0% found this document useful (0 votes)
24 views

Module in Crisis Management

Module Guide in Crisis Management
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Module in Crisis Management

Module Guide in Crisis Management
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 64

This handout is compiled for classroom use only

NOTES IN

CRISIS MANAGEMENT

“ TIME AND AGAIN, THE AFP AND PNP IS FACED WITH CRISIS
SITUATIONS BROUGHT BY NATURAL AND MAN-MADE
DISASTERS, WHICH CAUSE PUBLIC ANXIETY, LOSS OF LIVES,
DESTRUCTION OF PROPERTY, AND EMBARRASSMENT TO
THE GOVERNMENT, THE ARMED FORCES AND THE LAW
ENFORCEMENT AGENCIES.”

“THESE CRISIS SITUATIONS MAY BE PREDICTED, PREVENTED


OR ITS ADVERSE EFFECTS MINIMIZED THROUGH
ANTICIPATION, PREPAREDNESS AND ISSUANCE OF
APPROPRIATE GUIDELINES OR STANDARD PROCEDURES TO
EFFECT IMMEDIATE ACTIONS IN HANDLING SUCH
SITUATIONS.”

Taken from:
The Crisis Management Doctrine (PNP-AFP)

TABLE OF CONTENTS
2

title, rational, objectives and contents

the meaning of crisis vs emergency

crisis management defined

purposes and scope

the conceptual framework

phases of crisis management

the major concerns of crisis management

terrorism

hostage taking

kidnapping

Bombing

tactical crisis management


(SWAT)

Course Guideline

I. TITLE: CRISIS MANAGEMENT


3

II. RATIONALE:

Crisis management is equally important for the students to learn the


strategies and techniques in handling and dealing with the threats of various crisis
situations.

III. OBJECTIVES:

At the end of the course, the student should be able to:

1. discuss the course of crisis and the proper interventions


2. apply psychological principles in the process of crisis management
3. enumerate and discuss the different types of crisis
4. identify and discuss the stages of crisis
5. explain the major factors in crisis classification
6. elaborate the process of hostage negotiations and recovery
7. understand the PNP/AFP crisis management doctrine
8. explain the PNP rules of engagement in crisis situations
9. incorporate psychological steps in planning crisis management and the process
of crisis readiness.

IV. COURSE CONTENTS

1. Basic Concepts in the study of Crisis Management


2. The Crisis Management Doctrine
3. Terrorism
4. Hostage negotiations and recovery
5. Kidnapping
6. Tactical Crisis Management

CRISIS MANAGEMENT

CRISIS – is derived from the Greek “krisis” which means separate. It is the turning point
decision in a process of an affair or a series of events.

EMERGENCY – is derived from the Latin word “emergencia” which means dipping/plugging.
A sudden condition or a state of affairs calling for an immediate action.

Types of Crisis

MAN-MADE CRISIS
- civil disturbances - strike, riot, demonstration - revolt such as mutiny and
insurrection - revolution, border incident - war: conventional or nuclear – crimes:
kidnapping, hijacking, hostage-taking, etc

NATURAL CRISIS
- fire, floods, earthquake, tidal waves - marine/air disaster, hazardous spills
- power failure, nuclear accidents - water/food shortage/scarcity, drought - volcanic
eruption, epidemic, etc.

CRISIS in general
4

It is a period of disorganization, period of upset during which people attempts at


arriving at solution of problems. It is a state provokes when a person faces obstacles or
hazards to an important life goal.

INDIVIDUAL CRISIS – It refers to the feeling that arises when a person faces unpleasant
situation such as frustrations and conflicts. This includes:

1. Physical Crisis – those that are related to health problems or bodily


sickness/sufferings.
2. Economics Crisis – the deprivation of the basic necessities of life like food and
material things.
3. Emotional Crisis – when an individual is affected by negative feelings like
emotional disturbances, fear, etc.
4. Social Crisis – the experiencing lack of interest, confidence and social skills to
relate meaningful, harmonious relationship with others.
5. Moral Crisis – the person has an irrational or distorted concepts of what is right or
wrong, lack of moral values and integrity of the person.
6. Psychosexual Crisis – failure of the person to assume ones sex role and identity
as a man or woman. The person has an inappropriate sex objective, inadequate
and distorted expression of affection.

Diagram of Difference
CRISIS
CRISIS EMERGENC
Y

Progressive state/sequence of Unforeseen/ sudden


events events

Turning point decision of Immediate


crisis management planners Decision/Remedy

Recovery/Restoration
Change/ Continuity/ Survival Survival

CRISIS MANAGEMENT defined

CRISIS MANAGEMENT
5

Crisis management is the proper utilization of all available resources and the
formulation of policies and procedures to effectively deal with progressive sequence of
events (crisis) and sudden or unforeseen state (emergency).

Crisis Crisis

Contingency Plans

Crisis management
umbrella

PURPOSES OF CRISIS MANAGEMENT

1. It sets concepts, policies and general procedures of handling crisis situation.


2. It guides and assist law enforcers in the formulation of crisis management
contingency plans and SOP’s to address crisis situations.

SCOPE OF CRISIS MANAGEMENT IN THIS CONTEXT

This doctrine specifically addresses crisis situations arising out of the action of
mentally deranged individuals, criminals or terrorist elements that use violence or threat to
pursue their needs.

Crisis envisioned to be covered under this doctrine include among others, hostage
taking, sea jacking, hijacking, occupation of vital installation, ambush and arson, with the
use of violence or threat followed by blackmail, demands for ransom, safe-control, publicity
and the like.

The crisis may start as basically police or special unit matter, but could develop in
proportion and dimension requiring further military operations.

This doctrine also will not address crisis when the purview and jurisdiction of the
National Disaster Coordinating Council (NDCC), Peace and order council, the Cabinet Crisis
Committee or the National Security Council (NSC) and other national committee which could
be military, economic, political, social or combination thereof, in nature.

The general idea is to prevent the occurrence of a crisis, ensure a probability of


success in minimizing or neutralizing the perpetrator or to return the situation into
normalcy.

NATIONAL POLICY
6

The Philippines subscribed to all international conventions and initiatives against


terrorism and will participate in all endeavors designed to strengthen international
cooperation in order to prevent and neutralize terrorist acts.

PNP/AFP POLICY

The PNP/AFP shall be guided by the national policy on terrorism and will strictly
implement it.

The use of peaceful means shall always be employed. The AFP will not compromise
nor make concessions to terrorist even if involves the personnel or property. The AFP will act
promptly, decisively and effectively, choosing from the whole range of military actions
appropriate to the circumstances.

CONCEPTUAL FRAME WORK (CM Doctrine)

PROACTIVE PHASE REACTIVE PHASE

PREDICTION PREVENTION PREPARATION PERFORMANCE

UPDATE
Input- threat opn scty NCCM CM action PLAN

Intel-threat grps personnel RCAG- RCMOC initial action


events security Crisis stage
Incide
nt
 probable action stage
 target
physical
security post action stage

 vulnerabilities

-----------------adjustment --------------

OSCP

tactical unit support unit negotiation unit

Reaction Scty
element element Post Action Feedback
7

PHASES OF CRISIS MANAGEMENT

A. PRO-ACTIVE PHASE – is the stage of advance planning, organization


and coordination and control in response to an anticipated future crisis
occurrence. This phase is designed to predict or prevent probability or occurrence
of the crisis while at the same time prepares to handle them when they occur.

B. REACTIVE PHASE – is the performance of the crisis management plan when a


crisis situation occurs despite the pro-active effort.

PREDICTION

The first stage of anticipating future crisis occurrences through the following;

a. Update- Intelligence – involves the collection of information from


variety of sources as basis of actions and plan; those that are
related to crisis management contingency planning.

- Events – are those incidents that are already passed which can facilitate analysis
necessary for identification of probable threat groups, targets and necessary for
advance planning.

b. Threat Analysis of Threat Groups

Political Terrorist – ideologically inspire individuals who grouped together for


a common purpose usually for change of government or political power.
Ex. CPP/NPA, SPT’s, etc.

Criminals – these are people who commit terrorist acts for personal rather
than ideological gains. Some of the terroristic acts such as kidnapping are well
planned, other are not planned, but happens as a result of the fast response time by
LEAs to an on going crime. For instance, a number of bank robberies have evolved
into unplanned hostage situation when policemen arrive in response to an alarm
robbery is in progress.

Mentally Deranged Individuals – people commit terroristic acts during a period


of psychiatric disturbance. This type is the most difficult terrorist to deal with. Many
of them are impulsive and unpredictable.

PREVENTION

This pro-active phase considers counter measures as part of the total system of
operation. Such counter measures involves the following;

A. Operation Security – a counter intelligence measure where all aspect of


awareness and training must be considered to prevent threat groups from
learning the units plans methods of operations. It also refers to measures taken in
conducting operations or activities in secure and effective manner.

B. Personal Security – it considers that all personnel are susceptible to terrorist


attack so the is a need for securing them. All security measures designed to
prevent unsuitable individuals of DOUGHTFUL LOYALTY from gaining access to
classified matters or security facilities.
8

Considerations of Personnel Threat Assessment

1. Rank and Risk – higher ranking personnel have great risk level. In high-
risk areas, secure high ranking officers because they may be selected as terrorist
targets by special knowledge they possess.

2. Threat Level (Potential Threats)

a. Primary targets are high-ranking military or police officers,


government officials, foreign ministries, other VIPs and persons
possessing sensitive information.
b. Secondary targets – those selected as alternative terrorist targets
to gain publicity.
c. Randomly selected targets – Military or police personnel who are
not off duty or engage in private activities and become targets of
opportunity.

Stages in preparation of Personnel Security Program

1. Planning – threat analysis and assessment of available personnel


security resources.
Personal security education procedures are adopted.
2. Awareness – periodic briefing, public info drive, printed materials.
3. Education – education on terrorist tactics, sparrow opens and the like.

C. Physical Security – encompasses protection of info, material and people


including perimeter installation. A system of barrier placed between the potential
intruder and the material to be protected.

PREPARATION

This pro-active phase involves organizing training and equipment personnel of the
organization.

In general, military commanders and officers of the PNP must organize, train and
equip special reaction, security and negotiation elements and provide their immediate
activation when the need arises.

National Level Organization

NCCM – National Committee on Crisis Management

Serve as the umbrella organization for crisis management. The primary concern is
the formulation of crisis management policies, integration of mil/pol to public efforts towards
the prevention and control of crisis.
9

Organizational Structure

NCCM

NACAH

PAFSECOM PNSWG PASAG PNPSAG

NCCM – National Committee on Crisis Management

PAFSECOM – Philippine Air Force Security Command

PNSWG – Philippine Navy Special Welfare Group

PASAG – Philippine Army Special Action Group

PNPSAG – Philippine National Police Special Action Group

Regional Level

Organized in all regions headed by Regional Crisis Director in coordination with all
government LEA.

RCAG
RCMOC

OSCP

Tactical Unit Support Unit Negotiation Unit

RCAG – Regional Crisis Action Group

RCMOC – Regional Crisis Management Operation Center


- the point of all communications from the OSCP

OSCP – On-Scene Command Post

The OSCP shall established with in the crisis incident site. It is a post or unit with in a
probable target to be headed by an on-scene commander (OSC) whose responsibility is to
take charge of every happening of a crisis incident scene.
10

Composition of the OSCP

TACTICAL UNIT – composed of regular military or police placed under the


operational command of the OSC.

 Reaction Element – Special action unit which are specially organized, equipped and
deployed in the region to hold special operation in cases of crisis incident.
 Security Element – military or police personnel task to protect the area of perimeter
security to prevent occurrence of unnecessary incidents.

SUPPORT UNIT – It is a unit that provides the necessary administrative, operational


and logistic support of the OSC.

 Intelligence Team – responsible for the collection and processing of all information
needed by the OSC.

 Communication Team – responsible for insuring effective communication between


OSC and other units or sub-units.

 Logistic Team – responsible for ensuring mess services, supplies (clothing,


equipment, transportation) and other logistic services.

 Medical Team – responsible for all medical supplies and services in cases of crisis
incidents.

 Fire Fighting Team – responsible for all services related to extinguishing fires
intentionally set by perpetrators or during the result of operations.

 Administrative Personnel – personnel assigned to OSC to keep written records of


events, in coming or outgoing communications.

 Legal/Investigation Team – services of investigation, preservation of evidence,


documents and legal advice to the OSC.

NEGOTIATION UNIT – It is headed by a chief negotiator and composed of two or


more members. Their primary concern is to serve first life, prevent destruction and pave the
way for a peaceful resolution of crisis situations.

THE REACTIVE PHASE

When a crisis occur despite the pro-active effort, the organization concerned must be
prepare to perform the crisis management in accordance with their plan.

PERFORMANCE

It is the action stage, the implementation of the crisis management contingency


plan.

The Initial Action


 maintain control of the situation
 report the matter to the RCAG through channels
 secure the scene by establishing perimeter security
 evacuate by standers if possible
 prevent escape of perpetrator
 take maximum control
11

The initial action stage is taken by the Initial Action Unit, which is composed of police
and military personnel immediately organized into team to initially respond to take incident
and begin the containment effort.

The Action Stage

 The action stage starts as soon as the tactical, support unit and the negotiation
unit arrived and are deployed.
 The OSC discusses the incident with his commander and staff and decides on the
plans and actions to be taken.

Negotiation – chief negotiator undertakes negotiation as soon as he has been


properly briefed and received appropriate instruction from the OSC. He shall keep
the OSCP informed of the progress of negotiations and shall take instructions only
from the OSC. No further negotiation shall be under take when the tactical unit
commander initiates tactical operations.

Tactical Action – the tactical commander makes a complete estimate of the


crisis situation and plans his courses of action upon arrival at the scene while
negotiation is in progress. He shall maintain and continuous contact with the
OSCP. He shall take over authority on reaction element through out the tactical
operations. He shall take instructions only from the OSC and coordinate all
support requirements with the OSCP.

The Post Action Stage

This stage begin as soon as the perpetrator surrendered, captured or neutralized.


OSC shall ensure that the following are accomplished:

 Protection of the incident scene


 Investigation of the incident preservation of evidence
 Documentation
 SS – witnesses, hostage, perpetrators and other key participants of the incident.
 Recovered, documented, preserve evidences
 Pictorials, written reports
 Filing and prosecution of cases
 Damage Compensation and rehabilitation

He also initiates recommendation for the compensation and provide assistance to


civilian killed and injured during tactical operations. He initiates recommendation for the
rehabilitation, construction of damage or essential infrastructures.

Training and re-training of unit personnel special units and negotiators shall continue
with their training to improve their proficiency and enhance their readiness.
12

CONCERNS OF CRISIS MANAGEMENT

TERRORISM

So much has been written in recent years about terrorism by eminent people.
Terrorism means many different things to different people dependent upon individual
perspective thus many definitions exist.

Terrorism is ….

a threat or actual use of force or violence for political or other purpose, to foster fear,
insecurity, distrust, and unrest among a specific group or the general population.

“Violence for effect… not primarily, and sometimes not all for the physical effect on
the actual target, but rather for its dramatic impact on an audience.”

“The calculated use of violence or the threat of violence t attain goals, often political
or ideological in nature”.

“ Is violent criminal behavior designed to generate fear in the community, or a


substantial segment of it, for political purposes.

Disorders and Terrorism

- the word terrorism is used. to define almost all illegal acts of violence committed
for political purposes by clandestine groups.

National Terrorist
- A terrorist who operates and aspires to political power primarily within a single
nation.

Transnational Terrorist
- This is a terrorists who operates across national boarders, whose actions and
political aspirations may affect individual of more than one nationality.

International Terrorists
- A terrorists who is controlled by, and whose actions represents the national
interest of a sovereign state.

MOTIVATION AND GROUP CLASSIFICATION

What causes a rational thinking human being to terrorize society? Assuming that the
terrorists think rationally ( and most of them possess a high degree of rationality ), we must
look to the terrorists motives if we are to understand them, to think like them, and to
ultimately them.

1. Minority Nationalistic Groups - groups fighting the majority of the community where
the support base will depend one ethnic, religion, linguistic minorities at odd with the
majority community.

2. Marxist Revolutionary Groups – here, the terrorists movement is characterized by its


possession of a coherent Marxist ideology and of a long term strategy for bringing
about the socialistic revolution.
13

3. Anarchist Group - True Anarchist are difficult to find since true anarchy brings
lawlessness and disorder, which is not a natural state in which, the human race
exists.

4. Pathological Groups – problematic individuals who are grouped together for some
terroristic activities for emotional satisfaction.

5. Neo-fascist and Extreme Right- Groups

TERRORISTS PROFILE (based on commonalties of international terrorists)

 under 30 years of age


 action oriented - some are college educated
 from affluent/middle-class
 often trained in medical, legal, engineering, teaching professions
 terrorism rarely full-time occupation
 inward assurance of strength
 paradoxically, basically lonely
 believes he/she to be morally superior and in own mind is right
 indifferent to suffering of his immediate victims
 looks to colleagues for acceptance
 wants respect from victims
 willing to sacrifice self
 seek publicity
 believes violence is morally justified to support cause

Nature of Political Terrorist

1. It is a part of revolutionary strategy.


2. Manifest in acts on socially unacceptable means.
3. Symbolic target selection.
4. Creates psychological effects on population to change behavior attitude.
5. It forces the government to take drastic measures.
6. Combines political and criminal terroristic tactics.

Aims of Political Terrorist

1. Influence, discredit and destroy present system.


2. To break down social structures.
3. Erode trust in established government.
4. Foster insecurity and fears.
5. Shows that the government is incapable of protecting the people.
6. Forces the government to overreact to use excessive measures or force.
7. Destroy property.
8. Disrupt law and order
9. Propaganda
10. Create a ripe climate to revolution.
14

Dynamics of Terrorism

Terrorist

Threat Goal Demand

Victim Target Authority

Common Characteristics of Terrorist

1. Promote fear
2. Main objective is publicity
3. Highly mobile
4. Fatalist – they can create destruction affecting the whole nation.
5. Undercover operations
6. Small groups mean security efficiency

Immediate Goals of Terrorist

1. Local, national, worldwide recognition for a cause.


2. They cause government reactions.
3. Harass, weaken, embarrass government and government forces.
4. Demonstrate power and threat credibility.
5. Obtain money and equipment.
6. Destruction of communication.
7. Prevent and delay executive decisions.
8. Cause strikes or prevent elections, free or prevent elections.
9. Satisfy vengeance.

Long Range Goals of Terrorist

1. Cause drastic changes in the government.


2. Turn the system favorable to their side.
3. Gain political recognition as a legal body representing an ethnic or national group.

Cooperation among Terrorist

1. Sharing resources (logistic support)


2. Sharing expertise.
3. Sharing safe havens.
4. Participating in joint operations.

Organization of Terrorist Groups

The way terrorist group organized is determined by it’s the need of security and the
number of people in the group.

a. Larger Groups – less secured


15

b. Small Groups – high degree of security but limited to operational capabilities.

As to group size, the large group can only succeed over a longer term in a week
political environment.

As to group security, government forces attempt to destroy terrorist group or keep


them in defensive position to discourage them from mobilizing new to be extremely covert.

Terrorist Operation

1. Covert and well executed.


2. Carried out by specially well-trained and organized clandestine elements.

 Weapons – basic arms and explosives but continue to seek advance weaponry.
 Training – they are trained on subversion, weaponry, negotiation practices and
 espionage.
 Members of clandestine elements are of above average intelligence.

Methods of Operations

1. They operate in small bands


2. They carry light automatic weapons, grenades, basic explosives, ammunitions and
communication equipment.
3. They mask their activities with the local populace.
4. Team includes assaults and security elements.
5. Leaders serve as negotiators.
6. They watch out for counter intelligence measures of the government forces.
7. In hostage taking, hostages are usually separated in safe houses to prevent
communications and escape, planning, and intelligence gathering.

Sequence of Terrorist Action

A. Pre-incident phase – reconnaissance mission, Rehearsal


 Often reconnaissance team, planners, perpetrators do not meet.
 Comm are through intermediaries or by message drop.

B. Initiative Phase – moves to their target covertly.


 they use false names, ID, passports
 they use separate routes
 weapons and other items are separately to pre-arrange locations

C. Negotiation/Climax Phases
 they use negotiation to gain publicity.
 Negotiation- often require inter-government negotiations at the highest level.
 When government failed to give demands, they initiate more terror

D. Post incident Phase


 they learn from their failures and success
 terrorist re-groups, criticize and give critique about the operation.
16

Terrorist Tactics

 BOMBING

Delivery to target is done through:


1. Vehicle Bomb-booby traps with attached devices
2. Laid Charges-bomb plates
3. Projected bombs-launched from riffles by a mortal device
4. Postal/mail bombs

Activation means:
1. Command activation by leads, pull wire or mechanism
2. Action by the subject/top pressure device, light sense electric switch
3. Time delay clock/burning chemical delay

 ARSON

This is use to destroy or to disrupt public utilities, political HQs and industrial
facilities.

 HIJACKING

Hijacking and skyjacking are commonly used by terrorists. The hijack supply,
ammunitions, fuel cargoes, and vehicles to provide them to gain entry to a close military
area, skyjacking of commercial aircraft to gain publicity or to ask demands.

 ASSASSINATION

The oldest but the commonly used terrorist tactic where targets are often police or
military officials or political features and they always claim responsibility of assassination.

 AMBUSH

This is a well-planned, well thought-out, properly rehearsed and precisely


executed operation. The terrorist has time on his side and will spend considerable time
preparing for an operation. Terrorist have an advantage in that they can choose the time
and place of operation.

 KIDNAPPING

Kidnapping for ransoms is the most common form of this tactic. The victim is
normally confined in a secret hideout and kidnappers make material demands.

 HOSTAGE TAKING

The hostage-taker confronts the authorities and openly holds the victims for ransom.
His demands are more than just material in nature. Political concessions are the frequency
demanded in exchange for the hostage lives.

The advantages of this new tactic are:

1. It is current, it attracts the media


17

2. The fact that lives of hostage are involved in creases the drama of the event, thus
pressure can be applied by the terrorist to force concessions.
3. The hostage is tangible asset to the terrorist, something with which to bargain.

 ROBBERIES/EXTORTIONS

Terrorist operations are expensive. To help finance their activities, terrorists rob banks
and armored vehicles carrying large sums of cash. Bank robberies are also used as
graduation exercises for terrorist training programs and viewed as a tactical operation.

The conduct reconnaissance, plan escape routes and operates in the high degree of
efficiency.

The progressive taxation scheme of the CPAA/NPA is a form of extortion through


coercion or use of force against the victim or his property.

TERRORIST TARGETS

A. MILITARY/POLICE
 command and control facilities
 logistic/storage facilities
 computer facilities
 explosives, sensitive weapons, arms and ammunition depots

B. ENGINEERING AND ENERGY SYSTEM


 hydroelectric plants
 offshore oil rigs
 nuclear facility sites
 gas pipelines
 dams and electric power lines

C. COMMUNICATION AND SUPPLIES


 communication lines and facilities
 chemical storage sites
 dock facilities
 equipment warehouse
 computer facilities

D. TRANSPORTATION
 rail lines and cars
 bus depots
 airports and aircraft
 trucking and facilities
 shipyards and ships
 mainland routes and bridge

E. HUMAN
 members of the diplomatic crops
 government officials
 corporate executives
 police and military forces
 dependents/close relatives of the above
18

VULNERABILITIES

Vulnerabilities are the weaknesses the installation security and high risk targets with
in such installation. These vulnerabilities are normally identified through security surveys
and inspections conducted periodically or on the spot intelligence and security units staffs.

The analysis of the threat to certain installation is based on information with both
static and dynamic dimensions.

A. STATIC DIMENSIONS
terrain
nationality of population
major industry in the area
location of installation
mission of the installation

B. DYNAMIC DIMENSIONS
assignment of personnel
security measures used
relations with civilian security
demonstrations within post location

C. DYNAMIC DIMENTIONS THAT ARE HARDLY CONTROLLABLE


weather
activities of hostile groups
economic conditions
local law enforcement
off post demonstrations

The vulnerability of installations can be determined to some extent through the


consideration of the following factors:

Installation characteristics and its attractiveness as a target for the terrorist acts.

  status of training personnel


  availability of communications
  non-military law enforcement resources
  time and distance from military installation able to lend assistance
  geographic region
  proximity to foreign borders
  access to installation
  terrain
19

HOSTAGE SITUATION

This is termed as crisis by the law enforcement officers and behavioral professionals.
This situation exist when one or more individuals are held captive by other person or
persons against their will for purposes of demanding material things or due to behavioral
maladies. Criminal type hostage takers may direct their demand towards the government or
to other private individuals. Mentally or emotionally disturbed may take hostages out of
nothing or due to uncontrollable forces.

In dealing with hostage situations, the priorities are to 1) preserve lives, 2)


apprehend the captors, and 3) recover or protect properties. Negotiators should be
prepared for this kind of situation since it will take them a long period of time to contain the
situation. According to experts, a hostage taking may last for an hour to more than forty
hours. Hostage takers and hostages and even the negotiators become tired and stressed out
of the long period of crisis intervention. Hostages become impatient waiting for their safe
release or rescue. With this, there is a great possibility of the birth of the Stockholm’s
Syndrome. This is characterized by transference of attention between the captors and
captives. The hostage towards his captors may generate positive feelings.

 Negotiators can have enough time to contain and isolate the scene;
 The initial state of high emotion is given time to subside and rational thinking to
return;
 The lives of the hostages becomes more secure as the holder realizes the value
of their continued safety; and
 Fatigue will set in and alertness will fade.

It was research by experts that passage of time is in favor of the hostages and to the
negotiators. In the first hour of the situation, the hostage taker is at rage and tension is at
peak. As time passes mental, emotional and physical fatigue will be increased and will
operate against the hostage taker. As this happen, the above-enumerated benefits of
slowing time operate.

STAGES OF A HOSTAGE SITUATION

Alarm Stage

This stage is the most traumatic and dangerous. In the alarm stage, the emotion of
the hostage taker is exceedingly in its highest peak, his rationalization and proper thinking
is low, He may be extremely aggressive in his reaction to any perceived threat. E.g. escape
of hostages, tactical assault, trickery etc.

In order for the perpetrator gain cooperation from the hostages, he usually terrorizes
the hostages into submission. At this stage he may also inclined to inflict physical harm or
even kill anyone who interferes with their attempts. (Strentz, 1984, p. 190)

The same is the situation in the part of the hostages. Since no one knows when or
does not want that they will be held hostages. This is considered as a traumatic stage as
they fear much for their lives. From a peaceful situation, turns into a life and death situation
ticking every minute and the lives of the hostages depend on the hand of the hostage taker.
(Herman, 1995, p. 92)
20

A person taken as hostage becomes impatient, denial of reality sets in them,


particularly when those they expect to help seem to be doing nothing.

In order to cope immediately with this agitated feeling, one must put into place a will
to survive since panic may cause over reaction in the part of the hostage taker and
diminishes the chances of survival. It is also important that hostages should disregard any
notion of being a hero. (Strentz, 1984, p. 196)

Crisis Stage

In this stage, when negotiation attempts are being initiated by the crisis negotiator.
Outrageous demands and unpredictable emotion is marked or commonly noted in the
hostage taker. There is still a great deal of danger since hostage taker try to consolidate
their positions. To do these, they try to move their hostages to a safer ground area.

On the part of the captive, this is the most critical because this stage may predict the
remainder of the situation. Chances of survival may be enhanced or reduced during this
stage through the hostage –hostage taker interaction.

It is advisable that hostages must control their fear as it increases unpredictable


outburst of anger and violence on the captor. The hostage taker may inconsistently enforce
numerous demands and petty rules and this may result to unsuccessful negotiation. In
addition, the perpetrator seeks to destroy the victim’s sense of autonomy by depriving him
of his basic needs.

At this stage hostages may start to feel three (3) problems: 1) Isolation, 2)
Claustrophobia, and 3) Sense of time. Sense of time becomes important on hostages
who are hoping for rescue. This situation may also in favor of the hostage taker as they earn
compliance from their captives.

Accommodation Stage

This is distinguished by boredom, and with moments of terror. Though is considered


as the longest yet is the most tranquil. In the crisis stage, and even in the alarm stage,
hostages are considering escape options but in the accommodation stage, their initiative
and planning are narrowed since captors has increased control over them. The hostages’
sense of life preserving has increased and even tries to obey the orders. Stockholm’s
syndrome will likely to occur between the captors and the victims. One looks into this
phenomenon in the negative that one must say that cooperation of hostages to the
negotiator is constricted.

In the right manner, the hostages in good effect can make use of this phenomenon. It
lessens tension and openness is generated. It is advisable that hostages must avoid political
discussions as it accentuates differences with captors and hostages. (Miron and Goldstein)

Resolution Stage

This is the stage when the hostage taker is being stressed out or fatigued of the
situation. He is seemingly losing interest of the situation and lost most of his bargaining
points. Tension between the hostages, hostage taker and the crisis negotiator is notably low.
It should be regarded also that the crisis intervention techniques of the negotiation team
have increased.

In this stage, reactions of the hostages are mixed either blaming their captors or may
become hostile and uncooperative to their rescuers and even accusing them to be the
21

responsible for the whole situation. They might even appraise their captors for taking care
(saving) their lives though their captors placed them into a hell experience.

Released victims become paranoid and often experience post trauma attacks after
liberation. These may even last for a long period of time. Such experience becomes part of
their lives and haunts them from time to time if not being properly treated. They, being a
paranoid, continue to monitor their captors if taken away from them or safely put behind
bars.

THE HOSTAGE TAKER

It is a must that a police officer who first arrived at the scene has the necessary skill
to determine what type or personality of the hostage taker is. This does not mean that he
must diagnose the perpetrator. In assessing the situation, one must be able to determine
and know the two kinds of behavior:

1. Instrumental behavior- those who are engaging in this kind of behavior are having
goals to obtain or to be fulfilled. Generally, hostage takers of instrumental behavior
are criminal types and intervention usually needs bargaining. E.g. barricaded
criminals, or other organized crime groups.

2. Expressive behavior- This kind of behavior is characterized by their attempt to


display power. Those who engage in this kind are emotionally disturbed individuals.
E.g. mentally insane, etc.

In many hostage situations committed, statistics reveals that most of those involve
are mentally disturbed individuals and the remaining are results of instrumental behaviors.
According to research, twenty five (25%) percent of all hostage situations are instigated by
expressive acts. With this data, it is important that we must learn the different types of
hostage takers and we will begin with the emotional aspect.

Mentally Disturbed

This group suffers from different kinds of psychological maladies. They may or may
not in touch with reality. A mentally disturbed individual may be a loner, act in accordance
with an non existing irresistible force, or on a false belief or a stimuli (Cooper, 1981).
Symptoms may include such things as dramatic and sudden changes of behavior, loss of
memory, mistreatment of a loved one, a sudden, impulsive act of theft, extreme depression,
or anxiety that is out of proportion to the circumstances that appear to be causing the
anxiety.

The individual may talk to himself of hear voices, or he may be displaying dangerous
behavior without any apparent reason. Mentally or emotionally disturbed individual may be
in a very docile mood for a while and become extremely violent without any apparent cause
(Adams).

A patrol officer is usually the first person to respond to a crisis situation before the
crisis team arrives. In some instances where Crisis Management Teams (CMT) are not
available, he usually starts and event finalizes the job. Police officers are empowered to
bring the mentally and emotionally disturbed individuals to the psychiatrist for evaluation
and treatment.

Paranoid Schizophrenics
22

To begin with the different kinds of mental disorder, we must first understand the
different topics associated with this. Below are items of information discussed in the book of
Adams that serve as a guide to a police officer who will respond to a hostage situation
involving mentally disturbed.

Psychosis is a gross and persistent falsification of conventional reality that leaves


the person unable to manage conventional reality with any degree of effectiveness.
Psychosis has two major components.

 Delusion is the faulty belief that is motivated primarily by the individual’s needs
and wishes and in fact, has no basis.
 Hallucination is manifested in a visual image that is quite vivid and real to the
individual who experiences it.

Paranoia is a set of fixed delusional beliefs that are accompanied by clear and
orderly thinking outside the delusion system. Paranoia manifests itself. A paranoid has
been described as “vigilant suspicious, distrustful, insecure, and chronically anxious”. There
are two types of a paranoid individual as:

 The True paranoid or the Classical paranoid as psychologists prefer, may be


of high level of intelligence and so persuasive that he will successfully recruit
other persons to help him in his war against enemy.
 Individual with Paranoid Reaction do not handle the problem in as much logic
or intelligence as the true paranoid.

Schizophrenia is a thinking disorder. Expert says that, approximately 80 percent of


the mentally ill of the population are schizophrenic. There are subcategories of this kind of
mental disorder, the catatonic state and the hebephrenic state.

 Catatonic state is demonstrated by the patient’s rigidly held position for some
interminable period of time, while
 Hebephrenic state is when the subject acts childlike and silly.

The signs and symptoms of the schizophrenic condition may appear in three The
signs and symptoms of the schizophrenic condition may appear in three (3) different ways
such as the following:

1. The subject’s language may be rambling and tangential; he may make up


meaningless rhymes, or echo anything he hears;
2. The subject may show his split personality incongruent between his expressed
ideas and emotional responses. This indicates that two thought operate
simultaneously.
3. The subject may isolate or alienate himself from the rest of the society and pull
himself into his personal shell (Schizotype personality).

Neurosis is suffered by a person if most likely to be observed in a continuous state


of anxiety. Erratic behavior would more than likely be displayed by reaction to anxiety in the
form of ego defense mechanism such as rationalization, projection or displacement. The
signs and symptoms are shaking uncontrollably and depression without explanation.

In general, they are characterized by being out of touch with reality and being
recognized by their false belief. Hostage taking is done in order for them to carry out plans
from someone who compels them to do. Their routine is to accomplish something but there
is no accomplishment. Most of the paranoid schizophrenics are in conflict and with difficulty
in coping even in a minimal stress situation.
23

Male paranoid may have problems with gender identity and religious beliefs. It is so
noted that frustration and conflict is involved. When these two combines, severe anxiety will
surface that makes a person so sensitive and volatile. Lack of interpersonal trust, religious
conviction, sexual disfunction, persecutory beliefs about family or significant individuals or
even distrust to the negotiator or police may lie in the person’s behavior. This variety of
issues may cause the negotiation difficult and dangerous (1986).

The first thing a negotiator should do is to keep the dialogue at an even pace. Since
paranoid schizophrenics are out of touch with reality, it is a must that the hostage taker
should be kept calm enough to stay in touch with reality while the negotiation process is
going on. A good negotiation strategy is suggested below:

 Reduce anxiety at the same time create a problem solving atmosphere


 Do not trick the captor
 Accept the statement as true but do not agree
 Do not convince that he is wrong
 Emphatic understanding is needed

Manic depressive personality

Depressed individuals are in an incapacitated mental state. He may frequently know


the hostages and the latter might be the cause of his depression. Negative outlook in life,
feeling unworthy, slow speech, suicidal and unpredictable and extremely dangerous are the
characteristics of this type of mentally disturbed. To a one who is a suicidal type, he might
inflict harm or even kill one of the hostages and the police will be forced to shoot him
(Strentz, 1984).

When dealing with this kind of mentally disturbed hostage taker, the negotiator must
be:

 Firm and manipulative


 Understanding and be supportive
 Able to induce subject to talk about something positive

Inadequate personality

This is a type of person that displays attention-seeking behavior. Hostage taking is


his action to prove himself or his worth. During the commission of the crime, he tends to
delay his actions and be caught in flagrante in order for him to prove himself (“I’ll show
them”). His characteristics are homicidal, loser complex, maybe fired from many jobs and is
in touch with reality.

Though they are emotionally disturbed, yet they are apologetic to their behavior
(“I’m sorry but I have to do this to prove that I can be a good worker…”).

The negotiator should be aware that those statements mean that it’s either murder
or physical harm to the hostages. It is but wise to present problem solving alternatives so
that the hostage taker will not feel that he has failed again. The person needs acceptance
and understanding. An initial action is to offer promises that can be kept and do not allow
relatives in the scene.

Anti-social personality
24

Those who belong to this kind of personality are repeatedly having conflict with the
people around them and notably having a deviant behavior from groups, social values and
or individuals. They defend their face from embarrassment by blaming others in the form or
rationalization. Anti-socials, when takes hostages, are generally engages in expressive acts
and they are likely to dehumanize the hostages and this is an indication that they are
dangerous individuals.

According to Lanceley, antisocial individuals did not internalized moral values yet
they know the consequences of their acts and they are therefore considered or more likely
to become a foe. These hostage takers are only concerned for themselves indicating
egotism. Though they are aware of the consequences of their acts, they feel no remorse and
the negotiator must be aware of this. At any time the hostage taker may consider his
hostages as burden and might harm or even end killing his hostages. A guideline of action
suggested is that the ego of the hostage taker is stimulated.

In this situation, the stimulus of this situation might be the hostages and the
negotiator must diverse the attention away from them. It is also suggested that it is but wise
not to refer or talk about hospitalization or treatment during the crisis intervention as this
might agitate the perpetrator if they believe they might loose their freedom or is insinuated
that they are crazy. Since the hostage taker is a street and police wise, it is advisable not to
use trickery (Fusilier, 1981).

The estranged person

Domestic problem is the main cause why an estranged individual takes hostages.
The hostages are commonly known to him and mostly are his family members. The hostage
taker is experiencing from relationship breakdown in his or her interpersonal relationships
and hostage taking is employed to compel the relationship to be maintained. The hostage
taker at his point is afraid of loosing the significant others. In order to carry out hostage-
taking, alcohol and prohibited drugs are used to have the necessary courage (Cooper, pp.
27-28). Knowledge in domestic intervention is essential when dealing with this kind of
volatile situation. The negotiator should be careful when intervening on personal disputes as
oral arguments between the hostage and the hostage taker may occur.

The negotiator must be an emphatic listener and with good responding skill. He must
also be aware of the personal nature if the situation. The negotiator should also have the
ability to bar the denial of reality into despair. The resolution is that the perpetrator needs to
be shown a graceful way out (Cooper, 1981).

Terrorists

Terrorism throughout the world has been alarming for the past decades and even at
present. Countries around the world have been facing terrorism problems either local or
international groups. In the United States alone, it has been reported that there are local
terrorists sowing fear, insecurity and unrest amongst the people. They create chaos through
assassinations, bombing, arson and other forms of malicious destruction of properties.
(CMD, AFP/PNP)

Though global terrorism is seemingly increasing and alarming, the international law
enforcement community is trying its best to address to this kind of problem. (The
international police organizations, other law enforcement, religious and civic organizations
team up together in fighting these terrorists.)

Regardless of their cause, their terroristic activities are condoned by most of the
people.
25

Characteristics, Modus Operandi and Causes

In order for them to attain their goal, careful planning is involved. They employ
professional members [most of the planning team members are educated enough on
political matters] to outwit and deceive the authorities. They also employ undercover agents
and divide into groups.

Hostages are in serious jeopardy when their demands are not met immediately or if
the military pressure hovers them (i.e deployment of troops, hovering choppers). The local
police may not be able to meet the demands immediately and only serve as perimeter
security as they need government attention. They use media to get attention from the
government.

Since most of the longest running crisis situation involves political terrorists, they
want to negotiate directly to the Government and pay less attention to the agents or crisis
management teams. Terrorists also try to let the government overreact n the situation so
when worse come, they, the hostages and the rights groups will turn ire and blames on the
government.

The common question asked is what causes them to do such. Evidently, hostage
taking is their means to get the much-needed attention from the government or private
individuals just like other types of hostage takers. In this way, the authorities will initiate
actions to negotiate for the safe release of the hostages on the fear that the latter will end
killed or harmed.

On the issue on ransom, according to them are just demanded to cover their
expenses while hostages are at their custody, but in sense, will serve as their resources to
buy additional firepower or in the recruitment for additional manpower in preparation for the
anticipated military or police pressures.

Just like other types of hostage takers, they need to be negotiated with . The only
difference is that a mentally deranged, inadequate and antisocial personalities needs more
the help of mental health professionals and rapid police response as the last resort to rescue
hostages away from danger. While on terrorist hostage takers, painstaking bargaining on
social and political demands is traditionally used. Government negotiators are utilized to the
fullest to negotiate and bargain issues with the kidnappers.

Barricaded Criminals

This type might be robbers cornered by the police while in the act of committing their
crime (i.e bank robbers). Either barricaded in a building, road block or on getaway cars.
Hostages are may be employees, bystanders or both caught in the process of escaping. The
hostage taking is a spontaneous reactions of the criminal when cornered. Some law
enforcement officers consider barricaded criminals as attention seekers, but others describe
then in the contrary as they avoid being identified. Their primary aim is to escape safely
taking with them the hostages as shield to prevent being shot by the police. Usually
barricaded criminals are engaged in instrumental acts as they demand for material things
such as getaway cars, firearms, money, and safe escape.

Barricaded criminals may initiate bargaining negotiation as the police closely monitor
them. As earlier presented they might ask a safe conduct pass for the release of the
hostages, or they might ask for additional money or getaway car and leave the hostages
immediately. The negotiator, upon gathering all the facts and assessment of the situation,
26

including the mental faculties, he may use his own discretion in the negotiation process,
whether to grant the demand or not

Prisoners

While most prisoners spend most of their time inside the correctional institutions,
some are concentrated on penal colonies under tight guards and to those who are
completely secluded inside their prison cells, they are haunted by boredom, get tired and
hostile. These may be due to the strict implementation of house rules, favoritism and poor
prison conditions (Lack of recreational activities and inadequate facilities, poor structuring
etc.).

These conditions may largely contribute to the occurrence of riots and crisis [hostage
taking] situations in our correctional institutions. Most probably, the hostages are the prison
authorities and staffs or even some of the inmates. For some institutionalized individuals,
hostage taking is their means of effecting escape [hostages serve as their shield against
assault of authorities] to stay away from the harsh prison condition. Another group of
prisoner-hostage takers are those who do not consider escape but a rather total
improvement of the conditions and services of the prison institution.

Prisoners who initiate hostage taking may be involved on either instrumental or


expressive acts or both. Instrumental behavior involves those situationally related,
substantive and objective wants and commonly known as the commodity goal of the
hostage taker (Roloff and Jordan, 1992). An example of this is the demand for prison
condition as these are the causes of the situation.

Additionally the first group almost has similar purpose to the barricaded criminals as
they inhibit instrumental acts or behaviors.

The negotiation approach in this situation based on the acts involved is bargaining
approach. They need to be bargained with at the soonest possible time as the life of the
hostages are in great danger. This is possible, as the hostage taker believes that the
hostages are the main cause of the problem.

NEGOTIATION MODELS
In Crisis Situations

Whenever a crisis [hostage] situation is reported to the police or other law


enforcement professionals, the initial action being taken is the activation of tactical assault
or Initial Action team and the coordination of trained crisis negotiators within their
departments. In cases where the hostage taking is initiated by a perpetrator, purely
engaged in expressive acts, the services of a mental health professional trained in crisis
management is indispensable. On cases of instrumental behaviors, tactical assault teams
are mobilized to contain and isolate the area and on standby when worst come along as the
negotiator/s enter the situation. However, the services of mental health professionals are
sought since most of hostage takers with instrumental behaviors are partially engaged in
expressive acts.
27

In assessing a crisis situation, one must understand and be able to determine the two
kinds of behavior. Firstly, Instrumental behavior refers to actions on the part of the
perpetrators and negotiators that facilitates some types of substantive outcome in terms of
instrumental issues (situationally related, substantive and objective wants of each party).
Additionally, those who are engaging in this kind of behavior are having goals to obtain or to
be fulfilled. Generally, hostage takers of instrumental behavior are criminal types and
intervention usually needs bargaining. E.g. barricaded criminals, or other organized crime
groups. Expressive kind of behavior on the other hand refers to various forms of
perpetrator’s and negotiator’s behavior that serves to communicate the power or
significance of the individual and his/her emotional state. Simply, it involves the behavior of
the perpetrator (Hammer and Rogan). This is characterized by the hostage taker’s attempt
to display power. Those who engage in this kind are mostly emotionally disturbed
individuals. e.g. mentally insane, etc.

Over the years there are approaches used by negotiators and are devised to suit to
these kinds of behavior or acts.

Bargaining Negotiation Approach

Earlier discussed were the two types of acts. Bargaining negotiation approach is the
model that negotiator employ whenever instrumental issues come along way. In this
approach, negotiation is viewed in terms of an exchange or distribution of resources. This
approach is derived to the social exchange theory of Roloff, (1981), which accordingly
has two premises:

1. Conflicts involve people who are interdependent which means that each party
can not accomplish each own goals without agreement from each party, and
2. Such conflicts involve rewards and costs from each other

This Social Exchange Theory is obviously focused in the exchange of objects


during the negotiation. In order that the negotiation be successful, some authors of crisis
management books claimed that the communication approach involve the exchange of one
set of resources for others or known as bargaining.

Bargaining is a powerful tool to resolve a conflict provided that the hostage takers
focus on instrumental concerns or issues that are negotiable. They are more likely to
engage with the hostage negotiator in order to bargain and resolve the crisis.

Van Zandt, Rogan and Hammer reviewed and made critique on this approach and
notes:

“the type of situation law enforcement usually encounter, often fall in several ways
to match the requirements of instrumental negotiation approach.”

 First, crisis negotiation situation is not typically like others, more common forms of
instrumental dominated bargaining where the assumption is that, the parties come
with well thought out proposals and are willing to a bargaining process.
 Crisis [hostage] situations involve high levels of anxiety and uncertainty. They are
characterized by a pronounced level of emotional excitation precipitated by the
hostage takers motives and enhanced police response.
 Majority of hostage crisis occurs as a result of the mental and emotional inability of
the hostage takers to cope with life stressors. This produces a situation where
normative rational actor bargaining is generally absent and its place exist an
explosive dangerous and volatile set of interaction dynamics where emotional
28

excitation and relationship issues (e.g. control, power, trust, liking and face) play a
critical role.

Over all, the particular features of crisis situation discussed above suggest that
negotiators often face interaction dynamics that may not fully explained by the
instrumentality focused bargaining approach.

Expressive Negotiation Approach

This approach is mainly focused on the emotional state of the hostage taker as a
powerful tool to resolving of crisis situation. Expressive negotiation approach came to
existence with the use of psychology, human relatons theory and research. Both assume
that the nature and quality of interpersonal relationships play a large role in resolving a
conflict. (Folger, Poole and Stutman, Schlossberg, Van Zandt, Rogan and Hammer)

Schlossberg has suggested three (3) assumptions of the expressive negotiation


model.

 Hostage has no instrumental value. This explains that the hostage is a tool or device
used in gathering audiences or attracting attention (attention-seeking behavior) to
the hostage taker. The hostage taker may initiate a crisis to demonstrate his ability
to control others.
 Both interactants have the interest to prevent the escalation of the situation into
violence or death. The hostage taker has some minimal level of awareness that when
he kill his hostages, he will later suffer the consequences.
 Hostage taker and negotiators are confronted with high level of emotional excitation.
Increased emotional arousal prepares the perpetrator from reacting with either fight
or flight response rather than a problem-solving mode.

In this approach, negotiators must be knowledgeable on ‘crisis intervention therapy’;


listening skills as it contributes a lot in decreasing anxiety and a problem solving can
emerge later during the negotiation process. (Schlossberg, 1979, Van Zandt, Rogan and
Hammer, 1998)

In addition, relationship development and confidence building strategies are viewed


as critical to resolution of crisis [hostage] incidents. The negotiator must have enough
training in listening, paraphrasing, self-disclosure, open ended questioning to reduce
perpetrator’s anxiety.

Van Zandt, Rogan and Hammer discussed in their book three (3) recent additions to
the expressive negotiation approach.

 Under intense stress, the Stockholm syndrome may likely to occur. This
phenomenon has been carefully studied and recorded by psychologists.
 The impact of the incident stress on negotiator’s psychological well being. More so on
unsuccessful negotiations. Negotiators should also deserve attention like professional
help.
 Explications of emotional and personality disorders and their impact on crisis
negotiation. Most of the hostage situations are committed by paranoids, depressed,
antisocial and inadequate personality typologies.
29

Hostage negotiations depends on the psychological characteristics of the hostage


taker and the identification of the effective communication strategies when negotiating with
perpetrators who exhibit behavioral patterns consistent with specific mental and emotional
disorders.

This model of negotiation is used to lessen the perpetrator’s emotional tension to


give way for a rational problem-solving atmosphere. (Hammer and Rogan)

Communication-based negotiation approach

This approach is founded on an interactive assessment if the crisis [hostage]


situation as it unfolds and is created through the interaction of the negotiator and the
perpetrator. Therefore, communication based approach is an interactive process wherein
negotiators and hostage takers react to each message behavior.

In fundamental communications theory, communications is composed of content and


relational dimensions. Content dimension of communication represents the instrumental
focus of person’s message, while the latter conveys the expressive features (as trust, power,
and respect).

There are three (3) interaction concerns relative to the communication-based


negotiation approach, which may tend to escalate or deescalate the conflict. (Hammer and
Rogan)

Instrumental concerns; Hammer and Rogan notes:

“Instrumental message behavior arises in crisis negotiation as the hostage takers


and the negotiators bargain with one another regarding with the incompatibility of their
objective concerns.”

In this concern, there are two broad types of issues involved, the substantive issues
and non-substantive issues or the situationally related and the situationally unrelated
respectively

Relational concerns

Relational message behavior denotes when an individual’s concern is more on the


nature of the relationship to other individual.

There are thre-e (3) core elements that represents relational message behavior.

 Power- this concerns the degree of agreement between the two interactants along a
dominance-submission dimension.
 Trust- revolve around the degree to which each party is willing to accept the
premise that no one shall be hurt or no act shall be detrimental to self.
 Affiliation- refers to belongingness and acceptance between the perpetrator and the
negotiator (respect, liking and caring for the well being).

Identity concerns

Identity concerns refers to an individual’s concern for self-presentation, reputation or


face. These are then important to both parties.
30

According to Tajfel’s Social Identity Theory as discussed by Hammer and Rogan,


personal and social identities are the two dimensions of a person’s self image and are best
to be known by the negotiator when dealing with conflict situation, noted as:

a. ‘Personal identity is based on an individual’s unique perception of his or her own


attributes’ (The person perceives himself either weak, strong, or
intelligent).Hammer and Rogan also suggested that a suicidal’s emphasis is on
personal identity concerns, and
b. ‘…social identity consists of those characteristics and their emotional significance
that is attached to one’s membership in social groups...’ (nationality, gender,
ethnicity, social group/cult).

Rogan and Hammer further discussed that face message behavior varies along three
(3) dimensions and the first denotes the locus of a communicator’s interest (is the face
message directed to ones’s self or to other?); Face valence is the second dimension, a
behavior either to attack or honor face. Finally, ‘face-honoring entails a dimension which
relates to whether the message behavior functions to proactively protect against potential
future threats to face or to retroactively restore perceived loss of face’.

When these three (3) dimensions are combined together, there are six (6) types of
face message behavior being produced:

Defend Self’s Face

This behavior is self-honoring and self directed messages. More often, the hostage
taker uses this when he is asked about the condition of the hostages and replied… (“ I don’t
know but I think they’re all OK! “)

Attack Self’s Face

Is a behavior that tends to attack or is directed to one’s self. The statement, (“ I know
this is all my fault…” ) fits to this behavior.
The perpetrator directs criticism or attacks to himself when he fell remorse of his act and
this usually occur during the accommodation stage.

Restore Self’s Face

This is used to restore one’s face/reputation. (“ I’m not as crazy as you think…”)
A hostage taker with psychological maladies uses this face message behavior to
restore his reputation.

Restore Other’s Face

A face message behavior that is directed towards the other party. (“ You’re such an
intelligent guy…”) or (” You’ve got a lot of people who cares about you…”)The negotiator
tries to restore the perpetrator’s face by attempting to gain cooperation and lessen the
latter’s psychological burden.

Defend Other’s Face

Known as the traditional message behavior utilized to protect other’s face from
future attack or loss. (“ I know you can overcome these odds in your life…”)
The negotiator should defend the perpetrator and not the hostages to increase sense of
worth of the perpetrator.
31

Attack Other’s Face

This represents the traditional, more limited view of face attack behaviors. (“ These
people causes me to do this…”) When a negotiator shifts the blame to others, it does not
really mean that hostages are not prime importance. It is more likely that the hostage taker
fell sense of understanding and belongingness. However, if the hostage taker is the one who
uses this, he is trying to imply that the main cause of the situation are the people involved
[hostages].

THE STOCKHOLM SYNDROME

In the event of hostage crisis, the Stockholm syndrome will likely to occur. This
phenomenon is referred to as the process of transference in which the hostages begin to
identify their captors and the following may occur:

 Positive feelings from the hostages to the captors


 Negative feelings toward the authorities by both hostages and captors
 Positive feelings returned by the captors to the hostages

This phenomenon got its name after one of the hostages in an aborted bank robbery
in Sweden fell in love with the perpetrator (Strentz, 1994). In some instances, hostages may
even help the perpetrator consummate the crime either by providing cover fire during the
escape process or actually joining the heist or become an instant member of the group.

Stockholm syndrome with operate when there is an extended period of time, not
being isolated from one’s captor and the positive contact between the hostages and the
hostage taker (Fuselier, 1981).

Variety of issues may possibly cause the occurrence of this phenomenon such as:

 Pity- In the case of mentally disturbed individuals, hostages may pity them, as they
believe these individuals need professional help. The hostages may offer advises (i.e.
not advisable) or even instruct the police not to launch a tactical assault against the
defenseless and sick hostage taker.
 Personal feelings- the hostage may feel affection towards the hostage more when
the hostage is female, with pleasing personality and cooperative.
 Indoctrination- barricaded political terrorists tend to indoctrinate their hostages to
force them agree and believe with their stand or political ideology. It is not so
surprising that a son of a slain scout ranger sergeant in Mindanao joined his Abu
Sayyaf captors during the siege in 2000.
 Poor inaction of the authorities- the hostages in the alarm and crisis stages of
hostage taking want to be speedily rescued before they will be killed or harmed.

In a crisis [hostage] situation, negotiators consider staling of time the number one
rule in dealing with hostage crisis. On scene negotiators stale time to decrease tension
among themselves and the hostage taker. This might be misinterpreted by the hostages as
32

they feel neglected. They will end up sympathizing with their captors and uncooperative to
their rescuers.

It should be corrected that providing assistance to the hostage taker not a conclusion
that Stockholm syndrome has occurred. Hostages may carry the moneybag or the clerk
opens the vault due to continues threat of the hostage taker.

As Stockholm syndrome continue to develop among the hostages and their


captors, the latter will make increase awareness of the safety of the hostages for fear of
losing a shield. The negotiators and the hostages however may benefit from this
phenomenon since the safety of the hostages is increased. This happens during the
accommodation period as hostages may tend to obey every command of their captors and
the latter will decrease or lessen the degree of security, control and the introduction of
physical harm among the hostages.

REACTIVE MEASURES IN HOSTAGE TAKING INCIDENTS

OPERATIONAL PREMISES OR AREA:

1. Principal Participants: First responding officers, Field supervisors, Threat


Management Force Commander, Tactical Unit Commander

2. Duties and Functions

a. First Responding Officers:


 proceed to the scene discreetly
 do not return fire except:
 when loss of life is imminent
 when hostage-taker is visible, armed, identifiable and no
 third party will be caught in the crossfire.
 contain the suspect-condor or isolate the area
 request assistance
 evacuate-care of critically injured persons if any
 retain witnesses- gather information
 attempt to communicate there telephone, megaphone or other means
 deploy responding officers
 Develop required police information-initial report of situation
 keep headquarters/station informed-periodic assessment
 of situation relayed from time to time

b. Field officers
 assumes command upon reaching scene
 evaluate situation
 prescribed containment procedures until the TMF arrives

c. TMF Commanders
 establishment command post
 coordinate/direct Commander of Tactical Unit Team
 plans/promulgate aggressive operational activities if required.

d. Tactical Unit Commander


33

 ensure that suspect is under constant surveillance


 maintain well-planned assault operation, upon order

OPERATIONAL PROCEDURES

1. Stabilization and Containment

a. Establish Rapport: get to know the suspect


b. Operational Activities
 clear area/scene of pedestrians
 required innocent persons to evacuate-this can be done
 throughout non-verbal language
 gather information about the suspect
 submit initial report
 request for additional resources, if needed

2. Consolidation and negotiation

a. Negotiation and qualities


 civilian volunteer preferred depending upon the call of incident
 demonstrate sympathy without being emotionally involved
 ability o accept tension between conflicting views
 maintaining self-control
 possess moral courage and integrity
 patient and good listener
 should not be a decision maker
 possess certain language skills or background which will lend
 insight into the psycho of the hostage taker
 knowledge in psychology of aggressive human behavior
 ability to give minor rewards
 ability to withhold rewards

b. Steps in Negotiation

On Initial contact - avoid hostile or antagonistic approach, introduce yourself-


don’t use title or rank, sell yourself-sincere and honest, instill trust and
confidence, minimize tension soonest

Development - drawing a psycho profile or hostage taker, reinforce


relationship establishment at initial contact

Alternative steps
Climax stage
Termination

RULES AND PROCEDURES ON NEGOTIATION

1. Stabilize and contain the situation


2. Select the right time to make contact with the hostage-taker
3. Take time when negotiating, allow hostage-taker to speak
4. Don’t offer the hostage-taker anything. What he will ask for will be part of the
negotiation
34

5. Avoid directing frequent attention to the victim when talking to the hostage-
taker
6. Do not call them hostages. Be as honest as possible; avoid tricks; be sincere
7. Never dismiss any request from the hostage-taker as trivial or unimportant
8. Never say “No”, soften the demands
9. Never set a deadline; try not to accept a deadline
10. Do not make alternate suggestion not agreed upon in the negotiation
11. Do not introduce outsiders (non-law enforcement officers) into the negotiation
process, unless their presence is extremely necessary in the solution of the
crisis; provide that they shall be properly advised on the do’s and don’ts of
hostage negotiation
12. Do not allow any exchange of hostage, unless extremely necessary; in
particular, do not exchange a negotiator for a hostage
13. Avoid negotiating face-to-face if possible
14. Law enforcement officers without proper training shall not be allowed to
participate in hostage negotiations; and
15. Never introduce ranks/possessions.

KIDNAPPING FOR RANSOM

KIDNAP FOR RANSOM is a criminal act, particularly described as the unlawful taking
and carrying away a person by force or fraud and against his will, or in any manner
depriving him of his liberty for the purpose of extorting ransom as payment for the release.

KIDNAP FOR RANSOM is a common term used describe a specific criminal act under
ART. 267 of the RPC entitled “Kidnapping and serious illegal detention.”

KIDNAPPING, in general, posses a serious threat to the peace and order condition of
the country. Focus of concern, however, falls on so-called kidnap for ransom case, because
they exist a heavy tall not only on their victims and the victim’s families, but also on society
as a whole. This is so because kidnap for ransom is by nature a syndicated crime
perpetrated by professional criminals groups capable of planning their nefarious trade that
even a single gruesome act of kidnapping expertly pulled by them could prove very
alarming to the public.

COMMON MODUS OPERANDI USED BY KIDNAPPING OR CRIMINAL


GROUPS ENGAGED IN KIDNAP FOR RANSOM ACTIVITIES.

A. A kidnap group initially scouts or a potential victim through an informer or spotter.


B. An informer or spotter could be a gang member or outsider whose participation is to
locate targets for the group.
C. After the would-be victim has been spotted, the kidnap group conducts a through
study on his background and his daily routine movements/activities.
D. Customary route taken by the would-be victim is particularly observed.
E. After careful surveillance and planning, they would kidnap the victim at an opportune
time.
F. The victim is them brought in a pre-designated area, usually outside urban places
where the victim is held in captivity ransom for his release is being negotiated.

HOW DOES KIDNAPPERS ABDUCT THEIR VICTIMS?

How facilitate the kidnapping for the victim, a gang member is sometimes made to
seek employment with would-be victim’s family, either as a diver or as household help. In
35

coordinate with an inside man, the group snatches the victim at on opportune from the
public.

Although the manner of accosting the victim varies from one kidnap group to
another, the most common method of approach used by kidnap groups is by blocking the
kidnap victim’s car by using a military or police-like vehicles, sometimes with siren. At least
one of the kidnappers is in complete military or police uniform and armed with a long
automatic weapon. The victim is intercepted and accosted with alleged traffic violations.

HOW ARE RANSOM NEGOTIATIONS UNDERTAKEN?

Ransom negotiations are later affected through various means of communications.


The most common is through telephone.

The kidnappers will call up the relatives of the victim and demands for a ransom for
the release of the victim.

An almost hysterical victim is sometimes made to speak over the telephone and
appealed to his bewildered relatives whose tendency to cooperate blindly with the
kidnappers.

The kidnappers then indicate the amount, normally in cash payable on a date and a
place specified set by them.

Threats on the life of the victim are also relayed to the one contacted in case term of
the ransom one not met which include, among others, non-disclosure of the case to police
authorities.

WHAT ARE THE BASIC OBJECTIVES OF THE SPECIAL UNITS OF THE


PNP IN DEALING WITH KIDNAP-FOR-RANSOM?

By priority, the basic objectives of the PNP Special Unit handling kidnap-for-ransom
cases are the following:

 To insure safety of the hostage or victim is a paramount consideration


 that takes precedence over all others. Utmost care is therefore
 exercised in the conduct of rescue operations.
 To understand and minimize the mental anguish and agony of the
 victim’s family and friends.
 To achieve the early liberation/salvation of the hostage/victim.
 To insure successful cases against suspected kidnappers.
 To ensure successful case building and prosecution of cases against
 Suspected kidnappers.
 To prepare for any similar eventually that may ultimately endanger the
 preservation of internal peace and order.

MOST IMPORTANT ROLE OF THE CITIZENS IN THE FIGHT AGAINST


KIDNAP-FOR-RANSOM.

The role of the citizens especially the families and relatives of kidnap Victims is to
report immediately any kidnapping incident to police authorities. Aside from this, they
should extend their outmost cooperation to the police not only in the rescue of the victim
but also in the effective prosecution of the suspect as well as in the efforts to locate, identify
and arrest kidnap gang members who remain at large.
36

TIPS TO BE UNDERT AKEN TO PREVENT


ANY KIDNAPPING OR ABDUCTION

If you believe that you or members of your family are potential targets of kidnap-for-
ransom groups, the most logical thing to do is to be SECURITY CONSCIOUS always in your
person and in your day to day activities.

The following preventive measures are hereby suggested:

 Develop a security system in your residence and in your place of work


 Be very selective in hiring your employees or your household help. It is suggested
that you let a trusted person secure the necessary police clearances for them and
check their background.
 Watch out and report to the police questionable presence of persons loitering near
your home or office.
 While on board your car, be very observant. If you notice you are being followed or
observed by doubtful characters, taken note of the vehicle’s description, especially
the plate number. If you have seen the faces/appearances of the persons failing you,
try to remember their descriptions.
 In your daily trips from home to office or school and back, try not to develop a
pattern. Do not establish definite schedules and routes in addition, avoid routes that
are deserted.
 If you are accosted or intercepted along the roadway for alleged traffic violation and
asked to pull over by questionable persons, stop only in a place where there is a
policeman or there are other persons around.

BEST THING TO DO WHEN YOU RECEIVE A KIDNAP NOTICE/CALL:

If you receive a kidnap note:


 Be calm, don’t panic,
 Make written record of the delivery person’s description
 Take note of other circumstances of the delivery (time, manner,etc.)
 Preserve the note for submission to the police.

During the call:


 Try to signal someone else to listen on an extension.
 Keep caller on line as long as possible.
 Do not antagonize the kidnappers.
 Give kidnappers a code word for whatever identification.
 Ask for Victim’s name, Where and when seized, Victim’s code name

After the call:


 Make a written record of the Caller’s age/sex, Mental state (your assessment),
Peculiarity of speech (lips, accent), Exact words used
 Try to take note of background noises and the audibility to telephone reception,
which may reveal the place where kidnappers is calling.

ASSASSINATION

What is Assassination?

It is the murder of prominent citizens particularly a head of a state or high official in


government or the killing an important person by violent means, usually from political or
religious motives.
37

What are the basic causes of assassination?

1. Revolutionary Causes – Groups and individuals who become fanatic in their desires to
change an existing government or to establish a new government often resort to
violence by means of assassination.
2. Economic Causes – In some cases assassination are motivated by beliefs that the
victim is responsible for bad economic financial conditions affecting the nation, a
particular group of people, the assassin or his family.
3. Ideological Causes- Some assassination are motivated by beliefs that the intending
victim is impairing the principle of the assassin and his associates.
4. Psychological Causes – Mental derangement, fanaticism, or emotional instability are
motivated factors in most, if not all, assassination. One or more of these conditions
are usually present in addition to of the other basic causes of assassination.
5. Personal Causes - Revenge, jealousy, hate, and rage or strictly personal drives have
motivated personal Causes of assassination.
6. Mercenary Causes – Some assassinations have been committed for a monetary
reward. There is frequently a distinct difference between the basic causes of an
assassination and the motives given by the assassins.

Objectives of VIP Protection

1. To protect the lives of personalities, important citizens and their country.


2. To protect those personalities from illegal pressure being put upon them, such as
terrorism, threats and blackmail.
3. To prevent insult on their honor-embarrassment to protected persons, his
government / country.
Basic Concepts of Protection

1. Protection is a buffer set-up thrown around a dignitary who will either prevent an
attack or absorb the shock to such an extent that the results will not be tragic.
 It must strive to protect the dignitary wherever he is located but must always be
able to move him to a safer area if the need should arise.
 Absolute protection is seldom possible. Therefore, the protective forces should
always try to operate in such a manner that any attempted attack will have the
smallest possible chance to succeed.
 Every element of protection must be thoroughly planed in advance and every act
of movement of the dignitary and the protective detail must be scrutinized to
make sure it is not playing into the hands of some attackers.
 Protection must be surprised proof and flexible enough to instantly respond to
any emergency.

2. There are usually advance clues of a planned attack and the protective system must
secure this intelligence from all possible sources resources and recognize the signs of
danger.

METHODS OF ACTION USED BY THE ADVERSARY

 Physical Assault – The inflicting of physical injury, with the aim of disabling the object of
the attack, such as murder wounding and trashing.

 Threats – The objectives of threats is to frighten the person and bring about a change of
policy. The adversary may use anonymous letters, radio broadcast and in the adversary
38

happens to be from a foreign country, he will have additional means at his disposal, such
as the local press, international forum or assemblies.

 Insult and Humiliation – The adversary tries to ridicule the VIP in the eyes of the people,
and will use different means in order to achieve these objectives.

INITIAL ASSESSMENT FOR DIGNITARY PROTECTION

Plan for protective operations to include a complete evaluation of the dignitary’s


level of threat exposure of possible attackers and the vulnerabilities of the protected.
Develop Intelligence profiling, likely scenarios and the protectee’s environment and routes
of travel and security measures already in place. Finally, the identification, selection, and
implication of protective countermeasures shall be undertaken.

THE PROTECTION OF VERY IMPORTANT PERSONS (V.I.P.) IS BASED ON SEVEN


DIFFERENT METHODS

1. Physical Protection – This refers to the protection of the VIP and the installation he
uses through the physical presence of his guards.
2. Secrecy – Information about the VIP, which might be important to the adversary, will
be kept from him.
3. Deception – The publishing of deceptive information concerning the actions of the
VIP.
4. Control – Control over the persons coming into the contact with the VIP over the
object sent to him.
5. Intelligence – The gathering of the adversary’s intentions as to as assault upon the
VIP.
6. Instruction – The VIP and his Colleagues have to coach as to the necessary
precautionary measures.
7. Neutralization of Suspects – Neutralization of people who are suspected of trying to
liquidate the VIP. A good system of protection will use all of the above mentioned
methods. It is not always necessary to use them at the same time, but generally, it
will be necessary to employ most of them in order to ensure and efficient protection.

PROTECTION PROCEDURES AND PRINCIPLES

As recognized by most police agencies, absolute and complete protection against


assassination of a dignitary is seldom possible. The goal is to minimize the chances of
success of any contemplated attack. The privacy of the dignitary must be considered, and
under no circumstances should he be embarrassed. Despite this, protection must be
provided against hazards caused by personal designs, accidents or negligence. Procedures
are unknown to the public.

Every phase of security must be carefully planned in advance. Pertinent factors


considered in this planning include; importance of the protected persons, political attitude of
the local population, distances involved, means of transportation, and duration of the
security mission.

Physical protection consist of a series of protective cordons, each compelled in itself.


These defensive rings maybe composed of security personnel, physical barriers, or a
combination of both. An example of this type of security is the protection established around
a house from the third echelon of protection. The depth of the protective forces and the
degree of security established will be governed by the factors considered in the planning
stage.
39

Security planning should be flexible. Weather conditions and mechanical failures


(including failure if lighting) are two ever-present potential hazards. The unexpected arrival
of a large number of visitors is another situation frequently encountered. Last minute
changes in the schedule of events occur on occasion. The security must be sufficient trained
to cover these and many more eventualities.

Central direction and unity of effort are of special importance because of the nature
of this assignment. The officer-in-charge should be designated with full responsibility for all
phases of the security mission. Close coordination must be established with all local military,
police and civilian authority. The security’s responsibility for each phase must be clearly
defined. Arrangements should be made for the local civilian police to control local
inhabitants. All available intelligence channels should be utilized for information of potential
danger areas.

The advance party can best accomplish much of this coordination after the official’s
itinerary is received.

It is recommended that routes and means of transportation used by the protected


person not be published. It is recognized however that in many instances this is not
possible. The itinerary more of that not receives wide publicity. It is necessary that he
address public audiences, farewell delegations at bus stations and airports. Careful security
of the normal itinerary will reveal many phases of the transportation that need not be made
public. Routes to destinations must not be revealed. If a series of appointments is scheduled
for a particular location, routes should be varied. In this regard, close liaison with the
Information Officer or individual acting in this capacity should be maintained. No publicity
should be given concerning the mission except that which the Information Officer may
release. Maintaining secrecy on the movements of the dignitaries is one of the most
effective means of minimizing the opportunity for attack.

Personnel for the security detail should be outstanding in the performance of duty.
They should be mature and presentable. Normally, accredited military, police criminal
investigators are best qualified for this duty. They must be trained so that each individual
will exactly know what he is to do in any emergency. Security personnel must sacrifice their
lives when ever necessary to prevent the success of an attack.

USE OF SECURITY PLAN

An excellent format for preparation of a protective plan is the standard operation


plan used by the police. The requirements of the plan which are coordination or liaison, the
itinerary defense area, personnel and equipment requirements post designation,
cooperation, communication, public relations, and miscellaneous emergency information,
can all be logically included in the normal five paragraphs of the operational plan.

The plan should be on writing and procedures in sufficient copies, so that it can be
staffed with those officers with whom coordination is necessary. Only key personnel needed
to provide a complete protection are given an orientation on the events of the plan and
should be familiar with the whole operation. Each participant commits the requirement of
his specific mission to memory. For this reason, the plan contains detailed instruction for
each post and mission. The instruction should be simple to understand and easy to execute.
The length of the plan will depend upon the size of the mission to be performed. The
itinerary consists of one or more men stationed or in fixed post. Police should know the
identity in the party of protected official. The attitude of the protected official must be
estimated by the police officer. In most instances the presence of security personnel, is
unpleasant to the dignitary. This is understandable in view of lack of privacy. The security
40

personnel must be aware of this natural reaction, actually anticipate it, and they observe
adherence to strict policies of non-irritating conduct.

In the initial planning stages, all potential embarrassments should be avoided. It is


normally a good policy to avoid direct contact with the dignitary on details of arrangements.
The Officer-in-Charge should coordinate with the member of the official party who is
designated for this purpose. When a important person ignores the measure which have been
taken for his protection, security officers continue to perform their duties as directed. When
appropriate, they offer suggestion tactfully. The chief of the escort acts exercises
enforcement power over the security of an important person only when necessary with
caution and diplomacy. Any violation of the security measures for important persons is
brought to the attention of the chief of the escort or guard. The security police officer
insures that the guards comply with every detail of their instructions. Restriction on the
circulation of individuals should be strictly enforced. Before any person is allowed to
approach the important person of his effects, he is checked. The security detail should not
enter into conversation between the dignitary and other individuals. Information should be
given only when solicited. In all dealings with the protected person and his associates never
volunteer for uncalled for personal favors. Deliberate attempts to ingratiate themselves only
serve to degrade the security mission and result in an undesirable relationship if the official
or members of his party is bothered. Security personnel should react accordingly. The
protected person should set the standards of the relationship. In the absence of such
standard actions of the security detail should be formal.

THE USE OF WEAPONS

There is always the danger of undue alarm due to accidental discharges, and the
injury of innocent persons, when weapons are carried. All personnel should carry a holstered
sidearm of at least .38 or 9mm caliber. Automatic pistol should contain a fully loaded
magazine with a round in the chamber and the safe on. In certain areas, when attackers are
made in force by armed mobs, the appropriate weapon or machine gun can be used. The
machine gun is also used when attacks are made from vehicles, and when the attackers are
behind shields or barricades. Riot or shotguns should be available when the attack is made
in a congested area where there is danger of injuring innocent people if long-range weapons
are used. They are also effective against mobs using “Banzai” type of attacks. The use of
police nightsticks and tear gas will break up and confuse the crowd, making their movement
by the protective force easier.

CROWD CONTROL

The protective personnel should understand the principles of crowd control. They
should not show prejudice, sympathy, or become involved in the grievances of the crowd.
When force is necessary, the protective force should move with speed and surprise. At the
first sign of disorder all leaders should be apprehended. The real troublemakers are usually
to the rear of the crowd. Protective forces should not be fooled or deterred by mob leaders
who arouse and use women and children in front ranks to shield themselves from aggressive
action by the protective personnel. The crowd’s retreat should never be hindered, it should
be moved in the direction where there is no space to disperse.

AREAS AND BUILDING SURVEY


41

All areas to be occupied or visited by the protected person should be surveyed in


advance. The procedure to be prescribed for building inspection is complete and thorough.
In many instances, the dignitary is a state visitor of the visitor of the nation; on other
occasions he may be the houseguest of other high ranking government officials. At times, he
may stay in hotel occupied by numerous other guests. Certainly, all the inspection listed in
this section are feasible. The Officer-in Charge and his advance party use common sense of
sound judgement in establishing the best security possible under existing circumstances. In
some instances, the advance party can facilitate security measures by arranging for a
separate floor or wing of a hotel as a billet for the party. Normally, billeting arrangements
are included in the itinerary prior to the start of the security detail. Proper building
inspection entails a thorough examination from roof to basement. Blueprints of the building
should be obtained. Rooms and hallways are measured visually and compared with the
dimensions indicated in the building plan to locate any hidden passage or alcoves. Each
room is examined systematically. Walls, ceilings, are mentally divided in to three-foot
squares and each square minutely examined for cracks, evidence of recent repairs, or any
unnatural appearance. Suspicious areas should be examined satisfactory by reliance on
operating or maintenance personnel. All furniture are carefully examined, all doors opened
and drawers are removed as check for concealed compartments. All wires leading into or
leaving the various rooms are traced and all devices connected with them identified.
Heating radiators, plumbing, pipes and similar equipment are carefully examined for dummy
installations. All locks and locking mechanisms are inspected. After the inspection is
completed, the room or building is secured until used.

PROTECTIVE TECHNIQUES

PROTECTION WHILE RIDING IN VEHICLES – The selection of security trained driver


and the type of vehicles to be used should be given thought, then a closed car provided with
greater concealment and therefore better protection for the dignitary recommended. Route
survey should be conducted in advance before actual travel and protective details should be
equipped with radio communication processing encoding-decoding “scrambling”
capabilities. All auto motive equipment should be excellent mechanical condition and should
be regularly inspected for signs of tampering and bullet proof if possible. The driver should
be well trained and reliable. Vehicles must be secured at all times during security missions.
Escort vehicles should precede the protected vehicle. The security vehicle should follow the
protected vehicle as closely as possible consistent with driving safety. An advance car
should precede the convoy by approximately one-half kilometer to observe hazards and
reports on unusual conditions. A reserve vehicle should follow the convoy as a short
distance from the rear for use in emergency. The escort follow-up and all security vehicles
should maintain radio contact. Whenever possible, a member of the security detail is placed
in the protected person’s vehicle. In extreme conditions, when greater security is necessary,
one or two dummy vehicles, carrying individuals who are similar in appearance to the
protected person, may be included in the convoy. Fixed post and bridges, underpass, and
traffic stops must be secured when deemed necessary. An alternate route should be
arranged for emergency requirements. Unless indicated by competent security the convoy
will confirm with the local traffic regulations. Evaluation of such situation is made to
determine the degree of security, which is practical and necessary.

TRAVEL BY TRAIN – Generally, the greatest potential security hazard exists at the
points where the escorted person boards or leaves the train. Usually this is a congested area
with numerous individuals carrying all sorts of bags, packages, and containers. In the study
of assassination techniques, the large number of attempts in this location is not worthy.
When possible the area should be closed to the public or the dignitary’s party, it should be
attached to the rear of the train where feasible. The members of the security detail should
be in control of all entrances of the car. When the train is stopped, they assume position
covering all avenues of approach to the car. If the protected person leaves the train for a
42

temporary period constant security should be maintained on the train until the protected
person returns and the train departs. Prior coordination should be made with railway officials
for exact scheduling of stop enroute. Railroad security and local police at scheduled stops
can be contracted for standby assistance. When deemed necessary advance and rear guard
train may be placed on the other cars of the train, seated among passengers, as an
additional safeguard.

TRAVEL BY AIR – Normally, a special plane is placed for transporting the dignitary
and his official party. The technical safety factors, such as clearance of operating personnel
and control of flight, are responsibilities of the operating agency when performed by military
forces. The most dangerous periods, as in train, movements are boarding and departure
times. All structures offering observation of the boarding shall be adequately secured either
by closing of when not used or by strategic placement of security detail. When a large crowd
is expected for take off ceremonies, barricades and uniformed military or police force in
sufficient numbers should be included in the planning. The plane designated for the
important person should be kept away from contact with the plane. When the designation is
another base, advance arrangements should be made with the Air Force Office for additional
security and transportation is normally scheduled for the important person and his party. It
should not be forgotten however, that arrangements must be made for the accompanying
security personnel.

TRAVEL BY SMALL WATERCRAFT – When planning for a cruise, the boats selected
should be of types and sizes capable of withstanding weather and surf conditions that may
be encountered. A thorough inspection of the boat designated for the protected person
should be made in conjunction with responsible ship personnel. The inspection is primarily
for unauthorized persons stowing away for any suspicious objects or packages. An additional
check should be made for adequate life saving and emergency facilities. Security personnel
should be alert for either crafts approaching the dignitaries boat. When feasible,
arrangements should be made for a boat to follow the protected person’s boat.

PROTECTION WHILE WALKING – One of the best protective measures is varying the
selection of walking times and routes. The security detail accompanying the dignitary should
be positioned to cover all avenue of access, additional security personnel should cruise in
the immediate vicinity. Local police agencies can be of special value in adding background
security in these instances.

PROTECTION AT PUBLIC ASSEMBLIES – A careful search and inspection of the area


should be made at the time protection is established. A physical defense zone should be set
up immediately around the dignitary, and additional concentric defense area should be
added to the greatest possible extent. Protection in the defense zone is provided by
protective personnel, permanent or temporary type barricades, and a combination of the
above techniques. Screening points to admit passage of authorized persons and materials
should be established. Observant and inconspicuous personnel should be patrolled among
the crowd. Maximum use should be made of security aid such as flood and spot lights,
communications, emergency equipment, special weapons, locks, barricaded areas, and
helmet proof equipment, and materials.

PROTECTION WHILE IN A RESIDENCE – The protective detail should occupy at least


one protective ring. At least two additional areas should be established in the outer
perimeter. There must be a pass system for the staff and frequent visitors. Food suppliers
should be checked and food selection and handling should be controlled, Mail and packages
should be fluoroscope. Periodic inspection should be done on premises for safety hazards,
lethal devices such as bombs, traps and sufficiency of security equipment. Adequate
43

communication should be maintained, and all possible emergency situations should be


considered.

PLANNING CONSIDERATIONS

The nature of the Assassin

The assassin is a discontented individual who decides to kill the person whom he
thinks is responsible for his difficulties. He attempts to gain advantage by the use of
surprise. A well-trained protective force that he is likely to be caught does not discourage
him. Assassins do not have distinct features. They are not concerned about death. Many of
them suffer from mental disorders.

A mentally unbalanced person is not necessarily stupid and as a matter of fact they
can be ingenious.

Assassination of VIP normally feature the following:

 The location of victim at a given time will be known in advance by the assassin.
 The assassin with his weapon will choose a position giving him access to his victim.
 The protection detail will be attracted by some diversionary interest or otherwise
inattentive.

Break down of planning

BEFORE: Plan must be extensive and thorough as follows:

 Plan should be in writing.


 Plan should be specific-complete for each post and for each person involved.
 Plan should be simple to understand and easy to execute.
 Plan should be carefully read and committed to memory.
 Coordination among the different agencies must be laid out.
 Details and schedule of activity contemplated should be in advance.
 Define and establish the defense area.
 Number of personnel should be determined.
 The accessory equipment should be itemized and the distribution shown.
 Means of communication

DURING:

 Protective force should function as a team.


 The aim should be that nothing occurs that might jeopardize the safety of the VIP.

AFTER:
44

 Summarize things that happened in the operations.


 Evaluate individual performance, bring out the weak points and suggestions for
improvements.
 Encourage individual members to discuss their particular assignments.
 Encourage group discussions.
 Central summarization with outlook on succeeding operations.

BOMBING
(Incident Awareness)

IS BOMBING A SERIOUUS SOCIAL PROBLEM?

Bombing is a very serious social problem as when a bomb explodes, casualties and
destruction of property is very essential. When bomb incidents occur, people are affected
directly and indirectly. Work stoppage (evacuation), tension , fear or panic is felt by the
people within the area. Even if a person is not directly affected, just hearing or reading the
news about such incidents can make him apprehensive. Also, some people could took the
chance as leverage to scare or threaten would be victims for some reasons like extortion or
just for pranks. Bomb incidents include bomb threats and actual bombings. It can happen
anywhere and anytime.

With the recent advancement of science and modern day technology, bombs
becomes more sophisticated, smaller in sizes, easy to handle, easy to plant, easier to
transport but with more devastating effect.

The tactics common to terror groups is bombing. Of all terrorists incidents recorded.
70% were attributed to terrorists bomb.
45

The bomb is a popular weapon because it is cheap to produce, easy to make, has
variable uses and is difficult to detect and trace after the event. Investigations have
revealed that the targets for “terrorists bombing” are not selected at random. The modus
operandi for selecting the target and planting the explosives appears to follow this pattern:

1. The target is selected because of political or personal gain to the terrorists. It is then
kept under surveillance to determine the entrances and exits most used.

2. Reconnaissance of the building is made to locate an area where a bomb can be


concealed, do the most damage and here the bomber is least likely to be observed.

3. A test or dry run of the plan is often made. After the dry run and at a pre-determined
time, the building is infiltrated by the bomber to deliver the explosive or incendiary
device.

4. The device maybe partially pre-set prior to planting. If it is fully set and charged, it is
simple matter for one or two of the group to plant the device in a pre-selected
concealed area.

a. This can be accomplished in a minimum of time. If the device is not fully set and
charged, one member may act as lookout while others arm and place the device.

b. Most devices used for the destruction of property are usually of the time delay
type. These devices can be set for detonation to allow sufficient time for the
bomber to be at a considerable distance away before the bomb threat call is
made or the device is detonated.

HOW TO PREPARE

The terrorists have developed their plan of attack and the following procedures are
suggested to business and industry for coping with the bomb threats and actual bombings.

1. Contact the police, fire department and other local government agencies to
determine whether any has a bomb disposal unit. Under what condition is the bomb
disposal unit available. What is their telephone numbers. How can you obtain the
services of the bomb disposal unit in the event of a bomb threat. Will the said unit
assist in the physical search of the building or ill they only disarm or remove the
explosive device.

2. Establish strict procedures for control and inspection on packages and material
entering critical areas.

3. Develop positive means of identifying and controlling personnel who are authorized
to access to critical areas.

4. Arrange if possible, to have police, fire representatives with members of your staff,
inspect the building for areas where explosives are likely to be concealed. This may
be accomplished by reviewing the floor plan of the building.
46

5. During inspection, you should keep particular attention to rest rooms, storage, crawl
areas, trash bins, main switches, etc. It can give you an idea where a time delayed
explosive device or incendiary device may be concealed.

6. All security and maintenance personnel should be alert to suspicious looking or


unfamiliar persons or objects.

7. Instruct security and maintenance personnel t make periodic checks of all rest
rooms, stairways and other areas of the building to assure that unauthorized
personnel are not hiding or conducting surveillance of the area.

8. You should assure adequate protection for classified documents, proprietary


information and other records essential to the operation of your business. A well
planted, properly charged device could, upon detonation, destroy those records
needed in day to day operation.

9. Instruct all personnel especially those at the telephone switchboard in what to do if a


bomb threat call is received.

a. As a minimum, every telephone operator or receptionist should be trained to


respond calmly to a bomb threat call. To assist these individuals, a bomb threat
checklist should be kept nearby.
b. In addition, it is always desirable that more than one person listen in on the call.
To do this, have a covert signaling system to a second reception room.
c. A clam response to the bomb threat could result in getting additional information.
This is specially true if the caller wishes to avoid injuries or deaths. If told that the
building is occupied and can not be evacuated in time, the bomber may be willing
to give more specific information on the bomb location.

10. Organize and train an evacuation unit consisting of key management personnel. The
organization and training of this unit must be coordinated with other tenants of the
building.

PLANS TO BE MADE TO COUNTER BOMB INCIDENTS

1. PHYSICAL SECURITY PLAN- Physical security measures taken for the protection of
property, personnel, material, facilities and installation against unauthorized entry,
trespass, damage, sabotage or other illegal or criminal act. It deals with the
prevention and is designed to protect against not only bombing incidents, but a full
range of possible attacks.

THREE PRE-REQUISITES FOR A SUCCESSFUL BOMBING:

A. ACCESS TO EXPLOSIVE
B. KNOW-HOW
C. ACCESS TO TARGETS

Particular attention must be given to the third pre-requisite because this is the one
area which a law enforcing organization has the greatest opportunity to deter a bomb
incident. If adequate preventive measures and physical security precautions are
established; the opportunity to obtain explosive and emplace bombs will be reduced. In
addition, an effective bomb threat plan and a well rehearsed procedures for handling bomb
threats and incidents will reduce the chances f a bomb being successfully detonated.
47

COUNTER MEASURES AGAINST SABOTAGE BY EXPLOSIVE/ INCENDIARY ARE;

 PHYSICAL SECURITY EDUCATION


 USE OF EFFICIENT SECURITY FORCE
 IDENTIFICATION AND MOVEMENT CONTROL
 USE OF PHYSICAL SECURITY AIDS
 DESIGNATION OR RESTRICTED AREAS
 SEARCHES OF INCOMING VEHICLES
 EMERGENCY PLANNING
 GOOD HOUSEKEEPING

2. BOMB INCIDENT PLAN- A plan providing detailed procedures to be implemented


when a bombing attack is executed or threatened. Elements of this plan are;

AUTHORITY AND CONTROL

 WHO WIL BE INCHARGED OF THE INCIDENT?


 WHERE WILL CONTROL CENTER BE LOCATED?
 HOW WILL CRITICAL DECISIONS BE MADE?
 WHO WILL MAN THE CONTROL CENTER?
 WHAT PRIMARY AND ALTERNATE COMMUNICATION SYSTEM WILL BE DURING THE
INCIDENT?

THREAT EVALUATION

 CHARACTERISTICS OF THE THREATENER SUCH AS AGE, ETHNIC GROUPING, AND


PHYSICAL AND MENTAL CONDITION
 BACKGROUND NOISES (TELEPHONE THREAT) THAT GIVE INDICATIONS OF CALLER
LOCATION.
 TARGET IDENTIFICATION, DID THE THREAT INDICATE A VALID TARGET?
 TECHNOLOGY; IS THE DEVICE DESCRIBED TECHNICALLY LOGICAL AND POSSIBLE?
 ANALYSIS OF RECENT LOCAL BOMBING ACTIVITY. IF THE EVELUATION OF THE
THREAT INDICATES THAT THE THREAT IS VALID, ACTION IS REQUIRED TO
MAINTAIN SAFETY OF PERSONNEL. SECONDARY CONSIDERATION IS GIVEN TO
DAMAGE REDUCTION.

3. EVACUATION

A number of factors may influence the decision whether or not to evacuate. Threat
assessment is the primary consideration. Also, the most likely place for a device to be
located is on the exterior of the building. Evacuation to the outside of the building may
increase the danger to personnel. The second most likely places to conceal a device are
those areas of accessibility to the public, i. e., hallways, lobbies, and restrooms.
Evacuation of personnel through public areas may increase the hazard. Secondary
assembly points should be established in the event the device is located at/near the primary
assembly point.

An alternative to total evacuation is partial evacuation, which is effective when the


threat indicates the specific location of the device. Partial evacuation requires a high degree
of planning.

Should a device be located, the area around the item as well as the floors above and
below the suspected item should be evacuated immediately.
48

4. SEARCH PROCEDURES

 WHAT WILL BE SEARCHED?


 WHAT SEARCH TECHNIQUES WILL BE EMPLOYED?
 WHO WILL SEARCH?

The search must be thorough, systematic, and quick. The bomb threat plan should
include floor diagrams and room search cards. These expedite search, prevent duplication of
effort, and prevent areas from being overlooked.

The building search should start simultaneously at four places; the exterior search,
public search area, the detailed room search, and the garage search. The search starts at
the lowest part of the building, i.e. basement, garage, or bottom floor.

As the exterior search and public area search teams complete their tasks, they will
supplement the detailed room search teams in progress.

Two-person teams have proven most effective in searching must areas. Exceptions
would be for search or very large areas such as parking garages and auditoriums.

Except for the most unusual circumstances for vip and or presidential technical
security measures, eod/bomb squad and military/police will not be used to search for
reported explosive device in community areas, building and offices. Rather, such searches
must be conducted by designated individuals familiar to the area and its contents. If an
unusual item is found, eod is to neutralize and evacuate the device for disposal. Law
enforcement personnel are to be employed around the threatened area to control traffic and
provide other regulatory service.

5. DAMAGE REDUCTION

Damage control techniques include standby of fire and medical services;


disconnection of gas, fuel, and electrical power; evacuation of personnel; and venting by
opening doors and windows to minimize blast damage, and use of blast attenuation
techniques.

6. REMOVAL

Removal of an improvised explosive device or a suspect item is an eod function.


Under certain conditions where evacuation is impossible or bomb disposal personnel are not
available, it may be necessary for someone to take steps to remove the ied to an exterior
holding area or to neutralize the device. It must be understood that these procedures should
be used ONLY AS A LAST RESORT AND ONLY ON THE APPROVAL OF THE SENIOR
OFFICIALS IN-CHARGE.

7. DETONATION

If a detonation occurs, it may be necessary to organize rescue teams, first-aid


personnel, and the site security personnel. Likewise course of action taken must be done
such as:

 secure and control access to the compound/and or building


 control and extinguish fires
 search area for secondary explosive device
 supply immediate first-aid, remove dead and injured from the area
49

 secure entire blast scene, including area suspected or known to be the point
of detonation
 minimize disruption of the blast scene pending investigation. Do not move or
remove any evidence debris, bomb components.
 Photograph area including known or suspected point of destruction
 If building is safe to enter, shake down area to ensure all classified materials

BOMB THREAT

It is a message delivered by any means, warning or claiming the presence of one or


more bombs. A bomb threat may or may not specify the location of a bomb. It may or may
not include the time of detonation/ignition. It may or may not contain an ultimatum related
to the detonation/ignition or concealment of the bomb.

Reasonable explanations for receiving a bomb threat:

1. The caller has definitive knowledge or belief that an explosive or incendiary device
has been r will be placed in an area and wants to minimize personal injury or
property damage.
2. The caller wants to create an atmosphere of anxiety and panic which will in turn,
possibly result in a disruption of normal activities at the target area.
3. The caller wants to bring about or amplify a lack of confidence in the existing
leadership or programs.

Each threat received through any means of communication, should be treated as real
and must be thoroughly evaluated to safeguard life and property. The following procedures
apply to recipients of the threat;

Telephone calls

 A checklist of guidelines should be readily accessible (telephone bomb threat


report form)
 Keep the caller on line as long as possible. Ask him to repeat the message.
Record every word spoken by the person.
 If the caller does not indicate the location of the bomb or the time of the possible
detonation, you should ask him for this information.
 Inform the caller that the building is occupied and the detonation of a bomb could
result in death or serious injury to many innocent people.
 Pay particular attention to peculiar background noises such as motors running,
background music and any other noises which may give clue as to the location of
the caller.
 Listen closely to voice (male/female), voice quality (calm/excited), accents and
speech impediments, immediately after the caller hangs up, you should report to
the person designated by management to receive such information. Since the law
enforcement personnel will want to talk first hand with the person who received
the call, he/she must remain available until they arrive.
 Report the information immediately to the police/fire/bomb squad and other
appropriate agencies or counter-action.

Handwritten/ typed notes

 Save all materials, including any envelope or container. Once the message is
recognized as a bomb threat, further unnecessary handling must be avoided.
Every possible effort must be made to retain evidence, such as fingerprints,
50

handwriting r type writing, paper and postal marks which are essential to tracing
the threat and identifying the writer.

 While written messages are usually associated with generalized threats and
extortion attempts, a written warning of a specific device may occasionally be
received. It should never be ignored.

 With the growing use of voice print identification techniques to identify and
convict telephone callers, there will be an increase in the use of written warnings
and calls t third parties.

Person to Person (Indirect)

1. Notify your supervisor immediately.

2. Keep the person making the threat or indicating knowledge of a threat under
surveillance until relieved by your supervisor.

3. Take note of the age, height, weight, sex color of eyes, hair, skin, clothing,
unusual characteristics such as lameness, twitching or any peculiarities of the
person under surveillance. Observe for other personal defects.

4. If the person leaves the scene, take note of the transportation used, such as bus,
taxi or car, note the make, model, color, plate number and marking of the
vehicles used.

Pinpointing the exact location of the bomb must be the primary concern. The
following procedures apply when the location of the bomb is known;

Inform immediately your supervisor or officer

1. Coordinate with the nearest police4 unit on how t avail the services of the
bomb squad
2. Alert fire station and medics
3. Cordon the area.

BOMB IDENTIFICATION AND DETECTION

Usually, bombs that are used for terroristic purposes are disguised and are contained
in any of the following:

GIFT WRAPPED PACKAGES, BISCUIT CANS, FRUIT COCKTAIL BASKETS, ATTACHE CASE/SUIT
CASE, LUNCH BOXES, LAUNDRY BAGS, SHOPPING BAGS, ENVELOPE, BOOKS, CLUTCH BAGS,
LETTERS, TRASH BOXES, GARBAGE CANS, LADIES BAGS, CAR/BOXES, CARTONS,

HOW TO DETERMINE IF BOMB EXISTS

1. By using visual inspection without the use of any instrument or apparatus or touching
the suspected object.
2. visualize the suspected object at a distance t see if there is any relation or
connection to its surroundings. If none, take a closer look to see if there is or there
are protruding wires or gadgets;
3. check without touching if the suspected object emits smell of gas or commonly
smelled chemicals;
51

4. check if the presence of the suspected object in the area is unusual or strange;
5. be quiet and listen if there is a tic-tac sound of a clock

LOCATION OF BOMBS

The location of the bomb at the target site is usually determined by three criteria:

1. The location must be accessible to entrances.


2. The location must be accessible to exits, but isolated enough for the bomber to
conduct his mission.
3. The location would also be as place where the most structural damage to the
building would occur.

WHAT TO DO IF THE SUSPECTED BOMB IS LOCATED

Discovery of what appears to be suspicious material as a result of telephoned


information or accidental discovery, calls for action on the part o the individual only to a
limited extent. Evacuate the personnel to at least 300 feet away from the building/bomb.
Turn off the electrical and gas units. N attempts should be made to move, alter, open or
examine the article. Above all “Don’t panic”.

Once it has been determined that explosive items on inspected package exist and
while awaiting for the arrival of eod/bomb squad personnel, start the protective works by
utilizing minimum number of person for reason of safety such as VENTING – which is the
opening of doors and windows to minimize the blast effect; BUTTRESSING – which is
sandbagging adjacent walls to prevent blast and shock damage to adjacent rooms and
BAFFLING – which is the placing of sandbags around the bomb to minimize blast fragment
damage.

METHODS OF DELIVERY

Mail, Planted (booby trapped), Thrown, Projected, Delivered by agents

WHAT TO DO WHEN BOMB EXPLODED


Alert personnel for possible additional bombs, secure bombing scene and evacuate
the injured, leave obviously dead personnel, when fire occurs after explosion, assist in
putting off the fire and collect and preserve evidence.

DON’T’S IN HANDLING SUSPECTED BOMB PACKAGE


1. Do not attempt to open the package.
2. Do not submerge in water due to conductivity f electric circuit and the possibility of
violent reaction of chemical.
3. Do not indiscriminately shake or jar suspected package due to the possibility of
disturbing the trigger mechanism.
4. Do not puncture or cut the box with metallic object as the possibility of an electronic
probe may be employed.
5. Do not cut string or unwrap package due to the possibility of pressure release type
devices
6. Do not accept identification markings on any suspected packages as legitimate
7. Do not allow radio transmission near the vicinity f suspected package, explosion may
occur due to static electricity by transmitter.
52

8. Do not pass metallic tools or things over or near the vicinity of suspected package
until identification f contents are made due to magnetic device present
9. Do not switch on lights or any electrical switches just to light up the area
10. Do not use siren of police, fire or ambulance in the area.
11. Do not use photoflash in the immediate area
12. Do not underestimate the size of the package like a pack of cigarette or a lighter, it
could be a powerful explosive. Above all, do not panic.

THREE CHARACTERISTICS OF A BOMBER

1. ON PSYCHOLOGY
 Several forms of bombings are attractive to the radical mind.
 Bombing historically is linked to anarchy and classical revolution
 Bombing is a symbol of extreme frustration
 Satisfying feeling of conspiracy, danger, action, drama and finally group
excitement
 Disassociation psychologically from any resulting death or injury

2. AS TO TECHNOLOGY
 Commercial explosive materials are not necessary to construct effective bombs.
 Underground literatures and legitimate publications are available
 Contrary to popular beliefs, college of high school students taking up chemistry
subjects have the capability of making bombs.

3. AS TO SECURITY
 Successful bombings destroy the kind of evidence that can lead to conviction of
bombers.
 Fingerprints, bloodstains and tool marks offer no threat to the careful bombers.
 Eyewitnesses and incriminating evidence are frequently not available in bombing
scene.

BOMBER SKILL LEVEL MOTIVATING FACTORS OF A BOMBER


Amateur Experimentation
Semi-professional Vandalism
Professional Ideological perception
Emotional release
Profit

TERRORISTS ATTACK CYCLE

TARGET SELECTION - TARGET STUDY - ATTACK PLANNING - ATTACK REHEARSAL –


DEPLOYMENT - TARGET IDENTIFICATION – ATTACK

Important REMINDER

BE VIGILANT ON TERRORISM
WHAT CITIZENS CAN DO IN CASES OF
BOMBING AND BOMB THREATS

 Bomb threats and bombing incidents are the handiwork of terrorists.

 They intend to:


* harm civilians
53

* disrupts business activities


* embarrass the government
* sow anxiety and fear in the minds of the people

 All sectors of the community must act against criminality and terrorism. While the
government is doing everything within its authority and power to protect the people
and put a stop to these terroristic acts, the pro-active participation of the citizenry is
of utmost importance.

 No one should allow himself/herself to be cowed into fear. Everyone should instead
live his/her life normally.
SIX-POINT CITIZEN ACTION IN CASES OF BOMB THREATS AND BOMBING INCIDENTS
 STAY CALM

 TAKE PROPER PRECAUTIONS AT HOME AND WORK

 IMMEDIATELY REPORT INCIDENTS OR INFORMATION TO HOTLINE 117, TO TEXT


2920, TO MAGIC EYE 8383203, OR TO OTHER PROPER AUTHORITIES (I.E.
BARANGAY AND/OR OTHER LOCAL GOVERNMENT OFFICIALS, LOCAL POLICE)

 DELETE, DO NOT FORWARD RUMORS OR UNVERIFIED REPORT RECEIVED THROUGH


TEXT MESSAGES

 GET BACK TO REGULAR ROUTINE AND DAY TO DAY ACTIVITIES; BUSINESS AS USUAL
SOON AS POSSIBLE

 ORGANIZE/ACTIVELY PARTICIPATE IN MONITORING GROUPS IN YOUR NEIGHBORHOOD


AND/OR IN YOUR WORK PLACE.
HOW TO STOP A BOMB
Be cautious when you spot the following:

 STRANGE, UNUSUAL, UNATTENDED BAGGAGE, BAGS, BOXES OR PARCELS

 TIGHTLY WRAPPED AND COMPACT PACKAGES OR PARCELS.

 OILS STAINS ON AN ENVELOPE OR WRAPPING.

 A TICKLING SOUND SIMILAR TO THAT OF A CLOCK IS HEARD FROM A BAGGAGE, BOX


OR BAG

 PRESENCE OF ELECTRIC WIRES, PLASTIC CORD AND BATTERIES IN A BAGGAGE, BOX


OR BAG

 DELIVERY OF UNEXPECTED PACKAGE OR PARCEL


KEEP IN MIND THAT BOMBS CAN BE DEVISED TO LOOK LIKE ALMOST ANYTHING
AND CAN BE PLACED OR DELIVERED IN MANY WAYS.

HOW TO KEEP ESTABLISHMENTS SAFE FROM BOMB THREATS


 Strictly implement the inspection of bags, knapsacks, boxes, merchandise, etc., of all
the people entering malls, theaters and other business establishments.

 Cautiously inspect suspicious looking packages, paper bags, and other similar
54

packages.

 Instruct security personnel/employees to immediately contact proper authorities


when suspected bombs are noted.

 Be observant of people roaming around the area doing nothing and those leaving
behind bags and packages/boxes in the garbage cans/bins within the premises.
Vendors with knapsacks, bags and other similar belongings should be advised to
move out as they may be used as couriers of bombs.

 Be observant of cars/motorcycle riding individuals who are suspiciously and


constantly watching establishments.

 Be cautious in opening envelopes and packages sent by unknown individuals with no


return address.

 Safeguard especially from unauthorized persons restricted areas of the


establishments.
WHAT ARE THE MATERIALS/ITEMS TO WATCH IN CONDUCTING BOMB THREAT
RELATED INSPECTIONS
 Aluminum shell 2-4 inches in length which
1. Looks like an umbrella rod and/or
2. with sotanghon noodle size wire that comes in pair.

 Battery operated alarm clock sometimes with two protruding rods.

 Black powder.

 Oily stain which smells like gas/diesel.

 Small, white, bead like rice grains, light weight with pungent odor (urine-like odor)
and may be contained in bottles, boxes, cans and plastic bags and become oily when
exposed to air.

SPECIAL WEAPONS AND TACTICS


(SWAT: Response to Crisis)

Tactical Crisis Management

SWAT Teams

SWAT teams are highly trained police units. A unit is a small group within a larger
group. SWAT stands for Special Weapons and Tactics. Tactics are actions aimed at solving
problems.

SWAT team members are weapons and tactics specialists. A specialist is a person
trained for a particular job. SWAT team members use their special weapons, tactics, and
training to protect the public. They handle police emergencies. An emergency is a sudden
and risky situation.

Police send SWAT teams to any kinds of police emergencies. The emergencies often
involve one or more heavenly armed suspects. A suspect is a person believed to have
55

committed a crime. SWAT teams work on hostage situations. A hostage is a person held
against his or her will.

SWAT teams perform many jobs. They come to robberies that are in progress. They
help guard government officials. They help stop terrorists. A terrorist is a person who tries to
get what he or she wants by threatening or harming others. SWAT teams also patrol high-
crime areas.

SWAT Team Names

SWAT teams can be part of city, county or state law enforcement agencies. A law
enforcement agency is an office or department that makes sure people obey laws. Police
department and sheriffs departments are examples of law enforcement agencies.

Law enforcement agencies use different names for their SWAT teams. The names
include Emergency Service Unit and Emergency Response Team. They also include Mobile
emergency Response Group and Equipment (MERGE) and Tactical Response Team.

SWAT Team Beginnings

The New York Police Department (NYPD) had one of the earliest specially trained
police units. In the mid-1880s, the NYPD set up small units of police officers. The department
called these units strong-arm squads. The squads fought criminal gangs. Police clubs were
their only weapons.

By the 1920s, criminal gangs had grown in size and power. The gangs bought
handguns, rifles and submachine guns. A submachine gun is a light gun that fires rapidly.
The criminal gangs fought one another on New York City streets. Many innocent people died.

In 1925, the NYPD formed the Emergency Service Unit (ESU). The department also
formed the Gunman’s Squad as part of the unit. The squad included 60 heavily armed police
officers. The officers had handguns, rifles and submachine guns. They worked on cases
involving criminal gangs. They patrolled the city in green trucks.

Other large police departments formed early SWAT team units. These units also
worked to stop criminal gangs.
Growth and Change

The Gunman’s Squad is a good example of how the early SWAT teams grew and
changed. This squad became the Mobile Security Unit (MSU) in the late 1940s. the new unit
larger than the old unit. It continued to fight criminal gang activity.

The MSU changed in the late 1960s. more people lived in New York City. The number
of murders and robberies increased. The MSU formed the Stakeout Squad to fight the
increase in crime.

The NYPD’s best police officers joined the Stakeout Squad. Each member was a
skilled police officer and marksman. A marksman is a person skilled and aiming and
shooting guns. The Stakeout Squad work on difficult cases. It helped the NYPD lower the
number of murders in the city.

In the 1970s, Stakeout Squad officers learned new skills. They learned anti-terrorist
tactics and special weapons skills. Officers also learned how to rescue hostages. The skills
helped them fight terrorists. In the 1980s, the squad was taken over by the Emergency
Service Unit. Today, this unit controls all NYPD SWAT operations.
56

The LAPD SWAT TEAM

The Los Angeles Police Department (LAPD) changed law enforcement around the
country in the 1960s. Los Angeles police officers found themselves outgunned by criminals.
The criminals had powerful weapons. So the LAPD formed a specially trained and armed
police unit to protect people.

The LAPD named the unit the Special Weapons and Tactics (SWAT) team. Team
members received special weapons training. They also learned how to handle police
emergencies. The team was very successful.

Other police and sheriffs departments saw the success of the Los Angeles Police
Department’s SWAT team. Many department formed their own SWAT teams.

Today, special training centers in the United States train and organize many SWAT
teams. The centers teach SWAT team members tactics and weapons skills.

SWAT Team Officers

There are more than 17,000 police departments in the United States. Many have
either full-time or part-time SWAT teams. Many SWAT team officers work more than 40
hours each week. Most officers are on call 24 hours a day. On call means ready to work at
anytime.

SWAT team officers perform hard and risky work. They risk their lives each time they
go out on a police emergency. Police officers are not ordered to join SWAT teams. Instead,
they volunteer. Volunteer means to offer to do a job.

Training

SWAT team officers receive special training. Large police departments usually
conduct their own training. Officers in small units receive SWAT training from large units and
from training centers.

The federal government also trains large and small SWAT teams. The FBI operates an
advanced training school at Quantico, Virginia. The U.S. Army and U.S. Marine Corps also
conduct training classes.

During training, officers learn through classes and field work. Officers learn about
different weapons and practice using them.

Officers also receive other training. Many officers learn advanced first aid. First aid is
early medical help. Some officers learn to be sharpshooters. A sharpshooter is a marksman
skilled at hitting small or distant targets.

Some officers learn to handle and use tear gas. Tear gas is a gas that causes a
painful burning feeling in the eyes and lungs. Tear gas disable suspects. Other officers learn
communication skills. Communication is the sharing of information. Communication aloows
officers to calm suspects by talking to them.

Special Teams

Most SWAT teams include three kinds of smaller specialized teams. They include
negotiator teams, containment teams, and entry teams. Each team performs a different kind
57

of job. Sometimes only one specialized team works on an emergency. Other times, all three
teams work together.

Negotiator Teams

Negotiators are communication experts. They listen and talk to suspects during
police emergencies. Negotiators use words to reason with suspects and solve problems.
They often work on hostage situations. They try to convince suspects to free their hostages
and surrender. Surrender means to give up peacefully.

Negotiators have to be calm. They must think carefully about each word they say.
They do not want to upset a suspect. This could cause a suspect to harm hostages.

Negotiators may spend hours talking with suspects. Sometimes they use phones and
talk from a safe distance. Other times they talk with suspects in person. In these cases,
suspects will often talk only if negotiators do not have weapons.

Containment Teams

Containment teams control and contain crime scenes. Contain means to hold in. they
make sure innocent people do not become involved in situation. They also make sure that
suspects do not escape. Containment officers make observations and report what they see
to their leaders. Sometimes they have to shoot at suspects.

Containment officers take different positions at a crime scene. They choose locations
that help them see what is happening. Some may crouch on rooftops. Some may stand in
doorways. Others may take positions behind cars.

Containment officers are patient. They control their emotions while under pressure.
Containment officers also think carefully before they shoot. Careless shots could not hurt
innocent people or lead to deadly shoot-outs.

Entry Teams

Entry teams enter and search buildings. Their job is of find and capture suspects in
the buildings. They also try to locate and rescue hostages.

Sometimes entry team officers must secure crime scenes. This means they prevent
suspects from harming others or killing themselves. Entry team officers also prevent
suspects from escaping or destroying evidence. Evidence is facts or objects that help prove
guilt.

Entry team officers can break through locked or barricaded entrances quickly.
Barricaded means blocked. The officers use tools to break windows and push through doors.
Quick entries allow officers to catch suspects off guard. This makes entry operations safer.

SWAT TEAMS OPERATIONS

All swat teams try to resolve police emergencies as quickly and safely as possible.
They want to capture suspects without harming the public, hostages, or the suspects.
58

SWAT teams work carefully during their operations to reduce chances of harm or
death. SWAT teams use different tactics to reach these goals. They try peaceful tactics
first.

Peaceful Tactics

Waiting is one peaceful tactics SWAT teams use. SWAT teams sometimes wait for
hours before they take more forceful action. Waiting gives suspects a chance to think about
what they are doing.

SWAT teams try to resolve police emergencies with peaceful tactics.

It also suspects time to think about what may happen to them. Sometimes suspects
surrender after they have time to think.

Persuasion and negotiation are other tactics SWAT teams use. Persuasion is trying to
change a person’s mind. Negotiation is talking to reach an agreement. The goal of these
tactics is to talk suspects into surrendering without harming others.

Many times, SWAT teams use other tactics in combination with persuasion and
negotiation. For example, teams may cut the heat or air. They may constantly ring
doorbells or call suspects on the phone. These tactics make the suspects nervous.
Sometimes they make criminals more willing to surrender.

Forceful Tactics

SWAT teams change their tactics if more force is needed. They use forceful tactics
when negotiation and persuasion tactics fail. They also use forceful tactics if the lives of
hostages and officers are in danger.

Forceful tactics include the use of tear gas.

Forceful tactics include using tear gas, storming buildings, and attacking with
sharpshooters. Tear gas is the least forceful of these tactics.

Tear Gas

SWAT team officers often use tear gas as their first forceful tactic. Officers shoot
cans of tear gas through windows and doorways with tear gas guns. The tear gas makes
suspects’ eyes burn and swell. The suspects have a hard time breathing in rooms filled with
the tear gas.

Tear gas often disables suspects. This allows officers to arrest suspects safely.
Other times, tear gas forces suspects to surrender.

Entering a Building

Sometimes officers must enter buildings to try to capture suspects. Entry teams
meet at a staging are before entering a building. A staging area is a safe area near a
building that officers plant to enter. Entry team members check their equipment and
weapons at staging areas. They also go over their plans for entry.
59

Next, the entry teams enter buildings. They must often break through barricaded
doors and windows. Once inside, officers search rooms and hallways. They search until
they locate suspects and hostages.

Entry team officers try to capture and disarm suspects. Disarm means to take away
a person’s weapons. Many times suspects surrender when they see entry teams.
Sometimes suspects shoot at the officers. The officers shoot back.

Entry team officers often turn captured suspects over to arrest teams. Arrest teams
arrest captured suspects. They make sure nothing goes wrong during arrest. They may
also help hostages out of buildings.

Sharp shooting Teams

Sharpshooters may have to shoot suspects. This may become necessary if suspects
try to harm hostages, officers, or innocent bystanders. Sharpshooters may receive orders to
shoot suspects in these situations.

Many SWAT units have sharp shooting teams. Each team includes two officers. One
officer works as an observer. The other works a sharpshooter.

Sharp shooting Team Operations

Sharp shooting teams choose locations that give them clear views of suspects. Both
members examine crime scenes from their location.

Observers provide information about suspects to sharpshooters and SWAT team


leader. The information includes descriptions of suspects, their weapons, and their positions
in buildings. Observers’ information helps sharpshooters make sure they do not shoot at
innocent people.

Sharpshooters stay calm and keep their weapons aimed at suspects. Orders to shoot
a suspect can come at any time during an operation.

Special Weapons

SWAT team officers use special weapons. Many of the weapons are powerful guns.
At crime scenes, the weapons help the officers protect themselves and capture suspects.
But SWAT team members do not use their weapons unless peaceful tactics fail.

Different weapons are useful in different situations. Some weapons are useful in
short-range situations. Other weapons are useful in long-ranger situations.

Stun Guns and Rubber Bullets

Sometime SWAT team officers use impact weapons. Impact weapons disable
suspects

SWAT team officer use powerful weapons. Sometimes SWAT team officers use
submachine guns.
60

Without killing them. These weapons fire rubber or plastic bullets. Using impact
weapons reduces the risk of harm to hostages and the public.

Sometimes officers use stun guns. A stun gun is a device that delivers an electric
shock. The shock stuns suspects.

Semi – automatic Handguns

Most SWAT team officers carry semi – automatic handguns. A semi – automatic
handgun is a powerful gun that fires bullets quickly. These handguns are short –range
weapons. They work best for targets within 25 yards (23 meters).

Semi – automatic handguns hold 14 to 17 rounds in each magazine. A round is a


bullet. A magazine is a metal or plastic case that fits inside a gun. Magazines allow officers
to reload their handgun quickly.

Shotguns

Sometime SWAT team officers use shotguns. A shotgun is a powerful gun wit a long
barrel. Shotguns are mainly short-range weapons. They may be single-shot or semi-
automatic weapons. Shotguns fire large bullets called shells.

SWAT teams often use the Benelli M3 Super 90 shotgun. This shotgun is a semi-
automatic. It holds up to seven shells stored in a magazine.
Submachine Guns

SWAT teams use submachine guns during shootouts with heavily armed suspects.
Submachine guns fire rapidly but are not easy to aim.

SWAT team submachine guns can fire single or multiple rounds. They fire multiple
rounds in short and long bursts. A short burst is a quick series of two or three rounds. A
long burst is a quick series of four to eight rounds.

Many SWAT teams use the Heckler and Koch MP-5 submachine gun. Most MP-5 can
fire 30 shots in just two seconds.

Standard Rifle

SWAT teams use different rifles in different situations. Rifle give officers dependable
aim, fire power, and range. The M-16 is the standard SWAT team rifle.

The M-16 is light. This makes it easy to carry and use. The M-16 has a dependable
range of 50 to 200 yards (46 to 183 meters). Each magazine for the M-16 holds up to 30
rounds. These features make the rifle useful in many situations.

High-Powered Rifles

SWAT team officers use high-powered rifles for long-distance shooting. Containment
officers and sharpshooters use high – powered rifles to improve their shots.

High-powered rifles fire high-powered rounds. They are large rifles with long barrels.
They have telescopes on them. A telescope is an instrument that makes distant objects
61

seem larger and closer. Telescopes help sharpshooters aim their rifles. High-powered rifles
have ranges up to several hundred yards.

Fifty-caliber rifles are the largest high-powered rifles SWAT teams use. These rifles
weigh up to 40 pounds (18 kilograms) and are at least five feet (1.5 meters) long. The rifles
shoot rounds powerful enough to punch through metal and concrete. Officers use these
rifles to shoot at suspects inside buildings.

Equipment and Dogs

SWAT team officers use different kinds of equipment. The equipment ranges from
clothing to helicopters. Officers also work with police dogs. The dogs and equipment help
make SWAT team operations easier and safer.

Uniforms

Many SWAT team officers wear black or dark blue uniforms. During operations, the
uniforms help SWAT team officers identify each other. Sometimes SWAT team officers wear
camouflage uniforms. Camouflage uniforms have coloring that makes officers blend in with
their surroundings. Many camouflage uniforms are green and brown. These uniforms help
officers stay hidden from suspects.

Armored Vests and Shields

All SWAT team officers wear armored vest. Armor is a protective covering. Armored
vests can protect officers from gunshots. Officers wear two kinds of armored vests. One
kind fits over uniforms. The other kind fits over uniforms. The other kind fits under
uniforms.

Entry team officers often use armored shields in addition to their armored vests. The
shields are made of lightweight armor. They provide added protection against gunshots and
small explosions.

Goggles and Gas Masks

Many SWAT team officers wear goggles. Goggles are protective glasses that fit
tightly around the upper face and eyes. They protect officers’ eyes from dirt, dust, and
smoke.

Some SWAT teams use night vision goggles. Night vision goggles let SWAT team
officers see in the dark. The goggles are useful during night operations or inside dark
buildings.

SWAT team officers wear gas masks when they use tear gas. A gas mask keeps a
person from breathing gas. Gas masks help entry teams work in areas where tear gas is
present.

Entry Tools

Entry team officers often need tools to get into barricaded buildings. Basic tools
include ropes and ladders. Tools can also include battering rams, sledge hammers, and
axes. A battering ram is a heavy metal tube. Officers use battering rams to force open
doors.
62

Entry teams recently started using small amounts of explosives. The explosives can
blow holes in doors and walls. But the explosives present little danger to SWAT team
members and suspects.

Helicopters

Some SWAT teams use helicopter. Helicopters carry SWAT teams to emergencies
located in hard to reach places like rooftops.

Helicopters also let officers examine crime scenes from the air. This helps them plan
their operations.

Walkie Talkies and Telephone

Communications is important to SWAT team officers. Officers often use walkie


talkies. Walkie talkies are small two-way radios. Officers use walkie talkies to tell each
other what is happening during operations.

Sometimes SWAT teams use telephones to talk with suspects. Telephones also let
team member speak to other people during operations.

Swat Team Dogs

Many large SWAT teams use police dogs. Police dogs work with some SWAT officer
as K-9 teams. K-9 is short for canine. Canine means dog. Most police dogs are German
shepherds.

Police dogs help officers find suspects. The dogs follow suspects’ scents to the
suspects’ hiding places. Police dogs also chase and stop escaping suspects. They often
stop suspects by biting the suspects’ arms and legs.

Facing the Risks

SWAT team duty is challenging and risky work. Officers risk death each time they
work on a police emergency.

Many officers volunteer for SWAT team duty because they like challenge and
excitement. But most SWAT team officers volunteer because they want to protect the
public.

WORDS TO KNOW

Armor - a protective metal or plastic covering.


Barricaded– to block
Communication – the sharing of information
Disarm – to take away a person’s weapons
Emergency – a sudden and risky situation
Hostage – a person held against his or her will
Magazine – a metal or plastic case that holds bullets and fits inside a gun
Marksman – a person skilled at aiming and shooting guns
63

Negotiation – talking to reach an agreement


On call – ready to work at any time
Persuasion – trying to change a person’s mind.
Sharpshooter – a marksman skilled at hitting small or distant targets.
Specialist – a person trained for a particular job.
Surrender – to give up peacefully
Suspect – a person believed to have committed a crime.
SWAT – Special Weapons and Tactics
Tactics – actions aimed at solving problems.
Tear gas – a gas that cause a burning feeling in the eyes and lungs
Telescope – an instrument that makes distant objects seem larger and closer
Terrorist – a person who tries to get what he or she wants by threatening or harming others.

MAIN REFERENCES

 Crisis Management: PNP/AFP Proposed Crisis Management Doctrine, 1998


 Effective Crisis and Emergency Management, by: Antokol Norman
 Handbook on SWAT, by Green
 Understanding Terrorism, by James Poland
 Newspapers and Clippings
 Unpublished Criminology Review Materials
 Understanding Terrorism, by James Poland
 www.pnp.org.ph
64

You might also like