ROTC Compiled

Download as pdf or txt
Download as pdf or txt
You are on page 1of 68

PHILIPPINE MILITARY HISTORY

He who does not study the past is doomed to repeat it.” -George Santayana

IMPORTANCE
• “An accurate, objective, descriptive and interpretive record of the activities of the armed forces in peace
and war”
• “It gives an interesting and deep insight into the minds and hearts of military men into tactical and strategic
methods, procedures and principles, and into the relations between war, politics, economy, philosophy,
geography, and the mentality of nations and races.”
• foundation of our knowledge of military strategy and tactics

PRE-COLONIAL SPANISH AND AMERICAN ERA


BATTLE OF MACTAN
 April 27, 1521
 marked the first organized resistance of the
Filipinos against foreign invaders
 Lapu-Lapu, the chieftain of Mactan defeated
Spanish colonizer Magellan

SPANISH COLONIAL RULE


 More than 300 years from 1565 to 1898
 This made the Filipinos restive
 They soon clamored for reforms
 Revolts opened up
 The Philippines is named after King Philip II of Spain (1556-1598), and it was a Spanish colony for over 300
years.

NAME OF REVOLT DATE PLACE CAUSE LEADER RESULT


Lakandula and 1574 Tondo, Navotas Failure of Gov. Lakandula Failed
Sulayman Revolt Lavezares to
Tagalog Revolt fulfill Legazpis’
promise to
Lakandula
Pampanga Revolt 1585 Pampanga Abuses of Failed. A
Spanish woman
Landowners betrayed the
revolt.
Tondo Revolt 1587-1588 Tondo, Cuyo, Desire for Magat Salamat, Failed because
Conspiracy of the Calamianes Independence Martin Pangan, the plot was
Maginoos Juan Banal, discovered.
Revolt of the Pedro Balingit Leaders were
Lakans executed.

The revolt failed and Governor-General Lavezaris, with the help of Spanish and Filipino colonial troops, was able
to stop the rebellion and restore order in Manila. the conspiracy was foiled before it could begin after a Filipino
woman married to a Spanish soldier reported the plot to the Spanish authorities.
Spanish and Filipino colonial troops were sent by Governor-General Santiago de Vera, and the leaders of the
revolt were arrested and summarily executed by Christian Cruz-Herrera

Conspiracy of the Maginoos (Spanish: La Conspiración de las Maginoos), also known as the Revolt of the
Lakans, was a revolt planned by Tagalog nobles known as maginoos, led by Don Agustin de Legazpi of
Tondo and his cousin Martin Pangan, to overthrow the Spanish government in the Philippines due to
injustices against the Filipinos.

However, their plan was discovered by the Spaniards when Magat Salamat revealed their plan to fellow rebel
Antonio Surabao, who turned out to be a traitor when he reported the conspiracy to the Spaniards.
Consequently, the rebels associated with the conspiracy were punished, with some being put to death and
others being exiled

NAME OF DATE PLACE CAUSE LEADER RESULT


REVOLT
Cagayan- 1589 Cagayan, Ilocos abuses by the tax Philippine tax system
Ilocos Norte collectors reformed
Igorot 1601 Cordillera region Desire for religious Failed
conversion
Tamblot Revolt 1621- 1622 Bohol Desire to abandon Babaylan It was suppressed by
Christianity and Tamblot the Spaniards and
return to old religious Cebuanos.
faith

It began when six tax collectors who had arrived from Vigan were killed by the natives.
GovernorGeneral Santiago de Vera sent Spanish and Filipino colonial troops to pacify the rebels.
The rebels were eventually pardoned, and the Philippine tax system reformed

The Igorots, however, killed Marin and the Governor-General sent Lt. Mateo de Aranda with Spanish and Filipino
foot soldiers.
The combined force would be defeated although the Spanish would continue using harsher tactics (including
slavery) to force the Igorots to submit.
Nonetheless, the Igorots would continue to defy and defeat Spanish expeditions in the years 1608, 1635, and
1663

Tamblot, a babaylan or native priest, urged his fellow Boholanos to return to the old belief of their forefathers.
The revolt began on the day when the Jesuits were in Cebu, celebrating the feast day of St. Francis Xavier.
It was finally crushed on New Year's Day, in 1622.
Tamblot was executed and his head was set on a pike and displayed to serve as a warning to the populace
NAME OF DATE PLACE CAUSE LEADER RESULT
REVOLT
Dagohoy 1744- 1828 Bohol Refusal of Fr. Morales to Francisco Dagohoy Failed but rebels
give Dagohoy’s brother a were pardoned.
Catholic Burial
Silang 1762- 1763 Ilocos Desire to expel the Diego silang and Failed. Diego was
Spaniards from Ilocos Gabriela Silang assassinated.
Basi 1807 Ilocos Government monopoly of Pedro Mateo Failed. Rebels were
basi manufacturing crushed by
government troops.

the longest revolt ever held in Philippine history: 85 years. It also led to the establishment of a free Boholano
government.
Twenty governors-general, from Juan Arrechederra to Mariano Ricafort Palacin y Abarca, failed to stop the
revolt.
Ricafort himself sent a force of 2,200-foot soldiers to Bohol, which was defeated by Dagohoy's followers.
Another attack, also sent by Ricafort in 1828 and 1829, failed as well.
Dagohoy died two years before the revolt ended, though, which led to the end of the revolt in 1829.
Some 19,000 survivors were granted pardon and were eventually allowed to live in new Boholano villages
one of the most famous revolts in Philippine history is the Silang Revolt from 1762 to 1763, led by the couple
Diego Silang and Gabriela Silang

On December 14, 1762, Diego Silang declared the independence of Ilocandia, naming the state "Free Ilocos"
and proclaimed Vigan the capital of this newly independent state.
The British heard about this revolt in Manila and even asked the help of Silang in fighting the Spanish.
However, Silang was killed on May 28, 1763, by Miguel Vicos, a friend of Silang. The Spanish
authorities

She continued her husband's struggle, earning the title "Joan of Arc of the Ilocos" because of her many victories
in battle.
Eventually, the revolt ended with the defeat of the Ilocanos. Gabriela Silang was executed by Spanish
authorities in Vigan on September 10, 1763
Spanish-led troops eventually quelled the revolt

REVOLTS ARE CATEGORIZED INTO THREE


Personal and religious
Resistance to Spanish- imposed economic and religious institutions
Land problems

WHY ALL THESE REVOLTS FAILED?


Absence of national leader
Lukewarm spirit of nationalism among Filipinos
Inadequate training and preparation for warfare
KKK
 Andres Bonifacio founded the Katipunan on 07 Jul 1892
 to prepare freedom loving Filipinos for armed revolt
 The Katipunan formed the nucleus of the
Revolutionary Philippine Army
 The Katipunan, officially known as the
Kataastaasan, Kagalanggalangang Katipunan ng mga Anak ng Bayan or Kataastaasan
Kagalang-galang na Katipunan ng mga Anak ng Bayan, was a Philippine revolutionary society founded by
anti-Spanish colonialist Filipinos in Manila in 1892; its primary goal was to gain independence from Spain
through a revolution

PHIL REVOLUTIONARY GOVT


 a year after the outbreak of hostilities between the Katipuneros and the Spanish troops
 PRG and its Army were born on March 22, 1897, at Tejeros in Cavite
 General Artemio Ricarte was named Captain
General of the revolutionary Philippine Army
 marks the founding day of the modern-day
Philippine Army

FIRST PHIL REPUBLIC


 Gen Emilio Aguinaldo declared Philippine
Independence from Spain on June 12, 1898
 he sat as President of the First Philippine Republic
 The Filipino troops were to enjoy only a brief respite from combat

FIL-AMERICAN WAR
 erupted on February 4, 1899 - San Juan Bridge incident
 American commanders decided to implement
their plans
 General McArthur attacked Malolos
 due to the superiority of American arms, the
Filipinos lost the war
 the Americans have established government in 1901 but the Filipino revolutionaries continued their struggle
for freedom
 between 1901 and 1935, the revolutionary army lost many of its cohorts in sporadic engagements
 BUT NEVER LOST ITS CAUSE

ROLE OF THE PHILIPPINE SCOUTS


 The Philippine Scouts was a military organization of the United States Army from 1901 to WW II.
 native Filipinos assigned to the US Army's Philippine Department.
 a handful of Filipinos received commissions from the United States Military Academy.
 Philippine Scout units were given a suffix of (PS), to distinguish them from other US Army units.

SAKAY REVOLUTION
 Macario Sakay y de Leon
 Joined KKK in 1894
 Jailed for his seditious acts
 Released in 1902 due to amnesty
 Established Republika ng Katagalugan

BALANGGIGA MASSACRE
 General Lukban raided an American detachment stationed in Balagiga
 30 killed outright, 8 severely wounded and died later, 22 wounded and recovered, 4 missing, and 4
escaped unhurt
 Gen Smith ordered all persons 10 years and older to be killed

NATIONAL DEFENSE ACT


 the establishment of the Philippine
Commonwealth on 15 November 1935
 President Manuel Luis Quezon sought the services of General Douglas McArthur to evolve a national
defense plan
 Commonwealth Act No.1 was enacted into law
 paved the way to the birth of the new Philippine Army
 under the coat of the US Army
 trained new Filipino members in defending the nation and protecting its people

JAPANESE OCCUPATION AND THE LIBERATION ERA PHILS IN WW II


 2 regular and 10 reserve divisions of the Philippine
Army undertook the defense of the Philippines
 incorporated into the USAFFE
 under the command of Gen McArthur
 USAFFE- US ARMY FORCES FAR EAST
 CALLED THE PHIL COMMONWEALTH ARMY INTO
THE SERVICE OF THE US ARMED FORCES
 Defense of Bataan
 Initially, Filipino-American lines held
 problems on food supply, sickness and malnutrition caused the collapse of defenses
 Defense of Corregidor
 Japanese heavy bombing and artillery shelling
 defenders fought gallantly although food supply and water were low
 Defenders endured sickness ❑ Surrendered on May 6, 1942
 remaining forces in the Philippines resorted to guerilla methods of fighting until liberation

POST-WORLD WAR II ERA


 Major Commands were created
 July 01, 1947 - a small contingent of aircraft was flown by Filipino pilots
 Hqs National Defense Forces was renamed GHQ AFP
 Executive Order No. 389
 led to the creation of the Armed Forces of the Philippines (AFP)
 Created 4 military areas were subsequently created
 Philippine Army, Philippine Constabulary,
Philippine Air Force, and the Philippine Navy,

PHIL ARMY EXPANSION


 the onset of the 60s ushered an expansion of the army's roles
 1969 – NPA was organized
 military operations supported by civic action blocked the escalation of insurgency
 include participation in the socio-economic programs of the country

MARTIAL LAW ERA


 birth of the New People’s Army in 1969 caused chaotic environment
 declaration of Martial Law on 21 September 1972
 Military operations supported by civic action blocked the escalation of insurgency

MARTIAL LAW ERA


“I assure you that I am utilizing this power vested in me by the Constitution for one purpose alone, and that is to
save the Republic and reform our society. I wish to emphasize these two objectives. We will eliminate the threat
of a violent overthrow of our Republic, but at the same time, we must now reform the social, economic, and
political institutions in our country.” BBM BEST PRESIDENT

IPSP-"BAYANIHAN"
 Emphasis on Human Rights
 Whole of nation approach
 People centered approach
 Peace and Development Team (PDT)

PEACEKEEPING AND HUMANITARIAN MISSION


THE ARMY IN HUMANITARIAN MISSION
PEFTOK (1950 – 1953)
 part of its commitment as member of the United Nations
 Philippine Expeditionary Forces to Korea (PEFTOK) ❑ PEFTOK took part in decisive battles such as the
Battle of Yultong Bridge and the Battle of Hill Eerie

This is the story of 900 Filipino Soldiers who defeated 40,000 Chinese and North Korean forces on the hills of
Yultong.

On 21 May 1952, Colonel Abcede ordered


Major Felizardo Tanabe
Tanabe sent the 44-man 2nd reconnaissance platoon to sabotage the position.
The platoon was led by a young Filipino officer, a
1950 graduate of West Point's United States Military Academy, 2nd Lieutenant Fidel V.
Ramos (future President of the Philippines)
Ramos divided the assault team into four groups of snipers, riflemen, scouts, and forward observers, each with a
radio operator, a messenger, and a medic
The platoon crawled through rice paddies and scattered trees for two hours before it reaches an irrigation
ditch, about 400 meters from the top of the hill

The United States Air Force sent seven F-86 Sabre jet fighters to pound the Chinese people’s volunteer army PVA
positions with Napalm.
After the bombardment, Ramos' men seized the front part of the trench network after discovering a hole in the
blasted stack of barbed wire.
Close-quarter fighting raged as the retreating PVA fought back but the advancing Filipinos were gaining the
upper hand
The assault had lasted for two hours, Ramos' men
suffered one injury while the PVA had lost an estimated 1100 dead, 2540 wounded, whether from the
supporting artillery, tanks and air strikes could not be determined.

THE ARMY IN HUMANITARIAN MISSION


PERSIAN GULF WAR (1990 -1991)
 The Philippines sent 200 medical personnel to assist coalition forces in the liberation of Kuwait from the
stranglehold of Iraq.

IRAQ WAR (2003 -2004)


 The Philippines sent 60 medics, engineers, and other troops to assist in the invasion of Iraq
 withdrawn on the 14th of July 2004

THE ARMY IN NATION BLDG


 PA plays an important role in nation building helps aid in areas that lack needed vital facilities and service
like roads, bridges, schools, health, and sanitation

"BAYANIHAN"
 the Philippine Army continues to be of service to the country and people
 It has evolved from its traditional role of war fighting to agents of peace and catalysts for development

CONCLUSION
 The AFP of the past is a record of bravery, sacrifice and undaunted persistent struggle to make the country
free.
 The AFP today is the mirror and the fruit of the past. Thus, the soldiers are peace loving, partner in nation
building, competent, and more selfreliant corps of men and women.
 The AFP of tomorrow is not only a protector of the state but an agent of peace, and a partner in nation
building for better Philippines.

CODE OF CITIZENSHIP AND ETHICS


On August 19, 1939, a Code of Citizenship and Ethics was promulgated by President Quezon through Executive
Order No. 217.
It remains in force to this day.
In 1940 a small book was published by the
Committee that drafted the Code, explaining the meaning of each item in the Code, and providing examples
that teachers could use in teaching it.

This “Code of Ethics” is not to foster exaggerated nationalism, or to glorify narrow and blind patriotism.
Its object is higher, purer, nobler.
It is to strengthen the moral fiber of our youth; to keep alive in the hearts of our citizens the value of ethical
principles.
and to proclaim the truth that moral discipline is the only sure road to national greatness.

 All unite in the recognition of the existence and in fervid love of God by whatever name He is called.
 As a nation, the Filipinos demonstrated unity of belief in one Supreme Ruler as much as oneness of political
purpose.
 Our Constitution recognizes the freedom of religious profession and worship (Article III, section 1, paragraph
7, Constitution). Religious tolerance is necessary so that there may be peace among men and nations.
 Love of country is demonstrated not by words but by deeds. It is not an occasional virtue to be exhibited
now and then, but it is a flame that should constantly be kept aglow in our hearts. It is unflinching
determination to always serve and defend one’s country and at all costs.
 Service to the country is our inescapable obligation “and in the fulfilment of this duty all citizens may be
required by law to render personal military or civil service” (Section 2, Article II, Philippine Constitution)

 It is not enough that a citizen should take care that in his daily life he does not violate any of the many rules,
regulations, and ordinances of the State. He must also see that the laws are observed by the whole
community, that the officers of the law attend to their enforcement and properly perform their duties.
Citizens should participate not only in the privileges but also in the duties of citizenship. They should take a
direct interest in public affairs, participate in the discussion of public policies, and exercise a prudent
selection of the men who will carry out the measures for the attainment of the public welfare

 Taxes are needed to defray the cost of public administration, law enforcement and dispensation of justice;
national defense, and the promotion of social justice; and other important public services like the
promotion of education, agriculture, trade, and industry, as well as the construction of needed public works
and improvements.
 Living in society, however, entails rights and duties, among the most important of which is the duty of each
citizen to pay his just share in the expenses of the government. We enjoy rights and privileges under the
protection of the established government, and we must pay the price of that protection.
 Suffrage is a public and social duty which should not be neglected. The electors owe it to themselves and
their government to exercise this important political right not only regularly but judiciously.
 To preserve the integrity of elections, penalties for offenses against the ballot have been prescribed. No
election law can be made effective without provisions defining and punishing offenses committed at the
polls. To curb as much as possible attendant evils, our Election Law prescribes severe penalties for violations
of its provisions.

 Nobody is more faithful and devoted to us, more sensitive of our needs, more generous to our failings, than
our parents. Like a celestial message, filial love speaks more eloquently than the tongue of man can speak,
more eloquently than the pen of man can write.
 By respecting our elders and by loving and helping our brothers and sisters, we reflect honor and credit to
our parents. There are a thousand and one little things which we could do to gladden the hearts of our
parents and brighten the remaining years of their old age.

 Honor is what prompts a man to strive for all that is noble, true, and lofty, in word and in deed. It inspires a
man to be pure in thought, faithful to his duties, magnanimous to those who offend him, and generous to
his friends. It makes a man courteous, loyal, and true. It never falters when duty calls.
 Ever bear in mind that an honored name is the most precious legacy which we can leave to our children
and our children’s children. “A good name is rather to be desired than great riches, and loving favor than
silver and gold.”
 Be truthful. We should not only tell the truth, but we should also welcome it. Only by knowing the truth are
we able to correct our defects and shortcomings.
 It is simple courtesy and not slavishness for the people to show respect and consideration for the men
whom they themselves have elevated to high positions in the government.

 Cleanliness is next to godliness. Life is more than a gift, -it is a trust which we must not abuse. We owe it to
our Creator to conserve life and that we can do only by observing clean habits, both of mind and body.
Cleanliness is closely associated with frugality.
 Frugality means the simple life—both physically and morally. In its material aspect, it means bodily health
and conservation of wealth and energy. From the spiritual standpoint, it means modesty of conduct,
cleanliness of thought and speech, refinement of taste and behavior.

 We must use discrimination and prudence in adopting foreign models. If we have to fellow foreign patterns,
we should blend them with our own customs, traditions, and ideals, purifying them first of whatever
grossness or imperfection they may be afflicted with.
 With virility and courage and with unswerving resolve, we must safeguard our magnificent national
heritage, for our future lies not in slavish imitations of foreign ideals but in our native qualities, and in the
“composite voices of our great heroes that once trod our soil.”
 Labor leads the mind of men to serious things; it sharpens the mind of men by study; it inspires manly vigor
by exercise and discipline; and it leads to the intense cultivation of land, so essential to the life of an
agricultural nation. By labor, by work, by industry, jungles are cleared, barren lands are made to yield, fair
fields arise, and stately cities born.
 Only by hard and sustained work can men and nations live and survive. And in work lies our salvation as a
people. Indolent people are doomed to extinction. It is, therefore, extremely important that we develop
the natural resources of our land, bring forth its hidden powers and wrest from bowels of the earth the
treasures that await the calloused hands of labor.

 Our life is what we make it. If we are to succeed, it is necessary that we possess self-reliance, courage, and
perseverance, for out of these qualities, new strength is born which will enable us to overcome adversities
and conquer difficulties.
 Even a bended tree finally succeeds in ascending the sky and resisting the winds by its own self-sufficiency.
Therefore, trust yourself, be courageous, and persevere in your task.

 A nation of energetic and busy people, a people working cheerfully and thoroughly, all shoulders to the
wheel, with muscles swelling, with hearts pounding, a people finding in work the consummation of all their
hopes and all their desires, a people who considers a duty well done as its own sufficient reward, is a nation
destined, under God, to be great and strong.
 Only by adopting a correct attitude towards our work and giving ourselves wholeheartedly to the proper
fulfilment of our duties shall we be able to give full play to whatever talent is given us and justify our
existence in this world.
• The individual lives not for himself and for his family alone. His life is a community life. He has, therefore,
larger interests to serve. He should take interest in the affairs of his government and of the community in
which he lives. Civic conscience is a feeling of responsibility, courage, and pride.
• It is our duty to help in the promotion of social justice so that every Filipino may have the opportunity to
acquire, through toil, his necessities in food, clothing, and shelter, together with reasonable comforts, and a
leisure which will permit cultural self-improvement and a participation in the blessings of an enlightened
civilization.

 It is important that we develop our local industries with the aim in view of diminishing our imports, retaining
our wealth within the confines of our country, and increasing the earning capacity of our people.

 Our extensive and continued patronage of these local products will help bolster our infant industries and
lead to national economic self-sufficiency. We would thus contribute in a large measure to the economic
stability of our people and thereby promote their happiness and contentment.
 Real freedom must go hand in hand with economic stability, if not economic prosperity. Our vast domain
and natural resources constitute the inalienable heritage of our people. We cannot alienate them. We are
at most usufructuaries thereof. They belong to the generations yet unborn. It is, therefore, our duty to
conserve and develop them.
 Our natural resources are primarily for the Filipinos. Alien individuals are prohibited from acquiring public
and private agricultural land, excepting with respect to the latter, in cases of hereditary succession (Article
XII, section 5)

THE COMMITTEE THAT DRAFTED THE CODE OF CITIZENSHIP AND ETHICS WAS COMPOSED OF:

• Chief Justice RAMON AVANCEÑA, Chairman


• Secretary of Finance MANUEL A. ROXAS, Member
• Secretary of Public Instruction JORGE BOCOBO, Member
• NORBERTO ROMUALDEZ, Member
• TEODORO M. KALAW, Member
• Associate Justice JOSE P. LAUREL, Member (drafted and submitted the Code)
• Director of the National Library EULOGIO B. RODRIGUEZ, Secretary
HUMAN RIGHTS
Definition of Terms:

1.RIGHT = It is a legal claim to something.


2. HUMAN RIGHTS = Is the thing that a person is entitled to simply because he is a human being. It is a God-
given right.

UN DEFINITION: Human rights are generally defined as those rights’ w/c are inherent in our nature and w/out
w/c we cannot live as human beings.
CHR DEFINITION: Human rights are the supreme, inherent, and inalienable rights to life, to dignity and to self-
development. It is the essence of these rights that makes man human.

3. COMMISSION ON HUMAN RIGHTS = An independent office created for the protection and promotion of
human rights. Establish for the purpose of minimizing if not completely eradicating human rights abuses.

4.BILL OF RIGHTS (ART III, CONSTITUTION) = It is the formal declaration or enumeration of the fundamental rights
secured and guaranteed by the constitution to the individual.

5.SEC 17, ART XIII = Constitutional Basis of the Creation of the CHR.

6. HUMAN RIGHTS PRINCIPLES = Refers to the observance of human rights laws when there is a minimal public
disorder or during peacetime.

7.HUMANITARIAN PRINCIPLES = Refers to the observance of International Humanitarian Law when conditions
worsen or when things have so deteriorated that the conditions prevailing are those of war or during
wartime.

8.LAW OF GENEVA CONVENTION = Refers to law’s w/c aims to safeguard and/or protect persons who do not
take part in the hostilities/war.

9. LAW OF HAGUE CONVENTION = Refers to the rules of conducting warfare and w/c determines the rights and
duties of belligerents in the conduct of operations and limits the choice of the means of harming an
enemy.

10. RIGHT TO LIFE, LIBERTY, AND PROPERTY = Refers to the three (3) most important fundamental freedom or
individual rights of a man.

11. ARREST = It is the taking of a person into custody in order that he be forthcoming to answer for the
commission of an offense.

12.SEARCH = It is an examination or inspection by authority of one’s premises or person with a view to the
discovery of stolen, contraband, or illicit prop. Or of evidence of guilt, to be used in the prosecution of a
criminal action for some crime or offense w/ w/c one is charged.

13. SEIZURE = It is the physical taking of thing into custody. A seizure contemplate a forcible dispossession of the
owner and it is not a voluntary surrender.

14. CONFINEMENT = Refers to the physical restraint or imprisonment of a person subject to military law in a
detention cell or under guard to ensure that he will obey court martial processes and prevent him fm
committing the same or other offenses in the meantime. Confinement shall be resorted to when the
offense involves disloyalty, serious mil offenses and other high crimes.

15.CUSTODY = It is the placing of the person subject to military law under the control or safekeeping of a
responsible officer of a command who shall execute an affidavit of undertaking for the purpose,
ensuring obedience to court martial processes.

16. GARRISON PRISONER = The status of an accused who is on preventive confinement while awaiting trial or
the result thereof.

17. GENERAL PRISONER = Is one who is serving sentence of a court martial in any of the detention centers of pa
or AFP.

18. WAIVER OF DETENTION = A statement signed by a person arrested for his continued detention under oath
and in the presence of two (2) witnesses preferably his next of kin or barangay officials and executed
when there is a possible delay in the delivery of an arrested person to the proper judicial authorities
within the period prescribed by law under Art 125, RPC.

19. ARBITRARY DETENTION (ART 124) = An act/offense punishable by law wherein the offender is a public
officer/employee who detains a person w/out legal ground.

20. ILLEGAL DETENTION (ART 267) = An act/offense punishable by law whereby the offender is a private
individual who detains a person w/out legal grounds.

21. VIOLATION OF DOMICILE (ART 128) = An act/offense punishable by law whereby the offender is a public
officer/employee who not being authorized by judicial order enters a person’s dwelling w/out the
consent or against the will of the owner.
22. TRESPASS TO DWELLING (ART 280) = An act/offense punishable by law whereby the offender is a private
individual who shall enter the dwelling of another against the latter’s will.

23. SEARCHING DOMICILE W/OUT WITNESSES (ART 130) = An act/offense punishable by law wherein the offender
is a public officer/employee whose search is proper or armed w/ warrant legally procured and
searches in the absence of any member of his family or two (2) witnesses residing in the same locality.

24. DELAY IN THE DELIVERY OF DETAINED PERSONS (ART 125) = An act/offense punishable by law whereby the
offender is a public offr/employee who detains another for some legal ground and shall fail to deliver
such person to the proper judicial auth w/in the period of 12 hrs for crimes punishable by light penalties;
18 hrs for crimes punishable by correctional penalties and for 36 hrs for crimes punishable by capital
penalties.

25. CITIZEN’S ARREST (SEC 5, RULE 113) = Otherwise known as “warrantless arrest” whereby a person maybe
arrested w/out securing a judicial order for a warrant of arrest based on five (5) instances.

26. RA 1700 (ANTI-SUBVERSION LAW) = An act w/c outlaw the CPP and similar associations to include its mil arm
(NPA) and political front (NDF) and penalizing membership therein.

27. RA 7636 (REPEALING ACT OF RA 1700) = An act repealing RA 1700 w/c imposes legal constraints on the part
of the AFP to arrest dissidents by reason of their membership w/ the CPP/NPA/NDF.

28. RA 7438 = An act defining certain rights of person arrested, detained or under custodial invest as well as the
duties of the investigating, arresting and detaining offrs and providing penalties for violations thereof.

29. RA 7055 (CIVILIAN SUPREMACY LAW) = An act strengthening civilian supremacy over the military by
returning to the civil courts the jurisdiction over certain offenses involving members of the AFP and other
persons subject to military law.

30. ADMINISTRATIVE ORDER # 40 = An executive order prescribing guidelines for the treatment of the personnel
of the AFP and PNP who are facing administrative and criminal charges.

31. EXECUTIVE ORDER # 106 = An executive order promulgating rules and regulations governing the arrest of
officers and enlisted men of the Philippine Army.

FOUNDATIONS OF HUMAN RIGHTS


BASIC PRINCIPLE

MIND, WILL &


MAN LIFE, DIGNITY & SELF-
DEVELOPMENT
TALENTS

SURVIVE,SELF-
CULTURE,HISTORY & DETERMINATION &
SOCIETY DEVELOP AS A
RESOURCE
SOCIETY

INSTRUMENT &
COMPOSED OF MEN AGENT
GOVERNMENT PEOPLE’S
WELFAR
E
COMPOSED OF NATIONS SEC II, ART 2
INTER-GOVT

CLASSIFICATIONS
A. According to Source: D. According to Struggle:
1.Natural rights 1.First generation
2.Constitutional rights 2.Second generation
3.Statutory rights Legal rights 3.Third generation
B. According to Recipient: E. According to Derogability:
1.Individual rights 1.Absolute or non-derogable rights
2.Collective rights 2.Derogable or can-be-limited rights
C. According to the Aspects of Life: F. According to Importance:
1.Civil rights 1. Right to life
2.Political rights 2.Right to liberty
3.Economic rights 3.Right to property
4.Social rights
5.Cultural rights
HR DURING CUSTODIAL INVEST AND TACTICAL INTERROGATION
PRIOR TO INVESTIGATION

MIRANDA DOCTRINE (laid down by the United States Supreme Court in Miranda vs. Arizona)
The right to be warned prior to any questioning that he has the right to remain silent, that anything that
he says can be used against him in a court of law, that he has the right to the presence of any
attorney, and that if he cannot afford attorney, one will be appointed for him prior to any questioning if
he so desires.
UNDER INVESTIGATION

ARTICLE III- BILL OF RIGHTS (1987 PHILIPPINE CONSTITUTION)


1. Right to remain silent (Sec. 12.1)
2. Right to counsel (Sec. 12.1)
3. Right against torture (Sec. 12.2)
4. Right against secret detention

PRACTICAL GUIDES TO SAFEGUARD HR DURING MIL OPNS


WHILE NOT IN COMBAT

1. HAVE A STRONG AND EFFECTIVE MIL VALUES EDUCATION AMONG YOUR TROOPS.
The guide on how to prevent HR/IHL violations is only the immediate and temporary solution to the problem.
The best solution is the character-building among soldiers.

2. INCLUDE IHL/HR EDUCATION IN YOUR TI & Es.


Spend some time for HR/IHL issues/questions and discussions in your TI & E. Most HR violations are results of
ignorance of the law.

3. AS A GENERAL RULE, ARREST/SEARCH MAYBE EFFECTED FOLLOWING THE CONSTITUTIONAL PRECEPTS FOUND IN
SEC 2, ART III OF THE CONST TO WIT:
“THE RIGHT OF THE PEOPLE TO BE SECURE IN THEIR PERSONS, HOUSES, PAPERS AND EFFECTS AGNST
UNREASONABLE SEARCHES AND SEIZURES SHALL BE INVIOLABLE”.

Hence, no search warrant or warrant of arrest shall issue except upon probable cause to be personally
determined by the Judge after the examinations under oath of affirmation of the complainant and the
witnesses he produce and particularly describing the place to be searched and persons or to things to
be seized. There are situations, however, when you can apprehend without warrant of arrest:

a. When, in his presence, the person to be arrested has committed, is committing, or is attempting to commit
an offense.

b. When an offense has in fact been committed and he has reasonable ground to believe that the person to
be arrested has committed it; and

c. When the person to be arrested is a prisoner who has escaped fm a penal establishment or place where he
is serving final judgment or temporarily confined while his case is pending or has escaped while being
transferred from one confinement to another.

But generally, you cannot apprehend or detain a person arbitrarily, or just with a mere suspicion that he is an
insurgent.

4. DO NOT ALLOW ANY PERSON BELOW 18 YRS OLD TO TAKE PART IN THE ARMED CONFLICT. Children shall be
considered as zones of peace and shall enjoy the protection of the state against dangers arising from
an armed conflict.
Children shall not be recruited or employed by the government forces to perform or engage in activity
necessary to and in direct connection with an armed conflict either as a soldier, guide, courier or in a
similar capacity w/c would result in his being identified as an active member of an organized group
that is hostile to the government forces.

5. ESTABLISH NETWORK.
Be fierce in combat. Out of combat, you must learn to befriend everyone, even a communist, a government
official, a member of the cause-oriented groups, a CHR investigator or a plain civilian.

6. COMMUNICATE WITH THE MEDIA, HUMAN RIGHTS ACTIVISTS AND OTHER “THREAT GROUPS”.
While these organizations are not really threats to national security, the improper handling of situations involving
them may bring problems later.
Confidence-building efforts with these groups should be carefully studied and done.

7. RETURN IMMEDIATELY WHAT YOU BORROWED.


If you borrowed something, be sure to return it immediately. If you lost it, replace it with the same quality.

8. INFORM THE TROOPS THAT A CHILD TAKEN IN CUSTODY BY GOVT FORCES IN AN AREA OF ARMED CONFLICT
SHLD BE INFORMED OF HIS/HER CONSTITUTIONAL RIGHTS AND SHALL BE TREATED HUMANELY.
Some of these basic rights are “the right to remain silent”, “the right to be presumed innocent until proven
guilty”, “the right to be notified of the charge”, “right to counsel”, “right to presence of parents or
guardian”, and the “right to confront and cross examine witnesses.”
9. AVOID BEING IDENTIFIED WITH INFLUENTIAL AND CONTROVERSIAL PERSONS.
While it is not bad to befriend everyone, avoid being identified with the rich and powerful because you will be
accused of protecting their interests while trampling on the rights of the masses.

DURING COMBAT OPERATION


1. ESTABLISH THE PROPER AUTHORITY IN INITIATING COMBAT OPERATION.
Make sure that every combat operation is covered by an OPORD. In the absence of a written OPORD, a radio
message to or from HHQS regarding the operation may suffice. When HR problem crops up, the first
question of the CHR investigators is the authority of the combat operations.

2. ALWAYS REMIND YOUR MEN TO RESPECT HUMAN RIGHTS.


Before you start the combat operations, always remind your men to respect HR of the civilian populace and
the EN. Respecting HR does not make you less a fighter and a soldier.

3. BRIEF EVERY SOLDIER.


Often, soldiers talk too much, compromising your security and plans. Loose talk among soldiers is often the
waterloo of many field units. “Need-to-know” basis must always be applied.

4. AVOID EATING INSIDE HUTS OR HOUSES OF CIVILIANS.


When you are just a stranger in a particular area, don’t familiarize too much with the populace without first
studying their culture. They may not like the idea of having soldiers eat inside their huts or houses. You
may be accused of trespassing, illegal search and harassment.

5. AVOID SLEEPING INSIDE CIVILIAN HUTS OR HOUSES.


You can never tell how the EN thinks. Although it is a common notion that the EN would not hit you while in the
company of civilians, you can never discount the possibility of being harassed. Civilians might be
caught in crossfire, an incident that might be taken against you later.

6. AVOID EATING INSIDE HUTS OR HOUSES OF CIVILIANS.


When you are just a stranger in a particular area, don’t familiarize too much with the populace without first
studying their culture. They may not like the idea of having soldiers eat inside their huts or houses. You
may be accused of trespassing, illegal search and harassment.

7. AVOID SLEEPING INSIDE CIVILIAN HUTS OR HOUSES.


You can never tell how the EN thinks. Although it is a common notion that the EN would not hit you while in the
company of civilians, you can never discount the possibility of being harassed. Civilians might be
caught in crossfire, an incident that might be taken against you later.

8. TRY THE “SANTACLAUS” APPROACH.


In red areas, EN sympathizers teach the children that soldiers are “HAPON” (Japanese), identifying them to the
Japanese soldiers who terrorized the country during the WW II. You can change this image by giving
candies or chocolates to the children. Children may even volunteer information about the EN. This is a
way to countercheck the statements you get from the adults. Remember, a child does not lie.

9. NEVER ALLOW YOUR MEN TO DRINK LIQUOR WHILE RESTING OR HARBORING DURING PATROLS.
During patrols, it is the best time to show the good, if not the best side of the soldier. You can drink liquor up to
your hearts content while inside your camp but never during patrols. A “MAOY” (violently drunk) soldier
might steal the show while firing indiscriminately after getting drank, thus earning for you an HR case.
Image may come as a secondary consideration. A sniper’s bullet might hit you or a brgy folk may try to
poison you.

10. AVOID USING CIVILIANS FROM A VILLAGE AS GUIDE.


If you have problems about your direction, avoid using civilians, especially women, children and the elderly as
guides. Better ask help from a “Tanod” or from a brgy official. Never discount the possibility of being
trapped.

11. DON’T PROHIBIT, INTERRUPT AND DISSOLVE PEACEFUL MEETINGS.


No public officer or employee, without legal ground, shall prohibit or interrupt the holding of a peaceful
meeting, or shall dissolve the same. Any person shall not be hindered from joining any lawful association
or from attending and of its meeting.

12. AVOID DESTROYING CROPS, PROPERTIES AND POSSESSIONS.


During mil operations, avoid damaging plants and properties along the way. Avoid using incendiary that would
set fire combustible materials such as “sawali”, “nipa” and other indigenous materials usually used for
huts in the village. If unavoidable, pay for the damaged properties as soon as the combat operations
are over or else repair or replace the damages.

13. DO NOT BLOCK THE ENTRY OF FOOD, HEALTH SERVICES AND EDUCATION TO THE CIV POPULACE AS A WAY TO
DEFEAT THE EN.
If you plan to neutralize the EN thru this method, the civilian populace will surely be affected. However,
“government forces may prevent or limit the entry of svc workers (e.g. DSWD pers) & the delivery of
goods into an area of armed conflict if the same will interfere directly w/ ongoing combat operations,
or will endanger the lives or safety of svc workers or those delivering the goods. Any dispute arising from
the restriction of the flow of goods & services shall be resolved by the Peace & Order Council
concerned.

14. DO NOT DISRUPT NOR DISLOCATE THE LIVELIHOOD SOURCE OF THE CIVILIAN POPULACE.
When the conflict is not massive and can be contained in a particular area, do not involve areas that are
populated by civilians.

DURING AN ENGAGEMENT
1. KNOW HOW TO DISTINGUISH A CIVILIAN OBJECT FROM A MILITARY OBJECTIVE.
There are references that deal with the International Humanitarian Law and the Law Governing Armed
Conflicts. Yet the best tool in distinguishing a civilian object fm a mil objective is your common sense,
good judgment and conscience.
AVOID OVERKILL. Soldiers tend to be emotional during encounters. This is one reason why they used up too
much firepower which often results to overkill. It is always costly to an army whose ammunition are
considered non-expendable.

2. DON’T BE TOO EMOTIONAL, IT DESTROY YOUR SENSE OF REASON.


People tend to forget reason and good judgment when they are blinded by their emotions. There are several
instances where a number of casualties are killed not in the first burst but as a result of uncontrolled
emotional outbursts.

3. DON’T KILL EN COMBATANTS WHO ARE WOUNDED, WHO COULD NO LONGER FIGHT OR WHO HAVE ALREADY
SURRENDERED.
By IHL, it is authorized to neutralize EN forces by reasonable means while in combat. An EN who wields a FA and
considered a threat is still a mil objective and thus considered an authorized target. As long as he is
wielding his FA, he can still be considered as target for neutralization. But as soon as he drops his FA,
raises his hand or a white cloth that is a gesture or symbol of surrender, he can no longer be shot.

4. DOCUMENT EVERYTHING.
Photo, written statement or even video footage are best instruments to document the event. During any
operations, still and video cameras are very important, not only to document your activities but as a
source of evidence if HR cases are filed agnst you. Video messages from civilian folk can be used for
media release to show your good rapport with the brgy folks.

5. DOUBLE-CHECK YOUR TARGET.


Don’t be too hahsty and careless in firing at anyone whom you think is a combatant. There are times when it is
too late to know that the supposed combatant is just carrying an airgun or a farm tool. Sometimes,
friendly troops also become victims of friendly fires. This is also true to FA Units.

AFTER AN ENGAGEMENT
1. GET THE ATTENTION OF THE BRGY OFFLS RIGHT AFTER THE ENGAGEMENT.
Brgy Offls are the authorities in the villages. They become the 3rd party to the conflict, a neutral source of info
in case there will be problems later. Always request for formal statements to be made by the Brgy Offls
& other disinterested person regarding the legitimacy of the encounter. If possible, get a brgy resolution
concerning the incident/s.

2. DON’T VOLUNTEER INFORMATION.


It is not bad to be proud of your unit and yourself but sometimes, in some areas, it is better not to mention any
names or info to the civilian populace. If problems will crop-up later, the said names will be listed as
respondents of the complaints. You just don’t know the plans of the EN.

3. REPORT THE CIRCUMSTANCES OF THE DEATH OR WOUNDING OF THE ENEMIES.


If it is possible and the circumstances permit, report to your superiors in writing the detailed circumstances of
the death or wounding of the EN.

4. IDENTIFY THE DEAD.


Pursue the identification of the dead. EN forces often bring with them documents that carry their identities.
After identification, inform the nearest of kin and respect their cultural traditions.

5. GIVE IMMEDIATE MEDICAL ATTENTION TO WOUNDED.


Under HR/IHL, it is your duty to treat wounded EN combatants or crossfire victims. If a wounded EN or civilian
dies long after the battle or in your care, it may be used as an issue agnst you. Make sure that a brgy
offl is assisting you in bringing the wounded to the nearest hospital or clinic.

6. BRING THE BODIES TO THE POLICE, IF POSSIBLE AND DEMAND RECEIPT.


If possible, bring the dead to proper authorities. If not, bury them and mark their graves so they can be
retrieved later. This will dispel any doubts of foul play.

7. INFORM IMMEDIATELY THE BEREAVED FAMILIES OF THE DEAD.


Inform immediately the families of the dead. This includes the dead enemies and crossfire victims. Crossfire
victims are entitled of burial assistance from the government. Provide whatever assistance to the
families of the dead, to include financial help, if possible.

8. IMMEDIATELY TRANSFER CHILD CUSTODY TO THE PNP.


In case a child is taken into custody by the AFP, the military commander concerned shall immediately transfer
custody over said child to the nearest stns of the PNP, preferably to the Child & the Youth Relations
(CYRS/CYRO) unit thereof. However, never forget to demand receipt from the PNP.

9. PATCH-UP ANY ARGUMENT AMONG SOLDIERS.


The best information (or misinformation) agsnt the soldiers comes from the soldiers themselves. Avoid arguments
among your troops especially in front of civilians. You might be misunderstood and taken out of
context.

10. CONDUCT MASSIVE CMO AFTER AN ENCOUNTER.


Guilty people hide after committing a crime. After an engagement where there is an EN or civilian casualty,
don’t just leave the area. Request for reinforcements. If there are stronger EN forces to attack your
position, then prepare. It is an opportunity that every mil comdr is looking for. CMO/PSYOPS may come
in the form of sustained mil presence (show of force), civic and humanitarian acvts and other acvts that
will have the presence of the soldiers in the area. However, troops behavior must be properly observed
and monitored to avoid HR complaints and negative issues against the military.

11. ALLOW THE EVACUEES TO RETURN TO THEIR HOMES.


As soon as tactical considerations permit, the evacuee’s shld be allowed to return to their homes.

12. KEEP ALL PIECES OF EVIDENCE.


You can never tell when the HR cases will crop-up. Spent ammunition of rebels such as carbine, Garand, AK-47
(and of course, M16 & M14) empty shells are important in establishing the legitimacy of the firefight.
Captured photographs, letters and diaries of rebels also make good pieces of evidence.

13. ONE (1) FIREARM PER ENEMY CASUALTY.


This is not necessary a rule but this principle may help you in a way. This is the practical way to establish the
legitimacy of the encounter.

14. DON’T FORGET TO REPORT WOUNDED PERSONNEL.


There are times when others would not believe that it was a legitimate encounter especially when the EN has
many casualties while the govt troops don’t have.

15. DO NOT BURN THE HUTS/HOUSE AND OTHER POSSESSIONS OF CIVILIANS.


Avoid using incendiary that would set fire combustible materials such as “sawali”, “nipa” and other indigenous
materials usually used for huts/houses in the villages.

16. ANSWER ALL DOUBTS OF THE MEDIA AT YOUR LEVEL IMMEDIATELY.


Sometimes, the EN does not really care for the conviction of an HR violator. All they want is media mileage and
negative public opinion against the armed forces and the government. However, be careful on what
you say. On the other hand, silence may be misconstrued as a weakness or guilt. Know how to deal
with the media.

STEPS TO BE UNDERTAKEN WHEN FACED WITH HR CASE


GET A COPY OF THE CHR COMPLAINT SHEET.
1. It is your right to know the accusations against you. Know the charges so that you and your lawyer/s can
prepare.

2. DEVELOP CORDIAL RELATIONS WITH COMPLEMENT AGENCIES OF THE GOVT LIKE THE CITY OR PROVL
PROSECUTOR’S OFFICE, THE JUDGES, PUBLIC ATTORNEY’S OFFICE AND OTHER COORDINATE AGENCIES
SUCH AS PNP AND CHR AS WELL AS CIVIC-MINDED MEMBERS OF THE COMMUNITY. Although you can
fight well in the battlefront, legal battle is far different.

3. FACE THE PROBLEM.


Silence may be misinterpreted as guilt. But be extremely careful on what you say or statements that you give to
the investigators. There are documents that need to be kept for future legal battles. Ask legal advice
and give utmost attention in the observance of legal processes issued by the courts, boards, tribunal or
investigating bodies such as subpoenas, warrants or summonses.

4. BE CAUTIOUS IN DIVULGING MATERIAL INFORMATION WHETHER ORALLY OR IN WRITING AS THIS MAY AFFECT
THE CASE.
It is safer to invoke the right against self-incrimination and confer an independent and competent counsel
before volunteering any information. Additionally, there are classified information materials that need to
be cleared by higher authorities before it is released.

5. BE CONSISTENT.
It is essential that documents and testimonies submitted during the conduct of investigation must be consistent
with the issue of defense pursued. Debrief your superiors as well as your men properly on the
importance of this reminder.

6. NEVER DISREGARD THE SUBPOENA.


If the CHR issues you a subpoena, don’t hesitate to report. Innocent people wish to clear their names as soon
as possible. If you do not clear your name, sooner or later you will realize that this will work to your
disadvantages.
7. DOCUMENT YOUR EVIDENCE SUPPORTING YOUR CAUSE THE EARLIEST TIME POSSIBLE WHILE IT MAY STILL BE
CONVENIENTLY OBTAINED.
See to it that proper police authorities handle the initial investigation and gathering of evidence especially at
the scene of the incident to support your complaint.

8. SECURE AFFIDAVITS OF WITNESSES.


Make sure that the proper authorities take sworn statements of key/vital witnesses.

9. DON’T WORRY, JUST PRAY.


History is replete with numerous examples of men who have sought the assistance of God at the moment of
crisis. Religious belief provides the soldier with sense of self-worth, inspires courage, reduces his sense of
isolation, and restrains his baser impulses, which otherwise distract him in the heat of the battle.

INTERNATIONAL HUMANITARIAN LAW

International Humanitarian Law are international rules, established by treaties or custom, which limit the
right of parties to a conflict to use the methods or means of warfare of their choice, or which protect
States not party to the conflict or persons and objects that are or may be affected by the conflict.

To be more precise, IHL has been drawn up to protect, in time of armed conflict, persons who do not
take part or who have ceased to take part in hostilities, like civilian, medical and para-medical
personnel, or religious personnel, combatants who have stopped fighting because they are either
wounded or sick, or have been captured, or have surrendered or are otherwise defenseless.

International Law forbids the use or threat of force in international relations except for:
• United Nations enforcement action or peace-keeping operations; and
• Dual or collective self-defense when an armed attack occurs against a state

IHL AS ENFORCED IN THE AFP


DOCTRINE OF INCORPORATION UNDER THE PHILIPPINE CONSTITUTION.
- Philippines is a party to the Geneva Convention and Protocol II since 1952 and 1986 respectively
or high contracting party, and therefore bound to undertake to respect and ensure compliance of
these treaties.

- Recognizing the importance of Law of Armed Conflict, the President of the Philippines issued
Memorandum Order Nr. 259 dated Feb 7, 1995, for the inclusion of IHL and Human Rights in all career
course of the Officers and men of the AFP.

THE LAW OF ARMED CONFLICT


The Law of Armed Conflict is a part of international public law. It regulates the rights and duties of the
belligerents and the protections of the victims of combat if an armed conflict occurred whatever the cause of
that conflict. Its aim is to limit and alleviate as much as possible the calamities of war. The law of armed conflict
tends to conciliate the military needs imposed by the tactical situations and the fulfillment of the mission with the
requirements set by the humanitarian principles. This law applies in international and internal conflict.

Basic Principles
1. LIMITATION
2. PROPORTIONALITY
3. HUMANITY
4. MILITARY NECESSITY

Components of the Law of Armed Conflict

1. GENEVA-TYPE LAW

It compromises the four Geneva Conventions of 1949 which provide for the protection of victims of war,
that is,

a. the First Geneva Convention: the protection of wounded and sick on land;
b. the Second Geneva Convention: protection of wounded, sick and shipwrecked at sea;
c. the Third Geneva Convention: treatment of prisoner of war; and
d. the Fourth Geneva Convention: protection of civilians in times of war

2. HAGUE-TYPE LAW

It provides rules pertaining to the conduct of hostilities, specifically, the means and methods of combat.
In particular, it covers:

a. Conduct of combat;
b. The concept of occupation; and
c. The concept of neutrality.
The Law comprises:

a. the main Haque Conventions of 1899, mostly replaced and completed by the Hague Conventions
of 1907 (Land and sea);
b. the rules of air warfare drafted at the Hague in 1923; and
c. Various treaties relating to specific weapons (e.g. explosive projectiles, expanding bullets, poison
and poisonous weapons, gases and bacteriological weapons, non-detectable fragments,
booby-traps, mines and other devices, etc.).

3. MIXED-TYPE LAW

A mixed-type of Law consisting of both Hague-type and Geneva-type provisions comprises the
following:

a. the Hague Convention of 1995 for the protection of cultural property;


b. the two Additional Protocols to the Geneva Conventions of 1949, namely Protocol I relating to
international armed conflicts, and Protocol II concerning non-international armed conflicts.

PROTOCOL I - Applicable in international armed conflict, including wars of national liberation, ensures the
protection of civilians against the effects of hostilities

PROTOCOL II - Supplements Article 3 common to all Geneva Conventions with more detailed rules applicable
in situations which are not covered by Protocol I, that is internal armed conflicts of a certain magnitude.
It deals with the guarantees of protection for all persons who do not or have ceased to take part in
hostilities.

OTHER CONVENTIONS AND DECLARATIONS ON THE CONDUCT OF HOSTILITIES

1. Protocol I prohibit the use of any weapon the primary effect of which is to produce fragments which
cannot be in the human body by x-rays. This refers mainly to the despicable invention of
fragmentation bombs filled with fragments made of plastics.

2. Protocol II condemns the use of mine, booby traps and other devices against civilian population or in
such an indiscriminate manner as to cause the civilians incidental injury which is excessive with respect
to the concrete and direct military advantage sought. This refers to mines placed outside military
zones.

3. Protocol III- prohibits the use of incendiary weapons.

4. Convention for the protection of cultural property in the event of armed conflict, the Hague, 1954.
Article 19 of the convention provides that even in the event of a non-international armed conflict
each party to the conflict shall be bound to apply, as a minimum, the provisions of the present
convention which relate to respect for cultural property.

INTERNATIONAL RED CROSS AND RED CRESCENT


MOVEMENT AND WAR

ICRC- is a neutral and private organization whose members are all Swiss. As a neutral Intermediary, it
contributes to the application of IHL by providing assistance to the wounded, sick and shipwrecked,
seeking to improve the conditions and detention of prisoners of war, tracing, missing persons and
transmitting family messages.

THE INTERNATIONAL RED CROSS AND RED CRESCENT MOVEMENT COMPRISES THE FOLLOWING:

1. INTERNATIONAL COMMITTEE OF THE RED CROSS (ICRC) came into being in 1863, is an independent
and neutral institution. It is the founding body of the Red Cross and promote of the Geneva
Conventions. In times of armed conflict, international conflict, civil wars and internal disturbances it
provides protection and assistance to the military and civilian victims, be they prisoners of war, civilian
detainees, war wounded or civilian populations in occupied or enemy territory, if also visits political
detainees.

2. INTERNATIONAL FEDERATION OF RED CROSS AND RED CRESCENT SOCIETIES, which was founded in 1919,
and until very recently was known as the league that strives to facilitate the development of the
member societies at the national level, to coordinate their activities at the international level, and to
encourage the creation of new national societies. It organizes, coordinates and direct international
relief operations in the event of natural disasters and encourages the humanitarian work of the
national societies with a view to preventing and alleviating human sufferings.

3. THE NATIONAL RED CROSS AND RED CRESCENT SOCIETIES activities range from emergency relief to
medical services and social work, first aid, training of nurses, blood transfusion and youth program. In
times of armed conflict, the national societies act as auxiliaries to the armed forces medical services
and come to the aid of civilian and military victims.
THE INTERNATIONAL COMMITTEE OF THE RED CROSS
NAME: International Committee of the Red Cross.
DATE OF BIRTH: In 1863, in Geneva.
FOUNDING FATHERS: Henry Dunant and four other citizens of Geneva:
General Guillaume-Henry Dufour, Gustave Moynier,
Dr. Louis Appia and Dr. Theodore Maunoir.
SPONSORS: Almost all the countries of the world.
OCCUPATION: To protect and assist the civilian and military victims of conflicts and of their direct
consequences.
PLACE OF WORK: Everywhere in the world, in time of war, civil war,
internal disturbances and tensions.
TASKS: As the promoter of the Geneva Conventions which stipulate that the human being must be respect
even in armed conflict, the ICRC’s tasks is to develop and disseminate International Humanitarian Law.
As the guardian of the fundamental principles, it plays a major role in discussions about the
movement’s philosophy and activities.

DISTINGUISHING CHARACTERISTICS: As private, independent, and Swiss institution, the ICRC has a right of
initiative, recognized throughout the world, to take any humanitarian action in line with its
position as a neutral and independent body.
Domicile: 19, avenue de la Paix – 1202 Geneva, Switzerland (+ several delegations in different part
of the world).

CONTROL OF ARMED CONFLICT

This part deals with the general strategic concepts relative to the prevention and management of armed
conflict and with the measures to be taken accordingly by the states. Such measures will avoid the risk
of an escalation of violence, which besides unleashing atrocities; will also constitute an impediment to
the restoration of peace.

Preparatory Measures in peace time

1) Strategic Measures- a clear national security policy and abstention from provocative action and/or
behavior.

2) Preventive Measures

a. Avoiding armed conflict from breaking out


b. Remaining out of an armed conflict occurring between other states or within a state

3) Executive and Administrative Measures

a. Making the law of war known to the armed forces and the civilian population.
b. Rendering organizational and executive procedures effective to ensure the application of the
law of war in the event of armed conflict. The necessary national implementing legislation shall
be enacted to ensure the application of the law of war.

CONTROL MEASURES DURING ARMED CONFLICT

1. STRATEGIC MEASURES - Parties to the relevant treaties particularly the belligerent parties and neutral
states shall take necessary actions for the execution of their obligation under the law of war from the
outbreak of hostilities onwards, the belligerent parties shall:

a. As a rule, aim at the restoration of peace


b. Constantly ensure respect for the law of war within their sphere of influence.
c. Keep the armed conflict under control to avoid or at least restrict escalation.

2. EXECUTIVE AND ADMINISTRATIVE MEASURES - whenever suitable, special agreement shall be


concluded between the belligerent parties or with neutral states, for instance;

a. To keep given areas (e.g. hospital zones or locality, demilitarized zones) at an appropriate
distance from the military operations.
b. Suspension or interruption of hostilities in a given area (e.g. to search for wounded, to
established a neutralized zone).
c. For medical transportation, particularly by air (e.g. over flight of enemy controlled area, use
to distinctive signals).
d. Repatriation or transfer into neutral territory of prisoners of war.
e. Markings with distinctive signs of non-defended localities and demilitarized zones.

CONTROL MEASURES AFTER AN ARMED CONFLICT

a. End of hostilities
b. Restoring normal conditions
c. Repatriation and release of persons and objects
d. Missing and dead persons

EXERCISE OF COMMAND
a) COMMAND RESPONSIBILITY - The commander of the force engage in military operation has the
general responsibility for ensuring respect for the law of armed conflict. This is a matter of order and
discipline.
b) COOPERATION - To reduce risk incurred by civilian person and objects from military operation,
commander shall seek close cooperation with the civilian authorities.
c) INSTRUCTION - Special attention should be given to the distinction between combatants and non-
combatants.
d) EXERCISE OF COMMAND - is initiated by the mission which is conditioned by the military situation. The
mission must be consistent with the law of armed conflict, relevant aspect of which has to be
introduced into the decision-making process of the commander and their staff.

ELEMENTS OF THE DECISION-MAKING PROCESS


1. Intelligence/Information
2. Precaution
3. Analysis

CONDUCT OF OPERATIONS
This file covers the rules under the law of armed conflict governing the conduct of operations and the
constraints placed by the said law thereon, and it deals in particular with the rule of proportionality.

The two main principles contained in the regulations of the fourth Hague Convention of 1907, and
reaffirmed in the first additional Protocol (Art. 35) to the Geneva Conventions of 1949, which place
constraints on the conduct of hostilities are:

• The right to choose the means and methods of warfare is not unlimited; and
• The principle of proportionality which calls for the avoidance of unnecessary suffering and damage
and therefore prohibits all forms of violence not indispensable for the overpowering of the enemy.

Military operations may only be directed against military objectives. Therefore everything feasible must
be done to verify that the assigned target is a military objective. In the choice of weapons or methods of
combat, care must be taken to avoid incidental loss or damage to civilians or civilian objects. Effective
advance warning must be given of attacks which may affect the civilian population, unless
circumstances do not permit this

PROHIBITIONS: IT IS FORBIDDEN
1. to attack the civilian population, individual, civilians or civilian object as a deliberate method of
warfare;
2. to compel enemy national to take part in operations against their own country even if they were in
your service before the outbreak of hostilities;
3. to attack or bombard undefended towns, villages, dwellings or buildings;
4. to commit pillage, even if the town or place concerned is taken by assault;
5. to carry out reprisals against protected persons or property;
6. to starve civilians as a method of warfare;
7. to spread terror among the civilian population through acts or threats of violence;
8. to order that there will be no survivors, to threaten the enemy or to conduct operations on this basis;
9. to direct attacks at object indispensable for the survival of the civilian population such as food-stuff,
crops, livestock and drinking water;
10. to use methods of warfare which are specifically intended or may be expected to cause widespread,
long-term and severe damage to the natural environment;
11. to attack dykes, nuclear power plants or dams if to do so would cause the release of dangerous
forces and consequently, severe losses among the civilian population, unless they are being used in
direct support of military operations or for military purposes and attack is the only way to stop this; and
12. to carry out indiscriminate attacks.

PROTECTION OF PROPERTY
It is forbidden to destroy or requisition enemy property unless it is militarily necessary to do so.

In sieges, bombardments or attacks, precaution must be taken to spare, as far as possible, buildings
dedicated to religion, art, science or charitable purpose, historic monuments, important work of art,
hospitals and places where sick and wounded are collected, provided that they are not being used for
military purposes. Buildings of this sort should be distinctively marked, clearly identifying them as placed
to be spared. If a place of worship, hospital, museum or similar building is used for some military purpose,
then that part of it so used may become a proper military target.

CONDUCT OF ATTACK
Attacks may only be directed at a specific military objective which must be identified as such and be
clearly designated and assigned.
CONDUCT OF DEFENSE
When a choice is possible between several defense positions for obtaining a similar military advantage,
the position to be selected shall be that which would cause the least danger to civilian persons and
objects, if attacked.

MOVEMENTS AND LOCATIONS


Military units, except medical units, shall move or stay preferably outside populated areas, when their
presence, even temporary, could endanger civilian persons and objects.

BEHAVIOR IN ACTION
a. Sets the general framework of the rules governing war, within which the commander of a force has
to conduct military operations, “Behavior in action” illustrates what specific action members of the
armed forces must taken whenever environment armed forces are present to fulfill a mission.

b. Behavior is the reflection of training. This means that all members of a fighting force must undergo
training such as to ensure the enforcement of the existing rules at all levels of the military hierarchy.

c. Behavior in action ”first deals with rules related to the conditions or prohibition of use of certain types
of weapons, such as mines or incendiary weapons.. As a matter of fact no “weapon or weapons”
system is “good “ or “bad”. It is the use made of it and its potential effects on the target that permit
an appraisal and/or a valuation.

d. Every military operation engaging military means against an adversary will have a cause and effect
not only on the means of the enemy (men, positions, materiel), but also on the environment and on
the civilian population.

Rules for the military have to be simple if they want to get a chance to be applied, and the more so in a
combat environment. To achieve these goals we have to simplify without betraying the spirit of the law.

1. Therefore a rule of thumb for every military commander could be:


2. After the situation estimate ask yourself the three following questions:

• Is the objective a military one?


• Are there protected persons or objects in the vicinity of the assigned objective?
• Are the means that I am gong to engage, proportionate to the expected military result of
the operation?

CAPTURED ENEMY COMBATANTS


It is forbidden to kill or wound someone who has surrendered, having laid down his arms, or who no longer
has any means of defense. Those who have surrendered must be treated humanely as POW’s or prisoners
depending on the nature of the conflict. POW is entitled to keep his identity card and identity disc, his
personal property, decorations, badge of ranks, articles of sentimental such as steel helmet, gas mask
and NBC clothing.

MEDICAL UNITS, PERSONNEL RESOURCES


Protection from attack is given to fixed and mobile medical units and to medical transport e.g.
ambulance. They must not take part in hostilities. If they do, their protection might be forfeited.

CAPTURED ENEMY MILITARY OBJECTS


Become war booty (e.g. object of military value taken from the captured enemy military personnel, other
military material such as weapons, transport, store goods). War booty may be used without restriction. It
belong to the capturing party, not to individual combatants.

WOUNDED, SICK AND SHIPWRECKED


The wounded, sick and shipwrecked shall be treated humanely, cared for and protected.

RULES OF ENGAGEMENT
CONCEPTS AND TERMS
1. COLLATERAL DAMAGE – unintended and undesirable civilian personnel injuries or materiel damage
adjacent to a target produced by the effects of friendly weapons.

2. COMBATANT – armed forces of a party to a conflict, such as militia, volunteer corps and organized
resistance movements belonging to a party to the conflict that are under responsible command, wearing
a fixed distinctive sign, recognizable at a distance, carry their firearms openly, and abide by the laws of
war.

3. COMBAT BOARD AND SEARCH – a method of board and search employed when a suspected ship or
watercraft is considered hostile and was force to stop at sea or when there is an indication or sign of
hostility. This method shall also be employed in any hostile environment.

4. CREW-SERVED WEAPONS – any weapon system that requires more than one individual to operate. Crew-
served weapons include, but are not limited to tanks, artillery pieces, anti-aircraft guns, surface-to-air
missiles, and surface-to surface missiles, launcher of biochemical weapons, mortars and machine guns.
5. ELEMENTS OF SELF-DEFENSE – application of force in self-defense requires the following elements:
a. NECESSITY – requires that an armed force shall engage only those forces committing hostile acts
or clearly demonstrating hostile intent and that the use of deadly force is justified only in cases in
which the necessity of self-defense is instant, overwhelming, leaving no choice of means and no
moment for deliberation.
a. PROPORTIONALITY – requires that the force used be reasonable n intensity, duration, and
magnitude, based on all facts known to the commander at that time, to decisively encounter the
hostile act or hostile intent and to ensure the continued safety of one’s own force.

6. ENGAGE – action taken against a hostile aircraft by interceptor aircraft or by ground to air weapons with
intent to deter, damage or neutralize it.

7. EXCLUSIVE ECONOMIC ZONE (EEZ) – the maritime zone extending 200 NM from which the breadth of the
territorial sea is measured as defined in the PD 1599, as promulgated in RA 3046, as amended by RA 5446,
and as recognized by UNCLOS. (DFA)

8. FIRE COORDINATION AREA – area in which specific restraints have been imposed and in which fires in
excess of those restraints will not be delivered without approval of the NCA.

9. HIGH COLLATERAL DAMAGE TARGETS – targets that, if struck, are estimated to result in significant collateral
effects including non-combatant casualties estimated at 30 percent or greater. These are targets that
may affect the environment or infrastructure and the like which are not related to adversary’s combat
capabilities. These include targets close to human shelters.

10. HIGH SEAS – Include all parts of the ocean seaward of the EEZ.

11. HOSTILE ACT - an attack or other use of force against AFP forces. It is also force used directly to impede
the mission and/or duties of AFP forces.

12. HOSTILE AIRCRAFT – aircraft committing a hostile act, identified by a competent observer or confirmed
by the Chief, Philippine Air Defense Control Center or his authorized representative as:

13. HOSTILE FORCES – any armed force, local or foreign, that has committed a hostile act, exhibited hostile
intent, or has been declared hostile by appropriate government authority.

14. HOSTILE INTENT - the treat or imminent use of force against AFP forces. It is also the treat to preclude the
mission and/or duties of the AFP, including the recovery of RP personnel or vital property. The context of
hostile intent s imminent and demonstrated or exhibited, thus it must be demonstrated or exhibited by
behavior. Imminent does not necessarily means “immediate” or “instantaneous”. The logic of responding
to hostile intent is to preempt a hostile act. In the absence of specific criteria, hostile intent is a
determination based on behavior and the totality of the circumstances surrounding the behavior
demanding considerable judgment of command. Hostile intent may be characterized as behavior that,
if not responded to, becomes hostile action. The challenge in using force based on the hostile intent is
“when” and “how”. The when is based on necessity, and the how is based on proportionality. Responding
too soon risks misinterpreting the behavior, and responding too late s a moot point; the hostile intent would
have become hostile action. This indicates that there are thresholds between a hostile act, hostile intent,
and no threat perceived.

15. INDIVIDUAL SELF-DEFENSE – the inherent right to use all necessary means available and to take all
appropriate actions to defend oneself from a hostile act or demonstrated hostile intent

16. INFRASTRUCTURE – facilities, structures and related equipment customarily associated with sustainment of
the civilian population (public works) such as: communication, facilities (television, telephone, radio,
microwave, etc), port facilities, markets, dams, dikes, power generation facilities canals and similar
objects.
a. Belonging to an unfriendly nation;
b. Operating within the Philippine Air Space without proper clearance; and/or
c. By its actions, clearly demonstrates a threat to the security and interest of the Republic of the
Philippines.

17. MILITARY TARGET/OBJECT – installations, camps, facilities or objects which, by their nature, location,
purpose or use, makes an effective contribution to military action and whose total or partial destruction,
capture or neutralization, in the circumstances ruling at that time, offers a definite military advantage.

18. NATIONAL COMMAND AUTHORITY (NCA) – is the ultimate lawful source of military orders and refers to the
Commander-in-Chief of the Republic of the Philippines or his/her duly designated representative.

19. NON-COMBATANT – unarmed civilians or persons taking no active part in the hostilities, medical personnel,
and personnel of impartial humanitarian and relief organizations, priest/chaplain/imam and those out of
combat, including prisoners of war, the wounded and the sick.

20. NON-MILITARY TARGET/OBJECT – civilian populace, medical, relief, and/or impartial humanitarian
organizations, their personnel, materials, transport and facilities; protected places (e.g. those devoted to
the dead, religion, art, science or charitable purposes), cultural objects, historic monuments, hospitals or
any place where the sick and wounded are treated.
21. RIGHTS OF INNOCENT PASSAGE – international law provides that ships of all nations enjoy the right of
innocent passage for the purpose of continuous and expeditious traversing of the territorial sea. Innocent
passage includes stopping and anchoring, but only in so far as incidental to ordinary navigation or as
rendered necessary by force ampere or distress or for the purpose of rendering assistance to persons,
ships or aircraft in danger or distress. Passage is innocent as long as it is not prejudicial to the peace, good,
order or security of the Republic of the Philippines.

22. ROUTINE BOARD AND SEARCH – a method of board and search employed when a suspected ship or
watercraft stops at sea when ordered to stop and is determined to be non-hostile.

23. STRATEGIC IMPLICATIONS OF TACTICAL OPERATIONS – a tactical action acquires strategic implications if it
involves public perceptions beyond immediate area of operation; and/or when it involves adverse
consequences to the general state of law and order, socio economic activity and political stability within
and beyond the immediate area of operation.

24. TERRORIST AND TERRORIST GROUPS/CELLS/FACILITIES – person (s) providing support to or a member of the
following local and international terrorist organizations, or any groups/cells/facilities associated therewith
AL QAEDA, JEMAAH ISLAMIYAH, NEW PEOPLE’S ARMY, MORO ISLAMIC LIBERATION FRONT, ABU SAYAFF,
KIDNAP-FOR-RANSOM GROUPS, LOST COMMANDS and others as may be later identified by GHQ, AFP.

25. TIME SENSITIVE TARGETS – targets requiring immediate response because they pose (or will pose) a clear
and present danger to AFP forces, friendly forces, civilian communities and highly lucrative fleeting targets
of opportunity.

26. UNIT SELF-DEFENSE – the act of defending a particular AFP element, including individual personnel thereof
and other AFP forces in the vicinity, against a hostile act or demonstrated hostile intent.

27. UNLAWFUL AGGRESSION – equivalent to assault or at least threatened assault of an immediate or


imminent kind. There is unlawful aggression when the peril to one’s life or limb is either actual or imminent

RULES FOR GROUND OPERATIONS


1. BASIC PRINCIPLES
a. All AFP Units, elements and personnel involved in ground operations must adhere to the General Rules
of Self-Defense.
b. All AFP Units, elements and personnel involved in ground operations must adhere to the General Rules
for the correct use of force for the accomplishment of mission.

2. CONDUCT OF OPERATION IN GENERAL


a. The right to choose the means and methods of warfare is not unlimited.
b. Military operation other than war (MOOTW) demands greater restraint in the use of force or
applicability of combat power.
c. In all situations, the use of force must be in consonance with the rules of necessity and
proportionality.
d. The authority to use force may be limited but such limitation has no impact on the commander’s as
well as a soldier’s right and obligation of self-defense.
e. At all times, a distinction shall be made between:

1) Combatants and non-combatants; and


2) Military objectives and non-military objectives.
3)
f. In all military actions, constant precaution shall be taken to spare non-combatants and non-military
objects.
g. Civilians and civilian property may not be subject or sole object of a military attack.
h. When operating within or near populated areas, appropriate security and safety measures shall be
taken by the commander to prevent or minimize civilian casualties and damage to property, i.e.
clear, and where necessary, limit the area occupied by unit; restrict, if not regulate access to the
camp; give specific instruction to the members of the unit and appropriate information to the civilian
population regarding their presence in the area.
i. Except when the exigencies of military operation demands, no field operative shall take possession or
exploit any property of the local populace without their explicit acquiescence or approval.
j. It is prohibited to attack, destroy, remove or render useless objects indispensable to the survival of the
civilian population specifically for the purpose of starvation (e.g. foodstuffs, crops, livestock, drinking
water installation and supplies, irrigation work, etc); unless such object are used solely for the
sustenance or n direct support to a hostile force.
k. It is prohibited to use civilian persons or inhabited areas to shield military units, movement and/or
position.
l. Acts of threats of violence with a primary purpose to spread terror among the civilian population are
prohibited.
m. The use of deadly force against an enemy who, having laid down his arm, or having no longer means
of defense, has surrendered, is prohibited.
n. Crew-served weapons are considered a threat to AFP forces whether or not the crew demonstrate
hostile intent. Commanders are authorized to use all necessary force to confiscate and demilitarize
crew-served weapons in the area of operations. Confiscated weapons shall immediately be turn-over
to appropriate AFP units pursuant to current AFP SOP’s/Guidelines and Procedures.
3. CONDUCT OF ATTACK
a. Before the conduct of any offensive strike or attack, all ground Commanders shall clearly designate,
assign/or identify the specific military objective and/or target and determine the best possible
approach, taking into consideration the presence of non-combatants and non-military objects in the
area of operation, based on all known facts available.
b. An attack is prohibited when it treats as a single military objective a number of clearly separated and
distinct military objectives in the city, town, village or other containing a similar concentration of non-
combatants or civilian objects.
c. The direction and the time of the attack shall be chosen so as to limit civilian casualties and damages
(e.g. attack of factory after normal working hours).
d. When a choice is possible among several military objectives for obtaining similar military advantages,
the objective to be selected shall be that which would cause the least danger to non-combatants
and non-military objects.
e. Targets for particular weapons and fire unit shall be determined and assigned with the same
precaution as to military objectives, specifically taking into account the tactical results expected (e.g.
destruction, neutralization) and the destructive power of the ammunition used (quantity, ballistic
data, precision, point of area coverage, possible effects on the environment).
f. When tactical situation permits, effective advance warning shall be given of attack that may affect
the civilian populace (infantry fire to encourage civilian persons to seek shelter, discharge of leaflets.)
g. An attack shall be deviated or cancelled if the objectives or target appears to be non-military.

4. CONDUCT OF DEFENSE
a. All field operatives are bound duty to protect and defend themselves from any or all threats to life or
serious bodily harm. The use of deadly force in self-defense is authorized when:

1) Fired upon;
2) Armed elements mobs, and/or rioters pose actual or imminent threats to one’s own life of another
AFP soldier, or thee life of civilians in the area of operation; and
3) There is a clear demonstration of hostile intent.

b. Hostile intent of opposing forces can be determined by unit leaders of individual soldiers if leaders are
not present. Factors that should be considered include:

1) Presence and type of weapons;


2) If weapons are present, the manner in which they are displayed;
3) Size of the opposing force;
4) Response of opposing force to AFP forces; and
5) Act of opposing force toward unarmed civilians.

c. Once a threat group has been declared a hostile opposing force, unit or personnel may engage
without observing the hostile act or a demonstration of hostile intent.
d. Defense shall be organized primarily outside the populated areas. Non-combatants and civilian
object shall be removed from military objectives. For this purpose, Commanders shall seek the
cooperation of the civilian authorities.
e. When the choice is possible among several defense positions for obtaining a similar military
advantage, the position to be selected shall be on the one which would cause the least danger to
non-combatants and civilian objects.
f. The relocation of civilian person from the vicinity of military objectives shall take place preferably to
location known to them and which present no danger to them.
g. The removal of civilian objects shall take primarily to relocate them to areas outside the vicinity of
military objectives.
h. In addition to the removal and/or relocation of civilians and civilian object, field commanders shall
undertake additional danger reducing measures.
i. When tactical situation permit, defense measures that may affect civilians shall be announced by
effective advance warning (e.g. evacuation of specific houses or areas).

5. MOVEMENTS
a. Movements which have to pass through or close to populated areas shall be executed rapidly.
b. Movements and/or halts of military units near civilian objects must be limited to a minimum.
c. Units located within or near populated areas shall be deployed in such a way as to ensure the least
possible danger to the non-combatant and non-military targets in the areas (e.g. appropriate
distance between military used houses and facilities).

6. INDIRECT FIRE SUPPORT GUIDELINES


a. Artillery fires can be delivered subject to approval of immediate tactical commander not lower than
Brigade/Regimental level.
b. Mortar fires can be delivered subject to the discretion of the Battalion Commander.
c. Preparation fires can be delivered on confirmed hostile enemy position prior to attack of defensive
action subject to the approval/direction of the Brigade/equivalent level Commander.
d. During actual engagement where security of an AFP unit or critical installation/facility is threatened
and time is of the essence, the Commander of the engaged unit, through his own authority, may
selectively apply available fire support means to defend his unit or position.
e. Restriction in the use of field artillery/mortar assets are set on the following:
1. Harassing and interdiction (H & I) fires;
2. Unobserved fire mission; and
3. Fires on targets within populated areas or when undesirable civilian casualties/material
damages are expected.

OCCUPIED TERRITORIES
A. DEFINITIONS

- A territory is considered occupied when it is actually placed under the authority of the enemy armed
forces. The occupation extends only to the territory when such authority has been established and can
be exercised. The territory is considered occupied even when the occupation meets with no armed
resistance.

- A territory is invaded, but no occupied, when enemy armed forces stay or fight on it and where the
authority of the enemy is not yet established.
b. GENERAL PROTECTION
Residents of occupied territories are entitled, in all circumstances, to the respect of their persons, honour,
family rights, their religious convictions and practices, as well as their manners and customs.

c. COMBAT IN OCCUPIED TERRITORIES


Inhabitants of an occupied territory may organize themselves as resistance movements.

General provisions governing the preparation and conduct of operations are applicable in occupied
territories. Since every combat action taking place in occupied territory endangers the civilian
population, it is the interest of both sides to keep combat actions and their probable escalation under
control.

d. HUMANITARIAN ASSISTANCE
Free passage of all consignments of medical supply and objects necessary for religious worship intended
only for civilians are permitted. Likewise, the free passage of all consignments of essential foodstuff,
clothing, means of shelter and other supplies essential to the survival of the civilian population, should be
implemented without delay, with priority for the children under fifteen, expectant mothers and maternity
cases.

e. THE CIVILIAN POPULATION DURING OCCUPATION


Inhabitants of the occupied territory shall not be deprived, in any case, or in any manner whatsoever, of
their rights (under the fourth Geneva Convention), by any change introduced as the result of the
occupation or annexation of the territory.

The occupying power may not detain inhabitants of the occupied territory in areas particularly exposed
to the dangers of war unless the security of the population or imperative military reasons so demand.

f. PARTICULAR PROVISIONS ON OCCUPATION


The occupying power has the duty to ensure the food and medical supplies of the population.

The occupying power shall, in particular, bring in the necessary foodstuffs, medical supply and other
articles if the resources of the occupied territory are inadequate.

g. PENAL AFFAIRS
The penal legislation of the occupied territory remains in force. However, the occupying power may
repeal or suspend this legislation in cases where:

a. It constitutes a threat to the security of the occupying power; or


b. It constitutes an obstacle to the application of Geneva Convention relative to the protection of
civilian persons in time of war of 1949.

The occupying power may issue new penal provisions which are essential:

a. To enable the protecting power to fulfill its obligations under the Geneva Convention relative to the
protection of civilian persons in time of war of 1949; or
b. To maintain the orderly government of the territory; or
c. To ensure the security of the protecting power.

The occupying power shall publish its new penal provisions in the language of the inhabitants.

The effect of these penal provisions cannot be retroactive.

Subject to the above-mentioned measures of the occupying power, the tribunals of the occupied
territory shall continue to function in respect of all offenses by the law in force before occupation.
In cases of a breach of the penal provisions promulgated by the occupying power, the power may hand
over the accused to its properly constituted, non-political military courts. These courts must sit in the
occupied territory.

Inhabitants may not be prosecuted for acts committed before the occupation, or during a temporary
interruption thereof, with the exception of breaches of the law of war.

In case of acts intended solely to harm the occupying power, the sentence shall obey strictly the rule of
proportionality and not be excessive with regard to the damage actually caused.

CYBER SECURITY AWARENESS

TERMINOLOGIES
PEOPLEWARE – in IT parlance, peopleware are the persons involved in the IT layers (users, encoders, programmers,
system developers, computer engineers, technicians, etc., including hackers/crackers)

HARDWARE – these refer to the devices used in IT (workstations, servers, tablets, mobile phones, nodes, routers,
mediums such as cables, wireless routers, switches, microwave, radios, satellites etc)

SOFTWARE – these refer to Programs or applications, including malicious software, installed in computers which
are designed to perform specific functions for certain cyber purposes.
NETWORK (LAN/WAN) – aka Cyber, composed of online or offline IT implements (or layers) such as peopleware,
hardware, software, and data.

DATA – are the most important items saved in any storage devices. They can be accessible from offline or online
computers through the network or RF emulations.

CYBER INSECURITY - refers to unprotected information technology implements from intrusion, cyber terrorism,
cyber warfare, and cyber espionage.
CYBER TERRORISM according to the Cyber space Management Division J6, AFP is the disruptive use of IT by
terrorist groups to further their ideological or political agenda. This takes the form of attacks on networks,
computer systems, and telecommunication infrastructures,
CYBER WARFARE involves nation-states using IT to intrude into another nation's networks to cause damage or
disruption.
CYBER ESPIONAGE is the practice of using IT to obtain secret information without permission from its owners or
holders. Cyber espionage is most often used to gain strategic, economic, political, or military advantage.

COMMON CYBER SECURITY THREATS (HACKER TOOLS OR TOOLS OF THE TRADE)


VIRUSES - a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into
other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds,
the affected areas are then said to be "infected".
TROJAN HORSES - (simply Trojan) is a hacking program that is a non-self-replicating type of malware which gains
privileged access to the OS while appearing to perform a desirable function but instead drops a malicious
payload, often including a backdoor allowing unauthorized access to the target's computer.
WORM - is a standalone malware that replicates itself in order to spread to other computers. Often, it uses a
computer network to spread itself, relying on security failures on the target computer to access it. Unlike
a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at
least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always
corrupt or modify files on a targeted computer.
MALICIOUS SOFTWARE (MALWARE) – is any software of malicious intent that is used to disrupt computer or mobile
operations, gather sensitive information, gain access to private computer systems, or display unwanted
advertising.
SPY SOFTWARE (SPYWARE) - aids in gathering information about a person or organization without their knowledge
and that may send such information to another entity without the consumer's consent, or that asserts
control over a computer without the consumer's knowledge through a conveyor such as e-mail system.
BOTNET - is a collection of Internet-connected programs communicating with other similar programs in order to
perform tasks. This can be as mundane as keeping control of an Internet Relay Chat (IRC) channel, or it
could be used to send spam email or participate in distributed denial-of-service attack attacks. The word
“botnet” stems from the two words robot and network.
KEYBOARD/KEYSTROKE LOGGERS - often referred to as Keyboard Capturing, is the action of recording (or logging)
the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is
unaware that their actions are being monitored. It also has very legitimate uses in studies of human-
computer interaction. There are numerous keylogging methods, ranging from hardware and software-
based approaches to acoustic analysis
BACKDOOR - is a method of bypassing normal authentication, securing illegal remote access to a computer,
obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may
take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit.
CLICKJACKING – aka "UI redress attack" or "User Interface redress attack", is a malicious technique in which an
attacker tricks a user into clicking on a button or link on another webpage while the user intended to
click on the top level page.
FORK BOMB - aka WABBIT, is a DoS attack whereby a process continually replicates itself to deplete available
system resources. Fork bombs operate both by consuming CPU time in the process of forking, and by
saturating the OS's process table. A basic implementation of a fork bomb is an infinite loop that
repeatedly launches the same process.
SPAM - is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially
advertising, indiscriminately.
ROGUE SECURITY SOFTWARE - Malicious programmers have released a large number of these programs, and
widely distributed Web banner ads can warn users that their computers have been infected with
spyware, directing them to purchase programs which do not actually remove spyware or else, may add
more spyware of their own.
PHISHING (SPOOFING ATTACK) – is the act of attempting to acquire information such as usernames, passwords,
and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an
electronic communication. Communications purporting to be from popular social web sites, auction sites,
banks, online payment processors or IT administrators are commonly used to lure the unsuspecting public.
Phishing emails may contain links to websites that are infected with malware.
PHARMING - is a type of attack intended to redirect a website's traffic to another bogus site. Pharming can be
conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in
DNS server software.
ROOTKITS - collection of computer software, typically malicious, designed to enable access to a computer or
areas of its software that would not otherwise be allowed (for example, to an unauthorized user) and
often masks its existence or the existence of other software.
EXPLOIT - is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug,
glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer
software, hardware, or something electronic.
SCAREWARE - included into the class of malware known as FraudTool, comprises several classes of ransomware
or scam software with malicious payloads, usually of limited or no benefit, that are sold to consumers via
certain unethical marketing practices.
RANSOMWARE - is a malware that installs covertly on a victim's computer, executes a cryptovirology attack that
adversely affects it, and demands a ransom payment to decrypt it or not publish it. Simple ransomware
may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a
message requesting payment to unlock it.
DISTRIBUTED DENIAL OF ACCESS (DDOS) - is an attempt to make a machine or network resource unavailable to
its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it
generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected
to the Internet.

HACK VS CRACK
HACKING – is the technique of modifying the feature of a device or system to accomplish a goal outside of the
original creator’s purpose (Dan Goodin, 2015).
CRACKING - is the act of breaking into a computer system, often on a network. A cracker can be doing this for
profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-
and-entering has been done ostensibly to point out weaknesses in a site's security system (Alok, 2012).
SECURITY HACKER – (aka White Hat) is someone who seeks to breach defenses and exploit weaknesses in a
computer system or network. Meanwhile, Hackers (White Hat, Gray Hat, Black Hat) motivation: profit,
protest, challenge, recreation, or to evaluate system weaknesses to assist in formulating defenses against
potential crackers.
CRACKER is an unauthorized person unlawfully accessing a computer to commit another crime such as stealing
or destroying information contained in that system.

WHO ARE CYBER ATTACKERS?


WHITE HATS - also known as Ethical Hackers. They never intent to harm a system, rather they try to find out
weaknesses in a computer or a network system as a part of penetration testing and vulnerability
assessments.
BLACK HATS - also known as crackers, are those who hack in order to gain unauthorized access to a system and
harm its operations or steal sensitive information.
GREY HAT HACKERS are a blend of both black hat and white hat hackers. They act without malicious intent but
for their fun, they exploit a security weakness in a computer system or network without the owner’s
permission or knowledge.
ELITE HACKERS - This is a social status among hackers, which is used to describe the most skilled. Newly discovered
exploits will circulate among these hackers.
A Script Kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written
by others, usually with little understanding of the underlying concept, hence the term Kiddie.
NEOPHYTE - Also known as "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or
phreaking and has almost no knowledge or experience of the workings of technology and hacking.
A Blue Hat Hacker is someone outside computer security consulting firms who is used to bug-test a system prior
to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also
uses the term BlueHat to represent a series of security briefing events.
A Hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message.
In general, most hacktivism involves website defacement or denialof-service attacks.
PHASES OF HACKING
PHASE 1: RECONNAISSANCE - refers to the preparatory phase where an attacker gathers as much information
as possible about the target prior to launching the attack. Also in this phase, the attacker draws on
competitive intelligence to learn more about the target. This phase may also involve network scanning,
either external or internal, without authorization. This is the phase that allows the potential attacker to
strategize his or her attack. This may take some time as the attacker waits to unearth crucial information.

PHASE 2: SCANNING - is what an attacker does prior to attacking the network. In scanning, the attacker uses the
details gathered during reconnaissance to identify specific vulnerabilities. Scanning can be considered
a logical extension (and overlap) of the active reconnaissance. Often attackers use automated tools
such as network/host scanners and war dialers to locate systems and attempt to discover vulnerabilities

PHASE 3: GAINING ACCESS - is the most important phase of an attack in terms of potential damage. Gaining
access refers to the point where the attacker obtains access to the Operating System (OS) or applications
on the computer or network. The attacker can gain access at the operating system level, application
level, or network level. Factors that influence the chances of an attacker gaining access into a target
system include the architecture and configuration of the target system, the skill level of the perpetrator,
and the initial level of access obtained. The attacker initially tries to gain minimal access to the target
system or network. Once he or she gains the access, he or she tries to escalate privileges to obtain
complete control of the system. In the process, intermediate systems that are connected to it are also
compromised.

PHASE 4: MAINTAINING ACCESS - Once an attacker gains access to the target system, the attacker can choose
to use both the system and its resources and further use the system as a launch pad to scan and exploit
other systems, or to keep a low profile and continue exploiting the system. Both these actions can
damage the organization. For instance, the attacker can implement a sniffer to capture all network
traffic, including telnet and ftp sessions with other systems.

PHASE 5: CLEARING TRACKS - An attacker would like to destroy evidence of his or her presence and activities for
various reasons such as maintaining access and evading punitive action. Trojans such as ps or netcat
come in handy for any attacker who wants to destroy the evidence from the log files or replace the
system binaries with the same. Once the Trojans are in place, the attacker can be assumed to have
gained total control of the system. Rootkits are automated tools that are designed to hide the presence
of the attacker. By executing the script, a variety of critical files are replaced with Trojanned versions,
hiding the attacker in seconds.

METHODS OF ATTACKING OFFLINE COMPUTERS AND MOBILE PHONES


• Electromagnetic Radiation Spying
• Power Consumption Scrutiny
• Smartphone’s Accelerometer as a Key Logger
• Travelling in a Subway? You can be Tracked by Hackers. - Hackers can break into the smartphone’s built-
in motion detection technology
• Computer Keyboards are Vulnerable
• Radio Signals and Mobile Phones can Intercept Confidential Data.
• Heat Generated By a Computer
• Data can be Accessed through Thick, Solid Steel Obstructions.
• Exploits/Implants

NSA VARIATIONS OF EXPLOITS FOR THEIR IMPLANTS


• NSA has at least 48 variations of Exploits for their Implants according to NSA ANT Catalog (“Tool Box”)
since 2008. To name a few;
• BULLDOZER: Technology that creates a hidden wireless bridge allowing NSA personnel to remotely control
a system wirelessly.
• CANDYGRAM: A $40,000 tripwire device that emulates a GSM cellphone tower.
• COTTONMOUTH: A family of modified USB and Ethernet connectors that can be used to install Trojan horse
software and work as wireless bridges, providing covert remote access to the target machine.
• COTTONMOUTH-I is a USB plug that uses TRINITY as digital core and HOWLERMONKEY as RF transceiver.
Cost in 2008 was slightly above $1M for 50 units.
• COTTONMOUTH-II is deployed in a USB socket (rather than plug), and costs only $200K per 50 units, but
requires further integration in the target machine to turn into a deployed system.
• COTTONMOUTH-III is a stacked Ethernet and USB plug costing approximately $1.25M for 50 units.
• CROSSBEAM is "a GSM communications module capable of collecting and compressing voice data"
• CTX4000: Continuous wave radar device that can "illuminate" a target system for recovery of "off net"
information.

SYSTEMS AT RISK
Government Computers Aviation Computers Automobiles Computers
Defense/military Computers Consumer Devices
Financial Systems Home Automation Devices
Utilities and Industrial Equipment Large Corporations Computers
CYBER SECURITY
It involves protecting information and systems from major cyber threats, such as cyber terrorism, cyber warfare,
and cyber espionage. In their most disruptive form, cyber threats take aim at secret, political, military, or
infrastructural assets of a nation, organization, or its people. Cyber Security is therefore, a critical part of
the AFP security strategy. (Cyber Space Management Division J6, AFP. 2015)

NETWORK: STAND-ALONE WORKSTATION (WS)


DATA is the thing almost all IT people are interested into. And this is the most common thing in all computer
devices whether they are stand-alone computers or set of computers that are interconnected (or
networked)..
The most recommended way on how to secure your data is through encryption using one or any of the following:
WinRAR, WinZip, PGP, Kryptel, Steganography etc. Provide a daily password for your encryption with at
least combination of 20 alphanumeric and special characters. Example 946%^&*#jehgf890=1@#$. Just
delete the original raw file or folder and shred these from the recycle bin.
Internet
Data/file Server
disable
d Internet
enable
d
WS2

Switc
h
Network Printer

Modem/Router/WAP

WS3
Internet
Internet enable
Enabled (Wi-Fi) d
WS1
Internet
Enabled (Wi-Fi) Static IPV4 Range:
192.168.254.100-200

Example of a Basic LAN


As shown is a typical LAN which is a STAR TOPOLOGY with Wireless Access Point (WAP). To secure this LAN, network
Administrators should reconfigure the IP setting of all devices into static. Enroll the MAC Addresses of these
devices in the router for authorization to connect to the network. All devices that are not enrolled are
automatically blocked. Also, change the security configuration of the router such as Admin Name, SSID and
passkey from WEP into WPA/WPA2.

Internet Data/file Server


disabled Internet
S disabled
Signal

S Internet
Switch 2 disabled
Internet
S Internet
disabled Internet
disabled
enabled

Internet
disabled Switch 1
Modem/Router/WAP

HHCo

Internet
Network Printer enabled
S Internet Switch 3
disabled CO’s Shop

Static IPV4 Range:


Internet 192.168.254.100-200
disabled

S
Example of a Branched-out LAN
As shown is a more complicated LAN using branched-out STAR TOPOLOGY with Wireless Access Point (WAP) and
with three (3) switches. LAN1, LAN2, LAN3 etc, have the same IP and security configuration. Now, it has
a Data or File Server being added. The server uses Network Operating System (NOS) that can manage
all connected devices. It can share OS, security apps (end-point-protection), gaming apps, Files/folders,
printers and it can be used as Virtual Machine. In short, it can centralized shared resources or services.
Hence, it can store and safeguard data/database of all users connected to the LAN.
You can still extend this type of LAN wirelessly by using bridges connecting a LAN from across one building to
another with considerable distance. However, securing a complicated LAN becomes more tedious.
Hence, there is a need to use an End-Point-Security if the WSs are booting through the LAN. However, for
all WSs, they must have their own MDID security apps for enhanced security.
In all of these STAR TOPOLOGY LAN, the common thing here is the DATA being stored in all of the storage devices
in the individual WS and in the server. These should be protected at all cost.

As shown is an example of an insecure network. Connected are Server containing the data/database,
Workstations such as laptops, gadgets, printers and even PCs with cameras. They are being used by
encoders, programmers, web developers, artists etc. Likewise, to connect to the outside world (or www,
i.e. in the cyber space) users share internet access through a LAN.
Unknown to users, the internet is the gateway to all connected devices. People who has the cracking skills and
techniques with tools, (usually malicious software or malware) can possibly intrude into the connected
machines stealthily so they can manipulate to control these devices and spy on what you are doing in
your PC, steal data or sabotage your system. They can even turn-on your webcams and shutdown
your machines remotely.

As shown is the flow of how intruders crack their target system. As I have said, a while ago, the internet is the
gateway into these systems. They deploy their tools of the trade usually Malware such as viruses, Trojan
horses, worm, spyware, rootkits, Remote Access Trojans (or RATs), among others.
These malware pass through the internet. The LAN uses a router to share internet connectivity..

And when user’s turn-on their machines which are connected to the internet, and as soon as they check on
their e-mails, or when they surf the web, these malware may spread into their systems and finally infect
the servers. These malwares install themselves in all unsecured machines and finally, in the server.

As soon as a machine is infected, the intruders can now control it remotely. At this point, they can now monitor
your systems, rob your data, spy on you, sabotage your works, and they can do anything they want.
In a physical environment such as in a guerilla zone, the figure as shown is an example of how Infantry
Companies develop their classic Headquarters defense positions when they are not maneuvering.
Defense layers are established so that enemies can have a hard time intruding and eventually over
running the camp.
In this setup, within the enclosure are the Admin building with adjacent makeshifts for the troops’ shelter and a
parade ground. It has two towers with M60 Light Machine Guns nest for elevated ground observation. It
is armed with two 60 mm mortars with nests. It also has two guard posts, one in a corner and the other
at the entrance of the camp. Post number 1 is responsible for the security of the entrance, opening of
the gate and raising the boom. Post number 2 is responsible for the observation on the South West area
of the camp. The perimeter is enclosed with double layer concertina wires and within the fences are
filled with fungi sticks. And 3 sides are with running trenches. At the west side, with description as 60
degrees cliff of 50 meters elevation. It has a secret culvert passage for retrograde operations however,
it has warning devices such as booby traps and geese or dogs. Likewise, with the Eastern side where it
is an open and flat terrain has the same setup.

MITIGATION OF CYBER INSECURITY


Safeguard the IT Infrastructure
IT Infrastructure: Personnel, Hardware, Software, network and Data
Peopleware (users, programmers, encoders, technicians, artists, engineers, and so on and so forth)

MULTIPLE DEFENSE-IN-DEPTH COUNTERMEASURES


Analogous to that Camp's perimeter defense with Cyber Security, I would like introduce to you the MULTIPLE
DEFENSE-IN-DEPTH (or MDID) countermeasures. These are deployed in the IT infrastructure (such as
peopleware, hardware, software, network and data) to protect information assets of an organization.
The strategy is based on the military principle akin to that perimeter defense that it is “more difficult for
an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier”.
If an intruder gains access to a system, MDID minimizes the adverse impact and gives administrators and
engineers time to deploy new or updated countermeasures to prevent a recurrence.
MDID is a security strategy in which several protection layers are placed throughout an information system. It
helps to prevent direct attacks against an information system and data because a break in one layer
only leads the attacker to the next layer.

By the application of MDID, system administrators can effectively prevent intruders to perform their malicious
acts. As shown in the figure is an MDID application for the entire IT infrastructure.
For Perimeter Defense 1 (or PD1), security for the router – the portal to the systems must be established using
firmware configuration such as replace WEP into WAP/WAP2 encryption, replace Admin name and
passkey, enroll all MAC Devices in it, and limit the signal strength of the wireless access point.
For PD2, users must have security clearance to use these interconnected devices. They should be much aware
that cyber threats are real. They should be trained to deploy MDID, mitigate or fix these threats.
External storage drives, USB Flash drives, SD cards etc should be prohibited to be used inside the IT
Infrastructure. An ethical hacker (aka white hat hacker) may also be employed to conduct penetration
tests (pen test) in order to identify the vulnerabilities of the entire system.
For PD3 and 4, OSs and NOS, must always be up to date and security software must be deployed in all of the
machines. I will discuss how to update the OSs and NOS and selected security applications in the
succeeding slides. The Physical security of the machines should also be taken into consideration.
Casings of the computers must have pad locks.
For PD5, all doors of the workplace must have locks. Likewise, CCTV must be installed in the inside and outside
of the workplace. Design the workplace with classified steel room standard in order to prevent attacks
on offline Computers and Mobile Phones

SECURITY PACKAGE FOR WORKSTATIONS

SECURITY PACKAGES FOR SERVERS

What are the security packages that workstations and server must have?
Windows XP and 7 have reached their End-of-Life (EOL), hence no more manufacturers design computers for
these two (2) legacy OSs. Hackers made these legacy OSs as “guinea pigs” for hacking. If you still need
to run apps using any of these two, consider using Virtual Machine, make them as Guest OS and use
the latest OS as the Host.
Windows 8/8.1 is still being supported though by manufacturers and it reach its EOL on 10 July 2018 however, it
was extended until 11 July 2023. The trend now is for all PCs to run Windows 10- the best and secured
Microsoft OS so far. So, for security reasons, you must upgrade your OS into this version.
Since Windows XP and later 7, 8/8.1 as OSs of workstations I developed, I was already using the concept of
MDID wherein I used security updates, such as SP3 and update of Internet Explorer into IE11, security
package and utilities. These packages except SPs are also updated to fit into Windows 10. The latest
version is 2004 or 20H1.
For Network Operating Systems (NOSs), I used Windows Server 2013 and later 2016 version and I update the
system files and security app directly from Microsoft site. I also used MS End-Point Protection and
Immunet for the respective NOSs.

SECURITY PACKAGE: FOR MDID IN WSS


• Anti Virus: Bitdefender free/suite
• Firewall: ZoneAlarm free/suite
• Spyware Blocker: Spywareblaster
• Spyware Remover: Spybot search & Destroy
• Rouge security software remover: RogueKiller
• Anti-spyware: Super Anti-spyware
• Web Browser Ad blocker: Adblock
• Manage Privacy Settings: DonotSpy10 & Spybot Anti-beacon
• Anti Rootkit: TDSS Killer
As shown is the security package for MDID I installed in all Workstations I developed. These security apps were
tried and tested. Although, some are freeware but with the proper mix of other security apps, they can
fully guard your computers from being compromised by malware or any security threats.
For the server, you don’t need to install these security package. However, you may install the ZoneAlarm to
replace the native firewall of the NOS. The NOS has also a native Anti-Virus and I believe If you update
its virus signatures database from the internet, it can work well. You don’t need to connect the
data/file server into the internet if it is not for updating purposes and if it is not needed.

WINDOWS OS UPDATES
• Windows 8/8.1 (32-64 bits)
▪ Update the OS into the latest build (6.3.9600/ 8 April 2014) via direct DL
▪ EOL: Extended support until 11 July, 2023
• Windows 10 (32-64 bits)
▪ Update the OS into the latest build 20H1 (2004) via direct DL

Install manual update of Windows 8.1, make sure you are connected to the internet and do the following steps:
1. Point to the lower-right corner of the screen, move the mouse pointer up, click Settings, and then click
Change PC settings.
2. Click Update and recovery, and then click Windows Update.
3. Click Check now.
4. Click View details.
5. In the list of updates, select the update containing KB 2919355, and click Install.
6. After the installation is complete, restart your PC and sign in.
To upgrade your Windows 10 old version into the latest 20H1, DL Windows 10 Update Assistant from
https://support.microsoft.com/en-ph/help/3159635/windows-10-update-assistant. Run the assistant and
it will do the rest of upgrading into the latest version

WINDOWS 10 PRIVACY SETTINGS


If you are concerned with Windows 10 spying activity, DL and install DoNotSpy10 to turn off items that may
compromise your privacy or identity. These maybe transmitted to Microsoft servers, Also, DL and install
Spybot Anti-Beacon to turn off OS, MS Office telemetries and other privacy settings.

E-MAIL MANAGEMENT
• Old Days: Radio Transmission = voice messaging
• Upgrade: Radio + Modem + Computers = voice + data transmission (@Data Communication)
• Nowadays: e-mail, soc med, viber, FB Messenger, what’s app, zoom, etc

In the old days where we used radios for voice messaging, it was very tedious to send message, however as
radio modems became available, data or digital transmission was possible and life of radio operators
became easier. We call this Data Communications - using transmitters, modems and computers.
However, anything you transmit through the airwaves (voice or data) can be intercepted by persons
who are equipped with proper technology. So, man invented the so called encryption system. This is
to hide the plain text message into gibberish characters thus it is not easily understood by the one who
can intercept it not unless he can break the code.
Nowadays, transmission of documents seem easier by the use of e-mail systems. Because of the convenience,
we are now almost forgetting the old ways, that is almost all offices and private individuals send their
documents to another by the use of this technology. However, it is much risky, because, again anything
you transmit especially through the internet is also easier to intercept! Thus, the user must know how to
prepare and manage the documents before he send it through e-mail.

E-MAIL MANAGEMENT (CONT’N)


• To encrypt a file or folder:
▪ Prepare a Daily password list
▪ Install WinRAR (64-bit)
▪ Encrypt the document using WinRAR
▪ The encrypted document must be the one to be e-mailed.

To prepare the files, group of files, or a folder containing multiple files before sending them through e-mail, we
use encryption or steganos system to hide these message or group of messages or documents before
attaching them into the system. By the use of encryption software such as WinRAR, WinZip, PGP, Kryptel
you can hide the messages and provide passwords. In this manner, it would be very hard for the
interceptor to know the raw content of the e-mail.
An excerpt from the encryption system I invented is as shown. Daily passwords with 15 characters which are
combination of special and alphanumeric characters are used. I use WinRAR (64-bit) to encrypt the
files.
To encrypt a file, or group of files inside a folder, do the following steps:
1. Locate the file or folder you want to encrypt
2. Right-click the file or folder
3. Click “Add to archive…”, the WinRAR’s “Archive name and parameters Window” will pop-up.
4. At the “Archive name and parameters” window, click “Advanced” tab
5. Click “Set password…” tab
6. Open “Daily Password.pdf” and copy the 20 September 2020 password
7. Paste the selected password at the “Enter password” field
8. Click “OK” tab. You should successfully created your encrypted document.

To decrypt this WinRAR file, just reverse the process (or do the following steps):
1. Right click the encrypted file
2. Click “Extract here” to extract the raw file into that current folder (or “Extract to.. <Filename>” to create a
folder with the content in it
3. Go to “Daily Password.pdf” and copy the 20 September 2020 password.
4. Paste it to the “Enter Password” field. The file/folder should be decrypted.

AFP and PA ORGANIZATION

AFP ORGANIZATION
MANDATE
“Protect the people and the state, and secure the sovereignty of the state and the integrity of the national
territory.”

FUNCTIONS
• Uphold the sovereignty, support the Constitution, and defend the territory;
• Promote the national interests;
• Organize, develop, and deploy its forces;
• Support the national government in nation-building; and,
• Perform other functions as provided by law.

COMMAND AUTHORITY
HIS EXCELLENCY RODRIGO ROA HONORABLE DELFIN LORENZANA LIEUTENANT GENERAL GILBERT I
DUTERTE Secretary of National Defense GAPAY AFP
President of the Republic of the EXERCISES SUPERVISION & Chief of Staff, AFP
Philippines CONTROL OVER THE AFP EXECUTES POLICIES & GUIDANCE
COMMANDER-IN-CHIEF OF THE COMMANDER-IN-CHIEF
GENERAL HEADQUARTERS
PROVIDES:
• Strategic direction;
• Command and control of the whole afp;
• Direction of operations of unified commands; and,
• Formulate policies and guidelines
CSAFP Executes the President’s command functions in relation to military strategy, tactics, and
operation, exercises command and control of all elements of the AFP
VCSAFP Assists the CSAFP and performs his functions during the latter’s absence or inability

PERSONAL STAFF
PERSONAL ADVISERS OF CSAFP IN:
• Afp performance & readiness;
• Procurement;
• Ethical standards;
• Internal audit;
• Special studies;
• Public affairs;
• Legislative affairs;
• Resource management; and,
• Enlisted personnel matters
OTIG Inquiries into and reports matters pertaining to mission performance, state of morale & discipline,
& efficiency & economy in the utilization of AFP resources
AFPBAC Office responsible for awarding and bidding for all transaction of the AFP
OESPA Enhances professionalism, promotes honesty & integrity in the service, instills ethical standards, &
inculcates a sense of public accountability
OTIA Provides the CSAFP and independent and objective assurance on the adequacy and soundness
of internal control system and the quality of performance in the accomplishment of the AFP’s
mission
OSSS To conduct research and studies on national, regional and international strategic issues and
concerns that impact on the mission and functions of the Armed Forces; to communicate the
significance and implication of these concerns to various internal and external publics; and to
conduct independent review and evaluations of existing AFP policies in the pursuit of
organizational efficiency and effectiveness.
PAO Plans and carries out national information programs of the AFP
OLA Assists the CSAFP in maintaining harmonious relation with Congress & other concerned agencies
AFPRMO Advises the CSAFP on matters pertaining to resource management, force structure development,
program and budget development and capability development
AFPSM Assists the CSAFP on matters pertaining to the upliftment of morale, welfare, & discipline of the EP
OSJS Provides protocol, secretarial, and service support services to the CSAFP, the VCSAFP, and the
TDCSAFP
ODR Office of the Defense Reform

COORDINATING STAFF
PRINCIPAL ADVISERS OF CSAFP IN:
• Personnel;
• Intelligence;
• Operations;
• Logistics;
• Plans;
• Commel and info system;
• Civil military operations;
• Education and training; and,
• Reservist and retirees affairs
DCS PERS, J1 Assists the CSAFP on matters pertaining to personnel and administration in the AFP
DCS INTEL, J2 Assists the CSAFP in attaining intelligence objectives of the AFP
DCS OPNS, J3 Assists the CSAFP on matters pertaining to manpower & organization, employment, and
deployment of AFP resources
DCS LOG, J4 Assists the CSAFP on matters pertaining to logistics
DCS PLANS, J5 Assists the CSAFP in the formulation of strategic plans and direction, and long-term policy
formulation of the AFP
DCS CEIS, J6 Assists the CSAFP on matters pertaining to CEIS and resources of the AFP
DCS CMO, J7 Assist the CSAFP on all matters pertaining to the political, social, economic, and
psychological dimension of military operation.
DCS E&T, J8 Assist the CSAFP in the formulation of plans and policies and in the direction, coordination
and supervision of all matters operating to education and training of AFP personnel.
DCS RRA, J9 Assists the CSAFP on matters pertaining to AFP reservist and retiree affairs programs
AFPCC Facilitates direction, coordination, supervision, control, monitoring and evaluation of current
and AFP-controlled civil assistance operations.
AFPSOTC Assists the CSAFP in the formulation of policies and in the planning, directing, coordinating
and supervising and evaluating all matters pertaining to Special Operations Team and
SALA’AM activities

SPECIAL STAFF
ADVISE CSAFP IN THE TECHNICAL ASPECTS OF:
• Military justice;
• Military discipline;
• Educational benefits;
• Woman auxiliary service;
• Medical care;
• Dental care;
• Nursing care;
• Real estate management;
• Fiscal management;
• Supply management;
• Spiritual development;
• Engineering;
• Human rights; and,
• Special services
OTAG Provides administrative services for the AFP
OTCWAC Office primarily responsible for WAC concerns and recruitment
OTPMG To instill military discipline on all AFP personnel to attain a lawful environment through the
promulgation and enforcement of laws, rules, and regulation responsive to the over-all
objectives of the AFP.
OTCCS To provide opportunities for the religious explanations and morale growth of AFP personnel and
their families to assist effectively in the accomplishment of the overall mission of the AFP.
OTJAG To perform, enforce and discharge its assigned role and functions as the Chief Legal Office of
the AFP and Legal Adviser of the Department of National Defense on military matters and to
supervise the military justice system throughout the military.
OTCE To assist the CSAFP in planning, policy formulation and supervision of engineer programs,
projects, and activities, and to assist in national reforestation programs of the government.
OTQMG The OTQMG is tasked with the responsibility of assisting the CSAFP in the formulation of policies
and in planning, coordination, supervision, and control of all matters pertaining to
Quartermaster, materiel, QM and transport services of all AFP units and installations.
OTSG The Office of the Surgeon General, AFP assists and advises the Chief of Staff, AFP on Health and
Medical matters affecting the AFP.
AFPHRO Office which sees it if the AFP adheres to the strict implementation of the Human Rights
OTCN To assist the Chief of Staff, AFP in the formulation of policies and in the planning, coordination
and supervision of all matters pertaining to the Nurse Corps, AFP and the AFP Nursing Service.
OTCDS To assist the Chief of Staff, AFP in the formulation of policies, and in the planning, coordination
and supervision of all matters pertaining to the AFP Dental Service.
AFPREO Administers and manages AFP real estate
AFPEBSO Assists the CSAFP on matters pertaining to AFP educational benefit programs
MFO Advises the CSAFP on matters pertaining to fiscal operations and facilitates the execution
of GHQ appropriated and other non-appropriated funds
AFPMPMO Assists and advises the CSAFP in the management of the AFP Modernization Program and
in the generation of funds for the AFP Modernization Act Trust Fund

AFP WIDE SUPPORT & SEPARATE UNITS


AFPWSSUs
PROVIDES SUPPORT SERVICES TO THE WHOLE AFP:
• HEADQUARTERS SERVICES;
• TRAINING OF OFFICER CANDIDATES;
• COMMAND AND STAFF EDUCATION;
• TECHNICAL RESERVE FORCES DEVELOPMENT;
• INTELLIGENCE SUPPORT;
• ADMINISTRATION OF AFP PEACEKEEPING OPERATIONS;
• CIVIL-MILITARY OPERATIONS;
• JOINT SPECIAL OPERATIONS;
• MUNITION CONTROL; AND,
• DOCTRINE DEVELOPMENT

MAJOR SERVICES GENERAL HEADQUARTERS

“To organize, train, equip, deploy, and sustain the forces they provide to the Unified Commands.”
PHILIPPINE ARMY
Multi-functional force capable of both combat operations and development related mission.

PHILIPPINE AIR FORCE


Responsible for the air defense of the country

PHILIPPINE NAVY
Responsible for the naval defense of the archipelago
UNIFIED COMMAND

“Conduct joint operations in its AOR and assist local government agencies in socio economic, ecological and
developmental activities.”

COMMAND & CONTROL

UNIFIED COMMAND STRUCTURE


PHIL. ARMY ORGANIZATION
MANDATE
To develop, organize, train, equip, support, and sustain Army forces for the conduct of prompt and sustained
ground operation to accomplish the AFP mission

FUNCTIONS
a. To develop, organize, train, equip, deploy and sustain Army forces in the conduct of prompt and
sustained combat operations on land;
b. To prepare such units as may be necessary for the effective implementation of National Defense Plans
and Programs and Armed Forces missions, including support to National development and disaster
response;
c. To develop tactics, techniques, and equipment of interest to the Army on field operations and to
increase interoperability with other major services and international allies;
d. To train, organize, equip and develop Army reserve units for the possible expansion of the peacetime
Army component to meet any emergency; and,
e. To perform such other functions as the higher authorities may direct.

HIS EXCELLENCY HONORABLE DELFIN LIEUTENANT GENERAL LTGEN CIRILITO E


RODRIGO ROA DUTERTE LORENZANA GILDERT I GAPAY AFP SOBEJANA PA
President of the Republic Secretary of National Chief of Staff, AFP Commanding General,
of the Philippines Defense EXECUTES POLICIES & PA
COMMANDER-IN-CHIEF EXERCISES SUPERVISION GUIDANCE OF THE EXERCISES SUPERVISION
& CONTROL OVER THE COMMANDER-IN-CHIEF & CONTROL OVER THE PA
AFP

PA ORGANIZATION
COMBAT UNITS

To destroy enemy military forces, secure land areas, and protect the populace and resources.
To destroy, capture or repel enemy forces using maneuver and shock effect and to seize or secure land areas
and protect the population and resources.

To conduct special operations in support to the PA mission.

COMBAT SUPPORT UNITS

To provide general engineer support to PA units and contribute to the Socio-economic Development Program
of the government.
To provide signal support for the command, control, and administration of the Philippine Army.

To conduct CMO and related trainings in support of the Philippine Army’s mission.

To conduct special intelligence and counterintelligence operations in support of the Philippine Army mission.
To provide administrative, security, ceremonial services and service support function as complimentary unit for
Headquarters Philippine Army.

To educate and train personnel and units and manage doctrine development to support Army operations.

To provide combat service support to all PA units


To provide finance services for the Philippine Army.

To develop, organize, train, equip and administer reservists into a capable, responsive and mobilizeable
Reserve Force as integral component of the total Army in the defense of the state and to participate in socio
economic development efforts.

To provide responsive and efficient personnel management in support of the Philippine Army mission.
To account for all properties of the Philippine Army.

We seem to gain wisdom more readily through our failures than through our successes. We always think of
failure as the opposite of success, but it isn't. Success often lies just the other side of failure.” - Leo F Buscaglia

AFP CUSTOMS AND TRADITIONS

MILITARY CUSTOMS cont….


CALL OF NEWLY PROMOTED GENERALS/FLAG OFFICERS
Officers promoted to star ranks call on the Major Service Commanders, Chief of Staff, AFP, and the Secretary of
National Defense after taking oath of office before the Commander-in-Chief.
Call on the Major Service Commander are usually accompanied by some arrival and departure honors.

NEW YEARS CALL ON COMMANDING OFFICER


Officers make a formal call upon their CO during the New Year’s Day.

HAPPY HOUR
A special form of unit officer comradeship which has been developing and spreading in recent years.

MILITARY WEDDINGS
These customs are generally the same for all faiths. They vary only a chaplain of one different church
incorporated other procedures to add color and tone.

PATRONAGE OF THE OFFICER’S CLUB AND EP’s CLUB HOUSE


Enables officer’s and EP’s to spend their off duty social and recreational life in said centers.

CEREMONIES AT HOLIDAY DINNERS


Practice during Christmas and New Year’s Day, in which the CO visits troops during mealtime or prior to the
serving of the meal.

CHRISTMAS HOLIDAY ENTERTAINMENT


Children of the organization are given gifts and entertained.

RANK HAS ITS PRIVILEGE (RHIP)


Whenever a choice is to be made, such as selection of billets or quarters or electing means of transportation,
the option of selection follows rank, with the senior given the privilege to select first.

VISITING THE SICK


Military personnel who is sick in the hospital is visited by available officers and EP’s of the unit if permitted by the
doctor in order that his needs are attended.

SURVIVOR ASSISTANCE TO BEREAVED FAMILY


When any member of the units die, an officer is designated by the CO to render any possible assistance to the
bereaved family.

“I WISH” and “I DESIRE” STATEMENT


This wish or desire has all the force of direct orders.

PLACE OF HONOR
The place of Honor is on the right.
Accordingly, when junior walks, rides, or sits with senior he takes position abreast and to the left of the senior
USE OF THE WORD “SIR” or “MA’AM”
It is used in military conversation by the junior officer in addressing the senior and by all soldier in addressing
officers.
It precedes a report, a query, and follows the answer of a question.

• It is bad taste to address a woman by her first name or nickname unless she has indicated otherwise.
• If an officer invites a friend to his club he should be out of sight only when necessary.
• An officer stands when introduced to a woman, clergyman, or an old man.

CORE VALUES
VISION
By 2028, a world class Army that is a source of national pride
Competent, Capable, Respecful And A Modernized Army That We Can Depend Upond To Fight And Depend
Our Country That We Can Be Proud Of To Other Countries

MISSION
The mission of the Philippine Army is to “organize, train, equip, deploy, and sustain ground forces in the conduct
of support to operations to “win the peace” in order to help the Filipino nation create an environment
conducive for sustainable development and just and lasting peace
UP-HOLD AND DEFEND THE CONSTITUTION. “Protect People, Sovereignty of the State, Democratic Institutions &
Integrity of National Territory”
“SERVING THE PEOPLE, SECURING THE LAND”
But the Reserve Force Philippine Army, yung command natin ang Mission is to To develop, organize, train,
equip, and administer “DOTEA”

THREE (3) ARMY CORE VALUES


The values form the foundation of a culture of teamwork, excellence, and respect, which in turn, contributes to
a strong and ready Army that can improvise, adapt and overcome – an Army that is postured to defeat
any adversary in the future operational environment.

LOYALTY
The members of the AFP believe in unflinching loyalty. Thus we shall promote the national interest and security
as a paramount concern. We shall support and defend the constitution. We shall be obedient to the duly
constituted government. We should obey orders of those legally appointed over us. We shall support those who
lead us and those serve with us.

ENHANCES DEDICATION AND PRIDE, FOSTERS UNITY AND PROMOTES SINCERE CONCERN.
ARTICLE XVI, General Provisions
SECTION 5. (1) All members of the armed forces (Phil Army) shall take an oath or affirmation to uphold and
defend this Constitution.
TRADITION OF LOYALTY
- The Nation
- The Constitution
- The Commander-in-Chief
- Senior
- Peers
- Juniors
OBEY THE LAW, PAY YOUR TAXES

DUTY
Despite difficulty and danger, we perform our task as order or implied. Discipline and obedience we believe
that duty is a personal act of responsibility, which we show by doing our all-assigned task to the best of our
ability.

AN ACT OF RESPONSIBILITY AND SELF-SACRIFICE A SOLDIER WHO HAS DEDICATED HIS LIFE TO PUBLIC SERVICE.
TRADITION OF DUTY
- As dedicated public servant
Deep sense of responsibility
Self-sacrifice/SELFLESS SERVICE, SERVING WITH HONOR, INTEGRITY, AND PERSONAL COURAGE

PATRIOTISM
Is the feeling of love, devotion, and sense of attachment to one's country. This attachment can be a
combination of many different feelings, language relating to one's own homeland, including ethnic, cultural,
political, or historical aspects.

“LOVE FOR OR DEVOTION TO ONE'S COUNTRY”


It is for the country that a soldier willingly commits to a life of service. This is the highest value that the Filipino
soldier possesses. It is not measured by money or rank or possessions, and it endures through him and is kept
alive by those after him.
One woman once said “Before loving your country, you should love the people of your province first” that is
indeed an act of patriotism. So as a Cordilleran youth you should gave importance to the people around you.
Another sample is that, when you indulge yourself in National Greening program, etc.
AFP CORE VALUES
The AFP Core Values – the profession of arms, noble calling, demands from its members not only specialized
knowledge and skill but also a distinct lifestyle governed by commonly held belief-system containing non-
negotiable enduring core values of honor, loyalty, valor duty and solidarity.
THIS AFP CORE VALUES FOUNDATION STARTED WITH FOREFATHERS FIGHTING FOR OUR FREEDOM
- from Free Spanish Era, Spanish Era, American, Japanese, Communist Insurgent, Secessionist Groups and
Marawi Siege
THAT’S WHY THE AFP BECOME STRONGER, REESPECTFUL AND MOST TRUSTY ORGANIZATION IN OUR SOCIETY

HONOR
The members of the AFP believe in honor as the most important virtue that a soldier must posses. It is in fact
considered as more precious than life itself. Without honor, a man is nothing but beast. Honor means clean
consciousness, personal dignity, good reputation, unquestionable character. Honor means truthfulness,
sincerity, honesty, credibility. Honor means integrity, modest but decent life. A honorable soldier does not lie,
cheat, steal, violate moral and ethical codes not tolerate the violation of the code of honor is the sacred part
of the character of a soldier, violation of which should bring shame.

AN ACT OF RESPECT GAINED BY MEN AND WOMEN OF THE AFP FROM THE CIVILIAN POPULACE THROUGH GOOD
DEEDS AND GOOD EXAMPLES
TRADITION OF HONOR
- Personal Dignity
- Self-worth (Competence & Skilled)
- Supreme sacrifice to win freedom
- Most precious than life itself

LOYALTY
The members of the AFP believe in unflinching loyalty. Thus we shall promote the national interest and security
as a paramount concern. We shall support and defend the constitution. We shall be obedient to the duly
constituted government. We should obey orders of those legally appointed over us. We shall support those who
lead us and those serve with us.

ENHANCES DEDICATION AND PRIDE, FOSTERS UNITY AND PROMOTES SINCERE CONCERN
ARTICLE XVI
General Provisions
SECTION 5. (1) All members of the armed forces shall take an oath or affirmation to uphold and defend this
Constitution.
TRADITION OF LOYALTY
- The Nation
- The Constitution
- The Commander-in-Chief
- Senior
- Peers
- Juniors
SOLDIER - Obedience to laws, carry out directives & regulations, pay taxes, cast votes, enforce writs.

VALOR
We believe in valor as the power and strength, courage and ability to overcome fear, which enables the
soldier to carry out their mission and to accomplish what is seemingly impossible. It is more bravery or ability to
endure pain. Valor is calmness and presence of mind in the in the heat of battle where danger or death is
imminent. It is this courage to stand for what is right and the perseverance to make it difficult for others to do
wrong.

AN ACT OF A MARKED DEGREE OF COURAGE AND BRAVERY IN THE PRESENCE OF DANGER OR IN THE FACE OF
THE ENEMY
TRADITION OF VALOR
A.. Commemoration of our forefathers (ARAW ng Kagitingin) Death March in Tarlac
- Gallant defense of Bataan and Corregidor against the Japanese Imperial Army
- A tribute by Gen Douglas MacArthur when he proclaimed: “Give ME 20,000 FILIPINO SOLDIER AND
I’LL CONQUER THE WORD.”
B.
- The legend of the soldier who said: ‘Fire on my location’ It happened in the Mountain Province in
90s, where an Army lieutenant ordered to be fired at to save his retreating men
- late 2nd Lieutenant Jose Bandong Jr, the platoon leader of the 24th Infantry Battalion who died
saving his men from certain death on April 10, 1992, in the boundaries of Sagada and Bontoc. (BANDONG HILL
Bandong posthumously received the Medal of Valor for heroism in the battlefield.

DUTY
Despite difficulty and danger, we perform our task as order or implied. Discipline and obedience we believe
that duty is a personal act of responsibility, which we show by doing our all-assigned task to the best of our
ability.
AN ACT OF RESPONSIBILITY AND SELF-SACRIFICE A SOLDIER WHO HAS DEDICATED HIS LIFE TO PUBLIC SERVICE.
TRADITION OF DUTY
- As dedicated public servant
- Deep sense of responsibility
- Self-sacrifice (CALL OF DUTY, SACRIFICE LOVE ONES AND FREEDOM)
- WELLINGNESS TO ASSIGNED ANY WHERE

SOLIDARITY
Solidarity is the value that binds us with the rest of our comrades-in-arms. It is the value that makes us one strong
and united organization.

AN ACT OF UNITY AND TEAMWORK SHOWN BY EVERY MEMBER OF THE AFP WHICH SERVES AS AN ALLY IN THE
ACCOMPLISHMENT OF THE MISSION.
TRADITION OF SOLIDARITY
- Unity
- Work together through thick and thin
- Work as a part of the team
- Partner of people to attain national objectives.
- TEAM AFP, ARMY, RESCOM, 14RCDG, UC ROTC TEAM IN ACCOMPLISHING THE MISSION
Run Down: What are the five AFP Core Values?
1. Honor
2. Loyalty
3. Valor
4. Duty
5. Solidarity

MILITARY CULTURE, CUSTOMS AND TRADITION AND CORE PHILOSOPHIES


A. THE AFP ORGANIZATION
The AFP Organization proves that the AFP should be organized is such manner that it can function effectively to
accomplish its mission with minimum cost and maximum result. The AFP Organization must also promote the
active participation of the people in the defense of the state and in civil assistance projects during disasters
and calamities and national emergencies.

PHILIPPINE CONSTITUTION
ARTICLE XVI - General Provisions
SECTION 4. The Armed Forces of the Philippines shall be composed of a citizen armed force which shall
undergo military training and serve, as may be provided by law. It shall keep a regular force necessary for the
security of the State.
ARTICLE II - Declaration of Principles and State Policies
Principles
SECTION 4. The prime duty of the Government is to serve and protect the people. The Government may call
upon the people to defend the State and, in the fulfillment thereof, all citizens may be required, under
conditions provided by law, to render personal military or civil service.

This is to avoid creation and manning of new units that merely duplicates the function of another unit
or office, if only to give position to the favored general officers or senior field grade officers who have no
significant assignment or if only to generate funds which will be divested for personal use of proponents at the
expense of the government. The creation of CAFGU Active auxiliary, the bantay-bayan and the civilian
volunteer organization, not to mention the development of our reserve units in all 15 regions of the country are
some organization reforms embodied in the AFP Organization.

The Armed Forces of the Philippines (AFP) (Filipino: Sandatahang Lakas ng Pilipinas) are the military forces of the
Philippines. It consists of three main service branches; the Army, the Air Force, and the Navy (including the
Marine Corps).
AFP COMPONENTS: REGULAR FORCE (20%) AND RESERVE FORCE (80%)
IMPORTANCE AFP ORGANIZATION
The Armed Forces of the Philippines, being the protector of the people, plays a crucial role in preserving peace
and harmony, by defending the country against terrorism and other forms of threats, whether of civilian or
military nature.

B. SUPREMACY OF CIVILIAN AUTHORITY


Supremacy of civilian authority emphasize the legal ad moral obligation of the soldier as an ordinary citizen of
the republic to obey the laws, carryout directives and subscribes to regulation enacted and issued by the
legislative judicial and executive branches of the civil government.

PHILIPPINE CONSTITUTION
ARTICLE II
Declaration of Principles and State Policies
Principles
SECTION 3. Civilian authority is, at all times, supreme over the military. The Armed Forces of the Philippines is the
protector of the people and the State. Its goal is to secure the sovereignty of the State and the integrity of the
national territory.
Its goal is to secure the sovereignty of the State and the integrity of the national territory. The fact that the
President of the Philippines, who is a civilian, is the Commander-in-chief of the armed forces signifies the
supremacy of civilian authority over the military.
SOLDIER - Obedience to laws, carry out directives & regulations, pay taxes, cast votes, enforce writs.

C. CHAIN OF COMMAND
Chain of Command deals on the generally accepted principles that a military action being executed should
pass he approval or consent of the Commander at each level or echelon of command from lowest to highest
without bypassing any approving authority or taking action upon one’s self as his prerogative.

The chain of command is the line of authority and responsibility along which orders are passed within a military
unit and between different units.
The flow of authority from the Commander-in-Chief down to the Chief of Staff, AFP, and to the lowest rank in
the hierarchy for effective control, supervision, and authority of command as mandated by the Constitution.

D. MILITARY LEADERSHIP
Military Leadership summarizes the significant role of a military leader commander to influence his men to carry
out its mission, perform assigned task or fulfill its obligation and functions.

Military leadership is the process of influencing others to accomplish the mission by providing purpose,
direction, and motivation. COMMAND IS THE AUTHORITY A PERSON IN THE MILITARY SERVICE LAWFULLY
EXERCISES OVER SUBORDINATES BY VIRTUE OF HIS RANK AND ASSIGNMENT OR POSITION.

E. PEOPLE’S SUPPORT
People’s support is a treatment of the acknowledgement by the AFP of the vital importance of people’s
support to achieve peace and order. To get people’s support, the members of the AFP should exercise
prudence and justice when dealing with the civilian. The soldier should respect and protect the right of the
people, their beliefs, way of life and living conditions.

TO GAIN PEOPLES SUPPORT


- It emphasizes that being public servants, we in the AFP are expected to perform our duties and responsibilities
with utmost competence and efficiency.
(Training and Modernization AFP Program)
“NO ARMY HAS EVER SUCCEEDED WITHOUT THE SUPPORT & COOPERATION OF ITS PEOPLE”

F. NATIONAL DEVELOPMENT
The AFP must be catalyst of change, reform and development. Its must actively participate in endeavors that
will contribute to national progress.

ROLE OF AFP - The Armed Forces of the Philippines, being the protector of the people, plays a crucial role in
preserving peace and harmony, by defending the country against terrorism and other forms of threats,
whether of civilian or military nature.
TIME OF PEACE – HARD, PROMOTE ENVIRONMENT PROTECTION (tree planting/growing, clean up drive),
PROMOTE SOCIAL JUSTICE AND HUMAN RIGHTS AT ALL TIMES, PARTICIPATING TO BRGIGADA ESKWELA, BLOOD
DONATION, RELIGIOUS ACTIVITIES, COMMUNITY ASSISTANCE AND MANPOWER

G. PARTISAN POLITICS
The members of the AFP shall not engage in partisan politics. Its involvement shall be limited only to the exercise
of his choices right to vote the candidate assist in ensuring a clean and honest election.

ARTICLE XVI, General Provisions, SECTION 5.


(3) Professionalism in the armed forces and adequate remuneration and benefits of its members shall be a
prime concern of the State. The armed forces shall be insulated from partisan politics.
No member of the military shall engage directly or indirectly in any partisan political activity, except to vote.

H. DEMOCRACY
The AFP adheres to the principles of democracy. It believes that the Philippine Government is the embodiment
of the Filipino people’s will and was established to protect their inherent rights and fulfill their aspirations in
nation.

AFP STRONGLY ADHERE THE PRINCIPLE OF DEMOCRACY OR EXERCISING THE DEMOCRATIC WAY OF LIFE OF
EVERY FILIPINO PEOPLE,
BY UPHOLDING THE SOVEREIGNTY AND SUPPORTING THE CONSTITUTION OF THE REPUBLIC OF THE PHILIPPINES.

I. NATIONAL INTEREST
The AFP realize that the protection of the national interest is for the common good of the people. In
accomplishing the mission given to AFP it shall keep in mind that national interest is of paramount concern and
must be enhanced and protected.

AFP PRIMARY CONCERN OF THE AFP - IS THE PROTECTION OF THE PEOPLE, LIFE, RIGHTS AND PROPERTY AND ALSO
THE PROMOTION AND PROTECTION OF NATIONAL SECURITY (POLITICAL AND ECONOMIC SECURITY OF THE
COUNTRY)
J. PEACE
The AFP believes that program and development can only be attained if there is stability, peace, and order.

K. WAR
The AFP believes that war or the use of force against the enemy of the state shall be resorted only when all the
peaceful means shall have failed, and no other option is left to resolve the conflict

ARTICLE II - Declaration of Principles and State Policies


Principles
SECTION 5. The maintenance of PEACE AND ORDER, the protection of life, liberty, and property, and the
promotion of the general welfare are essential for the enjoyment by all the people of the blessings of
democracy.

L. USE OF ARMED FORCE


When implementing government policies pertaining to security, the AFP must act with restraint as far as use of
force is concerned. When the use of arms is necessary it must have the authority of duly established
government.

M. SOCIAL JUSTICE
The members of the AFP shall be instrument in the promotion of social justice. It shall subscribe to the generally
accepted principle that all men area created equal and every citizen must given the same rights and
opportunities is life and equal protection from the government

ARTICLE II - Declaration of Principles and State Policies


Principles , State Policies
SECTION 10. The State shall promote social justice in all phases of national development. WE MEMBER OF THE
AFP OATH TO DEFEND THE CONSTITUTION AND THE PEOPLE
- CITIZEN MUST REDERED EQUAL RIGHTS AND PROTECTION.

N. HUMAN RIGHTS
The members of the AFP shall respect the interest the inherent rights of the individual as a “human being”. In
the performance of its mission, the troop must see to it that the lives and properties on noncombatants and
innocent civilian are well protected.

ARTICLE II, Declaration of Principles and State Policies


State Policies
SECTION 11. The State values the dignity of every human person and guarantees full respect for human rights.
- STRICTLY ADHERE THE HUMAN RIGHTS AND INTERNATIONAL HUMANITARIAN LAW (IHL)
- AFP MUST RESPECT THE INHERENT RIGHTS OF AN INDIVIDUAL AS A HUMAN BEING (DURING COMBAT
OPERATION WE STRICLY ADHERE AND FOLLOW THE RULES OF ENGAGEMENT)

O. ENEMY OF THE STATE


The AFP shall consider the following as enemies of the state:
1. Those who shall violate the sovereignty of the Philippines such as foreign aggression whose intention is to
occupy and control the national territory or part thereof.
2. Those who resort to violence to achieve their end such as CPP/NPA/Guerillas.
3. Those who shall not accept the supremacy of civilian authority over the military, such as coup plotters and
participants.
4. Those who shall dismember the country or any part thereof, such as the Moro National Liberation Front
(MNLF) and other secessionist groups.
5. Those who shall engage in organized crimes, such as gambling syndicates, drug pushers, gun runners hired
killers.
6.Those who shall organize the populace for the purpose of alienating their allegiance from the state such as
the national democratic front and the sect oral organizations under its umbrella.

ARTICLE II
Declaration of Principles and State Policies
Principles
SECTION 4. The prime duty of the Government is to serve and protect the people. The Government may call
upon the people to defend the State and, in the fulfillment thereof, all citizens may be required, under
conditions provided by law, to render personal military or civil service.
The AFP is responsible for upholding the sovereignty, supporting the Constitution, and defending the territory of
the Republic of the Philippines against all enemies foreign and domestic;
advancing the national aims, interest and policies; and planning the organization, maintenance,
development, and deployment of its ...

P. PROFESSIONALISM
Military Professionalism is the heart and soul of the whole AFP code of ethics. It emphasizes that being public
servants, we in the AFP are expected to perform our duties and responsibilities with utmost competence and
efficiency. Our right to bear arms as one of the peculiarities of the military service calls for assurance to the
people that their safety, protection and welfare shall be our paramount concern.
The people expect the AFP to perform its task as mandate by the constitution with the highest
degree of excellence by applying expertly the basic and specialized skills of soldiery while adhering strictly with
the code of ethics and all laws and statutes of the land.

TO MEASURES - ENTRY TO AFP POLICIES AND STANDARDS


- 72 UNITS
- PHYSICALY FIT (PUSH-UP, SET UP, 3,2 KM RUN)
- PSYCHOLOGICAL TEST
- IQ EXAMINATION
- COMPLETE PHYSICAL AND MEDICAL EXAM
- PASSED THE TRAINING
- SCHOOOLING (PROMOTION)
- PASSED THE BACKGROUND INVESTIGATION

Q. STANDARD
1. STANDARD OF LOYALTY
All military personnel shall be loyal and true to the republic of the Philippines, the constitution, the AFP and the
people. We are loyal to the republic when we serve its interest and protect its territorial integrity against the
enemy, even if it shall cost our lives.
INTEREST OF THE PEOPLE COMES FIRST AND SERVES TO COUNTRY EVEN COST OF OUR LIVES

2. STANDARD OF COMPETENCE
All military must be competent in performance of his duties. By competence means the ability or capacity to
do what is expected him to do it well.
CAN PERFORMED AND PROVIDE SAFETY, PROTECTION AND WELFARE OF THE PEOPLE
- PHYSICALLY FIT, PHSICALY AND MENTALLY FIR, SKILLED. KNOWLEDGEABLE, MORALY AND HONORED SOLDIER

3. Standard of Ethics
Every soldier must conform to the principle of right conduct, being observed in the society which he is part,
from being a soldier, he is also a citizen of the community, because the military community is only a part of a
larger society the “Filipino society”.
To act according to ones moral values and standards AS A SOLDIER

4. STANDARD MORALS
The soldier must be aware that he has capacity to distinguish between what is right and what is wrong. To be
morals do right thing and avoid the wrong ones.
RESPECT TO SENIORS, PEERS AND CIVILIANS AT ALL TIMES AND MAINTAIN YOUR GOOD BEHAVIOR, REPUTATION &
INTEGRITY (HONOR)

R. UNPROFESSIONAL ACTS
These behaviors that fall short of the professional standard as enumerated in the AFP code if ethics are
considered unprofessional acts.
- betrayal of our country & people
- non support of the duly constituted government
- disregard of chain of command
- cowardice & desertion or post abandoment
- AWOL
- Insubordination

1. Acts of Disloyalty
We are disloyal when we do something or refuse to do something that betrayal of our country and people,
non-support to our duly constituted government and disregard to the AFP Chain of Command. Some disloyal
acts are cowardice from the enemy, desertion or abandonment of post, AWOL insulations, and disrespect to
Superiors, bypassing the Chain of Command.

2. Act of Incompetence
We are incompetent when we lack the required knowledge, skills, physical attributes and character traits
necessary for the adequate performance of duty and accomplishment of mission.
lack required knowledge, skills, physical attributes & character traits
- failed to attain min passing grade
- do not meet the physical, medical, mental & moral fitness tests
- indifferent & halfhearted to duty
3. UNETHICAL ACTS
Unethical acts are deviation from the established and corrupted ethical and moral standard and behavior and
performance laid down in the AFP Code of Ethics. Some of these ethical acts are using government time for
outside employment, sideline, position or authority, unwarranted assertion or rank, tolerating irregularities in the
military service, etc
are deviations from the established & accepted ethical & moral standards of behavior & performance.
- sideline
- arrogance
- unwarranted assertion of rank, position or authority
- tolerance of irregularities
- FORNICATION: ADULTERY, CONCUBINAGE, HOMOSEXUALITY

4. CORRUPT ACTS
Corrupt acts are the crimes against public interest, public morals, property, chastity, civil status of person and
honor. We corrupt when are dishonest. Unjust and commit moral acts.
crimes against public interest, public morals, property, chastity, civil status of person and honor

- USE OF GOVERNMENT FUNDS OR PROPERTIES OTHER THAN WHAT IS INTENDED


- MANIPULATION TO AMASS WEALTH
- FALSIFICATION OF RECORDS
- RECEIVING OR DEMANDING GIFTS

THE OFFICER’S CODE cont…

THE OFFICER’S CODE


OFFICIAL STATEMENTS
An officer’s official statement, whether written or unwritten without reservation, making false official statement
is not only contrary to military ethics but it is also punishable under the Article of War.

RESPOSIBILITIES
• It is an officer’s duty to prepare himself professionally for higher responsibilities.
• The rank of an officer carries with commensurate responsibilities.
• When he accept commission, its is his duty to prepare himself for higher responsibilities

TACT AND FORESIGHT


An officer must not only discreet in the exercise of his duties but must prepared to perform his task skillfully under
all circumstances.

PERSONNAL APPEARANCE
An officer at all times appears neat and clean. Nothing destroys the respect and confidence of subordinates
than the shabbiness of their superiors.

WELFARE OF ENLISTED MEN


The welfare of the enlisted men and their families should be the paramount concern of an officer.

FOLLOWERSHIP
THE TEN RULES OF FOLLOWERSHIP
1. DO NOT BLAME THE BOSS.
Do not blame your boss for an unpopular decision or policy your Job is to support, not undermine. It is insidiously
easy to blame an unpopular policy or decision on your superior. “I know this is a dumb idea and a pain for
everyone, but that is what the boss wants, sorry.”

2. DO NOT FIGHT THE BOSS.


Fight with your boss if necessary, but do it in private. Avoid embarrassing situations and never reveal to others
what was discussed. Chronologically, this rule should come first, but I felt the above principle so important it
deserved priority.

Before the decision is made, however, you will generally have the opportunity to express your opinion to the
boss. Speak honestly and frankly. Do not be a yes man. There is always a tendency to tell the boss what you
think he or she wants to hear. Resist the temptation.

3. USE INITIATIVE.
Use initiative make the decision and then run it past the boss. No one likes to work for a micro-manager. We all
believe we are smart enough and mature enough to get the job done without someone hovering around and
providing detailed guidance. There is another side to that coin.

Con’t..
One reason commanders become micro-managers because they see their subordinates standing by and
waiting for specific instructions.
4. ACCEPT RESPONSIBILITY.
Accept responsibility whenever offered. When I was in basic training, an instructor gave me what he thought
was sage and sane advice do not volunteer for anything. It took me several years to realize his suggestion was
worthless.

Con’t..
The military or any top-flight organization cannot work effectively or continue to grow and evolve unless it is
composed of risk-takers willing to assume responsibility. This can be difficult because no one wishes to risk failure
or embarrassment.

5. TELL THE TRUTH AND DO NOT QUIBBLE.


Your boss will be giving advice up the chain of command based on what you say. Mighty oaks from little
acorns grow. The same could be the law for major miscalculations that were based on minor indiscretions.

6. DO YOUR HOMEWORK.
Give your boss all the information needed to make a decision. Anticipate possible questions. Being a good
staff officer is harder than it looks; do your homework. When given a problem to solve by the boss, you must
become an expert on the subject before you attempt to propose a course of action.

7. SUGGEST IMPLEMENTATION.
When making recommendations, remember who will probably have to implement them. This means you must
know your own strengths and limitations. Once you have finished studying the problem in depth and are about
to make a recommendation you want the boss to ratify.

8. KEEP THE BOSS INFORMED.


Keep the boss informed of what is going on in the unit. People will be reluctant to tell him or her problem and
successes. You should do it for them and assure someone else will tell the boss about yours.

9. FIX PROBLEMS AS THEY OCCUR.


If you see a problem, fix it. Do not worry about who gets the blame, or praise. Army Chief of Staff General
George C. Marshall commented that there was no limit to the amount of good people that could accomplish
as long as they did not cart who received the credit.

10. PUT IN AN HONEST DAY'S WORK.


Put in more than an honest day's work, but never forget the needs of your family. If they are unhappy, you will
be too, and your job performance will suffer accordingly.

FOLLOWERS MAKE GOOD LEADERS GOOD


What makes a good follower?
The single most important characteristic may well be a willingness to tell the truth. In a world of growing
complexity, leaders are increasingly dependent on their subordinates for good information; whether the
leaders want to hear it or not. Followers who tell the truth and leaders who listen to it are an unbeatable
combination.

Like good leaders, good followers understand the importance of speaking out. More important, they do it.

The good follower may indeed have to put his or her job on the line in the course of speaking up. But consider
the price he or she pays for silence. What job is worth the enormous psychic cost of following a leader who
values loyalty in the narrowest' sense? Perhaps the ultimate irony is that the follower who is willing to speak out
shows precisely the kind of initiative that leadership is made of.

AFP CUSTOMS AND TRADITIONS


TRADITIONS are inherited principles, standards and practices that serve as the established guides for an
individual or group
CUSTOMS are accepted practices realized through continued usage that has force and effect of a
common law

MILITARY CUSTOMS AND TRADITIONS


VALOR an act of a marked degree of courage and bravery in the presence of danger or in the face
of the enemy
HONOR an act of respect gained by men and women of the afp from the civilian populace through
good deeds and good examples
DUTY an act of responsibility and self-sacrifice a soldier who has dedicated his life to public service.
LOYALTY an act of willing obedience to the governing laws of the country, the constitution, and lawful
superiors
SOLIDARITY an act of unity and teamwork shown by every member of the afp which serves as an ally in the
accomplishment of the mission.
NATIONAL COLORS AND ANTHEMS
The Philippine flag and the national anthem symbolize all democratic ideals that our country stand for and
serve to remind us of the sacrifices of our heroes in gaining our independence from foreign rule.

NATIONAL FLAG
we should always respect the National Flag by saluting it whenever it passes during parades and other
ceremonies where it is raised or lowered

a) When aboard a vehicle and a flag ceremony begins, halt, dismount and face the Philippine flag and
salute. It is impractical to dismount or when ceremony is almost over, you may just halt and sit erect.
b) When the Philippine Flag is tattered or worn down, do not display it anymore. Replace them immediately.
Note: The best way to dispose a tattered flag is to bury it.

National Anthem –the same measure of respect and reverence is shown to the National Anthem.
a) When it is being played, face the source of the music (amplifier) or the band playing it and salute.
b) When with a group, not in formation, you may salute individually during the play of the National Anthem.

MILITARY SENIORITY
Officers by virtue of their being commissioned are seniors to enlisted personnel. In the same manner, high-
ranking non-commissioned officers to low-ranking NCOs. Hence, officers and NCOs have accorded forms of
respect befitting their ranks and positions in the military organization.

RANKS HAS ITS PRIVILEGE


by military traditions, officers and senior NCOs enjoy some RHIPs

Pointers to remember when addressing or dealing with an Officer:


a) SALUTE – render salute in a dignified manner.
b) WORD OF ADDRESS – always use the word “Sir”, “Po” or “Opo”.
c) POSITION OF HONOR – when walking, sitting or riding a vehicle with a officer or any senior,
always walk or sit on his left side.
d) COMMANDER’S WISH – when a commander says “I desire. . . .” or “I wish”, this expression
should be taken and carried out with all authority and force of direct order.

NCOS RANKS AND POSITIONS


NCOs attain their ranks and position by virtue of their competence and qualifications. Thus, to be promoted
and be designated as head NCOs or Chief of a unit is always considered as an achievement.

a) In the Philippine Army and Philippine Air Force, Technical Sergeants are addressed as “Tech”, Chief, Senior or
Master Sergeant as “Master”. If uncertain with the rank, politely address them as “Sarge”.
b) Private First Class and Privates may normally be addressed as “Private”; to some, it is more flattering to be
called “Warrior”, “Trooper” for members of the Special Forces, “Ranger” for Scout Rangers, “Noy” or
“Iho” may be addressed by an officer to junior enlisted personnel.
c) First names may be addressed to juniors or contemporaries only and never to seniors.
d) Generally accepted way of making up informal military nicknames is to used the first two syllables of the
soldier’s name such as “Tintoy” or “Toinks” for Tolentino.

FUNERALS AND RELIGIOUS SERVICES


1) TAPS – “funeral bugle call”. During this solemn ceremony, all military personnel present come to
attention and salute. After the shots, the “taps” is sounded. The National Flag draped over the
casket is slowly removed and neatly folded by the most senior officer or NCO and given to
immediate family member of the deceased.
2)FUNERAL VISITATION – the Commanding Officer sends his personal letter of condolences to the bereaved
family of his men. Military vigil guards shall be posted beside the casket and a standardized
Philippine Flag shall be draped over it.

MILITARY WEDDINGS
1) BACKGROUND INVESTIGATION (BI) – Officers and Enlisted personnel are required by AFP regulations to
request permission to marry from their commanding officer by submitting a properly accomplished
Personal Action Form (PAF) and by requesting for a Background Investigation on his prospective
bride. The BI is not intended to find out if a soldier had made the right personal choice, but rather to
determine if his future wife will not be potential risk for the AFP.
2) “DRAW SWORDS” CEREMONY – a traditional military church wedding. The bride and the groom (an officer of
NCO) may wish to have this ceremony. A Military Sword Detail of at least four pairs of officers or
NCOs shall be organized among the friends of the groom in his unit.

VISITATIONS
1) HOSPITAL VISITS 2) FIELD VISITS
MILITARY CEREMONIES AND SOCIALS
1) PARADES – Military parades and review are held in military camps to honor senior commanders, government
officials and dignitaries. Parade and Reviews may be held both in the morning or in the afternoon
and mainly to showcase to the Guest of Honor and audience the smart appearance and executions
of the troops.
2) MILITARY HONORS

3) UNIT ANNIVERSARIES
4) HAPPY HOURS

STANDARD CONDUCT OF A SOLDIER


PURSUIT OF EXCELLENCE
“ the best weapon in the unit is the individual himself”
….Soldier should have full knowledge of his job, has proficiency in training and in combat, in peacekeeping
and in the implementation of national policies for development.
PRIDE IN UNIFORM
….embedded in the uniform is the extraordinary patriotism and dedication that begets respect and admiration
from the people he serves. The manner of wearing the uniform is therefore a manifestation of the
state of the Army.
It reflects not only the personality and character of the individual soldier but also that of the whole
organization. It is the responsibility of the soldier to take extra care and use of his uniform and all
insignias he carries on them, for it is in this simple ritual that the soldier is set apart from the rest.

DISCIPLINE
A soldier is a model of self-discipline. As he follows the disciplined path, he generates the same quality of
discipline from those he walks with. In this manner, disciplined governance from the Chain of
Command is correspondingly achieved especially since a Philippine Army soldier performs
excellently under the tutelage of an excellent commander.
The soldier and ultimately the Philippine Army's energy come from this unity of disciplined purpose. This means
continuing the fight even when alone and to the last man; staying alert when all others are asleep;
and keeping to the objective when all else seems lost.

PROFESSIONALISM
Professionalism in the military career stands for commitment, knowledge, and skills and is better expressed in
one's attention to duty with the required discipline and competence.
Professionalism comes from the soldier's pursuit of excellence; his disciplined performance as to When, Where
and How; the recognition of individual merit; humility where respect is earned and not coveted; and
most of all, humor in being human and in keeping one's feet on the ground.
Professionalism in the soldier gives rise to impartiality, objectivity, and non-partisanship that is necessary to
support common goals for the welfare of the population.

ADHERENCE TO LAW
All soldiers are both citizens and military personnel, hence are subject to the same law and shall uphold the
same as part of their duty of service to the country.

DEFERENCE TO AUTHORITY
Authority refers to those with the right and responsibility to carry out functions that affect an entire group. Within
the military, authority is evident in the chain of command, starting with the non-commissioned officer
in the most vital role as implementor, and the succession of Commanding Officers before him
through which commands are progressively issued and implemented at each level of the hierarchy.
Persons in position of authority within the military are entrusted with carrying out the military operational
imperative and discipline ensures this is followed.

MILITARY COURTESY AND DISCIPLINE


DEFINITION OF TERMS:

MILITARY COURTESY
- pertains to the wholesome relationships between juniors and seniors, between young and old, with all persons.
- Military courtesy means good manners and politeness in dealing with other people.
- most forms of military courtesy have some counterpart in civilian life, we train soldiers to say sir or ma’am when
talking to a higher-ranking officer.
- the use of the word sir is also common in the business world, such as in the salutation of a letter or in any well-
ordered institution
- military courtesy is the respect shown to each other by members of the same profession

❖ Some of the Army’s more common courtesies include rendering the hand salute, standing at attention
or parade rest, or even addressing others by their rank.

DISCIPLINE - is a combination of Army Values, attributes, skills and actions that relates directly to the physical
and mental sides of each soldier.

The highest form of discipline is the willing obedience of subordinates who;


1. Trust and follow their leaders without question
2. Understand and believe in the mission’s purpose.
3. Respect his/her unit and dutifully perform his/her task and obligation, and
4. Ensures the accomplishment of mission at all cause

HAND SALUTE:
is a privileged gesture of respect and trust among soldiers. Remember the salute is not only prescribed by
regulation but is also recognition of each other’s commitment, abilities, and professionalism

1. A SALUTE IS ALSO RENDERED:


a) when the Philippine National Anthem, or foreign national anthems is played.
b) to uncased National Color outdoors.
c) on ceremonial occasions such as changes of command or funerals.
d) In reveille and retreat ceremonies, during the raising or lowering of the flag.
e) During the sounding of honors.
f) When turning over control of formations.
g) When rendering reports.
h) To officers of friendly foreign countries.

2. SALUTES ARE NOT REQUIRED WHEN:


a) Indoors, unless reporting to an officer or when on duty as a guard.
b) Sentinel armed with pistol does not salute after challenging.
c) An enlisted man in ranks and not in attention comes to attention when addressed by an officer
d) A prisoner.
e) In churches, theaters, or public assemblies
f) When on the march in combat and other combat conditions
g) Driver of a vehicle in motion is not required to salute
h) Either the senior or the subordinate is wearing civilian clothes

COURTESY WHEN DEALING WITH OFFICERS AND SENIOR NCOs:


1. when talking to an officer of superior rank, stand at attention until ordered otherwise.
2. when you are dismissed, or when the officer departs, come to attention and salute.
3. when speaking to or being addressed a noncommissioned officer of superior rank, stand at parade rest until
ordered otherwise
4. when an officer of superior rank enters a room, the first soldier to recognize the officer calls personnel in the
room to attention but does not salute. A salute indoors is rendered only when reporting.
5. when an NCO of superior rank enters the room, the first soldier to recognize the NCO calls the room to “At
ease.”
6. walk on the left of an officer or NCO of superior rank.
7. entering automobiles and small boats - The senior enters a boat of automobile first and leaves last.
8. when outdoors and approached by an NCO, you greet the NCO by saying, “Good morning, Sergeant,” for
example.
9. procedure when an officer enters a squadron of tent - In a squadron of tent, uncover and stand at attention
when an officer enters.

- The first person that sees an officer enter a dining facility gives the order “At ease,” unless a more senior officer
is already present.
- When you report to an officer of superior rank, approach the officer to whom you are reporting and stop
about two steps from him, assuming the position of attention give the proper salute. If indoors, use the
same procedures as above, except remove your headgear before reporting. If armed, do not remove
your headgear.
- A soldier addressing a high-ranking officer uses the word sir or ma’am in the same manner as a polite civilian
speaking with a person to whom he wishes to show respect. In the military service, the matter of who
says sir or ma’am to anyone is clearly defined; in civilian life it is largely a matter of discretion. In the
case of NCOs and soldiers, we address them by their rank because they’ve earned that rank.
- Simple courtesy is an important indicator of a person’s bearing, discipline, and manners. It is a fact that most
people respond positively to genuine politeness and courtesy. Walk down a street in most towns and
cities and see the response you get from people when you just say “good morning.” It is no different for
soldiers.
10. Reporting to a superior officer in his office - When reporting to a superior officer, the junior (unless under
arms) removes his headdress, knocks and enters when told to do so. Upon entering, he marches up to
within about 2 paces of the officer’s desk, halts, salutes and reports
11. Courtesies exchanged when an officer addresses a soldier -During conversations, salutes are exchanged,
conversation is completed, salutes are again exchanged

THE NATIONAL FLAG:


The flag of the Philippines is the symbol of our nation. Some of the rules for displaying the flag are as follows

1) All Army installations will display the flag of the Republic of the Philippines.
2) Installations will display the flag daily from reveille to retreat
3) When a number of flags are displayed from staffs set in a line, the flag of the Philippines will be at the
right; to the left of an observer facing the display. If no foreign national flags are present, the flag of the
Philippines may be placed at the center of the line providing it is displayed at a higher level.
4) When the flag of the Philippines is displayed with state flags, all of the flags will be of comparable size.

- When the flag is being raised in the morning, you should stand at attention on the first note of “Reveille” and
salute.
- In the evening "Retreat" is played prior to “To the Colors.” Render the hand salute at the first note of “To the
Colors.”
- You normally face the flag when saluting unless duty requires you to face in some other direction. At the
conclusion of the music, resume your regular duties.
- If you are involved in some duty that would be hampered by saluting, you do not need to salute.
- When in a formation or a group, the senior soldier present will call the group to “Attention” and then
“Parade, Rest” at the first note of “Retreat.” That soldier will then call the group to “Attention” and
“Present, Arms” at the first note of “To the Colors” and then “Order, Arms” at the conclusion
- When in civilian clothing, the only change is to place your right hand over your heart instead of saluting.
- Vehicles in motion should stop. If you are in a car or on a motorcycle, dismount and salute. If you are with a
group in a military vehicle or bus, remain in the vehicle. The individual in charge will dismount and
salute.
- These honors also apply to the national anthems of foreign countries during ceremonies or parades.
- When you are passing or being passed by colors that are being presented, paraded, or displayed, salute
when the colors are six paces from you. Hold the salute until the colors are six paces beyond you

CORRECT USE OF TITLES:


TITLES OF COMMISSIONED OFFICERS
1. Lieutenants are addressed officially as lieutenants
2. Other officers are addressed or referred to by their titles
3.Ma’am will be used in addressing a female officer
4.All chaplains are officially addressed as chaplain regardless of their military grade
5.Women officers of the Technical service as well with those WAC are addressed by their titles.

TITLES OF CADETS
Cadets are addressed as “cadet”

TITLES TO NON-COMMISSIONED OFFICERS


Sergeant Majors is addressed as “Sgt Major”
A First Sergeant is addressed as “F/Sgt”
Sergeants are addressed as “Sgt”
Corporals are addressed as “Cpl”

USE OF TITLES BY RETIRED PERSONNEL


Individuals who retire from the armed forces and not active on duty are authorized to use their titles socially,
and in connection with commercial enterprises, subject to prescribed limitations.

GENERAL COURTESY AND DISCIPLINE


1.Being late for any engagement is the height of bad manners.
2.A military personnel is expected to behave and conduct himself with dignity and restraint.
3.It is bad taste to address a woman by her first name or nickname unless she has indicated otherwise.
4.A military personnel always asks to be permitted to smoke in the presence of a woman especially in a room
of automobile.
5.If military personnel invite a friend to his club, he should be out of sight only when necessary.
6.A military personnel always stands when introduced to a woman, a clergyman, an official or an old man
7.It is not polite to compliment a person in a company because the others might feel slighted.
8.A military personnel must be careful in speaking about his wife/husband. To people who have not met
her/him socially, she/he is referred to as my wife/husband or her/his first name

MILITARY TABOOS
1.Uniform must not be defamed
2.Never slink under cover to avoid retreat
3.Offer no excuses
4.Use of third person by an officer is of poor taste
5.Servility is scorned
6. Avoid praising your commander to his face
7. Old man to be spoken with care
8. Avoid going over the officer’s head
9. Harsh remarks are to be avoided
10. Avoid vulgarity and profanity
11. Excessive indebtedness to be avoided

IED AWARENESS

WHAT IS AN I.E.D?
It is an improvised explosive device (IED) attack is the use of a “homemade” bomb and/or destructive device
to destroy, incapacitate and harass. IED is used mostly by criminals, vandals, terrorist, suicide bombers
and insurgents.
These devices can cost massive damage or worst lives.

COMMON IED COMPONENTS


COMMON FIRING DEVICES

EXAMPLES OF BLASTING CAP FIRING DEVICES

COMMON POWER SOURCES


IED TRIGGER IDENTIFICATION PHOTOS

IED TRIGGERS
-AN IED (NON-REMOTE CONTROL) MAY BE TRIGGERED BY:
- COMMAND WIRE.
- TIME DELAY:
-SAFE ARM.
-DIGITAL (WATCHES).
-MICROPROCESSOR.
-RESISTOR/CAPACITOR.
-MECHANICAL (ALARM CLOCK OR TIME FUSE).
- SUICIDE BOMBER (MANUAL).

-VICTIM OPERATED (INITIATED/ACTIVATED) TRIGGERS INCLUDE:


- SENSORS:
- PASSIVE INFRA-RED.
- BAROMETRIC PRESSURE.
- LIGHT AND DARKNESS.
- RADIATION.
- TEMPERATURE.
- MOTION.
- SOUND.
- MANUAL PRESSURE (STEP ON TYPE).
- TRIP WIRE.
- BREAK WIRE.

CAR ALARM MOTION TRIGGER


• Al Qaeda modified car alarm r/cfs receiver: this commercial car alarm receiver, recovered in
Afghanistan in 2002, was modified to include an added slide switch, led indicator, and bnc connector
for the antenna. Three multi-pin connectors were replaced with a single connector.
• RF FREQUENCY: 330-340 mhz.
• CONTROL CODE: 12-bit digital.
• OPERATING RANGE: no transmitter was provided. A typical key-fob transmitter, generally provided with
such security systems, would be very short range.
• POWER SOURCE: designed to operate in standard 12-volt automobile electrical system. No power
source was recovered with the receiver.
• SIZE: the case measures 125 mm x 88 mm x 32 mm thick (4.9“x 3.5“ x 1.25“ thick). The circuit board
measures 121 mm x 81 mm (4.8” x 3.20”)
• PC BOARD SUBSTRATE: single clad 1.6 mm (0.063”) thick tan epoxy-fiberglass with green solder masking
and white silkscreen markings.
NOTE: THIS ALARM CAN BE
TRIGGERED BY A VICTIM OPENING
DOOR/TRUNK OR BY REMOTE
CONTROL TRANSMITTER.
CASIO WATCH TIMER TRIGGER
• Al Qaeda Casio watch timer with opto-isolator: recovered since mid-2002 in Afghanistan and Pakistan.
This device uses an opto-isolator to interface with the Casio digital watch alarm and a safe-arm delay
timer. This is a much safer circuit to use than other versions of the Casio watch timer
• TIME DELAY: User Programmable Up To 23 Hours, 59 Minutes in One Minute Increments.
• POWE SOURCE: Two Standard 9-Volt Batteries in Parallel (9 Vdc) With No Isolation.
• WATCH TYPE: Casio F-91w, But Other Digital Alarm Watches Could Be Utilized.
• SIZE: the blue plastic case measures 101 mm x 67 mm x 39 mm (4.0“x 2.6“x 1.5“). The circuit board
measures 52 mm x 26 mm x 1.6 mm thick (2.0“x 1.0“x 0.063“thick).
• CIRCUIT BASE: Type 4060 Oscillator/Divider Ic for The Safe Arm Delay Timer; Type 4n25 Opto- Isolator for
The Watch Interface.
• CIRCUIT BOARD SUBSTRATE: Brown Single-Sided with Silk Screen Legends.
• VARIATIONS: Concealed in Electrical Outlet Boxes with Toggle or Key Switch.

WATCH BREAK WIRE TRIGGER


• AL QAEDA DIGITAL WATCH: THIS DEVICE WAS RECOVERED IN AFGHANISTAN IN 2002. IT WILL TRIGGER
WHEN THE DIGITAL WATCH ALARM FUNCTIONS OR WHEN THE BREAK WIRE IS OPENED.
• TRIGGER: alarm from a digital watch (red leads), or immediately upon opening the break wire (twisted
blue leads).
• CONCEALMENT: circuit is covered w/hot-melt glue.
• SAFE-ARM DELAY: variable, two minutes maximum.
• ANTI-TAMPER FEATURES: the break wire trigger mechanism could be utilized with a lift switch.
• POWER SOURCE: standard 9-volt battery assumed to power the circuit. The watch is powered by its
internal sr-41 silver oxide button cell.
• SIZE: the pc board measures 70 mm x 39 mm (2.8” x 1.5”).
• PC BOARD SUBSTRATE: brown phenolic, 1.5 mm (0.060”) thick, with circuit traces on one side. there are
no markings on the board.
• DIGITAL WATCH: the digital wristwatch provided with the circuit is marked asahi sport alarm chrono,
model number m-686. the watch measures 39 mm x 37 mm x 11 mm thick (1.54” x 1.46” x 0.43” thick).
FIXED TIME DELAY TRIGGER
∙ IRAQI FIXED-DELAY TIMER: AT TIME OF MANUFACTURE, THIS FIXED-DELAY TIMER CAN BE SET FOR DELAYS OF
SEVERAL MINUTES TO SEVERAL HOURS. IT WAS FIRST SEEN IN 1988 AND USED EXTENSIVELY IN THE 1991 GULF
WAR. THE TIMER CIRCUIT HAS BEEN SEEN IN A NUMBER OF DIFFERENT EXTERNAL PACKAGES.
TIME DELAY: minutes to a few days delay possible. generally, in the range of a few hours, fixed at time of
assembly.
POWER SOURCE: generally, 9-volt battery.
SIZE: the circuit board measures 38 mm x 25 mm x 1.3 mm thick (1.5” x 1” x 0.05” thick).
PC BOARD SUBSTRATE: epoxy fiberglass.
CIRCUIT BASE: type 4536 oscillator/ divider ic.
CONCEALMENT: none, plastic box, cylinder.

TRAVEL ALARM CLOCK TRIGGER


∙ IRAQI MODIFIED TRAVEL ALARM CLOCK: THIS MODIFIED ALARM CLOCK WAS OBTAINED IN IRAQ IN 1991. THE
CLOCK USES MECHANICAL CONTACT CLOSURE TO SOUND THE ALARM. THE MODIFICATION IS SIMPLY TO SOLDER
TWO BLACK WIRES ACROSS THOSE CONTACTS AS SHOWN. THIS APPLIES BATTERY POWER TO THE LOAD WHEN THE
CONTACTS CLOSE. THE ALARM ON/OFF MECHANISM WAS IMMOBILIZED IN THE ON POSITION.
DELAY TIME: mechanically set up to 11 hours.
HOST: Casio alarm quartz tq-110 travel clock.
POWER SOURCE: a single aa battery
POWERS the clock and is switched across the load at the alarm set time.
SIZE: the clock measures 60 mm square x 25 mm thick (2.4” square x 1.0” thick).
JEWELRY BOX TIMER TRIGGER
∙IRAQI PROGRAMMABLE TIMER IN JEWELRY BOX: BASED ON A COMMERCIAL Q&Q TIMER AND ASSEMBLED IN A
STANDARD JEWELRY BOX, THIS CIRCUIT CAN PRODUCE A MAXIMUM DELAY OF 99 MINUTES 59 SECONDS. IN THE
COUNT-DOWN MODE, IT WILL ALARM WHEN THE COUNTER REACHES ZERO TRIGGERING THE OUTPLAY REPLAY
TIME DELAY: Preset on Timer To 99 Minutes 59 Seconds In One Second Increments.
CIRCUIT BASE: Q&Q “Timer Count Up/Down” Dt26-501-Gjb Manufactured By Japan Cbm (Citizens Business
Machine) Corporation.
POWER SOURCE: a standard 9-volt battery is mounted in the lid of the box.
SIZE: the black jewelry box measures 78 mm x 78 mm x 39 mm (3.1” x 3.1” x 1.5”).
PC BOARD SUBSTRATE: single-sided brown phenolic circuit board is 1.6-mm (0.063”) thick with white silk screen
markings.
VARIATIONS: the device has been recovered with both red and black safe-arm switches.
CONCEALMENT: the jewelry box serves as a light concealment, but the presence of the safe-arm switch is a
modification.

1-3-5-7 HOUR TIMER TRIGGER


AL QAEDA 1-3-5-7 HOUR TIMER USING PIC MICROPROCESSOR: THIS TIMER, RECOVERED IN AFGHANISTAN IN
EARLY 2004, CAN BE SET TO ONE OF FOUR DIFFERENT DELAYS. CUTTING ONE OF THE FOUR JUMPER WIRES
ON THE END OF THE PACKAGE WILL SET DELAY TIME TO 1, 3, 5, OR 7 HOURS. A CRYSTAL- CONTROLLED PIC
MICROPROCESSOR SETS DELAY TIME. TIMING BEGINS WHEN A BATTERY IS ATTACHED TO CLIP AND THE
DESIRED JUMPER WIRE IS CUT. THIS CAN BE DONE IN EITHER ORDER.
TIME DELAY: 1, 3, 5, OR 7 HOURS, JUMPER SELECTED.
CIRCUIT BASE: PIC16F84A microprocessor.
POWER SOURCE: clip w/standard 9-volt battery.
SIZE: black painted clear plastic box is 74 mm x 56 mm x 30 mm (2.9” x 2.2” x 1.2”). box was made from clear
plastic 2.54 mm (0.10“) thick sheet stock and painted black. board is 56 mm x 40 mm (2.2” x 1.6”).
PC BOARD SUBSTRATE: single-sided brown phenolic circuit board is 1.6-mm (0.063”) thick with white silk screen
markings and green solder- mask on the trace side.
VARIATIONS: board is designed for four separate outputs, one functioning at each of the delay times. circuit
has been modified to combine all four into a single output.
LIGHT/BREAK WIRE TRIGGER
AL QAEDA LIGHT/BREAK WIRE TRIGGER WITH SAFE- ARM DELAY: THESE CIRCUITS WERE RECOVERED IN
AFGHANISTAN IN 2002. AFTER THE SAFE-ARM DELAY, LIGHT WILL TRIGGER THE DEVICE. TWO WIRES FROM
THE DEVICE MUST BE SHORTED TO PREVENT IMMEDIATE DETONATION - OPENING THESE WIRES, EVEN WHILE
DARK, WILL TRIGGER THE DEVICE. THIS SHORT COULD BE A BREAK WIRE OR SWITCH.
TRIGGER: sensitivity to light or break wire.
CONCEALMENT: circuit covered w/hot-melt glue.
SAFE-ARM DELAY: variable, 45 seconds maximum.
SIZE: the pc board measures 56 mm x 24 mm (2.20“ x 0.95“).
ANTI-TAMPER FEATURES: the break wire trigger mechanism could be utilized with a lift switch.
power source: standard 9-volt battery assumed.
PC BOARD SUBSTRATE: phenolic “strip style” experimenter board, 1.6 mm (0.063”) thick. pc board has an array
of holes on 0.1” centers with strips of copper connecting rows of holes.

SHAPE CHARGE TIMER TRIGGER


IRAQI SHAPED CHARGE TIMER: DEVICE WAS RECOVERED IN THE MID-EAST IN 1991. SHAPE OF THE CHARGE
SUGGESTS ITS INTENDED USE ON OIL PIPELINES OF 122-137 CM (48”-54”). THE CHARGE IS TRIGGERED BY A
0-39 DAY TIMER ASSEMBLED IN A SECTION OF PIPE. DESIGN ERRORS PREVENT THE TIMER FROM
FUNCTIONING IN MANY OF ITS DELAY SETTINGS.
SAFE-ARM DELAY: 45 SECONDS.
CONTROL KEY: a magnetic plug must be installed at the end of the timer assembly for power to be applied
and timer to function. removing plug disconnects power from timer and the detonator.
TIME DELAY: program from 1-39 days, in one day increments, before assembly on the charge.
POWER SOURCE: 5.8 VDC FROM TWO LISO2 D CELLS, CONNECTED IN SERIES, AS PART OF THE TIMER ASSEMBLY.
SIZE: timer assembly is 280 mm long x 140 mm
maximum diameter (11” x 5.5” diameter). shape charge is 36 cm (14”) diameter with a capacity of 8
kilograms (18 pounds) of explosive
PUSH BUTTON TRIGGER

MANUAL TRIGGER FOR AN IED; CAN BE FOR A SUICIDE VEST IED OR SUICIDE VEHICLE BORNE IED

SUICIDE SWITCHBOX TRIGGER


IRAQI SUICIDE SWITCH BOX: THE PLASTIC CASE CONTAINS TWO TOGGLE SWITCHES, A PULL PLUG, A 9-VOLT
BATTERY, AND TWO PAIRS OF SCREW OUTPUT TERMINALS FOR DETONATORS. THE OUTPUT TERMINALS
HAVE FULL BATTERY VOLTAGE APPLIED WHEN BOTH SWITCHES ARE IN THE ON (UP) POSITION TO ARM THE
DEVICE AND THE PLUG IS PULLED OUT. A RED LED BETWEEN THE SWITCHES GLOWS WHEN THE OUTPUT IS
ACTIVE.
CONCEALMENT: BATTERY, SWITCHES, OUTPUT TERMINALS, AND PULL PLUG ARE MOUNTED IN A GRAY PLASTIC
BOX.
SAFE ARM DELAY: PLACING BOTH TOGGLE SWITCHES IN THE ON POSITION ARMS THE DEVICE.
POWER SOURCE: 9-VOLT BATTERY.
SIZE: THE CASE MEASURES 70 MM X 55 MM X 30 MM (2.8” X 2.2” X 1.2”).

OTHER EXAMPLES OF TRIGGERS:


• INFRARED (IR) TRIGGER
• RADIATION TRIGGER
• DARKNESS SENSOR TRIGGER
• LOW LEVEL LIGHT TRIGGER

IED IDENTIFICATION

ANTI-PERSONNEL IED
Not all ied attacks target vehicles. These photos were taken from insurgent video in chechnya (video was
dated august 2005). Insurgents attacked a russian foot patrol with an ied.
BOOBY-TRAPPED BUILDING IED
entire building can be booby-trapped with artillery rounds combined to form a massive building ied— can
bring down structure on top of a targeted force

BOOBY-TRAPPED TIRE IED

VICTIM OPERATED (INITIATED) BOOBY TRAP; IED DETONATES AS CAR MOVES; MOST LIKELY IMPROVISED GRENADE
DEVICE OR PLASTIC EXPLOSIVE; NOTICE EXPOSED WIRE.

VICTIM INITIATED BOOBY TRAP. IED DETONATES AS CAR MOVES; IMPROVISED GRENADE DEVICE. NOTICE
EXPOSED WIRE AND GRENADE

SUICIDE VEST IED


STICKS OF C-4/PE-4, WIRES, FIRING DEVICE MAY HAVE BALL BEARINGS OR NAILS FOR MAXIMUM CASUALTIES

SUICIDE EXPLOSIVE BELT


SUICIDE ATTACK THREAT FROM ALL AGES/SEXES; SEE MULTIPLE STICKS OF C-4/PE-4, WIRES, FIRING DEVICE; SOME
MAY HAVE BALL BEARINGS OR NAILS FOR MAXIMUM CASUALTIES

PACKAGE IED
IED HIDDEN IN A PACKAGE; HARD TO SEE OR IDENTIFY

CAMOUFLAGED CONCRETE BLOCK IED (1)


PROJECTILE EMBEDDED IN PLASTER OF PARIS (POP) HOUSING TO SIMULATE CONCRETE COVERED WITH GRASS

MULTIPLE ROCK PILE IEDS


MULTIPLE ‘ROCK’ IEDS WITH COMMAND WIRES BURIED; NOTICE OVERWATCH OR OBSERVATION POST

ROCK PILE IED


105 MM PROJECTILE CONCEALED BY ROCKS ON THE ROAD SIDE

LANDMINE IED
ANTI-TANK LANDMINE WAS ENCASED IN CONCRETE WITH FIRING DEVICE AND WIRE
BURIED IED
ARTILLERY ROUND BURIED NEXT TO ROAD; NOTICE FRESHLY BURIED WIRE LEADING OFF ROAD

DONKEY CART IED


DONKEY CARTS CAN CARRY PROJECTILES, C- 4/PE-4, OR 55 GALLON DRUMS OF FUEL WITH FIRING DEVICE;
CART DRIVER MAY DETONATE AS A SUICIDE BOMBER OR MAY POSITION CART AND WALK AWAY FOR
REMOTE DETONATION

DEAD ANIMAL IED


ANIMAL CARCASSES CAN BE FILLED WITH EXPLOSIVES (ARTILLERY ROUND IN THIS PHOTO) TO TARGET VEHICLES;
LOOK FOR WIRES PROTRUDING; MAY BE A COMMAND WIRE OR ANTENNA FOR A REMOTE DETONATION

You might also like