Definitions of Terms:: Police Intelligence

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 14
At a glance
Powered by AI
The document discusses definitions of terms related to police intelligence projects and operations. It also discusses categories of intelligence, classifications of police intelligence, security surveys and inspections, and security education programs.

The document discusses national intelligence, departmental intelligence, and military intelligence as the main categories of intelligence.

The document discusses criminal intelligence, security intelligence, and counterintelligence as the functional classifications of police intelligence.

Jeffrey Valera Tamolang, RCrim, MS Crim.

(Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam

Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

POLICE INTELLIGENCE

Definitions of Terms:
Project, proposals - a recommended general plan of action envisioned to undermine a target
threat group or organization with the ultimate objective of neutralizing its ranking personalities and
machinery in a specified time frame.
Intelligence Project - all project proposals approved by higher headquarters, officers and
competent authorities.
COPLAN - a case operation plan
Case Operation Plan - a time-phased plan of action under an intelligence project directed
against a specific personality under a threat group or organization through infiltration and
penetration by an Action Agent/s (AA.) and other means with the ultimate objective of neutralizing
the target personalities
Action Agents (AA) - are recruited, documented and dispatched intelligence agents with
access and/or placement in a target personality's group or organization. They receive and implement
orders from an Agent Handler (AH)
Principal Agent (PA) - an intelligence man who had developed his information net within a
target organization or a particular area of operation.
Support Agent (SA) - is a person who extends administrative or operational assistance to the
Agent Handler or Action Agent.
Target - is a person, organization, installation or activity considered inimical to national
interest and security and is the objective of an intelligence project or COPLAN.
Case Operation Officer - any intelligence officer who initiates and implements a COPLAN
Surveillances a planned observation of persons, places or objects and activity.
Subject - the person, place or object being watched or under surveillance.
Convoy - an accomplice or associate of the subject who follows him to detect surveillance.
Decoy - a person or object used by the subject in an attempt to elude surveillant. Contact -
any individual whom the subject speaks or deals with in any way while he is under
surveillance
Fade - when subject under surveillance becomes aware that he is under observation and
identifies the observer.
Lost - the subject is lost when the surveillant does not know his whereabouts. The surveillant
is lost when the subject has eluded him.
Fingerman - an individual who can positively point out the subject
Put the finger on-to identify subject by pointing him out either in person or in photograph
Put to bed - when the subject under surveillance has returned to his quarters and apparently
retired for the night, the surveillants are said to have put to bed.
Shades and Fails - to follow an individual wherever he goes, on foot or vehicle. Tail -
conscious or tail-wise - an individual who is alert for surveillance.
Tail Job - surveillance assignment

INTRODUCTION:
In essence, intelligence is knowledge. As such, it under-goes an often intricate cognitive
process of synthesizing data of various forms and sources in order to perceive with a high decree of
certainty the truth or reality of things, individuals and events for the purpose of serving the best
interest of its sponsor.

Broad Categories of Intelligence:


1. National Intelligence - refers to the knowledge formed from the integration of the
intelligence' developed by all the government departments which provide the valuable
Inputs or the formulation of national policy and the promotion and enhancement of national
security.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam

Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

2. Departmental Intelligence - refers to the knowledge required by an agency or department


of the government in order to execute its mission and discharge its responsibilities.
3. Military Intelligence - refers to the knowledge by the military institution essential in the
preparation and execution of military plans, policies and programs that encompasses three general
categories, such as:
a) Strategic intelligence - it deals with the activities of foreign nations
b) Combat or tactical intelligence - knowledge about weakness of the enemies
c) Counter-intelligence - deny information to the enemy. Provides security of the unit.
Police Intelligence - is the knowledge necessary in the preparation and execution of police plans,
policies and programs.

Functional Classifications of Police Intelligence:


1. Criminal Intelligence (CRIMINT) - production of intelligence essential to the prevention
of crimes, and the investigation, arrest and prosecution of criminal offenders.
2. Internal Security Intelligence (INSIT) – knowledge essential to the maintenance of
peace and order.
3. Public Safety Intelligence (PUSINT) - knowledge essential to ensuring the protection of
lives and properties.

Three Broad Categories of Police Intelligence:


1. Line or Tactical Intelligence - knowledge which contributes directly to the
accomplishment of specific objectives of immediate concern such as raids, arrest, etc.
2. Counter - intelligence - knowledge essential in the formulation, preparation and
execution of plans, policies and programs geared towards the neutralization of activities adverse to
the police organization.
Strategic Intelligence - knowledge which deals with the wide and far reaching issues of law
and order, internal security, crime suppression and prevention, and public safety necessary in the
formulation, preparation and execution of long range plans, policies and programs.

Principles of Intelligence:
1. Intelligence is a command responsibility - the use of Intel is a force multiplier, which
enhances the efficiency and effectiveness of police operations. Its non-utilization most often may
result in failure of police operation. It is therefore expedient that police officers most especially
Chiefs and Heads of Offices recognize their intrinsic value.
2. Intelligence and Operations are interdependent - intelligence provides valuable inputs for
effectiveness of police operation; operation likewise is needed for continuity of intelligence
activities.
3. Intelligence must be useful and timely - Intel data must be disseminated on time. It is a
waste of time if data is not disseminated to end-user on time or is found to have no
application and significance to police operation.
4. Intelligence Operations require flexibility, imagination, foresight and resourcefulness -
although the accomplishment of the assigned task is of paramount importance, police personnel arc
reminded to refrain from utilizing criminal elements in Intel operation.
5. Intelligence operations are continuous activities following a definite cycle - since it is a
cycle, it has no end. It begins where it ends.
6. Intelligence requires the employment of continuous security measures to protect
information, its source and organization itself.
7. Intelligence requires careful and thorough planning - It includes the anticipation of
intelligence needs, the identification of capable agencies and personnel to be tasked to provide the
valuable inputs to answer the Intel needs and the supervision of these collection agencies and
personnel.
4. DESSIMINATION – passing Intel data to end-users. In this process, consider the factors
of timeless, propriety and security.
EVALUATION OF EVALUATION OF SOURCE OF
SOURCE ACCURACY OF INFORMATION
ITEM
A - Complete 1-Confirmed by other T-Direct observation by
Reliable source other Unit Commander

B - Usually Reliable 2-Probably true U-penetration/Resident


Agent

C - Fairly Reliable 3-Pssibility true V-AFP Troops involved


in Encounter/Operation

D - Not usually 4-Doubtfully True X-Government Civilian


reliable Employee

E - Unreliable 5-Improbable Y-Member of the


Populace

F - Reliability 6-Truth cannot be Z-Documentary


Cannot be judged judged
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam

Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

CASING – is a reconnaissance or surveillance of a building, place or area to determine its suitability


for intelligence operation. It aids in planning of an operation by providing needed information.

Method of casing:

1. Personal Reconnaissance – the best way of casing or most effective way.


2. Personal Reconnaissance

Me Dugtung>>>> Page 260 to 271

Page 272 na to

SECURITY OPERATION

Preliminary:
Security is the state or quality of being secured, freedom from fear or danger; assurance;
certainty. To secure is to make safe or be protected.
The security of any business establishment today is a complex process. Security work involves
active and passive measures so that effective defenses can be established against crimes.

Active measures are the physical barriers, security lighting, use of vaults, locks and others.
Passive measures are those that will deter man from committing such act for fear of being caught,
charged in court or get dismissed. Security education programs, investigation, fire prevention seminars,
personal security checks are examples of passive measures.

Types of Security:
1. Physical Security - is the broadest branch of security which is concerned with the physical
measures adopted to prevent unauthorized access to equipment, facilities, materials and documents,
and to safeguard them against espionage, sabotage, damage and theft. Physical security covers other
types of security to protect equipment, document facilities and materials against theft, damage,
sabotage or espionage. It also encompasses protection of personnel from any criminal act.

2. Communications Security - is the protection resulting from the application of various


measures which prevent or delay the enemy or unauthorized persons in gaining information through
the communication system. This includes:

a) Transmission security - a component of communications security which results from all


measures designed to protect transmission from interception, traffic analysis, and initiative
deception.
b) Cryptographic security - results from the provisions of technically sound crypto-systems
and their proper use.

c) Physical security - providing of safeguards to equipment and materials from access by


unauthorized persons.
3. Hotel security - the protection of assets, guests, personal effects and other properties in a
hotel.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam

Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

4. Bank security - a specialized type of physical security protecting the assets, personnel and
operation of a bank, with special emphasis on the precaution and measures to safeguard the cash and
asset while in storage, in transit and during transactions.
5. Document Security - is physical security involving the protection of documents and
classified papers from loss, access by unauthorized persons, damage, theft and compromise through
disclosure.

6. Personal Security - protection of personnel especially ranking officials from any harm, kidnap
and other acts affecting them. VIP security is a type of personal security.
7. Crises Security - a part. of VTP security involved in hostage and kidnapping of VIPs.
8. Industrial Security - is a physical security as applied to business groups engaged in industries
like manufacturing, assembling, research and development, processing, ware
housing and even agriculture. It is a form of physical security involving industrial plants and business
enterprises where the personnel, processes. Properties and operations are safeguarded.
9. Operational Security - a part of physical security that deals primarily with the protection of
processes, formulas, patents, and other industrial and manufacturing
Activities from espionage, infiltration, loss, compromise or photocopying.

Other Special Types of Security:


1. Air Cargo Security - to minimize if not prevent, losses of cargo during transit, storage
and/or transfer.
2. School Security - a security involving not only the facilities of the school but likewise the
students or pupils.
3. Supermarket Security - a security involving the facilities, merchandise and goods owned
by businessmen or those occupied stalls inside the supermarket, or security to prevent shoplifting to
proliferate in the establishment.
4. Personnel Security - is involved in the background checks of individuals commensurate
with the security requirements of their work.

Security Hazards
Security hazards is an act or condition which results in a situation like a breach of the
protection system and the subsequent loss or compromise of defense information, company secret or
damage to personnel, property or facilities.

Kinds of Security Hazards:


1. Human Hazard - is the act or condition affecting the safe operation of the facility caused by
human action, accidental or intentional, like sabotage, espionage; pilferage, theft, etc.

3. Natural Hazard - is the act or situation caused by natural phenomenon like floods, typhoons,
earthquakes, etc.
Note: That the real problem actually in industrial place is the human or man-made hazards like
pilferage, theft, arson, etc.

Extent and Degree of Risks to Security Dependent on:


1. Relative Criticality of Operation - is the importance of the firm with reference to the natural
economy and security.
2. Relative Vulnerability - is the susceptibility of the plant or establishment to damage, loss or
disruption of operation due to various hazards.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam

Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

Note: A sudden dive of peso against the dollar which may cause inflation is an example of relative
criticality of operation

Types of Pilferers:
1. Casual pilferer - one who steals due to his inability to resist the unexpected opportunity and
has little fear of detection. Examples of these are kleptomaniac, children, and imbecile, etc.
4. Systematic Pilferer - steals with preconceived plans and takes away any or ail types of items
or supplies for economic gains. Examples of these are the professional shoplifters.

Some Common Measures Against Pilferage:


a) package inspection
b) body search
c) garbage and trash checks before disposal
d) personnel ID and management control
e) locks and key mgt.
f) property audits
g) asset inventories
h) inspections
i) security education
Perimeter Barrier - a medium or structure which defines the physical limits of an installation
or area to restrict or impede access thereto.

Two General Types of Physical Barriers:


a) Natural Earners - include mountains, cliffs, canyons, rivers, seas, marshes, deserts or terrain
difficult to traverse.
b. Man-made Barriers - are structural constructions like fences, walls, floors, roofs, grills bars,
roadblocks, or other physical means to deter or impede penetration.

Types of Perimeter Barriers


a) Wire fence is a type of perimeter barrier made of chain link design with mesh opening not
larger than two inches square, and made of no. 9 gauge wire or heavier,
minimum height of which is 7 feet.
b) Building wall, masonry wall should have the same height as the chain link and surmounted
by the barbed wire top guard; if the height is less than the prescribed, then additional chain link as
"topping" is placed to attain the minimum height requirement
c)Bodies of water - additional security measures are necessary.

Perimeter Barrier Openings


a) Gates and doors - guarded, locked b. Sidewalk elevators - provide access to areas within the
perimeter barriers and should be looked or guarded.
c. Utilities openings, sewers, air intakes, exhaust tunnels which penetrate the barriers and which
have cross sectioned area of 96 sq. in. or more should be protected by
bars, grills, etc.

d) Clear zones - an obstructed area maintained on both sides of the perimeter barrier. A clear zone of
20 feet or more is desirable between the barrier and extension structures and natural covers
which may provide concealment or assistance to a person seeking unauthorized entry. Where it
is impossible to have clear 7ones, because of property lines or natural features, an increment in the
height of the fencing increased guard coverage, more security Sighting, or the use of intrusion devices
in that portion of the perimeter barriers should be done.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam

Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

Additional Protective Measures


a. Top Guard - is an additional overhead of barbed wire placed on vertical perimeter fences
fencing upwards and outward with a 45° angle with three to four strands of barbed wires spread 6"
apart. This will increase the protective height and prevent easy access.
b. Normally provided at main perimeter entrances to secure areas located out of doors, and
manned by guards on a full time basis. Sentry Stations should be near a perimeter
barrier for surveillance at the entrance.
c. Towers - “guard towers" are house-like structures above the perimeter barriers. It gives a
psychological effect to violators.
d. Protection in depth - in large open areas or ground where fencing or walling is
impracticable and expensive, warning signs should be conspicuously placed. The depth
itself is a protection. Reduction of access roads and sufficient. notices to warn intruders should be
done. Use of animal guards and intrusion devices can also be done.
e. Signs and Notices - control signs" should be created where necessary in the management of
unauthorized ingress, and precludes accidental entry. It includes entry ID, prohibition and exclusion
areas signs;

Specifications for using chain-link Fences:


a. It must be constructed of 7-foot material excluding top guard
b. It must be 9 gauge or heavier
c. Mesh openings are not to be larger than 2" per side
d. It should be twisted and barbed salvage at top and bottom
e. It should be securely fastened to rigid metal or reinforced concrete.
f. It must reach within 2" of hard ground or paving.
g it must reach below surface drop enough on soft grounds to compensate for shifting soil or
sand.

Classifications for using Barbed Wire


a) Standard barbed wire is twisted, double strand, 12 gauge wire within 4 point barbs spaced on
equal distance apart.
b) Barbed wire fencing must be firmly affixed to post high excluding top guard.

Security Specifications for Windows or Openings


Windows or opening less than 18 foot above the ground, roofs, ledges, etc., or Jess than 14 ft.
directly or diagonally opposite uncontrolled windows in other walls, fire escapes or have step! Bar
protections.

Security Lighting
1. Security lighting provides sufficient illumination to areas during hours of darkness. Among
its other purposes are:
a) It improves visibility so that intruders can be
seen, identified or apprehended.
b) It gives psychological fear which serves as a deterrent to thieves, pilferers, trespassers and
saboteurs.
c) It makes easier the routine work of guards in identifying employees, vehicles, etc. during
nighttime.
d) If placed in certain areas, may even reduce the number of stationary guards and instead may
require only roving patrols at night.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam

Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

Security Lighting Techniques


a) Security lighting technique should enable a guard to observe clearly the activities around
and inside the premises within his jurisdiction,
b) In planning, high contrast between intruder and backgrounds should be provided, when
contrast is poor, increased intensity will improve guard's ability to see.
c) Lighting boundaries and approaches, as well as the area and structures are useful to
discourage unauthorized entries and reveal identity of persons. Good lighting should reveal well
boundaring areas, glaring to intruders and adequate for the guard to observe his position.
d) Effective lighting should:
1. Deter or discourage attempts to enter the premises
2. Make detection more likely if entry is attempted
e) If lighting at night cannot be provided due to impracticability other means of protection must
be made like additional guards.

Types of Security Lighting


a. Stationary Luminary - most common type consisting of series of fixed luminous to flood a
given area continuously with overlap it may either be:

1) Glare - projection type - the intensity is focused to the intruder while the observer or
guard remains in the comparative darkness. The lighting is toward the approach of an entrance to an
installation. Lights with reflectors increase glare.
2) Controlled Lighting - the width of the lighter atop can be controlled and adjusted to
suit the security needs. The lighting is focused, sag on a pile of items, rather than on the backgrounds.
These two types are used on the entry gate of employees
and vehicles.
b. Stand - by Lighting similar to continuous lighting but is turned on manually or by special
device or other automatic means when there is suspicion of entry.
c. Movable lighting - consists of stationary or portable, manually operated search Sights which
may be lighted continuously during hours of darkness or only as needed and
usually supplementary to cither at" the first two types.
d. Emergency Lighting - a stand-by lighting which can be utilized in the event of electrical
failure, either due to local equipment or commercial power failure.

Types of light Lamps


a. Incandescent lamps - common bulbs in which light is produced by the resistance of a
filament. to electric current. For better concentration of light, metal reflectors are used and directed on
arras to be lighted.
b. Gaseous discharge lamp - economical to use but take two to five minutes to Sight which
may be a disadvantage in industrial security lighting.
1. Mercury-vapor lamps - blue green color light due to the presence of mercury vapor.
2. Sodium vapor lamps - emits yellow light, placed usually in areas to connote special concern
like bridges and streets.
c. Quartz Lamps - very bright light

Protective Alarms
a) Alarm -aural or visual signal given by the annunciator to security when intruder enters in a
protected area. An annunciator is a visual or audible signaling device which initiates conditions of
associated circuits.
Basically, alarm systems are designed to alert security personnel to consummated or attempted
intrusions into an area, building or compound. Each type of alarm is activated in the event that an
intruder tampers with the circuitry, a beam or radiated waves; intrusion alarm can be an electrical,
mechanical or electronic. Alarms are also used for fire, smoke or other emergencies and presence of
other hazards.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam

Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

Types of Protective Alarm Systems


A. Central Station System - several separate compounds tie their alarm system to n station so
that in case of need, the central station calls for assistance to the police, fire
department, hospital or with other government assisting units.
B. Proprietary System - similar to the central station type except that the proprietary console
is located inside the subscriber's installation who owns or base the system.

Auxiliary System - on installation owned system which is a direct extension of the local
enforcement agency and/or fire department by special arrangements.

Local Alarm System - consists of rigging up a visual or audible alarm near the object to be
protected. In case of alarm, presence will be made by the local guards and other personnel within sight
or hearing.

Desirable Characteristics of Intrusion Alarm System


Intrusion alarm devices are designed to "detect" and not to prevent criminal acts and should be
used normally as an adjunct and not a replacement of the human guard force. The primary
considerations on the choice of a particular alarm system include stability, durability and reliability.

Operation of Intrusion Alarm Systems


Intrusion devices omit certain signal to the annunciator and operate on the following principles.
a. Breaking on electric circuit
b. Interruption of a light beam
c. Detection of sound motion detection
d. Penetration of an electromagnetic field.

Identification and Control


Identification and Control objective include precluding unauthorized entry and facilitating
authorized personnel to enter specific areas as well as preventing the introduction of material
components of harmful materials, misappropriation,
pilferage of installation properties and recorded classified information.
Access List - an authenticated list of personnel given to security allowing entry to a compound
or installation or part thereof.
Pass System - A pass or badge is issued by security for personnel to be admitted in the
installation. This system precludes those visitors with escorts and personal use and not
for the restricted areas like exclusive, limited and control areas. The following are systems
recommended:
1. Single Pass or Badge System – Pass is issued for permission to enter, differing in specific
areas by Setters, numerals or colors.
2. Pass or Badge Exchange System - Multiple copies of passes are issued to an individual
with the same photograph.
3. Visitor, Property Movement, and Vehicle Control – A visitor is any person not regularly
employed in a plant or concern.

Protective locks and Key Control


1. A lock is defined as a mechanical, electrical, hydraulic, or electronic device designed to
prevent entry to a building, room, container or hiding place.

Your General Groups of Key Locks


a. The warded lock - the underlying principle is the incorporation of wards or obstructions
inside the lock to prohibit a key from operating the bolt unless the key has corresponding notches out
in it so that it will pass the wards.
b. The lever tumbler lock - each lever hinges on a fixed point and is held down against a stop
by the pressure of a Hat spring.
Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam

Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

c. The disk tumbler locks - also known as the wafer tumbler type, has flat tumbler with open
center fitted type into slots in a plug, which is in turn fitted into a lock case.
Pin tumbler lock - the pin tumbler mechanism depends for its security un a number of round
pins or tumblers operating on a cylinder.
Lock - a portable and detachable lock having a pivoted or sliding hasp, which passes through a
staple ring, or the like and is made secured.
Combination Locks - is a lock that requires manipulation of parts according to a
predetermined combination code of numbers or letters.
Master key - a special key capable of opening a series of locks. This key is capable of opening
less number of locks than grand master.
Master Keying System - a system used in big installation whereby keys can open a group or
group of locks. This is possible by the use of interchangeable cylinder cores in the locks.
Level of Control in the Master Keying Plan

A. One level - change key


All locks operated by change key only and keys different or like or required. Each key operates
its own lock only. Examples: houses, stores, cars, warehouse.

B. Two levels - Master key


All levels operated by change keys and master key. Master key operates all locks generally of
one building. Examples: small school, apartment.

C. Three Levels - grand master key All locks operated by change key, master key and
grand keys. Grand Master key operates all locks generally used in-a large building or a facility with
several buildings. Examples: office building, hospitals.

D. Four levels - Great grand master key All locks operated by change key, grand master keys
and great master keys. Used greatly in large com-plex system and similar to three Levels.

E. Five levels - Great great grand master key.


All locks operated by change key, master key, grand master key, and great grand master key,
and great great grand master key. Examples: big universities, complexes large industrial complexes.

Maison keying - the issue of key to open the main entrance and the office.
Coded lock - a type of lock that can be closed and opened remotely by electronic means.

Fire Protection
1. Automatic Sprinkling System
Automatic sprinkling - is a type of built-in sprinkling which works by the increase of room
temperature and which automatically operates the system to put out the fire.

Types of Sprinkler System


a. Wet pips system - the piping has water sprinkler which will operate when head is
opened and water will! Continue to flow until shut off.

b. Dry pipe system - the pipes are filled with air under pressure, which hold the water
at a valve located in a room. When sprinkler head goes into operation, air is released, trapping the dry
pipe valve and allowing water to How through the system

2. Pump - a mechanical device for supplying water which can be manual or motor-driven.
These pumps are ideal when natural supplies of water are readily available like a river, lake or stream.

Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

3. Standpipes - are steel or plastic pipes located inside a building from the lowest to the top
floor with water under pressure for use in case of fire. Located near the standpipes is a fire hose
screwed into the standpipe outlet and a valve is opened to release the water. The water from the
standpipe can come from a storage tank at the roof or from a series of water pumps.
4. Fire hydrant - a mechanical service strategically located in an installation or street where a
fire hose is connected so that water with pressure will be available to extinguish a fire.
5. Portable Hand Extinguisher - is a fire fighting equipment which can be portable or in a cart
that is used to put out fire depending on the contents to extinguish certain types as classes A to D. This
is the most. Important and useful piece of fire fighting equipment in a plant, building or facility.

Clauses of Fire
a. Class A Fires - result to burning of wood, paper, textiles and other carbonaceous materials.
Extinguishment of this type is by quenching and cooling. Extinguishers which have water, sand, acid,
foam and the special solution of alkaline methyl dust, as found in the load-stream extinguisher; should
be used for this type of fire.
b. Class B Fires - those caused by flammable liquids like kerosene, gasoline, benzene, oil
products, alcohol and other hydrogen derivations. This type is put out and con trolled by foam, loaded-
stream, carbon dioxide, dry chemical and vaporizing liquid. If water is used, it might even spread the
flame, or explosions may ensue.
c. Class C Fires - Those that start in live electrical wires, equipment, motors, electrical
appliances and telephone switchboards. The extinguisher that should be used for such fires are carbon
dioxide, dry chemical and vaporizing liquid, as the soda-type can even electrocute the extinguisher
holder. In this case of fire, source of electricity should be shut off.
d. Class D Fires - the result of combustion of certain metals in finely divided forms. These
metal can be magnesium, potassium, powdered aluminum, zinc. sodium, titanium lithium, and
zirconium. This type of fire can be put out by G.I. type methyl LX, Lithium X, methyl L KYL, d;-y
sand and dry talc.

How to Use the Fire Extinguishers


1 Soda Acid (Class A Fire). It is carried to lire by top handle. Operates by turning extinguisher
upside down. Don't invert until ready to use. Aim stream at base of flame working around the edge.
Soak to prevent rekindling.
2. Carbon Dioxide - CO, (Clasp B, C Fin's) Operates by squeezing handle or trigger off horn,
gets cold, be ready for gas and snow. When using, keep hands off horn, gets cold, be ready for a
"ROAR" its normal. Avoid close blasting on liquid fires. Attack fire at base of flame, moving discharge
horn slowly back and forth and sweeping motion. Continue after fire is up out; prevent flare up.

3. Dry Chemical Multi-purpose. (Class A, B, C Fires) Operates same as the dry chemical
type above. Coat Class A combustible thoroughly. Do not mix with dry chemical designed only for
Class B end C fires.

4. Foam (Class A, D Fires)Operates like soda acid, operates by turning extinguisher upside down.
Don't ever invert until ready to use. Aim stream at wall; or container side in back of fire, allowing foam
to flow easily OP. fire.

Records and Document Protection


1. Types of Business Records

Class I - Vital records - include those that are irreplaceable; records of which reproduction does
not have the same value as the original; records needed to recover cash to replace buildings,
equipments, raw material, finished products and records needed to avoid delay in restoration of
production, sales and services.

Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

Class II - Useful Records - include records which loss might cause inconvenience but could be
readily replaced and which would not in the meantime present an insurmountable obstacle to the
prompt restoration of the business.
Class III - Important Records - include records the reproduction of which will involved
considerable expense and labor, or considerable delay. Operating and statistical records belong to this
class as well as those maintaining check on efficiencies, operation, cost, etc. Also included are
contracts, customer’s credit flies, sales records, designs in process development, records of
experiments in progress, etc.
Class IV - Non-Essential Records - are daily files, routine in nature so that even if lost or
destroyed, will not affect operation or administration.

Categories of Storage Containers


Class 1. Commercial record safe" designed for fire protection.
Class 2. Commercial money safes designed for robbery and burglary protection.
Class 3. Security cabinets designed to meet specifications for safeguarding classified materials.

Some tests for Sales Fire Resistance


a. Fire endurance test - a safe should not have at anyone time a temperature above 350
decrees Fahrenheit
b. Explain hazards test - test to determine if the sudden rise in temperature will not cause the
safe to rupture, if the safe can withstand 2000 degrees Fahrenheit for 30 minutes and will not crack or
open, then it has passed the explosion test.
c. Fire and impact test - aimed at determining the strength of a safe to withstand the collapse
of a building during a fire.
Safe - a metallic container used for the safekeeping of documents or small items in an office or
installation. Safes can be classified as either robbery resistant and burglary
resistant depending upon the use and need. Many safes are required to be installed in steel -clad
concrete blocks to prevent. being carted away by burglars.
Vault - A heavily constructed fire and burglar-resistant container usually a part of the building
structure used to keep and protect cash, documents and negotiable instruments.
Vaults are bigger than safes but smaller than. Safety file rooms.
File Room - a cubicle in a building constructed a little than a vault but of bigger size to accommodate
limited people to work on its records inside.

Security Surveys and Inspections


1. Security Survey - a fact-finding probe to determine a plant adequacy and deficiency in all
aspects of security, with the corresponding recommendation.
a. Survey - the term applied to the fire detailed look-see conducted by a team
b. Inspections or follow-up surveys - the term used for succeeding surveys after the initial
survey.
c. Supplemental surveys - one conducted when there is business reorganization with
corresponding changes in objectives and physical by-outs of the complex.
d. Special Survey - one directed by management, if the initial survey appear' to have left
certain portions or aspects involving security due to change in policy or operation that will greatly
affect the total security picture.
2. Entrance Conference - a conference or dialogue between the survey team and management
officials of a plant before security survey is conducted.
3. Exit Conference - a conference similar to entrance conference done after the completion of
the security survey.
4. Who performs security audit and survey?

Jeffrey Valera Tamolang, RCrim, MS Crim. (Instructor/Reviewer) 15 th Placer, 2002 National Criminology Board Exam
Cum Laude, BS Criminology/ (3rd Yr LlB.) Review & Lecture Notes in Police Intelligence

Security survey is performed by qualified security experts who can be from the organization or
outsiders contracted to do the job. Recommendations will fall into
three categories
a) Human guard
b) Equipment
c) Procedure

Security Education Program


1. Security Education - the. Exposure and teaching of employees on security and its relevance
to their work.

2. Objectives of Security Education Program


a. Guidance for ail supervisory and executive levels of the organization
b. A mandatory indoctrination on security for all new personnel before their assignment to their
respective jobs.
c. Development of high - degree of security consciousness among the selected supervisors and
other key personnel in a program that .should be containing and
supported by top management.
d. Down-the-line security programs - aimed at installing consciousness and dedication
through demonstration, lectures, motivation and suggestions.
e. To let all employee force be informed that they all belong to the organization and that non-
awareness to the security program is tantamount to disloyalty.
f. To develop discipline, loyalty and belongingness. These attributes when fully imbued in
everybody's mind will result in effectiveness and efficiency.

Note; Security education program to be effective must have the support and sanction of top
management. The main thrust being to acquaint all personnel of the reasons for the security measures.
This program should be given to all personnel from the work group that has no access to classified
Sendeavors, to the supervisors and executives handling sensitive plans and policies of the industrial
firm. This program is given a "follow through" which will be continuing and tailored to the specific
group level, depending on their access to restricted work and activity.

You might also like