Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 237

BACK TO THE BASIC

SECURITY CONCEPTS
BY

DIONICIO D MAGNIFICO LPT,


PhD (hc)
PAR, CATS, CLSYB, CSSWB, CSP, CSMS, CST, SPT, CMPP, SRMS, CCSSM,
SO2
PG-Dip AC | PG-Dip TS | Law Enforcement | Paralegal | Crime Analyst | Forensic
PNP SOSIA Accredited Licensed Security Professional
DOLE Occupational
EORA Association ofSafety Health
the Phils. Practioner
Inc(EORAAPI)
SEC REG. NO. CN201114064
TESDA National Competency TVET II – Security Services
Sequence of Presentation
• 1.References
• 2. Course Overview
• 3. Selected Preventive Security Concepts
• 4. Selected Bomb Security Concepts
• 5. Review of the Basic Security Systems
6.Incident Triangle & PNP 3-Tiered Defense System
7. Terrorist Bombers Modus Operandi

References
•1.Risk Analysis & Security Survey-J. Broder, CPP
2. Bombing Prevention Guide-FBI, DHS
3. Bomb Threat Guidance-FBI, DHS
4.International Assn of Bomb Technician &
Investigators(IABTI), 2002 Training Conf Kentucky USA
5. USP Suspicious Mail & Packages, FBI-DHS
6. EORAAPI Copyright Reg. No. 0-2017-00449 July
21,2017-(NLP-IPOPHL)
7. EORAAPI SEC Reg No-201114064
Copyright Infringement

“Not for further distribution or onward


transmission ;presentation; reproduction ; public
display or sale to paying audience except where
explicitly authorized by the author. You can reach
the author @ 0919-450-2415 & E mail:
eorasecreatariat@yahoo.com”
Copyright Reg. No. 0-2017-00449 July 21,2017-(NLP-IPOPHL)
Copyright Registration Number 0-2017-00449 dtd July 21, 2017
SELECTED
PREVENTIVE SECURITY
PRINCIPLES

“THE BEST DEFENSE: Preventive War”


“PREVENTIVE SECURITY IS A LONG AND
TEDIOUS EFFORT, BUT WORTH THE TIME”

-Deven Phillips, CISSP–

“ With many calculations, one can win;


with few one cannot “
- SUN TZU
“The Best Place to think . . . . . . .
NR 1 . THE SECURITY MISSION
THE PRIMARY ROLE OF SECURITY IS TO PREVENT & DETER

“CARDINAL RULE- WHEN SECURITY FAILS, FOR WHATEVER REASON


& A CRIME HAS BEEN COMMITTED ,THE EMPHASIS (&JURISDICTION)
IMMEDIATELY SHIFTS FROM SECURITY
SECURITY
TO LAW ENFORCEMENT”
LAW ENFORCEMENT
(crime prevention) (make arrest)
“IF AN INCIDENT OCCURRED THAT WAS DETECTED BY SECURITY
BEFORE ANY HARM WAS DONE , THERE WAS NO SECURITY
FAILURE”

LAW
SECURITY ENFORCEMENT
(crime prevention) (make arrest)
f£t

>• ★

-* ★
Revised Penal Code of the Philippines

Article 208-”Slight Illegal Detention” (3 days)-


Penalty- 6 yrs (Prision Mayor)
Article 269- “Unlawful Arrest”
Penalty- 6 month (Arresto Mayor)
f£t

>• ★

-* ★
The Primary Role of Security is
to Prevent and Deter.
“THIS IS BASICALLY THE SECURITY
MISSION”
Aggressive Preparedness &
A Capacity Building
Dutch prisons are closing
because the country is so safe

In 2013,
19 prisons in the Netherlands closed
because the country didn't have enough
criminals to fill them
Traditional Definition of
Crime Prevention
Crime prevention is the anticipation,
recognition, and appraisal of a crime
risk and the initiation of some action
to remove or reduce it.

Source: National Crime Prevention Institute, 1972

National Crime Prevention Council 15


Crime Prevention Redefined

Crime prevention is a pattern of attitudes and


behaviors directed at reducing the threat of
crime and enhancing the sense of safety and
security, to positively influence the quality of
life in our society, and to develop
environments where crime cannot flourish.

Source: National Crime Prevention Council, 1990

National Crime Prevention Council 16


Evolution of Crime Prevention

Sir Robert Peel was


considered to be
the father of law
enforcement.

National Crime Prevention Council 17


Sir Robert Peel’s
Nine Principles of Policing
1. The basic mission of the police is to prevent
crime and disorder.
2. The ability of the police to perform their duties is
dependent upon public approval of police
actions.
3. Police must secure the willing cooperation of the
public.
4. The degree of cooperation of the public that can
be secured diminishes proportionally to the
necessity of the use of force.
National Crime Prevention Council 18
Sir Robert Peel’s
Nine Principles of Policing (continued)

5. Police seek and preserve public favor.


6. Police use physical force to the extent
necessary.
7. Police at all times should maintain a
relationship with the public.
8. Police should always direct their actions
strictly toward their functions.
9. The test of police efficiency is the absence
of crime and disorder.

National Crime Prevention Council 19


Crime Prevention is Proactive
Crime prevention is designed to
Examine crime trends
Analyze and work toward positive alternatives
to community and neighborhood conditions
Educate and involve communities in crime
prevention strategies
Create an atmosphere of zero tolerance
toward crime and criminal activity

National Crime Prevention Council 20


Engaging the Power of Prevention:
10 Action Principles

National Crime Prevention Council 21


10 Action Principles of Crime
Prevention
Preventing crime is
1. Everyone’s business
2. More than security
3. A responsibility of all levels and agencies
of government
4. Linked with solving social problems
5. Cost-effective
Source: National Crime Prevention Council

National Crime Prevention Council 22


10 Action Principles of Crime
Prevention (continued)
Preventing crime requires
6. A central role in law enforcement
7. Cooperation and collaboration by all
elements of the community
8. Education
9. Tailoring to local needs and conditions
10. Continual testing and improvement
Source: National Crime Prevention Council

National Crime Prevention Council 23


The Four Ds of Crime Prevention
• Deny—Entry or the opportunity for crime to occur

• Delay—Entry and heighten awareness

• Detect—Unlawful entry via devices

• Deter—Criminals from committing a crime

National Crime Prevention Council 24


KAMBAL TUKO
LAW MAKER, LAW BREAKER
LAW ENFORCERS OR LAW BREAKERS ?
WALANG PLAKA, ONLY IN THE PHILIPPINES
2. CRIMES ARE PREVENTABLE

“THE BEST DEFENSE: Preventive War”


Palace: Duterte’s anti-tambay drive a
crime prevention initiative

Duterte administration’s “anti-tambay” drive is simply a


government initiative to prevent crimes in the country
through increased police visibility
Anti-tambay drive: 488 rounded up in
Quezon City

Duterte administration’s “anti-tambay” drive is simply a


government initiative to prevent crimes in the country
Aug 2, 2018
PNP launches ‘Clean Rider’ stickers
amid rise of bike-riding assailants

Albayalde’s OPLAN CLEAN RIDER “Is simply a


government Crime Prevention initiative to prevent
crimes in the country
Aug 2, 2018
PNP launches ‘Clean Rider’ stickers
amid rise of bike-riding assailants
Mandaluyong & Caloocan Anti-Riding in Tandem
Ordinances
Aug 6, 2018
Duterte: National ID to cut red tape, fight crime
Filipinos to have National ID as
Duterte signs bill into law(Starts 12 Oct 2020)

“Philippine National ID SYSTEM “Is an added


Government Crime Preventive Security Strategy thru an
enhanced National Agency Check (NAC)
Effective Jan 2020
“Philippine National ID SYSTEM “Is an added Government Crime
Preventive Security Strategy thru an enhanced National Agency
Check (NAC)
Effective Jan 2020
“Philippine National ID SYSTEM “Is an added Government Crime
Preventive Security Strategy thru an enhanced National Agency
Check (NAC)
Denmark’s total ban on full-face veil is a
hot-button issue across Europe.
PNP National Crime Prevention
Campaign.
LOCALIZED PEACE TALKS
Anti or Preventive Insurgency Campaign
Group seeks revival of Anti-Subversion Law

December 16, 2020 - 12:00am


MANILA, Philippines — A party-list group supportive of President Duterte
yesterday filed a bill seeking to revive the Anti-Subversion Law that was repealed
28 years ago as well as tag all communists in the country as
criminals.Rep. Ducielle Marie Cardema of the Duterte Youth party-list said she filed
House Bill 8231 or the proposed “Act to Outlaw the Communist Party of the
Philippines, New People’s Army and National Democratic Front (Anti-CPP-NPA-
NDF Act of 2021).”The Anti-Subversion Act of 1957 or Republic Act 1700 was
enacted during the time of former president Carlos Garcia but was repealed in
September 1992 when former president Fidel Ramos, a retired military general
and former defense minister, was in power.
Republic Act 7636 simply meant that subversion – or acts like recruiting individuals
for purposes of undermining an established government – is no longer a crime,
although sedition or inciting people to overthrow government through violent
means remained illegal.“If we want peace in this country, we must destroy the
capability of the CPP-NPA-NDF to wage war in all their fronts against our
government and people,” Cardema said, justifying HB 8231.
The Armed Forces of the Philippines (AFP) on Saturday observed the
commemoration of the liberation of Marawi, and said the crisis serves as a
reminder that the anti-terrorism campaign should also include prevention, and not
just be focused on combat."The Marawi Crisis reminds us that the vigorous
campaign should not be focused only on combatting terrorism but more importantly
in preventing the menace from invading our communities and cities," the AFP said
in a statement.The AFP said it is committed to continuing the fight against
terrorism."The AFP joins the nation and our people in the continuing fight against
terrorism. This is highlighted by the tragic beginning and end of the Siege of Marawi
that we commemorate today," it said.

The military added that its Preventing and Countering Violent Extremism campaign
"looks into sectors vulnerable to radicalism and violent extremism such as
orphanages, schools, and evacuation centers, among others."
Dec 23, 2020
Military sees end of communist rebellion in central, northern
Luzon by 2022

BAGUIO CITY, Philippines — Government security forces foresee the extinction of the
communist insurgency in Northern and Central Luzon towards the end of President
Rodrigo Duterte's term in 2022.

Among the indications cited by the military Northern Luzon Command (Nolcom) is the
surrender of 313 New People's Army rebels in the provinces north of Manila in 2020 alone.

At least 96 assorted firearms have been turned over to government during the series of
mass surrenders this year and "commensurate remunerations depending on the state and
caliber of firearms will be given to the surrenders as part of government grants under the
Enhanced Comprehensive Local Integration Program or E-CLIP prior to the weapons’
demilitarization," Lt. Gen. Arnulfo Marcelo Burgos Jr., Nolcom chief, said.
PREVENTIVE SECURITY SIGNAGE INSIDE POST
Nov 6, 2018
w they walk
August 2, 2018
PNP spox says internal cleansing
‘chilling,’ ‘deadly’ to crooked cops
only

GONE ROGUE Metro top cop, Chief Supt Eleazar confronts the
kidnapping suspects after their arrest. They turned out to be
police officers from Taguig City. PNP Spokesperson Sr. Supt.
Benigno Durana says the internal cleansing in PNP will be
chilling and deadly only to the police scalawags.
Aug 8, 2018
PNP chief: Crime rate down 25%
Nov 6, 2018
Cursing now banned in some public places in
Baguio City (video 3)

Cursing in some public places in Baguio City could now get you
in trouble under an ordinance the city government approved last
week. The ordinance was authored by City Councilor Lilia
Fariñas and bans cursing in schools, computer shops, arcades
and other business establishments patronized by young people.
Nov 8, 2018
Iloilo mall prohibits standing on parking spot
to 'reserve' it

For safety reasons, a mall in Iloilo City has prohibited the


practice of standing on a parking spot in an attempt to "reserve"
it. The mall even put up a signage to inform motorists of the
policy.
Nov 13, 2018
Bicam panel OKs ‘lifetime’ cellphone numbers

Filipinos may sTon be able to keep their mobile numbers even if


they switch networks. The law would help users who would want
to switch to the third telecommunications company. Mislatel
Consortium. “Hindi na nila kailangang magpalit pa ng cellphone
numbers so pwede na nilang dala-dala ang
kanilang numbers. Kung ang third telco ay nagbaba ng presyo,
nagbigay ng mas magandang service, hindi na tayong
mahihirapang lumipat sa kahit anong telco,”
Nov 6, 2018
Chinese ‘gait recognition’ tech IDs people by
how they walk

BEIJING — Chinese authorities have begun deploying a new


surveillance tool: “gait recognition” software that uses people’s
body shapes and how they walk to identify them, even when
their faces are hidden from cameras.
Jan 21, 2019
PNP: Lowered age of liability to deter adults from
using kids in crimes

Lowering the age of criminal liability could discourage adults from exploiting
minors in illegal activities, PNP chief Director General Albayalde said.this
comment hours before the House of Representatives justice panel approved
a bill lowering the age of criminal liability from 15 years old to nine.
“Yes, of course,” Albayalde said in a press conference when asked if the bill
could deter crimes involving minors. He added it could also discourage
parents who use their children in criminal activities.
eras.
March 2019
Motorcycle Crime Prevention Act
March 22, 2019
Madaris Tarbiyyah: Countering extremism in Sarangani

GENSAN -- Efforts to counter violent extremism among Muslims in Sarangani province continue to
gain ground through the provincial government’s innovative Madaris Tarbiyyah program.Asma
Akmad, coordinator of Sarangani’s Commission on Muslim Affairs, said Friday more Moro residents
are now aware of violent extremism and are making efforts to counter the problem in the area.
Akmad said such accomplishment was mainly due to the mainstreaming by the provincial
government in the past three years of the Madaris Tarbiyyah.The program engages Moro residents
by way of education and capacitating them to prevent the entry of violent extremism into their
communities. “We have been dealing with it even before extremism became a major issue in
2017,” she said, referring to the five-month siege by members of the Islamic State-inspired Maute
group in Marawi City. She said Sarangani initiated dialogues and awareness campaigns focusing
on countering violent extremism after the Davao City bombing in 2016.
March 22, 2019
Republic Act 10168, known as the Terrorism Financing
Prevention and Suppression Act of 2012

Republic Act 10168, known as the Terrorism Financing Prevention and Suppression Act
of 2012, states that those who directly or indirectly, willfully and without lawful excuse,
possesses, provides, collects or uses property or funds or makes available property,
funds or financial service or other related services, by any means, with the unlawful and
willful intention that they should be used or with the knowledge that they are to be used,
in full or in part: (a) to carry out or facilitate the commission of any terrorist act; (b) by a
terrorist organization, association or group; or (c) by an individual terrorist, shall be guilty
of the crime of financing of terrorism” will be penalized.Those found guilty would suffer
the penalty of reclusion temporal in its maximum period to reclusion perpetua and a fine
of not less than P500,000 but not more than P1 million. —
March 24, 2019
Unity ride held vs new motorcycle law
RA 11235 Crime Prevention Act

MANILA, Philippines — At least 10,000 motorcycle riders joined a so-called


unity ride yesterday along EDSA in protest against the new motorcycle law.
They rode to White Plains Avenue at the corner of EDSA to demonstrate their
protest against Republic Act 11235 or the Motorcycle Crime Prevention Law
that mandates double plates for two-wheeled vehicles . George Royeca,
Angkas head said,they are not against the law per se, they are not in favor of
the provision that requires large metal license plates for motorcycle, as this will
endanger the lives of motorists, commuters and pedestrians
March 24, 2019
Lalaking nambastos ng babae inaresto dahils sa
paglabag sa “Anti-catcalling Ordinance”
March 24, 2019
Caloocan City, may ordinansa na nagbabawal na
magsuot ng maiigsing shorts sa pampublikong lugar
a”

Ngayong Ngayong painit na nang painit ang panahon, hindi maiiwasan na


may mga kalalakihin na maghuhubad na lang sa labas ng bahay, habang
magso-short naman nang maigsi ang mga babae para mapreskuhan. Pero
mayroon palang ordinansa ang Caloocan City laban dito.
Sa ulat ng GMA News TV "State of the Nation with Jessica Soho" nitong Lunes,
sinabing nakasaad na bawal ang walang damit pang-itaas at ang pagsusuot ng
maiigsing shorts sa publiko sa ilalim ng City Ordinance 0439
March 27, 2019
Summer reminder: No shirtless, short shorts in
Caloocan

MANILA, Philippines — As the summer heat rises, people tend to wear less. Some
women prefer to wear shorts while men would wear undershirts or just go shirtless.
But in Caloocan City, an ordinance released in 2017 prescribes a dress code for its
residents.The City Ordinance no.0439 prohibits women from wearing short shorts and
men from wearing an undershirt or going topless in public.Several residents like Leticia
Yzon is in favor of the ordinance. She said revealing clothes are not a good look.
“Gandang-ganda sila sa sarili nila pero hindi nila napupuna pangit tignan. Kung
masusunod iyong ayos na pananamit, mas maganda. Iyong lumabas na halos lahat ng
kaluluwa, napakapangit tignan, (They think it looks pretty but it isn’t. It is better to have a
dress code. Revealing clothes do not look good)” she said.
COFEE BREAK
“PREVENTIVE SECURITY IS A LONG AND
TEDIOUS EFFORT, BUT WORTH THE TIME”

-Deven Phillips, CISSP–

“ With many calculations, one can win;


with few one cannot “
- SUN TZU
PERSONNEL SECURITY
“IN GOD WE TRUST, EVERYONE ELSE WE
MONITOR” “
--- Anonymous FBI Inspector

“TRUST BUT VERIFY”


- J. English
21 May 2016
Five (5) - Dead at CloseUp Forever Summer” concert –
Mall of Asia open parking grounds

Some partygoers managed to sneak pills into the venue by


hiding them “inside bras.”
April 7, 2018
2 in 2016 CloseUp concert drug deaths get life term

The five suspects accused of selling illegal drugs during the


CloseUp Forever Summer concert where five persons died
due to drug overdose were arrested following a buy bust
operation in Parañaque City .
Feb 19, 2019
Duterte approves lifetime cellphone number law

MANILA, Philippines — President Rodrigo Duterte has signed a law allowing


mobile phone users to keep their numbers even when they switch networks.

Republic Act 11202 or the "Mobile Number Portability Act" requires mobile
service providers to provide nationwide mobile number portability to
subscribers .
Section 3(a) of RA 11202 noted that the basic premise of the law is to "promote
consumer welfare as it fosters the freedom to choose and to respond to quality,
pride and other relevant considerations without the consumers having to
change their mobile numbers whenever they change mobile service providers
or subscription plans.Mobile number portability (MNP) is also seen to
encourage mobile service providers to compete with each other to provide
subscribers with the best that they can offer.
NR 3 –

“ STICK TO THE BASICS”


“When all else fails, go back to the basics”
- Vince Lombardi


NR 4 –
“ SECURITY IS MORE AN ART THAN A
SCIENCE”

“There is no single formula or application that will


cover the security needs of all organizations for all
situations”.

“Few formulas will cover all organizations,


situations and needs ”
NR 5 –

“ NETWORKING WORKS”

“Networking are essential to success in dealing with


criminals & terrorists”
NR 6-
“ AS THREATS EVOLVE , SO DO WE”

“Security Professionals must always be on a learning


curve.

“ NEW SITUATIONS will constantly arise to challenge our


professional skills.”

NR 7-
Continuous Improvement
is the engine of growth of
Security Management
MONKEY BUSINESS CONFERENCE
RELUCTANT AUDIENCE
OBSERVERS
UZI ZERO
KOALA SLEEPING 18 HOURS A DAY
CICADAS
“ Tarsier-Gising na Tulog 24/7”
“MEETINGS & CONFERENCES TODAY”
“MEETINGS & CONFERENCES TODAY”
“HELP IN DISGUISE”
’TODAY’S SITUATION”
“PEOPLE NOWADAYS”
“TRUE LOVE LASTS ”
“PEOPLE NOWADAYS”
“KIDS NOWADAYS”
Video 2-zombie
walking
“WORK TODAY”
We must be a
“learning organization”
NR 8 -
“ NOTHING OR NO ONE CAN
EVER BE MADE 100% SECURE”

“There is no Absolute Security”


“There is No Impenetrable Barrier”
NR 9-
ALL EMPLOYEES ARE SUBJECT TO CHECKS,
SEARCH & BACKGROUND INVESTIGATIONS

“MANAGEMENT MUST STRIKE A BALANCE


BETWEEN SECURITY & FREEDOM”
NR 10-
“NO SECURITY PLAN CAN BE EFFECTIVE
UNLESS IT IS BASED UPON A CLEAR
UNDERSTANDING OF THE ACTUAL RISKS IT
IS DESIGNED TO CONTROL .”

“RISK ANALYSIS-
Identify first those harmful events which may befall
any given enterprise”
NR 11-
“Human errors create security
holes.”
“ People make mistakes.

“Complacency is a serious & dangerous


human weakness”
“PEOPLE MAKE MISTAKES
NR 12-
“Preventive Security has Human and
Technological aspects”

“ Humans & computers are good at different


things.

The final human component is the routine


management of the technological components.
NR 13 -
MEASURE OF EFFECTIVENESS OF
SECURITY
“THE VALUE OF SECURITY IS BETTER
MEASURED BY WHAT DOES NOT HAPPEN
THAN BY WHAT DOES.”

- SENNEWALD

(Absence of a major attack does not


automatically mean that security is effective,
but it can tempt us into dangerous
complacency).
“The biggest obstacles are from within”
“The biggest obstacles are
NR 1 4 -
from within”

NR 15 -

Security measures are of little use if they


are not enforced.
A security audit will show where gaps
and vulnerabilities exist in the current
systems and procedures
SECURITY AUDITS CAN HELP MITIGATE RISK, MEET
COMPLIANCE, AND SAVE MONEY.
NR 16 -

“We cannot secure … if we


cannot buy “.
COFEE BREAK
THREE (3 )BASIC
INTELLIGENCE CONCEPTS
INTELLIGENCE CONCEPT NUMBER ONE (1) :

1. THERE EXISTS ESSENTIAL UNITY BETWEEN


KNOWLEDGE & ACTION, IN THAT, KNOWLEDGE ENHANCES
THE EFFECTIVITY OF ACTION & MINIMIZES THE CHANCES
OF ERROR.
INTELLIGENCE CONCEPT NUMBER TWO (2) :

2. COMING EVENTS CAST THEIR SHADOWS BEFORE THEY


OCCUR .THAT THROUGH A SYSTEMATIC SEARCH AND BY
THE ASSEMBLY OF BITS AND PIECES OF EVIDENCES,
EACH OF WHICH MAYBE INSIGNIFICANT BY THEMSELVES
IS POSSIBLE TO FORM MEANINGFUL PATTERNS.
INTELLIGENCE CONCEPT NUMBER THREE (3) :

3. INTELLIGENCE REQUIREMENTS IN DECISION MAKING


ARE COMPLEX AND BEYOND THE CAPACITY OF ONE MAN
TO FULFILL , THAT A THOROUGH AND SYSTEMATIC
SEARCH IS NECESSARY TO FULFILL THESE
REQUIREMENTS.
COUNTERINTELLIGENCE
CONCEPTS
“If you know the Enemy and you know
Yourself, You need not fear the result of a
Hundred battles “
“ If you know Yourself but not the Enemy,
for every Victory you will suffer a defeat”

“ If you neither know Yourself nor the Enemy ,


you are a fool who will lose in every battle”
-Sun Tzu–
““ An Army without Secret Agents is exactly like a
man without Eyes or Ears “

“ Secret Agents receive their instructions within the


tent of the general, and are intimate and close to him.
These are “ mouth to ear “ matters”

-Sun Tzu–
“There will always be espionage and there will always
be counter- espionage. Though conditions may alter,
though difficulties may be greater, when war is raging,
there will always be SECRETS which one side jealously
guards and which the other side will use every means to
discover.

There will always be men who, from malice or for


money, will betray their kith and kin. And there will
always be men who for love of adventure or sense of duty
, will risk a shameful death to secure information valuable
to their country”
- SOMERSET MAUGHAM
SELECTED BOMB SECURITY
MANAGEMENT CONCEPTS
INFORMATION + EVALUATION

= INTELLIGENCE

= INTELLIGENCE : KNOWLEDGE
(PROCESSED INFORMATION) DESIGNED
FOR ACTION

“ACTIONABLE INTELLIGENCE”
INTELLIGENCE & COUNTERINTELLIGENCE
DEFINED :

Intelligence- – end product resulting from the


collection, evaluation, analysis, integration and
interpretation of all available information.

Counterintelligence-prevention, detection,
neutralization, and destruction of the intelligence
efforts of an enemy to protect friendly forces
INTELLIGENCE & COUNTERINTELLIGENCE
DEFINED :

Intelligence- –ability to comprehend.


- Information Acquisition

Counterintelligence- ability to deny information,


intrusion, subversion, espionage & sabotage by
Enemy Forces through suitable
countermeasures.
- Information Protection
STRATEGIC CONTROLS
(Sun Tzu)

Principle of Intelligence Principle of Counter Intelligence


(Information Acquisition) ( Information Protection)

ESPIONAGE SECRECY DISCIPLINE


-Local Agents -Witholding Strategic Plans
-Inside Agents -Tight Security Measures
-Double Agents -Punitive Deterrents
-Doomed Agents -Creation of Unpredictability
-Living Agents -Use of Deception
TWO(2) RULE OF THUMB IN
COUNTERINTELLIGENCE

1.“ NOBODY IS TO BE TRUSTED “


2.”STABILITY UNDER PRESSURE”
.“ NOBODY IS TO BE TRUSTED”
HALLMARK OF AN EFFECTIVE
COUNTERINTELLIGENCE OPERATIVE -

“ PARANOIA”
“ STABILITY UNDER PRESSURE
SELECTED BOMB SECURITY
MANAGEMENT CONCEPTS
Bomb Security Management Concepts
1.Bomb Security Management is Corporate or Unit
Responsibility.
2.Terrorist can ATTACK ANYTHING ANYWHERE
ANYTIME .
3. Bomb Security Management is a dynamic
operation
4. Business Cost.”We can’t secure, if we can’t buy”

5. Many Risks associated with Bomb Threat & other


crisis can be reduced

6. There must be a continuous risk evaluation.


BSM Concepts (cont’d)
7. Effective Security require the cooperation of all
employees.

8. Visible Support & Commitment from the


Management is the Most Critical Success Factor

9.The value of security is better measured by what


does not happen than what does.
“A REVIEW ON THE BASIC
SECURITY SYSTEM”
TWO(2) REQUIREMENTS FOR ACCESS TO
INFORMATION/ AREA

1.“ MUST HAVE THE REQUIRED


SECURITY CLEARANCE
2. “MUST HAVE THE NEED TO
KNOW “
PHYSICAL SECURITY
(PHYSEC)
Video 3 -PHYSEC
AI technology important in the security industry
The three main elements of security systems are:

1.) Detection-
It should be capable of detecting unauthorized access as early as possible, and AI technology ca
improve the accuracy and speed of detection

2) Delay-
Unauthorized attempts to access the system should be warded off or delayed as much as possibl
empower effective security responses. Sound and light alarm warnings can further help prevent
occurrence of adverse events

3) Response-
Can assess potential risks in advance will allow timely response. Improvements in detection
accuracy based on AI technology can reduce the impact of high-risk events or prevent them from
happening entirely.
DEFINITION OF TERMS
“Security”
• Defense against crime
• of vandalism, theft,
• and attacks by individuals.
• “Safety:”
• protection of life
• and assets against fire,
• devastating accidents
• and natural disasters.
• (The key distinction between security and safety events is
their cause—accidental, unintentional, or natural disaster
(abnormal event) versus malevolent, intentional human
caused event)
“Physical Security -

-means the physical measures designed


to safeguard personnel,
property, and information

-A system of barriers placed between the


adversary and the subject of protection.
21 May 2016
Five (5) - Dead at CloseUp Forever Summer” concert –
Mall of Asia open parking grounds

Some partygoers managed to sneak pills into the venue by


hiding them “inside bras.”
STANDARDS
(Physical Security)

1. PHYSICAL SECURITY

-Closing the windows of access


points.
STANDARDS
(Physical Security)

2.THERE IS NO IMPENETRABLE BARRIER


FOR A DETERMINED THEFT/ INTRUDER,
BOMBER OR SABOTEUR.

3. THERE IS NO ABSOLUTE SECURITY


(WALLS & LOCKS PROVIDES RELATIVE
( TEMPORARY ) SECURITY ONLY)
STANDARDS
(Physical Security)

4. PERIMETER WALL HEIGHT: 8 FT (INCLUDES


1 FOOT TOP GUARD)

5. PUBLIC ROAD & PARKING AREA MUST BE


50 -100 METERS (162 ft – 323 ft) AWAY FROM
AN INHABITED BUILDING (IBD).
STANDARDS
(Physical Security)

6. Nothing should impede “life


safety goals.”
Ex.: Don’t lock the only fire
exit door from the outside.

7.Most organizations will


ignore or seriously
underestimate the threat from
insiders.
STANDARDS
(Physical Security)

8. The insider threat from careless


or complacent employees &
Contractors
exceeds the threat from malicious
insiders

9 No security device, system, or


program will ever be used properly
(the way it was designed) all the
time
Highlights of access control

Consolidated IP Networking
,biometrics and identity management,
Highlights of access control

Biometrics and identity management,


Highlights of access control

Biometrics and identity management,


PERSONNEL
SECURITY(PERSEC)
“IN GOD WE TRUST, EVERYONE ELSE WE
MONITOR” “
--- Anonymous FBI Inspector

“Trust but Verify”


PERSONNEL SECURITY CONCEPT

PERSONNEL IS THE WEAKEST LINK IN THE


SECURITY CHAIN”
“IN GOD WE TRUST “

“EVERYONE ELSE WE MONITOR”

“TRUST BUT VERIFY “ FBI


“RED FLAG IS UP”
PERSONNEL SECURITY CONCEPT

1. PERSONNEL IS THE WEAKEST LINK IN


THE SECURITY CHAIN”
57
APR 2018 | SECURITY MANAGEMENT
72
RISK MANAGEMENT | BY LILLY CHAPA

TAKENO
CHANCES BADTHINGSDON’TJUST
HAPPENTOGOOD
ORGANIZATIONS—BAD
THINGSHAPPENTO
ORGANIZATIONSTHAT
DON’TUNDERSTAND
THEIRRISKSOR
IMPLEMENTPROPER
MITIGATIONSTRATEGIES.
“Walls have ears “

“LOOSE LIPS SINKS


SHIPS”
“Walls have ears “

“LOOSE LIPS SINKS SHIPS”= LTSR


“LOOSE LIPS SINKS SHIPS”= LTSR
“NO TALK, NO MISTAKE
LESS TALK, LESS MISTAKE
MORE TALK, MORE MISTAKES
CONCEPTS
(Personnel Security)

2. PERSONNEL ACCESS IS BASED ON THE REQUIRED:

(“Identify-Authenticate-Authorize-Security- Sequence“)
(IAA) -Security Control Protection Sequence
Process)

A.) IDENTIFICATION- ID CARDS/ BADGES


WITH PHOTO

B) AUTHENTICATION-
C.) AUTHORIZATION-

“Need to Know- basis”, Security Clearance,


Password, PIN, Biometrics

“ Strong Authentication* – is the use of


two (2) or more different authentication
methods.”
Why the need to go beyond traditional authentication?
CONCEPTS
(Personnel Security)

3. PEOPLE MAKE MISTAKES -

“As long as people live, they will continue to


make mistakes “.

“Human Errors Create Security Holes”


CONCEPTS
(Personnel Security)

3. PEOPLE MAKE MISTAKES -


STANDARDS
(Personnel Security)

4. ALL EMPLOYEES ARE SUBJECT TO


BACKGROUND INV)

5. ACTIVE /RENEWAL OF LOCAL AGENCY


CHECK (LAC ) ;NATIONAL AGENCY CHECK
( NAC)

6. PERSONAL ACCES MUST HAVE THE


REQUIRED AUTHORIZATION.
STANDARDS
(Personnel Security)

4. ALL EMPLOYEES ARE SUBJECT TO


BACKGROUND INVESTIGATION-
DOCUMENT or
INFORMATION
SECURITY(INFOSEC)
DOCUMENT SECURITY-

( CLOSING THE WINDOW OF EXPOSURE)

REFERENCE :

a. AFPR-G-200-013
b. FC 2-005 COUNTERINTELLIGENCE dated Dec 2005
DEFINITION

Document. Any recorded information,


regardless of its physical form or
characteristics.
CONCEPTS
(Document Security)

1. DOCUMENT SECURITY IS BOTH AN INDIVIDUAL


AND ORGNL RESPONSIBILITY.

2. DOCUMENT ACCOUNTABILITY & CONTROL OF


CLASSIFIED DOCUMENTS MUST BE MAINTAINED.

3. STANDARDS SHOULD BE ESTABLISHED FOR THE


MARKING OF ALL TYPES OF DOCUMENTS.

4. TRANSMISSION IS THE WEAKEST LINK IN THE


CONTROL OF CLASSIFIED INFORMATION
CONCEPTS
(Document Security)

4.THERE IS NO IMPENETRABLE BARRIER FOR A


DETERMINED SPY, THIEF/ INTRUDER, BOMBER OR
SABOTEUR.

5.THERE IS NO ABSOLUTE SECURITY

6. PERSONNEL ACCESS TO INFORMATION OR AREA


IS ONLY GIVEN TO PERSONS WHO HAVE:

a. THE NEED TO KNOW


b. THE REQUIRED SECURITY CLEARANCE
CONCEPTS
(Document Security)

7. PROPER STORAGE,REPRODUCTION,
RECLASSIFICATION AND DESTRUCTION OF
DOCUMENTS MUST BE PROPERLY MAINTAINED.

8. CONTINGENCY PLAN FOR DOCUMENT


EVACUATION MUST BE ESTABLISHED IN
ANTICIPATION OF NATURAL DISASTER OR ENEMY
HOSTILE ACTION

9. DOCUMENT SECURITY AUDIT & INSPECTION


MUST BE CONDUCTED ON A REGULAR BASIS TO
DETERMINE IF A COMPROMISE HAS OR HAS NOT
OCCURRED .
CONCEPTS
(Document Security)

10. NO PERSON IS ENTITLED SOLELY BY


VIRTUE OF HIS GRADE, RANK OR POSITION
TO KNOWLEDGE OR POSSESSION NOR
ACCESS TO CLASSIFIED MATTERS.
10. NO PERSON IS ENTITLED SOLELY BY VIRTUE OF HIS
GRADE, RANK OR POSITION TO KNOWLEDGE OR POSSESSION
NOR ACCESS TO CLASSIFIED MATTERS.
Video 4 & 4a- Airport Screening

10. NO PERSON IS ENTITLED SOLELY BY VIRTUE OF HIS


GRADE, RANK OR POSITION TO KNOWLEDGE OR POSSESSION
NOR ACCESS TO CLASSIFIED MATTERS.
CONCEPTS
(Document Security)

11. ACCESS TO INFORMATION SHALL BE


GIVEN TO THOSE :

A.) WHO HAVE THE NEED TO KNOW


B) WHO HAVE THE REQUIRED SECURITY
CLEARANCE.
SECURITY CLASIFICATION OF DOCUMENTS
(AFPRG-200-013-Doc Security)

TOP SECRET- UNAUTHORIZED DISCLOSURE OF WHICH WOULD CAUSE


EXCEPTIONALLY GRAVE DAMAGE OR DANGER TO THE
NATION.

SECRET - UNAUTHORIZED DISCLOSURE OF WHICH WOULD RESULT


IN SERIOUS DAMAGE TO THE NATION

CONFIDENTIAL- UNAUTHORIZED DISCLOSURE OF WHICH WOULD BE


PREJUDICIAL TO THE DEFENSE INTEREST OF THE
NATION OR WOULD CAUSE ADMINISTRATIVE
EMBARASSMENT TO AN INDIVIDUAL

RESTRICTED- APPLIES TO INFORMATION OR MATERIAL WHICH IS


PUBLISHED OR COMMUNICATED TO ANYONE FOR
OFFICIAL PURPOSES ONLY.
INFORMATION SECURITY

“There is no way of estimating how


many battles have been lost, how many
ships have been sunk, or how many lives
have been sacrificed because someone
intentionally or unintentionally
betrayed a military secret.”

— Author unknown
“INFORMATION IS A
COMMERCIAL
COMMODITY “
1. INFORMATION (IT) SECURITY-

( CLOSING THE WINDOW OF EXPOSURE)


CONCEPTS
(Information Security)

INFORMATION (IT) SECURITY

A. ACCESS TO INFORMATION IS
BASED ON THE REQUIRED:
Broad Principles: (C-1-A TRIAD)

1. Confidentiality - the assurance that


information is accessible only to those
authorized to have access;
2. Integrity — the assurance that
information and processing methods
are accurate and complete

3. Availability — the assurance that


authorized users have access to
information and associated assets
when needed
Jan 12, 2019
DFA passport maker runs off with all data,passport renewal
affected

The Department of Foreign Affairs (DFA) is requiring some of those renewing their
passports to bring their birth certificates as its previous outsourced passport maker
“took away” all its applicants’ data, Foreign Affairs Secretary Teodoro Locsin Jr. said.
“We are rebuilding our files from scratch because previous outsourced passport maker
took all the data when contract (was) terminated,”

“Because previous contractor got pissed when terminated it made off with data. We did
nothing about it or couldn’t because we were in the wrong. It won’t happen again.
Passports pose national security issues and cannot be kept back by private entities. Data
belongs to the state,”
SECURITY

“There is no way of estimating how


many battles have been lost, how many
ships have been sunk, or how many lives
have been sacrificed because someone
intentionally or unintentionally
betrayed a military secret.”

— Author unknown
OPERATIONAL
SECURITY(OPSEC)
SELECTED OPSEC TOOLS :

1. CODES & CIPHERS(CODE


NAMES & NUMBERS; PW)
2. CUT-OUTS (SAFEHOUSE)
3. LIVE DROP
4. DEAD DROP
5. CYBERSECURITY DEFENSE
CODES AND CIPHERS
(CRYPTOGRAPHY)
THE PRIVACY PROBLEM

How safe is your company's network?


Security breaches are a growing concern for companies around
the world. It seems that every few weeks, there's a report of yet
another major cyberattack in the media. Each day, we continue to
see increasing cases of insurgents attempting to cyberattack our
every day lives
Jan 12, 2019
DFA passport maker runs off with all data

Passport renewal affected


MANILA, Philippines — The Department of Foreign Affairs (DFA) is requiring
some of those renewing their passports to bring their birth certificates as its
previous outsourced passport maker “took away” all its applicants’ data,
Foreign Affairs Secretary Teodoro Locsin Jr. said. “We are rebuilding our files
from scratch because previous outsourced passport maker took all the data
when contract (was) terminated,” Locsin said
Jan 19, 2019
Data breach hits Cebuana Lhuillier, around 900k
clients affected

MANILA, Philippines — Data of some 900,000 Cebuana Lhuillier clients


was compromised after the company admitted on Saturday that one of its
email servers was affected by a data breach.According to the company,
the data breach happened in one of the email servers it uses for
marketing purposes.
PURE CYBERSECURITY

As the world becomes dependent on the Internet of Everything,.


“NEW THREAT ON CYBER SECURITY
BREACH”Sep 22, 2016

Yahoo says 500 million accounts stolen

Yahoo confirmed data "associated with at least 500


million user accounts" have been stolen in what may
be one of the largest cyber security breaches ever.
Sept 30, 2018
Facebook breach hits 50million users

MANILA, Philippines — Some 50 million users of social media network


Facebook have been affected by a security breach involving a
vulnerability in one of the features of its mobile application.
Facebook founder and chief executive officer Mark Zuckerberg said they
are currently investigating the incident involving the theft of access
tokens or digital keys that allow attackers to take over or access
accounts.
Cybersafety
• Be cautious before giving out your
name and personal information to
others online.
• Be careful about sending personal
information over the Internet, by email,
or over cellular phones.
• Don’t use passwords that are obvious.
• Avoid break-ins by changing your
password regularly and memorizing it.
• Shop online with companies that you
know.
• Look for the “lock” icon on the
webpage.
National Crime Prevention Council 224
Cybersafety (continued)
• Use a secure browser that will encrypt or
scramble purchase information.
• Be cautious before agreeing to meet face-to-
face with someone you’ve met online.
• Be careful before responding to messages
from unfamiliar persons.
• Look for webpages that have a proper title,
additional resources, or a person that you are
able to contact.

National Crime Prevention Council 225


March 1, 2019
Pompeo: World should be aware of ‘risks’ of Huawei
technology

MANILA, Philippines — The world must have its “eyes wide open” to the alleged risks of adopting
Huawei’s technology into their telecommunication infrastructure, United States (US) Secretary of
State Mike Pompeo said competition in 5G and other technologies “should be open, free and


transparent.” However, Huawei “is not that,” So our task has been to share with the world the risks
associated with the technology, the risks to the Filipino people, the risk that America may not
be able to operate certain environments if there’s Huawei technology adjacent to that,” t:
“Every nation should have to make their own sovereign decision on how to proceed.”
“We want to make sure that the world has their eyes wide open as to the risks of having
that technology as part of infrastructure or backbone of networks that are transiting
communication inside of the country and back here around the world, transiting that
information internationally as well,” Pompeo also said.
INCIDENT TRIANGLE
Incident Triangle Model
OPPORTUNITY

TARGET ATTACKER
Remove one element to
eliminate the threat
CAPACITY BUILDING
PNP THREE-TIERED DEFENSE
SYSTEM (TTDS)

The TTDS rests on a


NG

IN
foundation of
I
EN

CI
community partnership
DE
RD

with the involvement


NT
HA

of the entire society.


MN
ET

Partnership amongst
RG

GT
LGA’s / LGU’s & the
TA

private sector, as well


as the community.
INTELLIGENCE
PNP THREE-TIERED DEFENSE
SYSTEM (TTDS)
NG
Intelligence

IN
I

- Prediction
EN

CI
DE
RD

Target Hardening
NT
HA

- Denial
MN
ET
RG

Incident Management
GT
TA

- Response to a
critical incident
INTELLIGENCE
Financer
Supplier
Transporter
Exploiter
Builder Boom
Planner
Emplacer Event Management
Protect
Trigerman
Detect
Predict & Prevent
Neutralize
Exploit

1y 1mth 1wk 1d 1hr 1min 1s 1min 1hr 1day


LESSONS LEARNT
PAST BOMBING INCIDENTS

"That men do not learn very much from


the lessons of history is the most
important of all the lessons of history."
Aldous Huxley
CONCLUSION
“No matter what technological
advances on security personnel,
products, services and best practices
that may evolve in the future, we can still
go back & rely to the herein basic
security management paradigms,
concepts & principles as our ultimate
reckoning in Bomb Security Guide”
-Sphinx Jones
End of Presentation
Any Question?

You might also like