonated.

HOW TO PREPARE

The terrorist have developed their plan of attack and the following procedures are suggested to
business and industry for coping with the bomb threats and actual bombings.

a. Contact the police, fire department and other local government agencies to determine
whether any has a bomb disposal unit. Under what condition is the bomb disposal unit
available. What is their telephone numbers? How can you obtain the services of the
bomb disposal unit in the event of a bomb threat? Will the said unit assist in the physical
search of the building or ill they only disarm or remove the explosive device.
b. Establish strict procedures for control and inspection on packages and material entering
areas.
c. Develop positive means of identifying and controlling personnel who are authorized to
access to critical areas.
d. Arrange if possible, to have police, fire representatives with members of your staff,
inspect the building for areas where explosives are likely to be concealed. This may be
accomplished by reviewing the floor plan of the building.
e. During inspection, you should keep particular attention to rest rooms, storage, crawl
areas, trash bins, main switches, etc. it can give you an idea where a rime delayed
explosive device or

f. All security and maintenance personnel should be alert to suspicious looking or


unfamiliar persons or objects.
g. Instruct security and maintenance personnel make periodic checks
of all rest rooms, stairways and areas of the building to assure
that unauthorized personnel are not hiding or conducting
surveillance of the area.
h. You should assure adequate protection for classified documents,
proprietary information and other records essential to the operation of your business. A
well planted, properly charged device could, upon detonation, destroy those records
needed in day to day operation
i. Instruct all personnel especially those at the telephone
switchboard in what to do if a bomb threat call is received.
a. As a minimum, every telephone operator or receptionist should
be trained to respond calmly to a bomb threat call. To assist
these individuals, a bomb threat checklist should be kept
nearby.
b. in addition, it is always desirable that more than one person
listen in on the call. To do this, have a covert signaling
system to the second reception room.
c. A calm response to the bomb threat could result in getting
additional information; this is especially true if the caller
wishes to avoid injuries or deaths. If told that the building
is occupied and can not be evacuated in time, the information
on the bomb location. Organize and train an evacuation unit consisting of key
j. management personnel. The organization and training of this unit-
must be coordinated with other tenants of the building.

PHYSICAL SECURITY PLAN - physical security measures taken for the protection of property,
personnel, materials, facilities, and installation against unauthorized entry, trespass, damage
sabotage or other illegal or criminal act its deal with the prevention and is designed to protect
against not only bombing incidents, but a full range of possible attacks

THREE PRE-REQUISITES FOR A SUCCESSFUL BOMBING:

a. ACCESS TO ECPLOSIVE
b. KNOW – HOW
c. ACCESS TO TARGETS

Particular attention must be given to the third pre- requisite because this is the one area which a
law enforcing organization has the greatest opportunity to deter a bomb incident. If adequate
preventive measures and physical security precautions are established; the opportunity to
obtain explosive emplace bombs will be reduced. In addition, an effective bomb threat and a
well-rehearsed, procedure for handling bomb threats and incident will reduce the chances a
bomb being successfully detonated.

COUNTER MEASIRES AGAINST SABOTAGE BY EXPLOSIVE/ INCENDIARY ARE

 PHYSICAL SECURITY EDUCATION


 USE OF EFFICIENT SECURITY FORCE
 IDENTIFICATION AND MOVEMENT CONTROL
 USE OF PHYSICAL SECURITY AIDS
 DESIGNATION OR RESTRICTED AREAS
 REARCHES OF INCOMING VEHICLES
 EMERGENCY PLANNING
 GOOD HOUSEKEEPING
BOMB INCIDENT PLAN - A plan providing detailed procedures to be implemented when a
bombing attack is executed or threatened. Elements of his plan are;

o AUTHORITY AND CONTROL


o WHO WILL BE INCHARGED OF THE INCIDENT?
o WHERE WILL CONTROL CENTER BE LOCATED?
o HOW WILL CRITICAL DECISIONS BE MADE?
o WHO WILL MAN THE CONTROL CENTER?
o WHAT PREIMARY AND ALTERNATE COMMUNICATION SYSTEM WILL BE DURING
THE INCIDENT?

THREAT EVALUATION

Characteristics of the threatened such as age ethic grouping, and


physical and mental condition

 Background noises (telephone threat) that give indications of caller location


 Target identification, did the threat indicate a valid target?
 Technology; is the device described technically logical and possible?
 Analysis of recent /local bombing. If the evaluation of the
threat indicates that the threat is valid, action is required to
maintain safety of personnel. Secondary consideration is given to
damage reduction.

EVACUATION

A number of factor may influence the decision whether or not to evacuate. Threat assessment is
the primary consideration. Also, the most likely place for a device to be located is on the exterior
of the building. Evacuation to the outside of the building may increase the danger to personnel.
The second most likely places to conceal a are those areas of accessibility to the public, i. e.,
hallways, lobbies, and restrooms. Evacuation of personnel through public areas may increase
the hazard. Secondary assembly points should be established in the event the device is located
at/ near the primary assembly point.

An alternative to total evacuation is partial evacuation, which is effective when the threat
indicates the specific location of the device. Partial evacuation requires a high degree of
planning.

Should a device be located, the area around the item as well as the floors above and below the
suspected item should be evacuated immediately.

Searched Procedures

 WHAT WILL BE BE SEARCHED?


 WHAT SEARCH TECHNIQUES WILL BE EMPLOYED?
 WHO WILL SEARCH?
The search must be thorough, systematic, and quick. The bomb threat plan should Include floor
diagrams and room search cards. These search, prevent duplication of effort, and prevent areas
from being overlooked

The search must be thorough, systematic, and quick. The bomb threat plan should Include floor
diagrams and room search cards. These the garage search. The search starts at the lowest part
of the building, i. e. basement garage, or bottom floor.

The building search should start simultaneously at four place: the exterior search, public search
area, the detailed room search, and the garage search. The search starts at the lowest part of
the building, i. e. basement garage, or bottom floor.

As the exterior search and public area search teams complete their tacks. They will supplement
the detailed room search teams in progress.

Two - person teams have proven most effective in searching must area. Exceptions would be
for search or very large areas such as parking garages and auditoriums.

Except for the most unusual circumstances for cip and or presidential technical security
measures. End/bomb squad and military/' police will not be used to search for reported
explosive device in community areas, building and offices. Rather, such searches must be
conducted by designated individuals familiar to the area and its contents. If an unusual items is
found, end is to neutralize and evacuate the device for disposal. Law enforcement personnel
are to be employed around the threatened area to control traffic and provide other regulatory
service.

DAMAGE REDUCTION

Person to Person (Indirect5

 Notify you supervisor immediately .


 Keep the person making the threat or indicating knowledge of a threat under
surveillance until relieved by your supervisor.
 Take note of the age, height, weight, sex color of eyes, hair, skin, clothing, unusual
characteristics such as lameness, twitching or any peculiarities of the person under
surveillance,. Observe for other personal defects.
 If the person leaves the scene, take note of the transportation used, such as bus, taxi or
car, note the make, model, color,
plate number and marking of the vehicles used.
 Pinpointing the exact location of the bomb must be the primary concern. The following
procedures apply when the location of the is known:

Inform immediately you supervisor or officer

1. Coordinate with the nearest police 1 unit how avail services of the bomb squad
2. Alert fire station and medics
3. Cordon the area

BOMB IDENTIFICATION AND DETECTION

Usually, bombs that are used for terroristic purposes are disguised and are contained in any of
the following : GIFT WRAPPED PACKAGES, BISCUIT CANS, FRUIT COCKTAIL BASKETS,
ATTACHE CASE/SUIT BAGS, LUNCH BOXES, LAUNDRY BAGS, SHOPPING BAGS,
ENVELOPE, BOOKS, CLUTCH BAGS, BETTERS TRASH BOXES, GARBAGE CANS,
LADIES BAGS, CAR/ BOXES, CARTOONS.

HOW TO DETERMINE IF BOMB EXISTS

a) By using visual inspection without the use of any instrument or


apparatus or touching the suspected object.
b) Visualize the suspected object at a distance see if there is any
relation or connection to its surroundings. If none, take a
closer look to see if there is or there are protruding wires or gadgets.
c) Check without touching if the suspected object emits smell of gas
or commonly smelled chemicals.
d) Check if the presence of the suspected object in the area is
unseals or strange.
e) Be quiet and listen if there is a tic-tac sound of a clock.

LOCATION OF BOMBS

The location of the bomb at the target site is usually determined by three criteria:

a) The location must be accessible to entrances.


b) The location must be accessible to exits, but isolated enough for
the bomber to conduct his mission.
c) The location would also be as place where the most structural
damage to the building would occur.

WHAT TO DO IF THE SUSPECTED BOMB IS LOCATED

Discovery of what appears to be suspicious material as a result of telephoned information or


accidental discovery, calls for action on the part of the individual only to a limited extent.
Evacuate the personal to at least 300 feet away from the building/bomb. Turn off the electrical
and gas units. Attempts should be made to move, alter, open or examine the article. Above ail
"Don't panic".

Once it has been determined that explosive items on inspected package exist and while
awaiting for the arrival of eod/bomb squad personnel, start the protective works by utilizing
minimum number of person for reason of safety such as VENTING which is the opening of
doors and windows to minimize the blast effect, BUSTTRESSING which is sandbagging
adjacent walls to prevent blast and shock damage to adjacent rooms and BAFFLING which is
the placing of sandbags around the bomb to minimize blast fragment damage.
METHODS OF DELIVERY

Mail, planted {booby trapped) Thrown, Projected, Delivered by agents

WHAT TO DO WHEN BOMB EXPLODED

Alert personnel for possible additional bombs, secure bombing scene and evacuate the injured,
leave obviously dead personnel, when fire occurs after explosion, assist in putting off the fire
and collect and preserve evidence.

DON'T'S IN HANDLING SUSPECTED BOMB PACKAGE

 Do not attempt to open the package


 Do not submerge in water due to conductivity electric circuit and
the possibility of violent reaction of chemical.
 Do not indiscriminately shake or jar suspected package due to the
possibility of disturbing the trigger mechanism.
 Do not puncture or cut the box with metallic object as the
possibility of an electronic probe may be employed
 Do not cut string or unwrap package due to the possibility of
pressure release types devices.
 Do not accept identification markings on any suspected packages
as legitimate
 Do not show allow radio transmission near the vicinity if
suspected, package explosion may occur due to static electricity
by transmitter.
 Do not pass metallic tools or things over or near the vicinity of
suspected package until identification contents are made due to
magnetic device present
 Do not switch on lights or any electrical switches just to light
 Do not use siren of police fire or ambulance in the
 Do not use photoflash in the immediate area
 Do not underestimate the size of the package like a
cigarette or a lighter it could be a powerful explosive
all do not panic.

THREE CHARACTERISTICS OF A BOMBER

1. ON PSYCHOLOGY
 Several forms of bombings are attractive to the radical mind.
 Bombing historically is linked to anarchy and classical revolution
 Satisfying feeling of conspiracy, danger action drama and finally group
excitement
 Disassociation psychologically from any resulting death or
injury.
2. AS TO TECHNOLOGY
 Commercial explosive materials are not necessary to construct effective bombs
 Underground literatures and legitimate publications are available
 Contrary to popular beliefs college of high school students taking up chemistry
subjects have the capability making bombs.

3. AS TO SECURITY
 Successful bombing destroy the kind of evidence that can
lead to conviction of bombers
 Fingerprints, bloodstains and tool -marks offer no threat to
the careful bombers.
 Eyewitnesses and incriminating evidence are frequently not
available in bombing scene

TERRORISTS ATTACK CYCLE


TARGET SELECTION
TARGET STUDY
ATTACK
- PLANNING
ATTACK REHERSAL
DEPLOYMENT
TARGET IDENTIFICATION

MPORTANT REMINDER:
BE VIGILANT ON TERRORISM

THAT CITIZENS CAN DO IN CASE OF BOMBING AND BOMB THREATS?

Bomb threats and bombing incidents are the handwork of terrorist.

They intend to:

 Harm civilians
 Disrupts business activities
Embarrass the government
 Sow anxiety and fear in the minds of the people

All sectors of the community must be against criminality and terrorism. While the government is
doing everything within its authority and power to protect the people and put a stop to
these terroristic acts the pro-active participation of the citizenry is of utmost importance.

No one should allow himself/herself to be cowed into fear. Everyone should instead live his/her
life normally.
SIX – POINT CITIZEN ACTION IN CASES OF BOMB THREATS AND BOMBING

 stay cairn
 take proper precautions at home and work
 immediately report incidents or information to hotline 117, to
text 2920 to magic eye 8383203 or to other proper authorities
(i.e.) Barangay and /or other local government official local
police
 delete do not forward rumors or unverified report receive through
text messages
 get back to regular routine and day to day activities business as
usual soon as possible
 Organize/actively participate in monitoring groups in your
neighborhood and/or in your work place.

HOW TO STOP A BOMB?

Be cautions when you spot the following:

 STRANGE, UNSUAL, UNATTENDED BAGGAGE, BAGS, BOXES OR PA.RCEL3


 TIGHTLY WRAPPED AND COMPACT PACKAGES OR PARCELS
 OILS STAINS ON AN ENVELOPE OR WRAPPING
 A TICKLING SOUND SIMILAR TO THAT OF A CLOCK IS HEARD FROM A
BAGGAGE, BOX OR BAG
 PRESENCE OF ELECTRIC WIRES, PLASTIC CORD AND BATTERIES IN A
BAGGAE BOX OR BAG
 DELIVERY OF UNEXPECTED PACKAGE OR PARCEL
 Keep in mind that bombs can be devised to look like almost anything
and can placed or delivered in many ways.

HOW TO KEEP ESTABLISHMENT SAFE FROM BOMB- THREATS

 Strictly implement the inspection of bags, knapsacks, boxes,


merchandise, etc. of all the people entering malls, threats and
other business establishments.
 Cautiously inspect suspicious looking packages, paper bags and.
other similar packages
 Instruct security personnel/employees to immediately contact
proper authorities when suspected bombs are noted.
 Be observant of cars/motorcycle riding individuals who are
suspiciously and constantly watching establishments.
 Be cautions in opening envelopes and pack ages sent by unknown
individuals with no return address.
 Safeguarding especially from unauthorized persons restricted areas
of the establishments.
WHAT ARE THE MATERIALS ./ITEMS TO WATCH IN CONDUCTING BOMB THREAT
RELATED INSPECTIONS

 Aluminum shell 2-4 inches which


o Looks like an umbrella rod and/or
o With sotanghon noodle size wire that comes in pair.
 Battery operated alarm clock sometimes with two protruding rods.
 Black powder
 Oily stain which smells like gas/diesel
 Small, white, bead like rice grains, light weight pungent odor (urine-like color) and nay
contained in bottles, boxes, cans and plastic bags and become oily when exposed to
air.

SPECIAL WEAPONS AND TACTICS


(SWAT: Response to Crisis)

Tactical Crisis Management


SWAT Teams

SWAT teams are highly trained police units. A unit is a small group within a larger group. SWAT
stands for Special Weapons and Tactics. Tactics are actions aimed at solving problems.

SWAT team members are weapons and tactics specialists. A specialist is a person trained for a
particular job. SWAT team members use their special weapons, tactics, and training to protect
the public. They handle police emergencies. An emergency is sudden and risky situation.

Police send SWAT teams to any kinds of police emergencies. The emergencies often involve
one or more heavenly armed suspects. A suspect is a person believed to have committed a
crime. SWAT teams work on hostage situations. A hostage is a person held against his or her
will.

SWAT teams perform many jobs. They come to robberies that are in progress. They help guard
government officials. They help stop terrorists. A terrorist is a person who tries to get what he or
she wants by threatening or harming others. SWAT teams also patrol high- crime areas.

SWAT Team Names

SWAT teams can be part of city, county or state law enforcement agencies. A law enforcement
agency is an office or department that makes sure people obey laws. Police department and
sheriff departments are examples of law enforcement agencies.

Law enforcement agenci.es use different names for their SWAT teams. The names include
Emergency Service Unit and Emergency Response Team. They also include Mobile Emergency
Response Group and Equipment (MERGE) and Tactical Response Team.
Table of Contents

1. A ~tumor is a new growth involving abnormal enlargement of body issues. Brain tumor
can cause a variety of personality alterations, and it may lead to any neurotic behaviour
and consequently psychotic behaviour.
2. Abnormal behavior (maladaptive/maladjusted behavior)-A group of behaviors that is
deviant from social expectations because they go against the norms or standards
behavior of society
3. Acting out - reduction of the anxiety aroused by forbidden
4. Administrative Personnel- personnel assigned to OSC 10
keep written records of events, in coming or outgoing
communications
5. Aesthetic Needs - our motivation for beauty and order.
6. Amnestic Syndrome- is the inability to remember on going
events more than a few minutes after they have taken place.
7. Analism (anillingus)- licking the anus of the sexual
partner
8. Anti – social Personality Disorder It is characterized by continuing, violation of the right
of others through aggressive, anti-social behavior without remorse or loyalty to anyone.
9. Anxiety (Psychological Perspective) - Stressful situation that become extreme may result
to maladaptive behavior.
10. Anxiety disorders are commonly known as "neurotic fear" when it is occasional but
intense, it is called "panic". When it is mild but continuous, it is called "worry" which is
usually accompanied by psychological symptoms such as sustained muscular tension,
increases blood pressure, insomnia, etc.
11. Anxiety -is an intangible feeling that seems to evade any effort to resolve it. It is also
called neurotic fear. It could be intense; it could be low and can be a motivating force
(Coleman, 1980).
12. Approach-Avoidance Conflict - a person faces situations having
both a desirable ana undesirable feature. It is sometimes
calied "dilemma", because some ' negative and some positive
features must be accepted regardless which course of action is
chosen.
13. Arousal Insufficiency (frigidity)- a sexual disorder characterized by partial or complete
failure to attain the lubrication or swelling response of sexual disorder characterized by
partial or complete failure to attain the lubrication or swelling response of sexual
excitement by the female partner
14. Arson This is use to destroy or to disrupt public utilities, political HQs and industrial
facilities
15. ASSASSINATION Is it is the murder of prominent citizens particularly a head of a state
or high official in government or the killing an important person the violent means,
usually from political or religious motives
16. Assassination The oldest but the commonly used terrorist tactic where targets are often
police or military officials or political features and they always claim responsibility of
assassination
17. Asthenic Disorders An anxiety disorder is characterized by chronic mental and physical
fatigue and various aches and pains. Symptoms include spending too much sleep to
avoid fatigue but to no avail, even feel worse upon awake, headaches, indigestions,
back pains, and dizziness.
18. Auto-sexual (self-gratification/masturbation)- it is also
called "self-abuse", sexual satisfaction is carried out
without the cooperation of another.
19. Avoidant Personality Disorder It is characterized by hypersensitivity to rejection and
apprehensive alertness to any sign of social derogation. Person is reluctant to enter into
social interaction
20. Awareness- periodic briefing, public info drive, printed materials.
21. Behavior refers to actions or activities
22. Bestiality- the sexual gratification is attained by having
sexual intercourse with animals
23. Biological or Physiological Needs - these motives include the need for food, water,
oxygen, activity, and sleep.
24. Bipolar Disorders- Those experienced by patients with both manic and depressive
episodes.
25. Blocked of Distorted Personal Growth (Humanistic Perspective) - presumably, human
nature tends towards cooperation and conductive activities; however, if we show
aggression, cruelty or ether violent behavior, the result will be an unfavorable
environment.
26. Borderline Personality. Disorder It is characterized by instability reflected in drastic mood
shifts and behavior problems. The person usually displays intense anger outburst with
little provocation and he is
impulsive, unpredictable, and periodically unstable.
27. Catatonic Schizophrenia- it is the altering period of extreme withdrawal and extreme
excitement. The individual may talk or shout incoherently and engage uninhibited,
impulsive behavior.The person may be dangerous.
28. Childhood Trauma - the experiences, which affect the feeling of security of a child
undergoing developmental processes. The development processes are being blocked
sometimes by parental deprivation as a consequence of parents or lack . of adequate
maturing at home because of parental rejection, overprotection,
restrictiveness, over permissiveness, and faulty discipline.
29. Cognitive need - our motivation for learning and exploration
30. Common sense science of behavior has one of its goals the culmination of widespread
misconceptions that are now considered valid such as numerology and palmistry,
although still accepted by some people today predict events and conditions
31. Communication Team- responsible for ensuring effected^
communication between OSC and other units or sub-
units.
32. Compulsive Personality Disorder It is characterized by excessive with rules, order, and
efficiency that everyone does things their ways and an ability to express warm feelings.
This person is over conscientious,
serious, and ‘with difficulty in doing things for relaxation
33. Conflict - refers to the simultaneous is arousal of two or more incompatible motives
resulting to unpleasant emotions. It is a source of frustration because it is a threat to
normal behavior (Bernstein, et al 1991)
34. Conscious or Unconscious Behavior is conscious when acts. are within the level of
awareness. It is unconscious when acts are embedded in one's subconscious-unaware.
35. Conversion Disorder (Hysteria) It is a neurotic pattern in which symptoms of some
physical malfunction or loss of control without any underlying organic abnormality
36. Coprolalia- the use of obscene language to achieve sexual
satisfaction.
37. Criminal Behavior The disorder used to describe the behaviour of a person who serious
crimes from individual to property crimes and the disobedience of societal rules in
general.
38. criminal psychology is a sub-field of general psychology where criminal behavior is only,
in part by which phenomena psychologists choose to study
39. Criminals- these are people who commit terrorist acts for personal rather than
ideological gains. Some of the terroristic acts such as kidnapping are well-planned, but
happen as a result of the fast response time by LEAs to an ongoing crime. For instance,
a number of bank robberies nave evolved into unplanned hostage situation when
policemen arrived in response to an alarm robbery in progress.
40. CRISIS – is derived from the Greek "krisis" which means separate. It is the turning point
decision in a process of an affair or a series of events.
41. crisis management is the proper utilization of all available resources and the formulation
of all available resources and the formulation of policies and procedures to effectively
deal with the progressive sequence of events (crisis) and sudden or unforeseen state
(emergency)
42. Cunnilingus- sexual gratification is attained by licking
the external female genitalia.
43. Cyclothymic Disorders -A less severe form of bipolar disorder
44. Delirium- the severe impairment of information processing
in the brain affecting the basic process of attention,
perception memory and thinking.
45. Dementia- deterioration in intellectual functioning after
completing brain maturation. There is defect in the process of
acquiring knowledge or skills, problem solving, and judgment.
46. Denial of Reality – protection of one – self from unpleasant reality by reality by refusal to
perceive or face it. Simply by avoiding something that is unpleasant
47. Dependent Personality Disorder It is characterized by extreme dependence on other
people- there is acute discomfort and even panic to be alone. The person lacks
confidence and feels helpless.
48. Depersonalization The loss of sense of self or the so-called out of the body experience.
There is a. feeling of detachment from one's mental processes or body or being in a
dream state. Cases of
somnambulism -(sleep walking) may fall under this disorder.
49. Depressive DisordersMajor depressive Disorders- Patients with-depressed mood have a
loss of energy and interest, feeling of guilt, difficulty in concentrating, loss of appetite,
and thoughts of dearh or suicide, they are not affected with manic episodes.
50. Displacement- --discharging pent-up emotion on objects less dangerous than those that
with the emotion.
51. Dissocial Personality is the term used to refer to these individuals (not anti-social) but
particularly those who violate law and practice "crime it's a profession
52. Don Juanism- the act of seducing women as a career without permanency of partner or
companion
53. Double Approach Conflict - a person is motivated to engage in
two desirable activities that cannot be pursued
simultaneously.
54. Double Avoidance Conflict - a person faces two undesirable
situations in which the avoidance of one is the ' exposure to
the other resulting to an intense emotion.
55. Dyspareunia- it is called painful coitus/ painful sexual acts in women.
56. Dysthymic Disorder- A mild form of major depressive disorder.
57. Economics Crisis- the deprivation of the basic necessities of life like food and material
things.
58. Education - education on terrorist tactics, sparrow opens an: the like."
59. ego is the only part of the conscious personality. It’s what the person is aware of they
think about themselves, and is what they usually try to project toward others
60. EMERGENCY – is derived from the Latin word "emergencia" which means
dipping/plugging. A sudden condition or a state of affairs calling for an immediate action
61. Emotional Aspect - this pertains to our feelings, moods, temper, and strong motivational
force.
62. Emotional Crisis- when an individual is affected by negative feelings like emotional
disturbances, fear, etc.
63. Emotional Insulation - withdrawal is passivity to protect self from hurt.
64. Environmental Factors This is refers to anything around the person the influences his
action. James Coleman in his Book mentioned some environmental factors such as:
65. Erectile Insufficiency (Impotency)- it is a sexual disorder characterized by the inability to
achieve or maintain erection for successful intercourse.
66. Esteem Needs. - Our motivation for an honest, fundamental respect
for a person as a useful and honorable human being.
67.
Exhibitionism- it is called "indecent exposure",
intentional exposure of genitals to members of opposite sex
under inappropriate conditions.
68. Family Background – it his is a basic consideration because it is in the family ’whereby
an individual first experiences how to relate and interact with another. The family is said
to be the cradle of harmonious relationship or a pathogenic family structure: the
disturbed family, broken family separated or maladjusted
relations.
69. Fantasy- the gratification of frustration desires imaginary achievement. Paying attention
not to what is going on around him but rather to what is taking place in his thought
70. Faulty Learning (Behavior Perspective) - The failure to learn the
necessary adaptive behavior due to wrongful development. This
usually results to delinquent behavior based on the failure to
learn the necessary social values and norms.
71. Fellatio- male sex organ to the mouth of the women coupled
with the act of sucking that initiates orgasm.
72. Fetishism- sexual gratification is obtained by looking at
some body parts, underwear of the opposite sex or other
objects associated with the opposite sex.
73. Fire Fighting Team- responsible for all medical
supplies related to fire extinguishing fires
intentionally set by the perpetrators or during the
result of operations.
74. Frotrage- rhe act of rubbing the sex organ against body parts of another person.
75. Frustration - refers to the unpleasant feelings that result from the blocking of motive
satisfaction, It is a feeling that is experienced when something interferes with our hopes,
wishes, plans expectations
76. General Paresis- also called "dementia paralytica", a syphilitic infection of the brain and
involving impairment of the CNS.
77. Gerontophilia- is a sexual desire with an eider person.
78. Hallucinosis the persistent occurrence of hallucinations,
the false perception that arises in full wakefulness scare. This
includes haIIucinations on visual and hearing or both.
79. Hebephrenic Schizophrenia- (Disorganized Type)- there is emotional distortion
manifested in inappropriate laughter, peculiar mannerism, and bizarre behavior.
80. Heredity- This refers to the genetic influences, those that, are explained by heredity, the
characteristics of a person acquired from birth transferred from one generation to
another. It explains that certain
81. Hijacking and skyjacking are commonly used by terrorist. The hijack supply ,
ammunitions , fuel cargoes, and vehicles to provide them to gain entry to a close military
area, hijacking of commercial aircraft to again publicity or to ask demands
82. Histrionic Personality Disorder it is characterized by immaturity, excitability, emotional
instability and self-dramatization.
83. Homosexuality- it is a sexual behaviour directed towards the same sex. It is also called
"lesbianism/ tribalism" for female relationship.
84. Hostage Taking
85. Hostility- response to alleged mistreatment with anger and
hostility, the person become increasingly suspicious
86. id is a part of the unconscious that contains all the urges and impulses including what we
called libido, a kind of generalized sexual energy that is used for everything from survival
instincts to appreciation of art
87. Identification - increasing feeling of worth by .identifying
self with person or institution. The person can associate himself with something or
someone to elevate position.
88. Incest- a sexual relation between people
89. Insult and Humiliation The adversary tries to ridicule the VIP in the eyes of the people,
and will use different means in order to achieve these objectives
90. Intellectual Aspect - this aspect of behavior pertains to our way of thinking, reasoning,
solving, problem, processing info and coping with the environment.
91. Intelligence Team- responsible for the collection and
processing Of all information needed by the OSC.
92. Introjections - incorporating external values and standards into ego structures so
individual is nor. at their mercy as external threats. The acceptance of other's values
even are contrary to one's own .assumption.
93. Isolation/Intellectualization - series to cut off the emotion from emotion a situation, which
is normally, is full of feeling
94. It is also called "dual personalities." The reason manifests two or more symptoms-of
personality usually dramatically different.
95. KIDNAP FOR RANSOM is a criminal act, particularly described as the unlawful and
carrying away a person by force or fraud and against his will, or in any manner depriving
him of his liberty for the purpose of extorting ransom as payment for the release
96. Kidnapping for ransom is the most common form of this tactic. The victim is normally
confined in secret hideout and kidnappers make material demands .
97. KIDNAPPING, in general, possess a serious threat to the peace and order condition of
the country. Focus of concern, however, falls on so-called kidnap for ransom case,
because they exist a heavy tall not only on their victims and the victim's families, but also
on society
98. Legal/Investigation Team- services of investigation,
preservation of evidence, documents and legal advice
to the OSC
99. Logistics Team- responsible for ensuring mess
services, supplies (clothing, equipment,
transportation) and other logistics services
100. Love/Belongingness - Belongingness is integration into various
kinds of social groups of social organizations. Love needs means
need for affection
101. Man Made Crisis – Strike, riot, demonstration – revolt such as mutiny and
insurrection -revolution, border incident- war conventional or nuclear crimes: kidnapping,
hijacking, hostage taking, etc.
102. Masochism - infliction of pain to oneself to achieve sexual pleasure
103. MCCM – National Committee on Crisis Management
104. Medical Team- responsible for all medical supplies and
services in cases of crisis incidents
105. Mentally Deranged Individuals- people commit terroristic is the most difficult
terrorist to deal with. Many of themare impulsive and unpredictable.
106. Mood Disorder (.Affective Disorder)Mood disorder often referred to as effective
disorder however the critical pathology in this disorder is one of mood which is the
internal state of a person, and not of affect, the external expression of emotional content
(Manual of Mental disorder).
107. Moral Crisis- the person has an irrational or distorted concepts of what is right or
wrong, lack of moral values and integrity of the person.
108. Multiple Approach-Avoidance Conflict - a situation in which a
choice must be made between two ..or more alternatives each has
both positive and negative features. It is the most difficult,
to resolve because the features of each portion are often
difficult to compare.
109. Multiple Personality
110. Narcissistic Personality Disorder It is characterized by an exaggerated sense of
self- importance and pre-occupation with receiving attention. The person usually
expects- and demands special treatment from others and disregarding the rights and
feelings of others.
111. Natural Crisis- fire, floods, earthquake, tidal waves- marine/air, disaster
hazardous spills, power failure, nuclear accidents – water/food shortage/scarcity,
drought, volcanic eruption, epidemic, etc.
112. necrophilia- an erotic desire or actual intercourse with a
corpse.
113. NEGOTIATION UNIT – it is headed by chief negotiator and composed of two or
more members. Their primary concern is to serve life, prevent destruction and pave the
way for a peaceful resolution of crisis situation
114. Neurotic Nucleus – the faulty evaluation of reality and tendency avoid rather that
to cope with stress. It is characterized by anxiety, avoidance instead of coping, and
blocked personal growth
115. Neurotic Paradox- the tendency to maintain the life style despite its maladaptive
nature. It is characterized by unhappiness and dissatisfactions.
116. Neurotic/ Psychoneurotic Behavior are group of mild functional personality
disorders in which there is no gross personality disorganization, the individual does not
lost contact with reality and hospitalization is not required
117. Normal behavior (adaptive or adjusted behavior)-the standard behavior, the
totality accepted behavior because they follow the standard norms of society
118. Nymphomania- a strong sexual feeling of women with an
excessive sexual urge.
119. Obsessive- compulsive disorders Obsession usually centered on fear that one
valuable to do something wrong. Compulsion on the other hand resulted from repetitive
acts (Wicks 1974). An obsessive- compulsive disorder is characterized by the following
120. OPERATION SECURITY- a counter intelligence measures where all aspects of
awareness and training must be considered to prevent threat groups from learning the
units plans methods of operations. It also refers to measures taken in conducting
operations or activities in secure and effective manner.
121. Oralism- it is the use of mouth or the tongue as a way of
sexual satisfaction.
122. Organic Affective Syndrome- is the extreme/ severe manic or
depressive state with the impairment of the cerebral function.
123. Organic Delusional Syndrome- is the false belief arising in
a setting of known or suspected brain damage.
124. Organic mental Disorders A diagnosis of organic mental disorder is associated
with specific, identified organic causes such as abnormalities of the brain structure
125. Organic Personality Syndrome- the general personality
changes following brain damage.
126. Orgasmic Dysfunction- a sexual disorder characterized by the difficulty in
achieving orgasm
127. OSCP – On Scene Command Post
128. Overt or covert Behavior Behaviors that are outwardly manifested or those that
are directly observable are overt behaviors. On the other hand, covert behaviors are
behaviors that are hidden-not visible to the naked eye.
129. Paedophilia- a sexual perversion where a person has the
compulsive desire to have sexual intercourse with a child
of either sex.

130. PAFECOM- Philippine Air Force Security Command


131. Paranoia – is as psychosis characterized by a systemized delusional system. A
delusion is a firm belief opposed to reality but maintained in spite of strong evidence to
the contrary. It is
also a psychosis characterized by delusion of apprehension following a failure or
frustration
132. Paranoid Personality Disorder It is characterized by suspicious, rigidity, envy,
hypersensitivity, excessive self-importance, argumentativeness and tendency to blame
others of one's own mistakes.
133. Paranoid Schizophrenia – it is the illogical, changeable delusion frequently
accompanied by vivid hallucinations, with a resulting impairment of critical judgment,
unpredictable and occasionally dangerous behavior
134. Partiallsm- it refers to the sexual libido on any part of the body of a sexual
partner.

135. PASAG – Philippine Army Special Action Group


136. Passive-aggressive Personality Disorder It is characterized by being hostile
expressed in indirect and non-violent ways. They are so called "stubborn.."
137. Pathological Gambling- It is an addictive form of disorder, which
does not involve chemically addictive.
138. Pathological social conditions- poverty, social discrimination, ate destructive
violence always results to deviant behavior.
139. PERSONAL SECURITY- it considers that all personnel are susceptible to
terrorist attack so there is a need for securing them. All security measures designed to
prevent unsuitable individuals of DOUGHTFUL LOYALTY from gaining access to
classified matters or security facilities.
140. Personal Shortcoming - such as being handicapped by, diseases,
deafness, paralysis, etc. which serves as a barrier to the
things one ought to do.
141. Personality Disorders They are called disorders of character; the person here is
characterized as a "problematic" without psychoses. This disorder is characterized
disrupted personal relationship, dependent.
142. Petechial Hemorrhage- small spots of bleeding at the site of damage
143. Phobic Disorders These refer to the persistent fear on some objects or situation
that present no actual danger to the person
144. Physical Assault - The inflicting of physical injury, with the nof disabling the object
of the attack, such as murder and trashing
145. Physical Crisis- those that are related to health problems or bodily
sickness/sufferings.
146. Physical obstacles - are physical barriers or circumstances that prevent a person
from”" doing his plan or fulfilling his wishes
147. PHYSICAL SECURITY encompasses protection of info, material and people
including perimeter installation. A system of barrier placed between the potential intruder
and the material to be collected.
148. PHYSICAL SECURITY PLAN - physical security measures taken for the
protection of property, personnel, materials, facilities, and installation against
unauthorized entry, trespass, damage
sabotage or other illegal or criminal act its deal with the prevention and is designed to
protect against not only bombing incidents, but a full range of possible attacks
149. Planning -threat analysis and assessment of available personnel security
resources.
150. Pluralism- group of persons in sexual orgie such as couple
to couple sexual relations. It is also called "sexual
festival

151. PNPSAGSD – Philippine National Police Special Action Group


152. PNSWG –Philippine Navy Special Welfare Group
153. Political Terrorist- ideologically inspire individuals who
grouped together for a common purpose usually for change of gov't or political power.
154. Pre-mature Ejaculation- it is the unsatisfactory brief period of sexual stimulation
that results to the failure of the female partner to achieve satisfaction.
155. Presenile Dementia- mental disorder associated with earlier
degeneration of the brain
156. Primary Targets- these are high ranking military or police officers, gov't officials,
foreign ministries, other VIPs and person possessing sensitive information.
157. Projection - placing blame for difficulties upon others attributing one's own
unethical desires to others in effort to prevent ourselves being blamed.
158. Protective Thinking- blame others for one's own mistake
159. Psychogenic Pain Disorder It is characterized by the report of severe and lasting
pain. Either no physical basis is apparent reaction greatly in excess of what would be
expected from the physical abnormality
160. Psychological needs are influenced primarily by the kind of society in which the
individual is raised. Psychological motives are those related to the individual happiness
and wellbeing, but not for the survival, unlike the biological motives that focuses on basic
need the primary motives.
161. psychology is the science of behavior and mental processes
162. Psychopathic Behavior This pertains to the second group of abnormal behavior,
which typically stemmed from immature and distorted personality development, resulting
in persistent maladaptive ways of perceiving and thinking
163. Psychosexual Aspect - this pertains to our being a man or a woman and the
expression of love
164. Psychosexual Crisis- failure of the person to assume ones sex role and identify
as a man or woman. The person has an inappropriate sex objective, inadequate and
distorted expression of affection
165. Randomly Selected- these are military or police personnel who are not off duty or
engage in private activities and became targets of opportunity.
166. Rank and Risk- higher ranking personnel have great risk level. In high risk areas,
secure high ranking officers because they maybe selected as terrorist targets by special
knowledge the possess
167. Rational or Irrational Behavior
168. Rationalization – the use of excuses an individual to him and to others.
Attempting to prove that one's behavior is justifiable and thus worthy of self and social
approval
169. RCAG – Regional Crisis Action Group
170. RCMOC – Regional Crisis Management Operation Center
-the point of all communications from the OSCP
171. Reaction and Formation - it occurs when someone tries to prevent his
submission to unacceptable impulses by taking opposite stand. Preventing dangerous
desires from expresses by exaggerating opposed attitudes and types behavior and using
them as barriers
172. Reaction Element- Special action unit which are
specially organized equipped and deployed in the
crisis incident.
173. Regression - revert from a past behavior to retreating to earlier development
level involving less mature responses and usually a lower level of aspiration.
174. Residual Schizophrenia- is used for persons who have had a prior episode of
schizophrenia but currently are not displaying active delusions, hallucinations, or overall
organization of behavior
175. Retarded Ejaculation- it is the inability to ejaculate during
intercourse- resulting to worry between partners
176. Retrograde Amnesia- the inability to recall events immediately proceeding the
injury in the site of damage
177. Sadism- achievement of sexual stimulation and gratification
through the infliction of physical pain on the sexual partner.
It may also be associated with animals or objects instead of
Human beings.
178. Sado-Masochism (Algolagnia)- pain/ cruelty for sexual
gratification.
179. Safety Needs - these pertains to the motives of being cared for
and being secured such as in income and place to live.
180. Satyriasis- an excessive (sexual urge) desire of men to have sexual intercourse
181. Schizoid Personality Disorder This is characterized by the inability to form social
relationship and lack of interest in doing so. Thee person seem to express their feelings,
they lack social skills, they are the so-called "loners."
182. Schizophrenia- refers to the group of psychotic disorders Characterized by gross
distortions of reality, withdrawal of social interaction, disorganization and 'Fragmentation
of
mention, thoughts and emotion
183. Schizotypal Personality Disorder This is characterized by reclusiveness, over
sensitivity avoidance of communication and superstitious thinking is
184. Scoptophilia- the international act of watching people undress or daring sexual
intimacies
185. Secondary Targets- those selected as alternative terrorist targets to gain
publicity.
186. Security Element- military or police personnel task to
protect one area of perimeter security to prevent
occurrence of unnecessary incidents.
187. Self- actualization - pertains to human total satisfaction, when
people are motivated not so much by unmet needs, as by the desire
to become all they are capable of (self-realization).
188. Senile Dementia- mental disorder that accompanied by brain
degeneration due to old age
189. Simple or Complex Behavior These are acts categorized according to the
number of neurons while complex behavior involved more number of neurons, a
combination of simple behaviors.
190. Simple Schizophrenia (undifferentiated type) – the schizophrenia in which
symptoms are rapidly changing mixture of all primary indicators of schizophrenia. The
varying combinations of dilutions, hallucinations, thought disorders,
and gross bizarreness
191. Social Aspect - this pertains to how we interact or relate with other people.
192. Social Circumstances - are restrictions circumstances imposed
by other people and the customs and laws of social living.
193. Social Crisis- the experiencing lack of interest, confidence and social skills to
relate meaningful, harmonious relationship with others.
194. Sodomy- is a sexual act through the anus of the sexual partner.
195. Somatoform Disorders Complaints of bodily symptoms that suggest the presence
of physical problem but no organic basis can be found. The individual is pre-occupied
with his state of health or diseases
196. Stress – is the process of adjusting to dealing with circumstances that disrupts,
or threatens to disrupts a person's physical or psychological functioning (Bernstein, et al
,1991)
197. Sublimation - gratification of frustrated sexual desire in substitutive men sexual
activities
198. superego is a part of the unconscious that is the voice of conscience (doing what
is right) and the source of self-criticism. It reflects society's moral values to some degree,
and a person is sometimes aware of their own morality and ethics, but the superego
contains a vast number of codes, or prohibitions, that are issued mostly unconsciously in
the form of commands or "don't" statements
199. SUPPORT UNIT- it is a unit that provides the necessary administrative,
operational and logistics support of the OSC
200. Suspiciousness- the individual mistrust the motives of others
and fear that he will be taken advantage.
201. Sympathism - striving to gain sympathy from ’others. The person seeks to be
praised by relating faults or problems
202. TACTICAL UNIT- composed of regular military or police placed under the
command of the OSC
203. TERRORISM So much has been written in recent years about terrorism by
eminent people. Terrorism means many different things to different people independent
upon individual perspective thus many definitions exist
204. The anti – social family – those that espouses unacceptable values as a result of
the influence of their parents to their children
205. The discordant/ disturbed family – characterized by non – satisfaction of one or
both parent from the relationship that way express feeling of illustration. This is usually
due to value differences as common sources of conflict and dis – satisfaction.
206. The disrupted family - characterized by in completeness whether as a result of
death, divorce, separation or other circumstances.
207. The hostage-taker confronts the authorities and openly holds the victims for
ransom. His demands are more than just material m nature. Political concessions are
the frequency demand in exchange for the hostage lives
208. The inadequate family - characterized by the inability to
cope with the ordinary problems of family living. It lacks the resources, physical or
psychological, for meeting the demand of family satisfaction.
209. There is rational when a person acted with sanity or reason and there is irrational
behavior when the person acted with no apparent reason or explanation-as when a man
loses his sanity and laugh out loud at nobody or nothing in particular.
210. Threat Level (Potential Threats)
211. Threats The objectives of threats are to frighten the person and bring about a
change of policy. The adversary may use anonymous letters; radio broadcast and in the
adversary happens to be from a foreign country, he will have additional means at his
disposal, such as the local press, international forum or assemblies.
212. Transvestism- refers to the achievement of sexual excitation by dressing as a
member of the opposite sex such a man who wears female apparel.
213. Troilism- three persons participate in sex orgy such as two
women versus on man or vice versa.
214. Undoing -.apologizing for wrongs, repentance, doing penance and undergoing
punishment to negate, a disapproval act
215. Unsatisfactory interpersonal relationship- self-concept in early childhood by over
critical parents or by rigid socialization measures usually causes deviant behaviors
among individuals because they are not contented and even unhappy to the kind of
:trial dealings they are facing.
216. Uranism- sexual gratification is attained through fingering, holding the breast of
licking parts of the body.
217. Vaginismus- the involuntary spasm of the muscles at the entrance to the vagina
that prevent penetration of the male
218. Value/Attitude - this pertains to our interest towards something, our likes and
dislikes
219. Voluntary or Involuntary Behavior Voluntary behavior is an act done with full
volition or will such as when we discriminate, decide or choose while involuntary
behaviors refers the bodily processes that foes on even when we are awake or asleep
like respiration, circulation and digestion.
220. Voyeurism- the person is commonly called "the peeping Tom", an achievement
of sexual pleasures through clandestine peeping such as peeping to dressing room,
couples room, toilets, etc. And frequently the person masturbates during the peeping
activity.
221. Vulnerabilities are the weaknesses of the installation security and high risk
targets with in such installation. These vulnerabilities are normally identified through
security surveys and inspection conducted periodically or on the spot intelligence and
security units staff

Vous aimerez peut-être aussi