Académique Documents
Professionnel Documents
Culture Documents
COLLEGE OF CRIMINOLOGY
HUMAN BEHAVIOR
The central concept of psychoanalysis, and the one that Freud first put forth, is the
unconscious. The concept had been around before Freud, but he was the one that made the
most out of it, arguing that traumatic experiences in early childhood left their mark on the
Individual was not aware of these experiences. The idea of unconscious determination of
behavior flew headfirst against the idea The next most important idea conflict and Freud
postulated the existence of a three-part personality (an idea going back to Plato) consisting of
id, ego, and superego 'which operated in constant conflict with one another (primarily between
the id and superego)producing the basic problem of guilt which required the use of one or more
defense mechanisms. The idea of personality conflict as a cause of crime became quite popular
among both scientists and the general public.
The id is a part of the unconscious that contains all the urges and impulses including what we
called libido, a kind of generalized sexual energy that is used for everything from survival
instincts to appreciation of art. The id is also kind of stubborn, for it responds
only to what. Freud called the pleasure principle (if it feels good, do it), and nothing else.
The ego is the only part of the conscious personality. It’s what the person is aware of they think
about themselves, and is what they usually try to project toward others. The ego is dominated
by what Freud called the reality principle (an orientation to the real world which the person
lives). It is continually trying to mediate the demands of the id and prohibitions of the superego.
The superego is a part of the unconscious that is the voice of conscience (doing what is right)
and the source of self-criticism. It reflects society's moral values to some degree, and a person
is sometimes aware of their own morality and ethics, but the superego contains a vast number
of codes, or prohibitions, that are issued mostly unconsciously in the form of commands or
"don't" statements.
The superego is also somewhat tricky, in that it will try to portray what it wants the person to do
in grandiose, glowing terms, what Freud called the ego-ideal, which arises out of the person's
first great love attachment (usually a parent). The assumption is that children
raised by parents experience love conditionally (when they do something right), and the child
internalizes these experiences as a series of real or imagined judgmental statements.
Guilt is a very common problem because of al drives coming from the id and all the prohibitions
and codes in superego. There are a variety of ways an individual handles guilt, and
these are called defense mechanisms (see complete list below).
Of the defense mechanisms, psychoanalysts have put forward replacement as their number one
choice for explaining crime. A few have explored the others, most notably, reaction
formation, but the list remains largely unexhausted because, essentially, the ideas are
untreatable.
Freud also provided a theory of human development. These ideas revolved around his terms for
the three stages of early childhood. The oral. stage (age 0-2) is when a person develops their
sense of satisfaction or satiation, cf figuring out how is enough (e.g. of food and drink) which
has implications for much of an eater, drinker, or smoker a persons is in adulthood. The anal
stage of orderliness, of figuring out their referred levels of cleanliness (e.g. as in toilet training).
The genital stage (age 3-4) is when a person develops there , of figuring out their sexual
preferences and whether they are capable of real love or not. <ale children go thru what is
called an Oedipus complex (with a comparable Electra complex in females) Both complexes
involve sexual feelings for the parent of .the opposite sex (and are called "inverted" complexes
in cases of homosexuality), and hew these feelings are resolved determines how capable the
person is of real love later in life.
The primary technique of psychoanalysis is transference, the process of the patient, through
free association and "talk therapy", re-enacting or relieving their early childhood experiences
with the therapist. The therapist, in short, becomes a love object, for the patient, but without the
therapist going too far or becoming too involved, which is called counter transference, without
therapy, person will engage in amateur transference with other people, a process whereby they
play out a "script" or replay the same failed relationships over and over again.
The current approach to classification and diagnosis of the mentally ill is multiaxial. Rather than
using a single term, such as schizophrenia, to label a person, the American Psychiatric
Association (APA) prefers to describe a person in terms of clinically important factors or axes.
The first multiaxial system was developed in 1980 as the DSM-III (diagnostic and statistical
Manual of Mental Disorders).,revised in 1987 as DSM-III-R, and revised again in 1994 as DSM-
IV. It's a multiaxial system with five axes.
The area that has received the most criminological attention is Axis II, the personality disorders,
specifically, the antisocial personality disorder. It has been associated with criminal behavior as
far back as the Freudians who believed that there childhood behaviors were associated with it:
(1) bedwetting; (2) fascination with fire; and (3) cruelty to animals. As such, it's the one disorder
that can be detected earliest in childhood.
However, the APA does not recommended labeling anyone antisocial until they have reached
the age of 18, and to use not only behaviors committed before the age of 15 (chronic conduct
disorders before the age of 15 are considered under Axis I). From the standpoint of abnormal
psychology, antisocial personality is not so much a matter of behaviors as it is a deeply
ingrained pattern to life. They always seem to be using other people as game pieces, and they
seldom show anxiety or feel guilty.
We will further have better understanding on these views and perspectives as can start to learn
the basic concept of criminal psychology.
CRIMINAL PSYCHOLOGY
In general, psychology is the science of behavior and mental processes. This means that
psychologists use the methods of science to investigate all kinds of behavior and mental
processes, from the activity of a single nerve cell to the social conflict in a complex
society (Bernstein, et al, 1991) .
A major description of criminal psychology is the word behavior. Behavior refers to actions or
activities (Kahayon, 1985). To the criminologists, behavior is the observable actions because he
is more interested in actions and reactions that can be seen and verified that in concepts, which
cannot be directly verified.
CLASSIFICATION OF BEHAVIOR
Atkinson (1993) also presented that understanding criminal behavior includes the idea of
knowing what characterized a normal person from tr. abnormal one. A normal person is
characterized by:
A behavior that deprives from the accepted norms of society is considered abnormal.
However, it is primarily dependent on the existing norm of such society.
c. Behavior as maladaptive
Maladaptive behavior is the effect of a wellbeing of the individual and or the social group.
That some kind of deviant behavior interferes with the welfare of the individual such as a man
who fears crowd can't ride a bus. This means that a person cannot adopt himself with the
situations where in it is beneficial to him.
This is abnormally in terms of the individual subjective feelings of distress rather than the
individual behavior. This includes mental illness, feeling of miserably, depression, and loss of
appetite or interest, suffering from insomnia and numerous aches and pains.
It declares that a person is insane largely on the basis of his inability to judge between right
and wrong or to exert control over his behavior (Bartol, 1395)'.
The view that normal and abnormal behaviors are different in kind simply does not exist.. There
are not "normal" people in the one hand and "abnormal" people on the other. Rather,
adjustment seems to follow what is called Normal Distribution-most people are moderately well,
adjusted, with minor maladaptive patterns, a few at one other extreme enters mental clinics and
a few at the other extreme lead satisfying and effective lives ^Coleman, 1980)
Kinds of Behavior
As mentioned earlier, the important element in the definition of psychology is behavior. As cited
by Alicia Kahavon, behavior may be:
Behaviors that are outwardly manifested or those that are directly observable are overt
behaviors. On the other hand, covert behaviors are behaviors that are hidden-not visible to
the naked eye.
Behavior is conscious when acts. are within the level of awareness. It is unconscious when
acts are embedded in one's subconscious-unaware.
These are acts categorized according to the number of neurons while complex behavior
involved more number of neurons, a combination of simple behaviors.
There is rational when a person acted with sanity or reason and there is irrational behavior
when the person acted with no apparent reason or explanation-as when a man loses his
sanity and laugh out loud at nobody or nothing in particular.
Voluntary behavior is an act done with full volition or will such as when we discriminate,
decide or choose while involuntary behaviors refers the bodily processes that foes on even
when we are awake or asleep like respiration, circulation and digestion.
Aspects of Behavior
a. Intellectual Aspect - this aspect of behavior pertains to our way of thinking, reasoning,
solving, problem, processing info and coping with the environment.
b. Emotional Aspect - this pertains to our feelings, moods, temper, and strong motivational
force.
c. Social Aspect - this pertains to how we interact or relate with other people.
d. Psychosexual Aspect - this pertains to our being a man or a woman and the expression
of love
e. Value/Attitude - this pertains to our interest towards something, our likes and dislikes
Criminal 'Formula
Where:
The formula shows that a person's criminal tendency and his instance to them may either result
in criminal act depending upon, which of them is stronger. This means that a crime or criminal
behavior exists when the person's resistance is insufficient to
withstand the pressure of his desire or intent and the opportunity (Tradio, 1983).
In understanding this, the environment factors such as stress and strains are considered
because they contribute in mobilizing a person’s criminal tendency and the individual's
psychological state while resistance temptation arises from the emotional, intellectual and social
upbringing and is either manifestation of a strong or weak character.
Determinants of Behaviors
The questions why do people become heterosexual and others homosexuals, some are
alcoholics, some are law abiding and others are criminals, come are well adjusted and others
mentally ill? What will enable us to understand these extremes of behavior?
The answer to these questions requires the study and understanding of the influences of
HEREDITY and ENVIRONMENT. As cited by Tuason:
This refers to the genetic influences, those that, are explained by heredity, the
characteristics of a person acquired from birth transferred from one generation to another. It
explains that certain total aggression, our intelligence, ability and potentials and our
physical appearance are inherited.
It is the primary basis of the idea concerning criminal behavior, the concept that "criminals are
born"
It also considers the influences of genetic defects and faulty genes, diseases, endocrine
imbalance, malnutrition, and other physical deprivation that can be carried out from one
generation to other
2. Environmental Factors
This is refers to anything around the person the influences his action. James Coleman
in his Book mentioned some environmental factors such as:
In the environment, the following are also factors that are influential to one’s behavior:
a. Institutional influences such as peer group mass media, church, and school,
government institution, NGO’s, etc.
b. Socio – cultural Factors – such as war and violence, group prejudice and
discrimination, economic and employment problems and other social changes.
c. Nutrition or the quality of food that a person intake in also a factor that influences
man to commit crime because poverty is one of the many reasons to criminal
behavior.
In order to further understand and provide answers on the question that why do some
people behave criminally, it is important to study the other determinant of behavior. These are
need, drives and motivation
The aroused condition motivates the person to remedy the need. For example, if
you have had no water for some time, the chemical balance of the body fluids is
disturbed, creating a biological need for water. The psychological consequence
of this need is a drives – thirst – that motivates you to find and drink water. In
others words.
Motivation
Motivation on the other hand refers to the the influences that govern the initiation,
direction, intensity, and persistence of behavior(Bernstein, et al 1991). Thus motivation
refers to the causes and as required by a need
Motivation is the hypothetical concept that stands for the underlying force impelling
behavior and giving its direction (kahaiyon, 1975) .
Drives are states of comfortable tension that spur activity until a goal is reached. Drive
and motivation are covered in the world of psychology, for they energize behavior and give
direction to man’s action. For example, a motivated individual is engaged in a more active, more
vigorous, and more effective that unmotivated ‘one, thus a hungry person directs him to look for
food.
A. Biological needs Motivational Systems
Sex S’ powerful
A 'j motivator but unlike food and
1 water, sex is not vital for survival but
i essential to the survival of species.
Fain Avoidance The need to ^ avoid tissue damage is
essential to the survival for the organism.
Pain will activate behavior to reduce
discomfort.
Stimulus Curiosity
t, is most people and animal is
motivated to explore even when the
activities satisfies no bodily needs.
B. Psychological Needs
Psychological needs are influenced primarily by the kind of society in which the individual is
raised. Psychological motives are those related to the individual happiness and well being, but
not for the survival, unlike the biological motives that focuses on basic
need the primary motives.
Bernstein, et al (1991) offered that at any time, many motives might guide a person's behavior.
What determines which ones will?
Abraham Maslow/ (1970) have given a perspective that addresses this question. He suggested
basic classes of needs, or motives, influencing human behavior. These motives are organized in
a hierarchy. Abraham Maslow has suggested that human needs form a hierarchy from the most
basic biological requirements to the needs for self-actualization -
highest of all needs.
1. Biological or Physiological Needs - these motives include the need for food, water,
oxygen, activity, and sleep.
2. Safety Needs - these pertains to the motives of being cared for
and being secured such as in income and place to live.
3. Love/Belongingness - Belongingness is integration into various
kinds of social groups of social organizations. Love needs means
need for affection
4. Cognitive need - our motivation for learning and exploration
5. Esteem Needs. - Our motivation for an honest, fundamental respect
for a person as a useful and honorable human being.
6. Aesthetic Needs - our motivation for beauty and order.
7. Self- actualization - pertains to human total satisfaction, when
people are motivated not so much by unmet needs, as by the desire
to become all they are capable of (self-realization).
According to the Maslow's formulation, the level that commands the individuals' attention and
effort is ordinarily the lowest one on which there is an unmet need. For example, unless needs
for food and safety are reasonably well-met behavior will be dominated by these needs and
higher motives are of little significant.' With their gratification, however, the individual is free to
devote time and effort to meet higher level. In other words, one level must at least be partially
satisfied before those at the next level become determiners of action.
1. Frustration - refers to the unpleasant feelings that result from the blocking of motive
satisfaction, It is a feeling that is experienced when something interferes with our hopes,
wishes, plans expectations (Coleman 1980)
a. Physical obstacles - are physical barriers or circumstances that prevent a person from”"
doing his plan or fulfilling his wishes
b. Social Circumstances - are restrictions circumstances imposed
by other people and the customs and laws of social living.
c. Personal Shortcoming - such as being handicapped by, diseases,
deafness, paralysis, etc. which serves as a barrier to the
things one ought to do.
d. Conflicts between motives
3. Anxiety -is an intangible feeling that seems to evade any effort to resolve it. It is also
called neurotic fear. It could be intense; it could be low and can be a motivating force
(Coleman, 1980).
As introduced in the preliminary regarding the Freudian view, the defense Mechanisms are the
unconscious techniques used to prevent a person’s self-image from being damaged. When
stress quite defeat -We all use ego defense mechanisms to us from anxiety and maintain our
feeling of personal worth. We consider them normal strong, an individual strives to protect his
self-esteem, integrity (Bernstein, et al, 1991)
Denial of Reality – protection of one – self from unpleasant reality by reality by refusal to
perceive or face it. Simply by avoiding something that is unpleasant
Fantasy- the gratification of frustration desires imaginary achievement. Paying attention
not to what is going on around him but rather to what is taking place in his thought
Projection - placing blame for difficulties upon others attributing one's own unethical
desires to others in effort to prevent ourselves being blamed.
Rationalization – the use of excuses an individual to him and to others. Attempting to
prove that one's behavior is justifiable and thus worthy of self and social approval
Reaction and Formation - it occurs when someone tries to prevent his submission to
unacceptable impulses by taking opposite stand. Preventing dangerous desires from
expresses by exaggerating opposed attitudes and types behavior and using them as
barriers
Displacement- --discharging pent-up emotion on objects less dangerous than those that
with the emotion.
Emotional Insulation - withdrawal is passivity to protect self from hurt.
Isolation/Intellectualization - series to cut off the emotion from emotion a situation, which
is normally, is full of feeling
Regression - revert from a past behavior to retreating to earlier development level
involving less mature responses and usually a lower level of aspiration.
Sublimation - gratification of frustrated sexual desire in substitutive men sexual activities
Identification - increasing feeling of worth by .identifying
self with person or institution. The person can associate himself with something or
someone to elevate position.
Introjections - incorporating external values and standards into ego structures so
individual is nor. at their mercy as external threats. The acceptance of other's values
even are contrary to one's own .assumption.
Undoing -.apologizing for wrongs, repentance, doing penance and undergoing
punishment to negate, a disapproval act
Sympathism - striving to gain sympathy from ’others. The person seeks to be praised by
relating faults or problems
Acting out - reduction of the anxiety aroused by forbidden
Human values are relevant understanding human behavior. They are the standards
which people use to cognize, express and evaluate behavior as .right or wrong, just or unjust,
appropriate or inappropriate. Values are also guides that people use to evaluate
their behavior thus give direction to their lives. They are the enduring preferences for mode of
conduct or state of existence.
How are values acquired? They are acquired through the influence of the rewards and
punishments meted out by our parents, teachers and peers. For instance, at home - there is the
teaching of control, cleanliness and good manners, in. school - there is competition and
earning in conformity with a bigger group, morality and the teachings of the church, the
exposure to mass media and. the government influences. The accumulations of these values
continue to change as we continue to face different experiences.
Feeling, aspiration., attitude and belief a're also considered values if they are chosen
freely, chosen from alternatives, prized and cherished, publicly affirmed, and acted upon
repeatedly.
Common sense
The science of behavior has one of its goals the culmination of widespread
misconceptions that are now considered valid such as numerology and palmistry, although still
accepted by some people today predict events and conditions (Wicks 1974).
Common Sense is a commonly health notion where .truth is not dependent on judgment
which is based purely on observation, thus it luck organization of thoughts and jumps to
conclusion immediately
Criminal psychology requires the study of common sense. The development of the
ordinary good senses is important in the examination of existence of a fact before a conclusion
is drawn. In psychology, scientific method must be made and therefore judgment is suspected
until all facts had been analyzed. This is not true in the common sense.
The commission of a crime may be the result of complicated factors and causes. The
following are some of the perspective about the causes of criminal behavior.(Coleman, 1980).
a. Anxiety (Psychological Perspective) - Stressful situation that become extreme may result
to maladaptive behavior.
b. Faulty Learning (Behavior Perspective) - The failure to learn the
necessary adaptive behavior due to wrongful development. This
usually results to delinquent behavior based on the failure to
learn the necessary social values and norms.
c. Blocked of Distorted Personal Growth (Humanistic Perspective) - presumably, human
nature tends towards cooperation and conductive activities; however, if we show
aggression, cruelty or ether violent behavior, the result will be an unfavorable
environment.
d. Unsatisfactory interpersonal relationship- self-concept in early childhood by over critical
parents or by rigid socialization measures usually causes deviant behaviors among
individuals because they are not contented and even unhappy to the kind of
:trial dealings they are facing.
e. Pathological social conditions- poverty, social discrimination, ate destructive violence
always results to deviant behavior.
Coleman (1980) stated that regardless of one's theoretical, orientation, several terms is in
common usage regarding causes of abnormal or criminal behavior, the following are used:
Neurosis and Psychosis are terms used to describe the mental status of a certain
psychologically unstable person. They are frequently used in reports and articles and even in
every day conversations, so today's criminologists and law enforcement personnel
are expected to be familiar with them (Wicks, 1974).
For purposes of discussion, the DSM III has been selected as the reference in grouping what
criminologist call pattern of criminal behavior.
Criminal behaviour may be patterned from the three main group of maladaptive/ criminal
behavior, which are the Neurotic/ Psychoneurotic behaviors, psychopathic behaviors, and the
Psychotic behavior.
Neurosis embraces a wide range of behaviours that are the core of most maladaptive life
style. Basic to this neurotic life style are:
1. Neurotic Nucleus – the faulty evaluation of reality and tendency avoid rather that to
cope with stress. It is characterized by anxiety, avoidance instead of coping, and blocked
personal growth
2. Neurotic Paradox- the tendency to maintain the life style despite its maladaptive nature.
It is characterized by unhappiness and dissatisfactions.
I. Anxiety disorders
Anxiety disorders are commonly known as "neurotic fear" when it is occasional but
intense, it is called "panic". When it is mild but continuous, it is called "worry" which is
usually accompanied by psychological symptoms such as sustained muscular tension,
increases blood pressure, insomnia, etc.' they are considered as the central feature of all
neurotic patterns. These disorders are characterized by mild depressions, tear and tensions,
and mild stresses
3. Phobic Disorders
These refer to the persistent fear on some objects or situation that present no actual
danger to the person. The following are examples of phobia;
There are many phobic disorders of persons. Many of us experience fear in different levels and
at different times. Unaware, we are actually in the state of suffering phobic
disorders.
Complaints of bodily symptoms that suggest the presence of physical problem but no organic
basis can be found. The individual is pre-occupied with his state of health or diseases.
Hypochondriasis
Refers to the excessive concern, about state of health or physical condition (multiplicity about
.illness)
A hypochondriacal person tends to seek medical advises, but his fear is not lessened by
his doctor's reassurances, and he may be disappointed when no physical problem is
found.
It is characterized by the report of severe and lasting pain. Either no physical basis is
apparent reaction greatly in excess of what would be expected from the physical abnormality
It is a neurotic pattern in which symptoms of some physical malfunction or loss of control without
any underlying organic abnormality.
Sensory Symptoms of Hysteria
Amnesia
It is the partial or total inability to recall or identify past experiences following a traumatic
incident.
1. Brain pathology amnesia- total loss of memory and it cannot be retrieved by simple
means. It requires long period of medication.
2. Psychogenic amnesia- failure to recall stored information and
still they are beneath the level of consciousness but
"forgotten material".
Multiple Personality
It is also called "dual personalities." The reason manifests two or more symptoms-of
personality usually dramatically different.
Depersonalization
The loss of sense of self or the so-called out of the body experience. There is a. feeling of
detachment from one's mental processes or body or being in a dream state. Cases of
somnambulism -(sleep walking) may fall under this disorder.
Mood disorder often referred to as effective disorder however the critical pathology in this
disorder is one of mood which is the internal state of a person, and not of affect, the external
expression of emotional content (Manual of Mental disorder).
Mood disorder are group of clinical condition characterized by a loss of sense of control of
their moods ‘and affects, and a subjective experience of great distress, mood may be elevated
on depressed. These disorders always result in impaired interpersonal, social and occupational
functioning.
Depressive Disorders
Major depressive Disorders- Patients with-depressed mood have a loss of energy and
interest, feeling of guilt, difficulty in concentrating, loss of appetite, and thoughts of dearh or
suicide, they are not affected with manic episodes.
Dysthymic Disorder-
Bipolar Disorders-
Cyclothymic Disorders
:
Psychopathic Behavior
This pertains to the second group of abnormal behavior, which typically stemmed
from immature and distorted personality development, resulting in persistent
maladaptive ways of perceiving and thinking
They are generally called "personality or character disorders." groups of disorders are
composed of the following:
1. Personality Disorders
They are called disorders of character; the person here is characterized as a "problematic"
without psychoses. This disorder is characterized disrupted personal relationship, dependent pr
This is characterized by the inability to form social relationship and lack of interest in doing so.
Thee person seem to express their feelings, they lack social skills, they are the so-called
"loners."
It is characterized by instability reflected in drastic mood shifts and behavior problems. The
person usually displays intense anger outburst with little provocation and he is
impulsive, unpredictable, and periodically unstable.
It is characterized by extreme dependence on other people- there is acute discomfort and even
panic to be alone. The person lacks confidence and feels helpless.
It is characterized by excessive with rules, order, and efficiency that everyone does things their
ways and an ability to express warm feelings. This person is over conscientious,
serious, and ‘with difficulty in doing things for relaxation
Anti-social Personality is actually the "psychopathic personality disorder". The person lack
ethical or moral development and the inability to follow approved models of behaviour. They are
the socialized people, which often bring them conflict with society. They may be refer to mixed
groups of individuals such as unprincipled business people crooked politicians, imposters, drug
pushers, quack doctors, prostitutes, etc.
2.Criminal Behavior
The disorder used to describe the behaviour of a person who serious crimes from individual to
property crimes and the disobedience of societal rules in general.
"Dyssocial Personality" is the term used to refer to these individuals (not anti-social) but
particularly those who violate law and practice "crime it's a profession". They are not normally
associated with any significant personality disturbances. As a study, criminal behavior refers to
the human conduct focused on the mental processes of the criminal; the way he behaves or
acts including his activities and the causes and
influences of his criminal behaviour.
The psychotic behaviors are group of disorders involving gross structural defects in the brain
tissue, severe disorientation of the mind thus it involves loss of contact .with, reality.
Acute brain disorder- caused by a difficult impairment of the brain function. Its symptoms range
from mild mood changes to acute delirium.
Chronic brain disorder- the brain disorder that result from injuries diseases, drugs, and a variety
of other conditions. Its symptoms include impairments of orientation (time, place and
person), impairment of memory, learning, comprehension and judgment emotion and self-
control.
A ~tumor is a new growth involving abnormal enlargement of body issues. Brain tumor can
cause a variety of personality alterations, and it may lead to any neurotic behaviour and
consequently psychotic behaviour.
Injury to the head as a result of falls, blows and accidents causing sensory and motor disorders
and metal disorder such as:
1. Retrograde Amnesia- the inability to recall events immediately proceeding the injury in the
site of damage
2. Petechial Hemorrhage- small spots of bleeding at the site of damage
These injuries may also impair language and other related sensory motor functions and may
result to brain damage
Mental Retardation
5. Residual Schizophrenia- is used for persons who have had a prior episode of
schizophrenia but currently are not displaying active delusions, hallucinations, or overall
organization of behavior
Symptoms of this disorder include feeling of being mistreated, ignored, stolen from, spied upon,
and over suspicious
The addictive group of disorders includes substance use, obesity and pathological gambling.
Substance Use
a. It serves as a depressant
b. It numbs the higher brain center
c. It impairs judgment and other rational
d. It lowers self-control
e. Deterioration of perception.
The sexual deviations are impairment either the desire for sexual gratification or in the ability to
achieve it (Coleman, 1980)
The sexual disorder is common causation of sex crimes. Solis (1987) presented the
criminological characteristics of sex
Crimes as:
3. Vaginismus- the involuntary spasm of the muscles at the entrance to the vagina that
prevent penetration of the male
As sexual Reversals
1. Homosexuality- it is a sexual behaviour directed towards the same sex. It is also called
"lesbianism/ tribalism" for female relationship.
2. Transvestism- refers to the achievement of sexual excitation by dressing as a member of
the opposite sex such a man who wears female apparel.
3. Fetishism- sexual gratification is obtained by looking at
some body parts, underwear of the opposite sex or other
objects associated with the opposite sex.
As to Sexual Urge
As to Visual Stimulus
1. Voyeurism- the person is commonly called "the peeping Tom", an achievement of sexual
pleasures through clandestine peeping such as peeping to dressing room, couples
room, toilets, etc. And frequently the person masturbates during the peeping activity.
2. Scoptophilia- the international act of watching people undress or daring sexual
intimacies
CRISIS MANAGEMENT
CRISIS – is derived from the Greek "krisis" which means separate. It is the turning point
decision in a process of an affair or a series of events.
EMERGENCY – is derived from the Latin word "emergencia" which means dipping/plugging. A
sudden condition or a state of affairs calling for an immediate action.
Types of Crisis
1. Man Made Crisis – Strike, riot, demonstration – revolt such as mutiny and insurrection -
revolution, border incident- war conventional or nuclear crimes: kidnapping, hijacking,
hostage taking, etc.
2. Natural Crisis- fire, floods, earthquake, tidal waves- marine/air, disaster hazardous spills,
power failure, nuclear accidents – water/food shortage/scarcity, drought, volcanic
eruption, epidemic, etc.
CRISIS in general
INDIVIDUAL CRISIS
It refers to the feeling that arises when a person faces unpleasant situation such as frustrations
and conflicts. This includes;
1. Physical Crisis- those that are related to health problems or bodily sickness/sufferings.
2. Economics Crisis- the deprivation of the basic necessities of life like food and material
things.
3. Emotional Crisis- when an individual is affected by negative feelings like emotional
disturbances, fear, etc.
4. Social Crisis- the experiencing lack of interest, confidence and social skills to relate
meaningful, harmonious relationship with others.
5. Moral Crisis- the person has an irrational or distorted concepts of what is right or wrong,
lack of moral values and integrity of the person.
6. Psychosexual Crisis- failure of the person to assume ones sex role and identify as a
man or woman. The person has an inappropriate sex objective, inadequate and distorted
expression of affection.
DIAGRAM OF DIFFERENCE
CRISIS EMERGENCY
Change/Continuity/Survival Recovery/restoration/Survival
CRISIS MANAGEMENT
crisis management is the proper utilization of all available resources and the formulation of all
available resources and the formulation of policies and procedures to effectively deal with the
progressive sequence of events (crisis) and sudden or unforeseen state (emergency)
I. PREDICTION
The first stage of anticipating future crisis occurrences through the following:
II. PREVENTION
a. Rank and Risk- higher ranking personnel have great risk level. In high risk areas, secure
high ranking officers because they maybe selected as terrorist targets by special
knowledge the possess
b. Threat Level (Potential Threats)
1. Primary Targets- these are high ranking military or police officers, gov't officials,
foreign ministries, other VIPs and person possessing sensitive information.
2. Secondary Targets- those selected as alternative terrorist targets to gain publicity.
3. Randomly Selected- these are military or police personnel who are not off duty or
engage in private activities and became targets of opportunity.
Steps in the Preparations of Personnel Security Program
A. PREPASATION
This pro-active phase involves organizing training and equipment personnel of the
organization.
In general, military commanders and officers of the PNP must organized, train
and equip special reaction, security and negotiation elements and provide their
immediate activation when the need arises.
The primary concern is the formulation of crisis management policies, integration of mil/pol to
public efforts towards the prevention and control crises.
Organizational Structure
NCCM
.NACAH
Organized in all regions headed by Regional Crisis Director in coordination with all
Government LEA’s
RCAG
RCMOC
OSCP
The OSCP shall establish within the crisis incident site. It is a post or unit with in a
probable target to be headed by an
on – scene commander (OSC) whose responsibility is to take charge of every happening of a
crisis incident scene.
TACTICAL UNIT- composed of regular military or police placed under the command of the
OSC.
NEGOTIATION UNIT – it is headed by chief negotiator and composed of two or more members.
Their primary concern is to serve life, prevent destruction and pave the way for a peaceful
resolution of crisis situation
It is the performance of the crisis management plan when a crisis situation occurs
despite of the pro-active effort.
When a crisis occur despite the pro-active effort, the organization concerned must be
prepare to perform the crisis
management in accordance with their plan.
PERPORMANCE
The initial action stage is taken by the Initial Action Unit, which is composed of police and
military personnel immediately organized into team to initially respond to take incident and begin
the containment effort.
Negotiation- the chief negotiator undertakes negotiation as soon he has been properly briefed
and received appropriate instruction from the OSC, He shall keep the OSCP informed of
process of the negotiations and shall take instructions only from the OSC. No further negotiation
shall be under take when the tactical unit commander initiates tactical operations.
Tactical Action- the tactical commander makes a complete estimate of the crisis situation and
plans his courses of action upon arrival at the scene while negotiation is in progress. He
shall maintain and continuous contact with the OSCP. He shall take over authority on reaction
element throughout the tactical operations. He shall take instructions only from the OSC and
coordinate all support requirements with the OSCP.
These stages begin as soon as the perpetrator surrendered, captured or neutralized. OSC shall
ensure that the following are accomplished:
He also initiates recommendation for the compensation and provide assistance to civilian killed
and killed and injured during tactical operations. He initiates recommendation for the
rehabilitation, construction of damage or essential infrastructures.
Training and re-training of unit personnel special units and negotiators shall continue with their
training to improve their proficiency and enhance their readiness.
TERRORISM
So much has been written in recent years about terrorism by eminent people. Terrorism means
many different things to different people independent upon individual perspective thus many
definitions exist.
Terrorism is.. .
A threat or actual use of force or violence for political or other purpose to foster fear,
insecurity, distrust, and unrest among specific group or the general population
Violence for effect... not primarily, sometimes not all for the physical effect on the actual
target, but rather for its dramatic impact on an audience."
The calculated use of violence or the threat of violence to attain goals, often political or
ideological in nature."
Is violent criminal behavior designed to generate dear in the community, or the
substantial segment of political purposes.
A word terrorism is used to define almost all illegal acts violence committed for political
purposes by clandestine groups
National Terrorist
A terrorist who operates and aspires to political power primarily within a single nation.
Transnational Terrorist
A terrorist, who operates across national borders, whose actions and political aspirations may
affect individual or more than
International Terrorist
A terrorist who controlled by, and whose actions represents the nation interest of sovereign
state.
Motivation and Group Classification
a. Minority Nationalistic Groups-groups fighting the majority of the community where the
support base will depend one ethnic, religion, linguistic minorities a odd with the majority
community.
b. Marxist Revolutionary Groups- the terrorist movement that is characterized by its
possession of a coherent Marxist ideology and of a long term strategy for bringing about
the socialistic revolution.
c. Anarchist group- True anarchists are difficult to find since true anarchy bring lawlessness
and disorder, which is net a natural state which, the human race exists.
d. Pathological Groups- problematic individuals who are grouped
for some terroristic activities for emotional satisfaction.
e. Neo-fascist and Extreme Right Groups
Characteristics of Terrorists
Promote fear.
Main objectives is publicity,
Highly mobile.
Fatalist they can create destruction affecting the whole nation.
Undercover operations.
Small groups mean security efficiency.
They way terrorists group organized is determined by it’s the need of security and
number of people in the group.
As to group size, the large group can only succeed over a longer term in a week political
environment
Terrorists
Methods of Operation
c. Negotiation/Climax Phases'
Terrorist Tactics
Bombing
Activation means.
This is use to destroy or to disrupt public utilities, political HQs and industrial facilities
Hijacking
Hijacking and skyjacking are commonly used by terrorist. The hijack supply ,
ammunitions , fuel cargoes, and vehicles to provide them to gain entry to a close military area,
hijacking of commercial aircraft to again publicity or to ask demands
Assassination
The oldest but the commonly used terrorist tactic where targets are often police or
military officials or political features and they always claim responsibility of assassination
Ambush
Kidnapping
Kidnapping for ransom is the most common form of this tactic. The victim is normally
confined in secret hideout and kidnappers make material demands .
Hostage Taking
The hostage-taker confronts the authorities and openly holds the victims for ransom. His
demands are more than just material m nature. Political concessions are the frequency demand
in exchange for the hostage lives
Robberies/Extortion
Terrorists operations are expensive. To help finance their activities, terrorist rob bank
and armored vehicle carrying large of cash. Bank robberies are used as graduation exercise for
terrorist/training programs and viewed as a tactical operation.
The reconnaissance, plan escape routes and operates in the high degree of efficiency.
A. LITARY/POLICE
MICOMMAND AND CONTROL FACILITIES
LOGISTICS/STORAGE FACILITIES
COMPUTER FACILITIES
EXPLOSIVE, SENSITIVE WEAPONS, ARMS AND AMMUNTION DEPOTS.
Hydroelectric plants
Offshore oil rigs
Nuclear facility sites
Gas pipelines
Dams and electric power lines
TRANSPORTATION
HUMAN
Vulnerabilities are the weaknesses of the installation security and high risk targets with in
such installation. These vulnerabilities are normally identified through security surveys and
inspection conducted periodically or on the spot intelligence and security units staff.
The analysis of the treat to the certain installation is based on information with both static
and dynamic dimensions
A. STATIC DIMENSIONS
1. Terrain
2. nationality of population
3. Major industry in the area
4. Location of installations
5. Missions of the installations
B. DYNAMIC DIMENSIONS
1. Assignment of personnel
2. Secured measures used
3. Relations with civilian security
4. Demonstration within post location
1. Weather
2. Activities of hostile groups
3. Economic conditions
4. Local law enforcement
5. Off post demonstration
The vulnerability of installations can be determined to some extent through the consideration
of the following factors:.
Installation characteristics and its attractiveness as a target for the terrorist acts.
This is termed as crisis by the law enforcement officers and behavioral professional. This
situation exists.
When one or more individual are held captive by other person or person against their will
for purposes of demanding material things or due behavioral maladies criminal types hostage
takers may direct their demand toward the government or to other private individuals mentally or
emotionally disturbed may take hostage out of nothing or due uncontrollable forces
It was research by the experts that passage of time is in favor its hostages and to the
negotiators. In the first hour of the situation, the hostage taker is at rage and tension is at peak.
As time passes mental, emotional, and physical fatigue will be increased and will operate
against hostage taker. As this happen, the above- enumerated benefits of slowing time operate.
Crisis Management
Alarm stage
This stage is the most traumatic and dangerous. In the alarm stage, the emotion of the
hostage taker is exceedingly in its highest peak, is rationalization and proper thinking is low. He
may be extremely aggressive in his reaction to any perceived threat. E.g. . escape of hostage,
tactical assault trickery etc.
In order for the perpetrator gain cooperation from the hostages, he usually terrorizes the
hostages into submission. At this hostage may also inclined to physical harm or even kill
everyone who interfere with their attempts. (Strentz, 1984, p. 190)
The same is the situation in the part of the hostages. Since no known as when or does
not want that they will be held hostages. This is considered traumatic stages as they fear much
for their lives. From a peaceful situation, turns into a life and death situation ticking every
mimute of the lives of the hostages depend on the hostage (Herman, 1995, p. 92)
Person taken as a hostage becomes impatient; denial of reality sets in them, particularly
when those they expect to help seems to be doing nothing
In order to cope immediately with this agitated feeling, one must put into place a will to
survive since panic may cause over reaction in the part of the hostage taker and diminishes the
chances of survival. It is also important that hostages should disregard any of being a hero.
(Strentz, 1984, p, 196)
Crisis stage
In this stage, when negotiation attempts are being initiated by the crisis negotiator.
Outrageous demands and unpredictable emotion is marked or commonly noted in the hostage
taker. There is still a great deal danger since hostage taker try to consolidate their positions, to
do these, they try to move hostages to a safer ground area.
On the part of the captive, this is most critical because the stage may predict remainder
of the situation. Chances of survival may be enhanced or reduced during this stage through the
hostage hostages' taker interaction
It is advisable that hostages must control their fear as it increase unpredictable outburst
of anger and violence on the captor. The hostage taker may inconsistently enforce numerous
demands and pretty rules and this may result to unsuccessful negotiation. In additional, the
perpetrator seeks to destroy the victim's sense of the autonomy by depriving him of his basic
needs
At this stage hostages may start to feel three (3) problems: 1)isolation, 2)
Claustrophobia, and 3) Sense of time. Sense of time becomes important on hostages who are
hoping for rescue. This situation may also in favor of the hostage taker as they earn
compliance from their captives
Accommodation Stage
In the right manner, the hostages in good effect can make use of this phenomenon. It
lessens tension and openness is generated. It is advisable that hostages must avoid political
discussion as it accentuates differences with captors and hostages. (Miron and Goldstein)
Resolution Stage
This is the stage when the hostage taker is being stressed out or fatigued of the
situation. He is seemingly losing interest of the situation and lost most of his bargaining points.
Tension between the hostages, hostage taker and the crisis negotiator is notably low. It should
be regarded also that the crisis intervention techniques negotiation team have.
Paranoia - is a set of fixed delusional beliefs that are accompanied by clear and orderly thinking
outside the delusion system. paranoia manifests itself. A paranoid has been described as
"vigilant suspicious, distrustful, insecure and chronically anxious ". The are two types of
paranoid individuals:
Schizophrenia is a thinking disorder. Expert says that, approximately 80 percent of the mentally
ill of the population are schizophrenic. There are subcategories of this kind of mental disorder,
the catatonic state and the hebephrenic state.
The signs and symptoms of the schizophrenic condition may appear in three. The signs and
symptoms of the schizophrenic condition may appear in three (3) different way such as the
following:
In general, they are characterized by being out of' touch with reality and being recognized by
their false belief. Hostage taking is done in order for them to carry out plans for someone who
compels them to do. Their routine is to accomplish something but there is no accomplishment.
Most of the paranoid schizophrenics are in conflict and with difficulty in coping even in a minimal
stress situation.
Male paranoid may have problems with gender identity are religious beliefs. It is so noted that
frustration and conflict is involved. When these two combines, severe anxiety will surface that
makes a person so sensitive and volatile. Lack of interpersonal trust, religious conviction, and
sexual dysfunction, persecutory beliefs about family or significant individuals or even distrust to
the negotiator or police may lie in the person's behavior. This variety of Issues may cause the
negotiation difficult and dangerous (1986) .
The first thing a negotiator should do is to keep the dialogue at an even pace. Since paranoid
schizophrenic are out of touch with reality. It is must that the hostage taker should be kept calm
enough to stay in touch with while the negotiation process is going on. A good negotiation
strategy is suggested below:
Depressed individuals are in an incapacitated mental state. He may frequently know the
hostages and the latter might e the cause of his depression. Negative outlook in life, felling
unworthy, slow speech, suicidal and unpredictable and extremely dangerous are the
characteristics of this type of mentally disturbed. To a one who is a suicidal type, he might inflict
harm or even kill one of the hostages and the police will increased.
In this stage, reactions of the hostages are mixed either blaming their captors or may become
hostile and uncooperative to their rescuers and even accusing them to be the responsible for
the whole situation. They might even appraise their captors for taking care
Released victims become paranoid and often experience post trauma attacks their liberation.
These may even last for a long period of time. Such experience becomes part of their lives and
haunts from time to time if not being properly treated. They, being a paranoid, continue to
monitor their captors if taken away from them or safely put behind bars.
THE HOSTAGE TAKER
It is a must that a police officer who first arrived at the scene has the necessary skill to
determine what type or personality of the hostage taker is. This does not mean that he must
diagnose the perpetrator. In assessing the situation, one must be able to determine
and know the two kinds of behavior.
In may hostage situations committed, statistic reveals that’s most of those involve are mentally
disturbed individuals and the remaining are results of instrumental behaviors. According to
research, twenty five (25%) percent of all hostage situations are instigated by expressive acts.
With this data, it is important that we learn the different types of hostage takers and will begin
the emotional aspect.
Mentally disturbed
This group suffers from different kinds of psychological maladies. They may or may not in touch
with reality. A mentally disturbed individual may be a loner, act in accordance with a non-
existing irresistible force, or on a false belief or a stimulus (cooper, 1981). Symptoms may
include such thing as dramatic and sudden changes of behaviors, loss of memory, mistreatment
of a loved one, a sudden, and impulsive act of theft, extreme depression, or anxiety that is out of
proportion to the circumstances that appears to be causing the anxiety.
The individual may talk to himself of hear voices, or may be his displaying dangerous behaviors
without any apparent reason. Mentally or emotionally disturbed individual may be in a very
docile rood for awhile and become extremely violent without any apparent cause. (Adams).
International groups. In the United States alone, it has been reported that there are local
terrorists sowing fear. They create chaos through assassinations, bombing, arson and other
forms of malicious destruction of properties.
Though global terrorism is seemingly increasing and alarming, the international law
enforcement community is trying its best to address to this kind of problem, (the international
police organizations, other enforcement, religious and civic organization team up together in
fighting these terrorists.)
Regardless of their cause, their terrorist activities are condoned by most of the people.
Hostages are in serious jeopardy when their demands are not met immediately or if the military
pressure hovers them (i.e. development of troops, hovering choopers). The local police may be
not be able to meet the demands immediately and only serve as perimeter security as
they need government attention. They use media to get attention from the government.
Since most of the longest running crisis situation involves political terrorists, they want to
negotiate directly to the government and pay less attention to the agents or crisis management
teams. Terrorists also try let the. Government overreach in "the situation so when worse come,
they, the hostage and the rights group ‘will turn ire and blames on the government.
The common question asked is what causes them to do such. Evidently, hostage taking is their
means to get the much – needed attention from the government or private individuals just like
other types of hostage. In this way, the authorizes will initiate actions to negotiate for the safe
release of the hostage on the fear that the latter 'will end killed or harmed.
On the issue on ransom, according to them are just demanded to cover their expenses while
hostage are at their custody, nut in sense, will serve as their resources tc buy additional
firepower or in the recruitment for additional manpower in preparation for the anticipated
military or police pressures.
Just like other type of hostage takers, they need to be negotiated with. The only difference is
that a mentally deranged, inadequate and antisocial personality needs more the help of mental
health professional and rapid police response as the last resort to rescue hostages away from
gander. While on terrorist hostage takers, Plain staking bargaining on social and political
demands is traditionally used. Government negotiators are utilized to the fullest renegotiate and
bargain issues with the kidnappers.
Barricaded Criminals
This type might be robber cornered by the police while in the act of committing their crime e.i
bank robbers. Either barricaded in a building, road block or on gateway cars. Hostages are may
be employees, bystanders or both caught in the process of escaping. The hostage taking is a
spontaneous reaction of the criminal when cornered. Some law enforcement officers consider
barricaded criminals as attention weekers, but other describe then in the contrary as they avoid
being identified. Their primary aim is to escape safely taking with them the hostages as shield to
prevent being shot by the police. Usually barricaded criminals are engaged instrumental acts as
they demand for material things such as getaway cars, firearms, money, and safe escape.
Barricaded criminals may initiate bargaining negotiation as the police closely monitor them. As
earlier presented they might ask safe conduct pass for the release of the hostages, or they
might ask for additional money or gateway car and leave the hostages immediately. The
negotiator, upon gathering all the facts and assessment of the situation, including the mental d
faculties, he may use his own discretion in the negotiator process, whether to grant the demand
or not
Prisoners
While most prisoners spend most of their time inside the correctional institutions, some are
concentrated on penal colonies under light guard' and to those who are completely secluded
inside their prison cells; they are haunted by boredom, get tired and hostile. These may be due
to the strict implementation (lack of recreational activities and inadequate facilities, poor
structuring etc.)
These conditions may largely contribute to the occurrence of priors and crisis [hostage taking]
situations in our correctional institutions. Most probably, the hostages are the prison authorities
and staffs or even some of the inmates. For some institutionalized individuals, hostage taking is
there is means of effecting escape hostage serve as their shield against assault of authorities]
to stay away from the harsh prison condition. Another group of prisoner – hostage takers are
those who do not consider escape but a rather total improvement of the conditions and services
of the prison institution.
Prisoners who initiate hostage taking may be involved on either instrumental or expressive acts
or both. Instrumental behavior involves those situationaly related, substantive and objective
wants and commonly known as the commodity and of the hostage taker (Roloff and Jordan,
1992). An examples of this is the demeaned for prison condition as these are the causes of the
situation
Additionally the first group has similar purpose to the barricaded criminals as they inhibit
instrumental acts or behaviors.
The negotiation approach in this situation based on the acts involved is bargaining approach.
They need to be bargained 'with at the possible time as the lives of the hostage are in great
danger. This is possible, as the hostages are the main cause of the problem.
NEGOTIATION MODELS
In Crisis Situations
Whenever a crisis [hostage] situation is reported to the police or other law enforcement
professional, the initial action being taken is the activation of tactical assault or initial action
team and the coordination of trained crisis negotiators within their departments.
In cases where the hostage taking is initiated by a perpetrator, purely engaged in expressive
acts, the services of a mental health professional trained in crisis management is indispensable.
On cases of instrumental behaviors, tactical assault team are mobilized to contain and isolate
the area and on standby when worst come along as the negotiator/s enter the situation.
However, the services of mental health professionals are sought since most of hostage takers
with instrument behaviors are partially engaged in expressive acts.
In assessing a crisis situation, one must understand and be able to determine the two kinds of-
behavior. Firstly, instrumental behavior refers to actions on the part of the perpetrator and
negotiators that facilitate some of substantive outcome in terms of instrumentation issues.
(Situationally related. Substantive and object wants of each party). Additionally, those who are
engaging in this kind of behavior are having goals to obtain or to be fulfilled. Generally, hostage
takers of instrumental behavior are criminal types and intervention usually needs bargaining.
E. g. barricaded criminals, or other organized crime groups. Expressive kind of behavior on the
other hand refers to the various forms of perpetrator's and negotiator's behavior that serves to
communicate power or significance of the individual and his/her emotional state. Simply, it
involves the behavior of the perpetrator (Hammer and Rogan). This is characterized by the
hostage taker's attempt to display power. Those who engage in this kind are mostly emotionally
disturbed individuals. E.g. mentally insane, etc
Over the years there are approaches used by negotiators are devised to suit to these kinds of
behavior or acts.
Earlier discussed were the two types of acts. Bargaining negotiation approach is the model that
negotiator employ whenever instrumental issues come along way. In this approach, negotiation
is viewed in terms of an exchanged or distribution of resources. This approach is derived to the
Social Exchange Theory of Roloff, (1981), which accordingly has two premises;
The Social Exchange Theory is obviously focused in the exchange of objects during the
negotiation. In order that the negotiation be successful, some authors of crisis management
books claimed that the communication approach involve the exchanged of one set of resources
for others or known as bargaining.
Bargaining is a powerful tool to resolve a conflict provided that the hostage takers focus on
instrumental concerns or issues that is negotiable. They are more likely to be engage with the
hostage negotiator in order to bargain and resolve the crisis.
Van Zandt, Rogan and Hammer reviewed and made critique on this approach and notes:
"The type of situation law enforcement usually encounter, often fall in several ways to match the
requirements of instrumental negotiation approach."
First, crisis negotiation situation is not typically like others, more common forms of
instrumental dominated bargaining where the assumption is that, the parties come
with well thought out proposals and are willing to a bargaining process.
Crisis (hostage) situations involve high levels on anxiety and uncertainty. They are
characterized by a pronounced level of emotional excitation precipitated by the hostage
takers motives and enhanced police response.
Majority of hostage crisis occurs as a result of the mental and emotional inability of the
hostage takers to cope with life stressors. These procedures a situation where normative
rational actor bargaining is generally absent and its place exist an explosive dangerous
and volatile set of interaction dynamics where emotional excitation and relationships
issues (e.g. control, power, trust, liking and face) play a critical role.
Overall, the particular features of crisis situation discussed above suggest that negotiators often
face interaction dynamics that may not fully explained by the instrumentality focused bargaining
approach.
This approach is mainly focused on the emotional state of the hostage taker as a powerful tool
to resolve the crisis situation. Expressive negotiation approach came to existence with the use
of psychology, human relations theory and research. Both assume that the nature and quality of
interpersonal relationships play a large role in resolving a conflict. (Folger, Poole and Stutman,
Schlossberg, Van Zandt, Rogan and Hammer)
Schlossberg has suggested three (3) assumptions of the expressive negotiation model.
In addition, relationship development and confidence building strategies are viewed as critical to
resolution of crisis [hostage] incidents. The negotiator must have enough training in listening,
paraphrasing, self - disclosure, open ended questioning to reduce perpetrator' s anxiety.
Van Zandit, Rogan and Hammer discussed in their book three (3) recent additions to the
expressive negotiation approach.
Under intense stress, the Stockholm syndrome may likely to occur.
This phenomenon has been carefully studied and recorded by
psychologists.
The impact of the incident stress on negotiator's psychological
well-being. More so on unsuccessful negotiations. Negotiators
should also deserve attention like professional help.
Explications of emotional and personality disorders and their
impact on crisis negotiation. Most of the hostage situations are
committed by paranoids, depressed, antisocial and inadequate
personality typologies.
Hostage negotiations depends on the psychological characteristics of the hostage taker and the
identification of the effective communication strategies when negotiating with perpetrators who
exhibit behavioral patterns consistent with specific mental and emotional disorders.
This model of negotiation is used to lessen the perpetrator's emotional tension to give way for a
rational problem –solving atmosphere. (Hammer and Rogan)
There are three (3) interaction concerns relative to. The communication - based negotiation
approach, which may tend to escalate or deescalate the conflict. (Hammer and Rogan)
"Instrumental message behavior arises in crisis negotiation as the hostage takers and the
negotiators bargain with one another regarding with the incompatibility on their objective
concerns."
In this concern, there. Are two broad types of issues involved, the substantive issues and non-
substantive issues or the situationally related and the situationally unrelated respectively?
Relational concerns
Relational, message behavior denotes when an individual's concern is more on the nature of
the relationship to other individual. There are three (3) core elements that represents relational
message behavior.
a. Power - this concerns the degree the agreement between the two interact ants along a
dominance submission dimension.
b. Trust - revolve around the degree to which each party is willing to
accept the premise that no one shall be hurt or no act shall be
detrimental to self.
c. affiliation - refers to belongingness and acceptance between the
perpetrator and the negotiator (respect, liking and caring for the
well-being) .
Identity concerns
Identity concerns refers to an individual's concern for self - presentation, reputation or face.
These are then important to both parties.
According to Tajfel's Social Identity Theory as discussed by hammer and Rogan, personal and
social identities are the two dimensions of a person's self image and are best to be known by
the negotiator when dealing with conflict situation, noted as:
Personal identity is based on an individual's unique perception of his or her own attributes' (the
person perceives himself either weak, strong, or intelligent). Hammer and Rogan also
suggested that a suicidal emphasis is on personal identity concerns, and social identity consists
of those characteristics and their emotional significance that is attached to one's membership in
social groups...' (Nationality, gender, ethnicity, social group/ cult).
Rogan and Hammer further discussed that face message behavior varies along three (3)
dimensions and the first denotes the locus of a communicator's interest -( is the face message
directed to one's self or to other?); Face valence is the second dimension, a behavior either to
attack or honor face. Finally, ' face - honoring entails a dimension which relates to whether the
message behavior functions to proactively protect against potential future threats to face or to
retroactively restore perceived loss of face'.
When these three (3) dimensions are combined together, there are six (6) types of face
message behavior being produced
This behavior is self-honoring and self-directed messages. More often, the hostage taker this
when he is asked about the condition of the hostages and replied ("I don't know but I think
they're all OK!")
Is a behavior that tend to attack or is directed to one’s self. The statement/(“I know this is all my
fault”)fits to this
The perpetrator directs criticism or attacks to himself when he fell remorse of his act and this
usually occur during the accommodation stage.
Restore Self's Face
This is used to restore one's face/ reputation. ("I’m not as crazy as you think...")
A hostage taker with psychological maladies uses this face message behavior to restore his
reputation.
A face message behavior that is directed towards the other party. ("You're such an intelligent
guy...") or (" You've got a lot of people who cares about you ...") The negotiator tries to restore
the perpetrators face by attempting to gain cooperation and lessen the letter's psychological
burden.
Known as the traditional message behavior utilized to protect other's face from future attack or
loss. ( " I know you can overcome these odds in your life...")
This represents the traditional, more limited view of face attack behaviors. ("These people
causes me to do this ../') When a negotiator shifts the blame to others, it does not really mean
that hostages are not prime importance. It is more likely that the hostage taker fell sense of
understanding and belongingness. However, if the hostage taker is the one who uses this, he is
trying to imply that the main cause of the situation are the people involved [hostage].
In the event of hostage crisis, the Stockholm syndrome will likely to occur. This phenomenon is
referred to as the process of transference in which the hostages begin to identify their captors
and the following may occur.
This phenomenon got its name after one of the hostages in an aborted bank robbery in Sweden
fell in love with the perpetrator (Strentz, 1994). In some instances, hostages may even help the
perpetrator consummate the crime either by providing cover fire during the escape process or
actually joining the heist or become an instant-member of the group.
Stockholm syndrome with operate when there is an extended period of time, not being isolated
from one's captor and the positive contact between the hostages and the hostage taker
(Fuselier, 1981).
Variety of issues may possibly cause the occurrence of this phenomenon such as:
Pity - In the case of mentally disturbed individuals, hostages may pity them, as they believe
these individuals need to professional help. The hostages may offer advises (i.e. not advisable)
or even instruct the police not to launch a tactical assault against the defenseless and sick
hostage taker. Personal feelings - the hostage may feel affection towards the hostage more
when the hostage is female, with pleasing personality and cooperative.
Indoctrination - barricaded political terrorists tend to indoctrinate their hostages to force them
agree and believe with their stand or political ideology. It is not so surprising that a son of a
slain scout ranger sergeant in Mindanao joined his Abu Sayyaf captors daring the siege in 2000.
Poor inaction of the authorities - the hostages in the alarm and crisis stages of hostage taking
want to be speedily rescued before they will be killed or harmed.
In a crisis [hostage] situation, negotiators consider staling of time the number one rule in dealing
with hostage crisis. On scene negotiators state time to decrease tension among themselves and
the hostage as they feel neglected. They will end up sympathizing with their captors and
uncooperative to their rescuers.
It should be corrected that providing assistance to the hostage taker not a conclusion that
Stockholm syndrome has occurred. Hostages nay carry the moneybag or the clerk opens the
vault due to continues threat of the hostage taker.
As Stockholm syndrome continue to develop among the hostages and their captors, the latter
will make increase awareness of the safety of the hostages for fear of losing a shield. The
negotiators and the hostages however may benefit from this phenomenon since the safety of
the hostages is increased. This happens during the accommodation period as hostages may
tend to obey every command of their captors and the latter will decrease or lessen the degree of
security, control and the introduction of physical harm among the hostages.
OPERATIONAL PROCEDURES
Steps in Negotiation
a. On initial contact - avoid hostile or antagonistic approach, introduce yourself- don't use
title or rank, sell yourself- sincere and honest, instill trust and confidence, minimize
tension soonest
b. Development - drawing a psycho profile or hostage taker, reinforce relationship
establishment at initial contact Alternative steps
c. Climax stage
d. Termination
KIDNAP FOR RANSOM is a criminal act, particularly described as the unlawful and carrying
away a person by force or fraud and against his will, or in any manner depriving him of his
liberty for the purpose of extorting ransom as payment for the release.
KIDNAP FOR RANSOM is a common term used describe a specific criminal act under ART.267
of the RPC entitled "Kidnapping and serious illegal detention."
KIDNAPPING, in general, possess a serious threat to the peace and order condition of the
country. Focus of concern, however, falls on so-called kidnap for ransom case, because they
exist a heavy tall not only on their victims and the victim's families, but also on society
as a whole. This is so because kidnap for ransom is by nature a syndicated crime perpetrated
by professional criminals groups capable of planning their nefarious trade that even a single
gruesome act of kidnapping expertly pulled by them could prove very alarming to the
public.
After the would-be victim has been spotted, the kidnap group conducts a through study on his
background and his daily routine movements/activities.
After careful surveillance and planning, they would kidnap the victim at an opportune time.
The victim is them brought in a pre-designated area, usually outside urban places where the
victim is held in captivity ransom for his release is being negotiated.
How facilitate the kidnapping for the victim, a gang member is sometimes made to seek
employment with would-be victim's family, either as a diver r as household help. In coordinate
with an inside man, the group snatches the victim at on opportune from the public.
Although the manner of accosting the victim varies from one kidnap group to another, the most
common method of approach used by kidnap groups is by blocking the kidnap victim's car by
using military or police-like vehicles, sometimes with siren. At least one of the kidnappers is in
complete military or police uniform and armed with a long automatic weapon. The victim is
intercepted and accosted with alleged traffic violations.
Ransom negotiations are later than affected through various means of communications. The
most common is through telephone.
The kidnappers will call up the relatives of the victim ana demands for a ransom for the release
of the victim. An almost hysterical victim is sometimes made to speak over the telephone and
appealed to his bewildered relatives whose tendency to cooperate blindly with the kidnappers.
The kidnappers then indicate the amount, normally in cash payable on a date and a place
specified set by them. Threats on the life of the victim are also relayed to the one contacted in
case term of the ransom one not met which include, among others, non-disclosure of the case
to police authorities.
WHAT ARE THE BASIC OBJECTIVES OF THE SPECIAL UNITS OF THE FNP IN
DEALING WITH KIDNAP-FOR-RANSOM?
By priority, the basic objectives of the PNP special Unit handling kidnap-for-ransom cases are
the following: To insure safety of the hostage or victim is a paramount
consideration.
That takes precedence over all others. Utmost care is therefore exercised in the conduct of
rescue operations to understand and minimize the mental anguish and agony of the victim's
family and friends to achieve the early liberation/salvation of the hostage/ victim. To insure
successful cases against suspected kidnappers. To ensure successful case building and
prosecution of case against suspected kidnappers to prepare for any similar eventually that may
ultimately endanger the preservation of internal peace and order.
The role of the citizens especially the families and relatives of kidnap Victims is to report
immediately any kidnapping incident to police authorities. Aside from this, they should extend
their outmost cooperation to the police not only in the rescue of the victim but also in the
effective prosecution of the suspect as well as in the efforts to locate, identify and arrest kidnap
gang members who remain at large.
If you believe that you or members of your family are potential targets of kidnap-for-ransom
groups, the most logical thing to do is to be SECURITY CONSCIOUS always in your person
and in your day to day activities.
ASSASSINATION
What is Assassination?
Protection is a buffer set-up thrown around a dignitary who will either prevent an attack or
absorb the shock to such an extent that the result will not be tragic.
It must strive to protect the dignitary wherever he is located but must always be able to move
him to a safer area if the need should arise.
Absolute protection is seldom possible. Therefore, the protective forces should always try to
operate in such a manner that any attempted attack will have the smallest possible chance to
succeed. Every element of protection must be thoroughly planed in advance and every the
protective detail must be scrutinized to make sure it is not playing into the hands of same
attackers
Protection must be surprised proof and flexible enough to instantly respond to any emergency.
There are usually advance clues of a planned attack and the protective system must secure this
intelligence from all possible sources resources and recognize the signs of danger.
1. Physical Assault - The inflicting of physical injury, with the nof disabling the object of the
attack, such as murder and trashing
2. Threats The objectives of threats are to frighten the person and bring about a change of
policy. The adversary may use anonymous letters; radio broadcast and in the adversary
happens to be from a foreign country, he will have additional means at his disposal, such
as the local press, international forum or assemblies.
3. Insult and Humiliation The adversary tries to ridicule the VIP in the eyes of the people,
and will use different means in order to achieve these objectives
Plan for protective operations to include a complete evaluation of the dignitary's level of threat
exposure of possible attackers and the vulnerabilities of the protected. Develop intelligence
profiling, likely scenarios and the projectile’s environment and routes of travel
and security measures already in place. Finally, the identification, selection, and implication of
protective counter measures shall be undertaken.
As recognized by most police agencies absolute and complete protection against assassination
of a dignitary is seldom possible. The goal is to minimize the chances of success of any
contemplated attack. The privacy of the dignitary must be considered, and under no
circumstances should he embarrass. Despite this, protection must be provided against hazards
caused by personal designs, accidents or negligence, Procedures are unknown to the public.
Every phase of security must be carefully planned in advance Pertinent factors considered in
this planning include importance the protected persons, political attitude of the local population
distance involved, means of transportation, and duration of the security
Physical protection consists of a series of protective cordons each compelled in itself. These
defensive maybe composed of security personnel, physical barriers, or a combination of both.
An example of this type of security is the protection established will begoverned by the factors
considered in the planning stage.
Security planning should be flexible. Weather conditions and mechanical failures (including
failure if lighting) are two ever- present potentials hazards. The unexpected arrival of a large
number of visitors is another situation frequently encountered. Last minute changes in the
schedule of events occur on occasion. The security must be sufficient trained to cover these
and many more eventualities
Central direction and unity of effort are of special importance because of the nature of this
assignment. The officer-in-charge should be designated with full responsibility for all phases of
the security mission. Close coordination must be established with all local military, police and
civilian authority. The security's responsibility for each phase must be clearly defined.
Arrangements should be made for the local civilian police to control local inhabitants. All
available intelligence channels should be utilized for information of potential danger areas.
The advance party can best accomplish much of this coordination after the official's itinerary is
received.
It is recommended that routes and means of transportation used by (the protected person not
be published It is recognized however that in many instances this is not possible. The itinerary
more of that not receives wide publicity. It is necessary that he address public Audiences,
farewell delegations at bus stations and airports. Careful security of the normal itinerary will
reveal many phases of the transportation that need not be made public. Routes to destinations
must not be revealed. If a series cf appointments is scheduled for a particular location, routes
should be varied. In this regard, close liaison with the Information Officer or individual acting in
this capacity should be maintained. No publicity should be given concerning the mission except
that which the Information Officer may release. Maintaining secrecy on the movements of the
dignitaries is one of the most effective means of minimizing the opportunity for attack.
Personnel for the security details should be outstanding in the performance of duty. They should
be mature and presentable. Normally, accredited military, police criminal investigators are best
qualified for this duty. They must be trained so that each individual, will exactly know what he is
to do in any emergency .Security personnel must sacrifice their lives whenever necessary to
prevent the success of an attack.
USE OF SECURITY PLAN An excellent format for preparation of a protective plan is the
standard operation plan used by the police. The requirements of the plan which are
coordination's or liaison, the itinerary defense area, personnel and equipment requirements post
designation , corporation, communication, public relations, and miscellaneous emergency
information, can all logically included in the normal five paragraphs of the operational plans.The
plan should be on -writing and procedures in sufficient copies, so that it can be staffed with
those officers with whom coordination is necessary. Only key personnel needed to provide a
complete protection are given an orientation on the events of the plan and should be familiar
with the whole operation. Each participant commits the requirement of his specific mission to
memory. For this reason, the plans contained detailed instruction for each post and mission.
The instruction should be simple to understand and easy to execute. The length of the plan will
depend upon the size of the mission to be performed. The itinerary consists of one or more men
stationed or in fixed post. Police should know the identity in the party of protected official. The
attitude of the protected official must be estimated by the police officer. In the most instances
the presence of security personnel, is unpleasant to the dignitary. This
is understandable in view of lack of privacy. The security must be aware of this. Natural
reaction, actually anticipate it, and they observed adherence to strict policies of non irritating
conduct.
In the initial planning stages, all potential embarrassments should be avoided. It is normally a
good policy to avoid direct contact with the dignitary on details of arrangements. The Officer-in-
Charge should coordinate with the member of the official party who designated for this purpose.
When appropriate, they offer suggestion tactfully. The chief of the escort acts exercises
enforcement power over the security of an important person only when necessary with caution
and diplomacy, any violation of the security measures for important persons is brought to the
attention of the chief of the escort or guard. The security police officer insures that the guards
comply with every detail of their instructions.
Restriction in the circulation of individuals should.be strictly enforced. Before any person is
allowed to approach the important person of his effects, he is checked. The security should not
enter into conversation between the dignitary and other individuals. Information should be given
only when solicited. In all dealings with the protected person and his associates never volunteer
for uncalled for personal favors. Deliberates attempts to ingratiate themselves only serve to
degrade the security mission and result in an undesirable relationships if the official members if
his party is bothered. Security personnel should react accordingly. The protected person should
set the standards of the relationship. In the absence of such standard actions of the security
detail should be formal.
There is always a danger of undue alarm due to accidentals discharges, and the injury of
innocent persons, when weapons are carried. All personnel should carry a bolstered sidearm of
at least, 38 or 9mm caliber. Automatic pistol should contain a fully loaded magazine with a
round in a chamber and the safe on. In certain areas, when attackers are made in force by
armed mobs, the appropriate weapon or machine gun can be used. The machine gun can also
use when attacks are made from the vehicles, and when the attackers are behind the shields or
barricades. Riot or shotguns should be available when the attack is made in a congested area
where there is danger of injuring innocent people if long range weapon are used. They are also
effective against mobs using "Banzai" type of attacks. The use of police nightsticks and tear gas
will break up and confuse the crowd, making their movement by the protective force easier
CROWD CONTROL
The protective personnel should understand the principles of crowd control. They should not
show prejudice, sympathy, or become involved in grievances of the crowd. When force is
necessary, the protective force should move with the speed and surprises. At the first sign of
disorder all leaders should be apprehended. The real troublemakers are usually to the rear of
the crowd. Protective forces should not be fooled or deterred by the mob leaders who-arouse
and use women and children in front ranks to shield themselves from aggressive action by the
protective personnel. The crowd's retreat should never be hindered, it should be moved in the
direction where there is no space to disperse
All areas to be occupied or visited by the protected person should be surveyed in advance. The
procedure to be prescribed of building inspection is complete and thorough. In many instances,
the dignitary is a state visitor of the nation; on other occasions he maybe the houseguest of
other high ranking government officials. At times, he may stay in hotel occupied by numerous
other guests.
Certainly, all the inspection listed in this section are feasible. The officer -in charge and his
advance party use common sense of sound judgment in establishing the best security possible
under existing circumstances. In some instances, the advance party can facilitate security
measures by arranging for a separate floor or wing of a hotel as a billet for the party. Normally,
billeting arrangements are included in the itinerary prior to the start of the security detail. Proper
building inspection entails a thorough examination from roof to basement. Blueprints of the
building should be obtained. Rooms and hallways are measured visually and compared with the
dimensions trained driver and the type of vehicles to be used should be given therefore better
protection for the dignitary recommended. Route survey should be conducted in advance before
actual travel and protective details should be equipped with radio communication processing
encoding-decoding "scrambling'' capabilities. All auto motive equipment should be excellent
mechanical condition and should be regularly inspected for signs of tampering and bullet proof
if possible. The driver should be well trained and reliable. Vehicles must be secured at all times
during security missions. Escort vehicles should precede the protected vehicle as closely as
possible consistent with driving safety. An advance car should precede the convoy by
approximately one-half kilometer to observe hazards and reports on unusual conditions. A
reserve vehicle should follow the convoy as a short distance from the rear for use in emergency.
The escort follow- up and all security vehicles should maintain radio contact. Whenever minutely
examined for cracks, evidence of recent repairs, or any
unnatural appearance. Suspicious areas should be .examined satisfactory by reliance on
operating or maintenance personnel. All furniture are carefully examined,. All doors opened and
drawers are removed as check for concealed compartments. All wires leading into or leaving the
indicated in the building plan to locate any hidden passage or alcoves. Each room is examined
systematically. Walls, ceilings, are mentally divided into the three - foot squares and each
square various rooms are traced and all devices connected with them identified. Heating
radiators, plumbing, pipes and.similar equipment are carefully examined for dummy
installations. All locks and locking mechanisms are inspected. After the inspection is completed,
the room or building is secured until used.
Protective Techniques
PROTECTION WHILE RIDING IN VEHCLE –the selection of security trained driver and the type
of vehicles to be used should be given thought, then a closed car provided with greater
concealment and therefore better protection for the dignitary recommended. Route
survey should be conducted in advance before actual travel and protective details should be
equipped with radio communication processing encoding-decoding "scrambling'' capabilities. All
auto motive equipment should be excellent mechanical condition and should be regularly
inspected for signs of tampering and bullet proof if possible. The driver should be well trained
and reliable. Vehicles must be secured at all times during security missions. Escort vehicle
should precede the protected vehicle as closely as possible consistent with driving safety. An
advance car should precede the convoy by approximately one-half kilometer to observe hazards
and reports on unusual conditions. A reserve vehicle should follow the convoy as a short
distance from the rear for use in emergency. The escort follow- up and all security vehicles
should maintain radio contact. Whenever possible, a member of the security detail is placed in
the protected person’s vehicle. In extreme conditions, when greater security is necessary, one
or two dummy vehicles, carrying individuals who are similar in appearance to the protected
person, may be included in the convoy. Fixed post and bridges, underpass, and traffic stops
must be secured when deemed necessary. An alternate route should be arranged for
emergency the convoy will confirm with the local traffic regulations. Evaluation of such situation
is made to determine the degree of security, which is practical and necessary.
TRAVEL BY TRAIN generally, the greatest potential security hazard exists at the points where
the escorted person boards or leaves the brain. Usually this is a congested area with numerous
individuals carrying all sorts' bags, packages, and containers. In the study of assassination
techniques, the large number of attempts in this location is not worthy. When possible the area
should be closed to the public or the dignitary's party, it should be attached to the rear of the
train where feasible. The members of the security details should be in control of all entrances of
the car. When the train is stopped, they assume position covering all avenues approach to the
car. If the protected person leaves the train for a temporary period constant security should be
maintained on the train until the protected person returns and the train departs. Prior
coordination should be made with railway officials for exact scheduling stop en enroute.
Railroad security and local police at scheduled stops can contracted for standby assistance.
When deemed necessary and rear guard train may be placed on the other cars of the seated
among passengers, as an additional safeguard.
TRAVEL BY AIR normally, a special plane is placed for transporting the dignitary and his official
party. The technical safety factors, such as clearance of operating personnel and control of
flight, are responsibilities of the operating agency when performed by military forces. The most
dangerous periods , as in train, movements are boarding and departure times. All structures
offering observation of the boarding shall be adequately secured either by- closing of when not
used or by strategic placement of security- details. When a large crowd is expected for takeoff
ceremonies, barricades and uniformed military or police force in sufficient number should be
included in the planning. The plane designated for the important person should be kept away
from contact with the plane. When the designation is another base, advance arrangement
should be made with the Air force office for additional security and transportation is normally
scheduled for the important person and his party. It should riot be forgotten however, that
arrangement must be made for the accompanying security personnel.
TRAVEL BY SMALL WATERCRAFT when planning for a cruise the boats selected should be of
types and sizes capable of withstanding weather and surf conditions that may be encountered.
A thorough inspection of the boat designated for the protected should be made in conjunction
with responsible ship personnel. The inspection is primarily for unauthorized persons stowing
away for any suspicious objects or packages. An additional check should be made for adequate
lifesaving and emergency facilities. Security personnel should be alert for either craft
approaching the dignitaries' boat. When feasible, arrangements should be made for beat to
follow the protected person's boat..
PROTECTION WHILE WALKING• one of the best protective measures is varying the selection
of walking times and routes. The security- details accompanying the dignitary should be
positioned to cover all avenue o' access, additional security personnel should cruise in the
immediate vicinity. Local police agencies can be of special value in adding background security
in these instances.
PROTECTION AT PUBLIC ASSEMBLIES a careful search and inspection of the area should be
made at the time protection is established. A physical defense zone should be set up
immediately around the dignitary, and additional concentric defense area should be added to
the greatest possible extent. Protection in the defense zone is provided by protective personnel,
permanent or temporary type barricades, and a combination of the above techniques. Screening
points to admit passage of authorized persons and material should be established. Observant
and inconspicuous personnel should be patrolled among the crowd. Maximum use should be
made of security' aid such as flood and spot lights, communications, emergency equipment,
special weapon, locks, barricaded area, and helmet proof equipment, and materials.
PROTECTION WHILE IN A RESIDENCE the protective details should occupy at least one
protective ring. At least two additional areas should be established in the outer perimeter. There
must be a pass system for the staff and frequent visitor. Food supplies should be checked and
food selection and handling should be controlled. Mail and packages should be fluoroscope.
Periodic inspection should be done on premises for safety hazards, lethal devices such as
bombs, traps and sufficiency of security equipment. Adequate communication should be
maintained, and all possible emergency situations should be considered.
PLANNING CONSIDERATIONS
The assassin is a discontented individual who decides to kill the person whom he thinks is
responsible for his difficulties. He attempts to gain advantage by the use of surprise. A well
trained protective force that he likely to be caught does not discourage him. Assassins do not
have distinct features. They are not concerned about death. Many of them suffer from mental
disorders.
DURING:
AFTER
'
BOMBING
(Incident Awareness)
With the recent advancement of science and modern day technology, bombs becomes more
sophisticated, smaller in sizes, easy to handle
The tactics common to terror group is bombing. Of all terrorists incident records. 70 % were
attributed to terrorist.
1. The bomb is a popular weapon because it is cheap to produce, easy to make, has
variable uses and is difficult to detect and trace after the event. Investigations have
revealed that the targets for "terrorists bombing" are not selected at random. The modus
operandi for selecting the target and planting the explosives appears to follow this
pattern:
2. The target is selected because of political or personal gain to the terrorists. It is then
under surveillance to determine the entrances and exits most used Reconnaissance of
the building is made to locate an area where a bomb can be concealed, do the most
damage and here the bomber is least likely to be observed.
3. A test dry run of the plans is often made. After the dry run and at a pre-determined time,
the. Building is infiltrated by the bomber to deliver the explosive or incendiary device.
4. The device maybe partially pre-set prior to planting. If it is
fully set and charged, it is simple matter for one or two of the
group plan the device in a pre-selected concealed area.
a. This can be accomplished in a minimum of time. If the devices
is not fully set and charged, one member may act as lookout
while others arm and place the device.
b. Most devices used for the destruction of property are usually
of the time delay type. These devices can be set for
detonation to allow sufficient time for the bomber to be at a
considerable distance away before the bomb threat call is made
or the device is detonated.
HOW TO PREPARE
The terrorist have developed their plan of attack and the following procedures are suggested to
business and industry for coping with the bomb threats and actual bombings.
a. Contact the police, fire department and other local government agencies to determine
whether any has a bomb disposal unit. Under what condition is the bomb disposal unit
available. What is their telephone numbers? How can you obtain the services of the
bomb disposal unit in the event of a bomb threat? Will the said unit assist in the physical
search of the building or ill they only disarm or remove the explosive device.
b. Establish strict procedures for control and inspection on packages and material entering
areas.
c. Develop positive means of identifying and controlling personnel who are authorized to
access to critical areas.
d. Arrange if possible, to have police, fire representatives with members of your staff,
inspect the building for areas where explosives are likely to be concealed. This may be
accomplished by reviewing the floor plan of the building.
e. During inspection, you should keep particular attention to rest rooms, storage, crawl
areas, trash bins, main switches, etc. it can give you an idea where a rime delayed
explosive device or
PHYSICAL SECURITY PLAN - physical security measures taken for the protection of property,
personnel, materials, facilities, and installation against unauthorized entry, trespass, damage
sabotage or other illegal or criminal act its deal with the prevention and is designed to protect
against not only bombing incidents, but a full range of possible attacks
a. ACCESS TO ECPLOSIVE
b. KNOW – HOW
c. ACCESS TO TARGETS
Particular attention must be given to the third pre- requisite because this is the one area which a
law enforcing organization has the greatest opportunity to deter a bomb incident. If adequate
preventive measures and physical security precautions are established; the opportunity to
obtain explosive emplace bombs will be reduced. In addition, an effective bomb threat and a
well-rehearsed, procedure for handling bomb threats and incident will reduce the chances a
bomb being successfully detonated.
THREAT EVALUATION
EVACUATION
A number of factor may influence the decision whether or not to evacuate. Threat assessment is
the primary consideration. Also, the most likely place for a device to be located is on the exterior
of the building. Evacuation to the outside of the building may increase the danger to personnel.
The second most likely places to conceal a are those areas of accessibility to the public, i. e.,
hallways, lobbies, and restrooms. Evacuation of personnel through public areas may increase
the hazard. Secondary assembly points should be established in the event the device is located
at/ near the primary assembly point.
An alternative to total evacuation is partial evacuation, which is effective when the threat
indicates the specific location of the device. Partial evacuation requires a high degree of
planning.
Should a device be located, the area around the item as well as the floors above and below the
suspected item should be evacuated immediately.
Searched Procedures
The search must be thorough, systematic, and quick. The bomb threat plan should Include floor
diagrams and room search cards. These the garage search. The search starts at the lowest part
of the building, i. e. basement garage, or bottom floor.
The building search should start simultaneously at four place: the exterior search, public search
area, the detailed room search, and the garage search. The search starts at the lowest part of
the building, i. e. basement garage, or bottom floor.
As the exterior search and public area search teams complete their tacks. They will supplement
the detailed room search teams in progress.
Two - person teams have proven most effective in searching must area. Exceptions would be
for search or very large areas such as parking garages and auditoriums.
Except for the most unusual circumstances for cip and or presidential technical security
measures. End/bomb squad and military/' police will not be used to search for reported
explosive device in community areas, building and offices. Rather, such searches must be
conducted by designated individuals familiar to the area and its contents. If an unusual items is
found, end is to neutralize and evacuate the device for disposal. Law enforcement personnel
are to be employed around the threatened area to control traffic and provide other regulatory
service.
DAMAGE REDUCTION
1. Coordinate with the nearest police 1 unit how avail services of the bomb squad
2. Alert fire station and medics
3. Cordon the area
Usually, bombs that are used for terroristic purposes are disguised and are contained in any of
the following : GIFT WRAPPED PACKAGES, BISCUIT CANS, FRUIT COCKTAIL BASKETS,
ATTACHE CASE/SUIT BAGS, LUNCH BOXES, LAUNDRY BAGS, SHOPPING BAGS,
ENVELOPE, BOOKS, CLUTCH BAGS, BETTERS TRASH BOXES, GARBAGE CANS,
LADIES BAGS, CAR/ BOXES, CARTOONS.
LOCATION OF BOMBS
The location of the bomb at the target site is usually determined by three criteria:
Once it has been determined that explosive items on inspected package exist and while
awaiting for the arrival of eod/bomb squad personnel, start the protective works by utilizing
minimum number of person for reason of safety such as VENTING which is the opening of
doors and windows to minimize the blast effect, BUSTTRESSING which is sandbagging
adjacent walls to prevent blast and shock damage to adjacent rooms and BAFFLING which is
the placing of sandbags around the bomb to minimize blast fragment damage.
METHODS OF DELIVERY
Alert personnel for possible additional bombs, secure bombing scene and evacuate the injured,
leave obviously dead personnel, when fire occurs after explosion, assist in putting off the fire
and collect and preserve evidence.
1. ON PSYCHOLOGY
Several forms of bombings are attractive to the radical mind.
Bombing historically is linked to anarchy and classical revolution
Satisfying feeling of conspiracy, danger action drama and finally group
excitement
Disassociation psychologically from any resulting death or
injury.
2. AS TO TECHNOLOGY
Commercial explosive materials are not necessary to construct effective bombs
Underground literatures and legitimate publications are available
Contrary to popular beliefs college of high school students taking up chemistry
subjects have the capability making bombs.
3. AS TO SECURITY
Successful bombing destroy the kind of evidence that can
lead to conviction of bombers
Fingerprints, bloodstains and tool -marks offer no threat to
the careful bombers.
Eyewitnesses and incriminating evidence are frequently not
available in bombing scene
MPORTANT REMINDER:
BE VIGILANT ON TERRORISM
Harm civilians
Disrupts business activities
Embarrass the government
Sow anxiety and fear in the minds of the people
All sectors of the community must be against criminality and terrorism. While the government is
doing everything within its authority and power to protect the people and put a stop to
these terroristic acts the pro-active participation of the citizenry is of utmost importance.
No one should allow himself/herself to be cowed into fear. Everyone should instead live his/her
life normally.
SIX – POINT CITIZEN ACTION IN CASES OF BOMB THREATS AND BOMBING
stay cairn
take proper precautions at home and work
immediately report incidents or information to hotline 117, to
text 2920 to magic eye 8383203 or to other proper authorities
(i.e.) Barangay and /or other local government official local
police
delete do not forward rumors or unverified report receive through
text messages
get back to regular routine and day to day activities business as
usual soon as possible
Organize/actively participate in monitoring groups in your
neighborhood and/or in your work place.
SWAT teams are highly trained police units. A unit is a small group within a larger group. SWAT
stands for Special Weapons and Tactics. Tactics are actions aimed at solving problems.
SWAT team members are weapons and tactics specialists. A specialist is a person trained for a
particular job. SWAT team members use their special weapons, tactics, and training to protect
the public. They handle police emergencies. An emergency is sudden and risky situation.
Police send SWAT teams to any kinds of police emergencies. The emergencies often involve
one or more heavenly armed suspects. A suspect is a person believed to have committed a
crime. SWAT teams work on hostage situations. A hostage is a person held against his or her
will.
SWAT teams perform many jobs. They come to robberies that are in progress. They help guard
government officials. They help stop terrorists. A terrorist is a person who tries to get what he or
she wants by threatening or harming others. SWAT teams also patrol high- crime areas.
SWAT teams can be part of city, county or state law enforcement agencies. A law enforcement
agency is an office or department that makes sure people obey laws. Police department and
sheriff departments are examples of law enforcement agencies.
Law enforcement agenci.es use different names for their SWAT teams. The names include
Emergency Service Unit and Emergency Response Team. They also include Mobile Emergency
Response Group and Equipment (MERGE) and Tactical Response Team.
Table of Contents
1. A ~tumor is a new growth involving abnormal enlargement of body issues. Brain tumor
can cause a variety of personality alterations, and it may lead to any neurotic behaviour
and consequently psychotic behaviour.
2. Abnormal behavior (maladaptive/maladjusted behavior)-A group of behaviors that is
deviant from social expectations because they go against the norms or standards
behavior of society
3. Acting out - reduction of the anxiety aroused by forbidden
4. Administrative Personnel- personnel assigned to OSC 10
keep written records of events, in coming or outgoing
communications
5. Aesthetic Needs - our motivation for beauty and order.
6. Amnestic Syndrome- is the inability to remember on going
events more than a few minutes after they have taken place.
7. Analism (anillingus)- licking the anus of the sexual
partner
8. Anti – social Personality Disorder It is characterized by continuing, violation of the right
of others through aggressive, anti-social behavior without remorse or loyalty to anyone.
9. Anxiety (Psychological Perspective) - Stressful situation that become extreme may result
to maladaptive behavior.
10. Anxiety disorders are commonly known as "neurotic fear" when it is occasional but
intense, it is called "panic". When it is mild but continuous, it is called "worry" which is
usually accompanied by psychological symptoms such as sustained muscular tension,
increases blood pressure, insomnia, etc.
11. Anxiety -is an intangible feeling that seems to evade any effort to resolve it. It is also
called neurotic fear. It could be intense; it could be low and can be a motivating force
(Coleman, 1980).
12. Approach-Avoidance Conflict - a person faces situations having
both a desirable ana undesirable feature. It is sometimes
calied "dilemma", because some ' negative and some positive
features must be accepted regardless which course of action is
chosen.
13. Arousal Insufficiency (frigidity)- a sexual disorder characterized by partial or complete
failure to attain the lubrication or swelling response of sexual disorder characterized by
partial or complete failure to attain the lubrication or swelling response of sexual
excitement by the female partner
14. Arson This is use to destroy or to disrupt public utilities, political HQs and industrial
facilities
15. ASSASSINATION Is it is the murder of prominent citizens particularly a head of a state
or high official in government or the killing an important person the violent means,
usually from political or religious motives
16. Assassination The oldest but the commonly used terrorist tactic where targets are often
police or military officials or political features and they always claim responsibility of
assassination
17. Asthenic Disorders An anxiety disorder is characterized by chronic mental and physical
fatigue and various aches and pains. Symptoms include spending too much sleep to
avoid fatigue but to no avail, even feel worse upon awake, headaches, indigestions,
back pains, and dizziness.
18. Auto-sexual (self-gratification/masturbation)- it is also
called "self-abuse", sexual satisfaction is carried out
without the cooperation of another.
19. Avoidant Personality Disorder It is characterized by hypersensitivity to rejection and
apprehensive alertness to any sign of social derogation. Person is reluctant to enter into
social interaction
20. Awareness- periodic briefing, public info drive, printed materials.
21. Behavior refers to actions or activities
22. Bestiality- the sexual gratification is attained by having
sexual intercourse with animals
23. Biological or Physiological Needs - these motives include the need for food, water,
oxygen, activity, and sleep.
24. Bipolar Disorders- Those experienced by patients with both manic and depressive
episodes.
25. Blocked of Distorted Personal Growth (Humanistic Perspective) - presumably, human
nature tends towards cooperation and conductive activities; however, if we show
aggression, cruelty or ether violent behavior, the result will be an unfavorable
environment.
26. Borderline Personality. Disorder It is characterized by instability reflected in drastic mood
shifts and behavior problems. The person usually displays intense anger outburst with
little provocation and he is
impulsive, unpredictable, and periodically unstable.
27. Catatonic Schizophrenia- it is the altering period of extreme withdrawal and extreme
excitement. The individual may talk or shout incoherently and engage uninhibited,
impulsive behavior.The person may be dangerous.
28. Childhood Trauma - the experiences, which affect the feeling of security of a child
undergoing developmental processes. The development processes are being blocked
sometimes by parental deprivation as a consequence of parents or lack . of adequate
maturing at home because of parental rejection, overprotection,
restrictiveness, over permissiveness, and faulty discipline.
29. Cognitive need - our motivation for learning and exploration
30. Common sense science of behavior has one of its goals the culmination of widespread
misconceptions that are now considered valid such as numerology and palmistry,
although still accepted by some people today predict events and conditions
31. Communication Team- responsible for ensuring effected^
communication between OSC and other units or sub-
units.
32. Compulsive Personality Disorder It is characterized by excessive with rules, order, and
efficiency that everyone does things their ways and an ability to express warm feelings.
This person is over conscientious,
serious, and ‘with difficulty in doing things for relaxation
33. Conflict - refers to the simultaneous is arousal of two or more incompatible motives
resulting to unpleasant emotions. It is a source of frustration because it is a threat to
normal behavior (Bernstein, et al 1991)
34. Conscious or Unconscious Behavior is conscious when acts. are within the level of
awareness. It is unconscious when acts are embedded in one's subconscious-unaware.
35. Conversion Disorder (Hysteria) It is a neurotic pattern in which symptoms of some
physical malfunction or loss of control without any underlying organic abnormality
36. Coprolalia- the use of obscene language to achieve sexual
satisfaction.
37. Criminal Behavior The disorder used to describe the behaviour of a person who serious
crimes from individual to property crimes and the disobedience of societal rules in
general.
38. criminal psychology is a sub-field of general psychology where criminal behavior is only,
in part by which phenomena psychologists choose to study
39. Criminals- these are people who commit terrorist acts for personal rather than
ideological gains. Some of the terroristic acts such as kidnapping are well-planned, but
happen as a result of the fast response time by LEAs to an ongoing crime. For instance,
a number of bank robberies nave evolved into unplanned hostage situation when
policemen arrived in response to an alarm robbery in progress.
40. CRISIS – is derived from the Greek "krisis" which means separate. It is the turning point
decision in a process of an affair or a series of events.
41. crisis management is the proper utilization of all available resources and the formulation
of all available resources and the formulation of policies and procedures to effectively
deal with the progressive sequence of events (crisis) and sudden or unforeseen state
(emergency)
42. Cunnilingus- sexual gratification is attained by licking
the external female genitalia.
43. Cyclothymic Disorders -A less severe form of bipolar disorder
44. Delirium- the severe impairment of information processing
in the brain affecting the basic process of attention,
perception memory and thinking.
45. Dementia- deterioration in intellectual functioning after
completing brain maturation. There is defect in the process of
acquiring knowledge or skills, problem solving, and judgment.
46. Denial of Reality – protection of one – self from unpleasant reality by reality by refusal to
perceive or face it. Simply by avoiding something that is unpleasant
47. Dependent Personality Disorder It is characterized by extreme dependence on other
people- there is acute discomfort and even panic to be alone. The person lacks
confidence and feels helpless.
48. Depersonalization The loss of sense of self or the so-called out of the body experience.
There is a. feeling of detachment from one's mental processes or body or being in a
dream state. Cases of
somnambulism -(sleep walking) may fall under this disorder.
49. Depressive DisordersMajor depressive Disorders- Patients with-depressed mood have a
loss of energy and interest, feeling of guilt, difficulty in concentrating, loss of appetite,
and thoughts of dearh or suicide, they are not affected with manic episodes.
50. Displacement- --discharging pent-up emotion on objects less dangerous than those that
with the emotion.
51. Dissocial Personality is the term used to refer to these individuals (not anti-social) but
particularly those who violate law and practice "crime it's a profession
52. Don Juanism- the act of seducing women as a career without permanency of partner or
companion
53. Double Approach Conflict - a person is motivated to engage in
two desirable activities that cannot be pursued
simultaneously.
54. Double Avoidance Conflict - a person faces two undesirable
situations in which the avoidance of one is the ' exposure to
the other resulting to an intense emotion.
55. Dyspareunia- it is called painful coitus/ painful sexual acts in women.
56. Dysthymic Disorder- A mild form of major depressive disorder.
57. Economics Crisis- the deprivation of the basic necessities of life like food and material
things.
58. Education - education on terrorist tactics, sparrow opens an: the like."
59. ego is the only part of the conscious personality. It’s what the person is aware of they
think about themselves, and is what they usually try to project toward others
60. EMERGENCY – is derived from the Latin word "emergencia" which means
dipping/plugging. A sudden condition or a state of affairs calling for an immediate action
61. Emotional Aspect - this pertains to our feelings, moods, temper, and strong motivational
force.
62. Emotional Crisis- when an individual is affected by negative feelings like emotional
disturbances, fear, etc.
63. Emotional Insulation - withdrawal is passivity to protect self from hurt.
64. Environmental Factors This is refers to anything around the person the influences his
action. James Coleman in his Book mentioned some environmental factors such as:
65. Erectile Insufficiency (Impotency)- it is a sexual disorder characterized by the inability to
achieve or maintain erection for successful intercourse.
66. Esteem Needs. - Our motivation for an honest, fundamental respect
for a person as a useful and honorable human being.
67.
Exhibitionism- it is called "indecent exposure",
intentional exposure of genitals to members of opposite sex
under inappropriate conditions.
68. Family Background – it his is a basic consideration because it is in the family ’whereby
an individual first experiences how to relate and interact with another. The family is said
to be the cradle of harmonious relationship or a pathogenic family structure: the
disturbed family, broken family separated or maladjusted
relations.
69. Fantasy- the gratification of frustration desires imaginary achievement. Paying attention
not to what is going on around him but rather to what is taking place in his thought
70. Faulty Learning (Behavior Perspective) - The failure to learn the
necessary adaptive behavior due to wrongful development. This
usually results to delinquent behavior based on the failure to
learn the necessary social values and norms.
71. Fellatio- male sex organ to the mouth of the women coupled
with the act of sucking that initiates orgasm.
72. Fetishism- sexual gratification is obtained by looking at
some body parts, underwear of the opposite sex or other
objects associated with the opposite sex.
73. Fire Fighting Team- responsible for all medical
supplies related to fire extinguishing fires
intentionally set by the perpetrators or during the
result of operations.
74. Frotrage- rhe act of rubbing the sex organ against body parts of another person.
75. Frustration - refers to the unpleasant feelings that result from the blocking of motive
satisfaction, It is a feeling that is experienced when something interferes with our hopes,
wishes, plans expectations
76. General Paresis- also called "dementia paralytica", a syphilitic infection of the brain and
involving impairment of the CNS.
77. Gerontophilia- is a sexual desire with an eider person.
78. Hallucinosis the persistent occurrence of hallucinations,
the false perception that arises in full wakefulness scare. This
includes haIIucinations on visual and hearing or both.
79. Hebephrenic Schizophrenia- (Disorganized Type)- there is emotional distortion
manifested in inappropriate laughter, peculiar mannerism, and bizarre behavior.
80. Heredity- This refers to the genetic influences, those that, are explained by heredity, the
characteristics of a person acquired from birth transferred from one generation to
another. It explains that certain
81. Hijacking and skyjacking are commonly used by terrorist. The hijack supply ,
ammunitions , fuel cargoes, and vehicles to provide them to gain entry to a close military
area, hijacking of commercial aircraft to again publicity or to ask demands
82. Histrionic Personality Disorder it is characterized by immaturity, excitability, emotional
instability and self-dramatization.
83. Homosexuality- it is a sexual behaviour directed towards the same sex. It is also called
"lesbianism/ tribalism" for female relationship.
84. Hostage Taking
85. Hostility- response to alleged mistreatment with anger and
hostility, the person become increasingly suspicious
86. id is a part of the unconscious that contains all the urges and impulses including what we
called libido, a kind of generalized sexual energy that is used for everything from survival
instincts to appreciation of art
87. Identification - increasing feeling of worth by .identifying
self with person or institution. The person can associate himself with something or
someone to elevate position.
88. Incest- a sexual relation between people
89. Insult and Humiliation The adversary tries to ridicule the VIP in the eyes of the people,
and will use different means in order to achieve these objectives
90. Intellectual Aspect - this aspect of behavior pertains to our way of thinking, reasoning,
solving, problem, processing info and coping with the environment.
91. Intelligence Team- responsible for the collection and
processing Of all information needed by the OSC.
92. Introjections - incorporating external values and standards into ego structures so
individual is nor. at their mercy as external threats. The acceptance of other's values
even are contrary to one's own .assumption.
93. Isolation/Intellectualization - series to cut off the emotion from emotion a situation, which
is normally, is full of feeling
94. It is also called "dual personalities." The reason manifests two or more symptoms-of
personality usually dramatically different.
95. KIDNAP FOR RANSOM is a criminal act, particularly described as the unlawful and
carrying away a person by force or fraud and against his will, or in any manner depriving
him of his liberty for the purpose of extorting ransom as payment for the release
96. Kidnapping for ransom is the most common form of this tactic. The victim is normally
confined in secret hideout and kidnappers make material demands .
97. KIDNAPPING, in general, possess a serious threat to the peace and order condition of
the country. Focus of concern, however, falls on so-called kidnap for ransom case,
because they exist a heavy tall not only on their victims and the victim's families, but also
on society
98. Legal/Investigation Team- services of investigation,
preservation of evidence, documents and legal advice
to the OSC
99. Logistics Team- responsible for ensuring mess
services, supplies (clothing, equipment,
transportation) and other logistics services
100. Love/Belongingness - Belongingness is integration into various
kinds of social groups of social organizations. Love needs means
need for affection
101. Man Made Crisis – Strike, riot, demonstration – revolt such as mutiny and
insurrection -revolution, border incident- war conventional or nuclear crimes: kidnapping,
hijacking, hostage taking, etc.
102. Masochism - infliction of pain to oneself to achieve sexual pleasure
103. MCCM – National Committee on Crisis Management
104. Medical Team- responsible for all medical supplies and
services in cases of crisis incidents
105. Mentally Deranged Individuals- people commit terroristic is the most difficult
terrorist to deal with. Many of themare impulsive and unpredictable.
106. Mood Disorder (.Affective Disorder)Mood disorder often referred to as effective
disorder however the critical pathology in this disorder is one of mood which is the
internal state of a person, and not of affect, the external expression of emotional content
(Manual of Mental disorder).
107. Moral Crisis- the person has an irrational or distorted concepts of what is right or
wrong, lack of moral values and integrity of the person.
108. Multiple Approach-Avoidance Conflict - a situation in which a
choice must be made between two ..or more alternatives each has
both positive and negative features. It is the most difficult,
to resolve because the features of each portion are often
difficult to compare.
109. Multiple Personality
110. Narcissistic Personality Disorder It is characterized by an exaggerated sense of
self- importance and pre-occupation with receiving attention. The person usually
expects- and demands special treatment from others and disregarding the rights and
feelings of others.
111. Natural Crisis- fire, floods, earthquake, tidal waves- marine/air, disaster
hazardous spills, power failure, nuclear accidents – water/food shortage/scarcity,
drought, volcanic eruption, epidemic, etc.
112. necrophilia- an erotic desire or actual intercourse with a
corpse.
113. NEGOTIATION UNIT – it is headed by chief negotiator and composed of two or
more members. Their primary concern is to serve life, prevent destruction and pave the
way for a peaceful resolution of crisis situation
114. Neurotic Nucleus – the faulty evaluation of reality and tendency avoid rather that
to cope with stress. It is characterized by anxiety, avoidance instead of coping, and
blocked personal growth
115. Neurotic Paradox- the tendency to maintain the life style despite its maladaptive
nature. It is characterized by unhappiness and dissatisfactions.
116. Neurotic/ Psychoneurotic Behavior are group of mild functional personality
disorders in which there is no gross personality disorganization, the individual does not
lost contact with reality and hospitalization is not required
117. Normal behavior (adaptive or adjusted behavior)-the standard behavior, the
totality accepted behavior because they follow the standard norms of society
118. Nymphomania- a strong sexual feeling of women with an
excessive sexual urge.
119. Obsessive- compulsive disorders Obsession usually centered on fear that one
valuable to do something wrong. Compulsion on the other hand resulted from repetitive
acts (Wicks 1974). An obsessive- compulsive disorder is characterized by the following
120. OPERATION SECURITY- a counter intelligence measures where all aspects of
awareness and training must be considered to prevent threat groups from learning the
units plans methods of operations. It also refers to measures taken in conducting
operations or activities in secure and effective manner.
121. Oralism- it is the use of mouth or the tongue as a way of
sexual satisfaction.
122. Organic Affective Syndrome- is the extreme/ severe manic or
depressive state with the impairment of the cerebral function.
123. Organic Delusional Syndrome- is the false belief arising in
a setting of known or suspected brain damage.
124. Organic mental Disorders A diagnosis of organic mental disorder is associated
with specific, identified organic causes such as abnormalities of the brain structure
125. Organic Personality Syndrome- the general personality
changes following brain damage.
126. Orgasmic Dysfunction- a sexual disorder characterized by the difficulty in
achieving orgasm
127. OSCP – On Scene Command Post
128. Overt or covert Behavior Behaviors that are outwardly manifested or those that
are directly observable are overt behaviors. On the other hand, covert behaviors are
behaviors that are hidden-not visible to the naked eye.
129. Paedophilia- a sexual perversion where a person has the
compulsive desire to have sexual intercourse with a child
of either sex.