You are on page 1of 62

CRISIS MANAGEMENT 2014

CRISIS MANAGEMENT

CONCEPTS OF CRISIS AND EMERGENCY


CRISIS is a period of disorganization, period of upset during which
people attempts at arriving at solution of problems. It is a crucial or decisive
point or situation; a turning point; an unstable condition, as in political, social, or
economic. It is a state provokes when a person faces obstacles or hazards to
an important life goal. The term Crisis is derived from the Greek word “krisis”
which means to separate; a turning point decision in a process of an affair or a
series of events.
EMERGENCY – is derived from the Latin word “emergencia”
which means dipping/plugging. A sudden condition or a state of affairs calling
for an immediate action.

TYPES OF CRISIS
MAN-MADE CRISIS - civil disturbances - strike, riot,
demonstration - revolt such as mutiny and insurrection - revolution, border
incident - war: conventional or nuclear – crimes: kidnapping, hijacking,
hostage-taking, etc
NATURAL CRISIS - fire, floods, earthquake, tidal waves -
marine/air disaster, hazardous spills, power failure, nuclear accidents -
water/food shortage/scarcity, drought - volcanic eruption, epidemic, etc.
INDIVIDUAL CRISIS – It refers to the feeling that arises when a
person faces unpleasant situation such as frustrations and conflicts. This
includes:
1. Physical Crisis – those that are related to health problems or
bodily sickness/sufferings.
2. Economics Crisis – the deprivation of the basic necessities of life
like food and material things.
3. Emotional Crisis – when an individual is affected by negative
feelings like emotional disturbances, fear, etc.
4. Social Crisis – the experiencing lack of interest, confidence and
social skills to relate meaningful, harmonious relationship with
others.
5. Moral Crisis – the person has an irrational or distorted concepts of
what is right or wrong, lack of moral values and integrity of the
person.
6. Psychosexual Crisis – failure of the person to assume ones sex
role and identity as a man or woman. The person has an
inappropriate sex objective, inadequate and distorted expression
of affection.
CRIMINAL SOCIOLOGY 53
2014 CRISIS MANAGEMENT

CRISIS MANAGEMENT defined


Crisis management is the proper utilization of all available
resources and the formulation of policies and procedures to effectively deal
with progressive sequence of events (crisis) and sudden or unforeseen state
(emergency).

PURPOSES OF CRISIS MANAGEMENT


1. It sets concepts, policies and general procedures of handling crisis
situation.
2. It guides and assists law enforcers in the formulation of crisis
management contingency plans and SOP’s to address crisis
situations.

THE CRISIS MANAGEMENT DOCTRINE


This doctrine specifically addresses crisis situations arising out of the
action of mentally deranged individuals, criminals or terrorist elements that use
violence or threat to pursue their needs. Crisis envisioned to be covered under
this doctrine include among others, hostage taking, sea jacking, hijacking,
occupation of vital installation, ambush and arson, with the use of violence or
threat followed by blackmail, demands for ransom, safe-control, publicity and
the like.
The crisis may start as basically police or special unit matter, but could
develop in proportion and dimension requiring further military operations. This
doctrine also will not address crisis when the purview and jurisdiction of the
National Disaster Coordinating Council (NDCC), Peace and order council, the
Cabinet Crisis Committee or the National Security Council (NSC) and other
national committee which could be military, economic, political, social or
combination thereof, in nature. The general idea is to prevent the occurrence of
a crisis, ensure a probability of success in minimizing or neutralizing the
perpetrator or to return the situation into normalcy.

NATIONAL POLICY
The Philippines subscribed to all international conventions and
initiatives against terrorism and will participate in all endeavors designed to
strengthen international cooperation in order to prevent and neutralize terrorist
acts.

PNP/AFP POLICY
The PNP/AFP shall be guided by the national policy on terrorism and
will strictly implement it. The use of peaceful means shall always be employed.
54 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
The AFP will not compromise nor make concessions to terrorist even if
involves the personnel or property. The AFP will act promptly, decisively and
effectively, choosing from the whole range of military actions appropriate to the
circumstances.

PHASES OF CRISIS MANAGEMENT


PRO-ACTIVE PHASES – is the stage of advance planning,
organization and coordination and control in response to an anticipated future
crisis occurrence. This phase is designed to predict or prevent probability or
occurrence of the crisis while at the same time prepares to handle them
when they occur.
1. PREDICTION - The first stage of anticipating future crisis
occurrences through the following;
 Update- Intelligence – involves the collection of
information from variety of sources as basis of
actions and plan; those that are related to crisis
management contingency planning.
 Events – are those incidents that are already
passed which can facilitate analysis necessary
for identification of probable threat groups,
targets and necessary for advance planning.
Threat Analysis of Threat Groups
a. Political Terrorist – ideologically inspire individuals
who grouped together for a common purpose usually
for change of government or political power. Ex.
CPP/NPA, SPT’s, etc.
b. Criminals – these are people who commit terrorist
acts for personal rather than ideological gains. Some
of the terrorist acts such as kidnapping are well
planned, other are not planned, but happens as a
result of the fast response time by LEAs to an ongoing
crime. For instance, a number of bank robberies have
evolved into unplanned hostage situation when
policemen arrive in response to an alarm robbery is in
progress.
c. Mentally Deranged Individuals – people commit
terroristic acts during a period of psychiatric
disturbance. This type is the most difficult terrorist to
deal with. Many of them are impulsive and
unpredictable.

CRIMINAL SOCIOLOGY 55
2014 CRISIS MANAGEMENT
2. PREVENTION - This pro-active phase considers
counter measures as part of the total system of
operation. Such counter measures involves the
following;
 Operation Security – a counter intelligence
measure where all aspect of awareness and
training must be considered to prevent threat
groups from learning the units plans methods of
operations. It also refers to measures taken in
conducting operations or activities in secure and
effective manner.

 Personal Security – it considers that all


personnel are susceptible to terrorist attack so
the is a need for securing them. All security
measures designed to prevent unsuitable
individuals of DOUGHTFUL LOYALTY from
gaining access to classified matters or security
facilities.
Considerations of Personnel Threat Assessment
1. Rank and Risk – higher ranking personnel have great risk
level. In high-risk areas, secure high ranking officers
because they may be selected as terrorist targets by special
knowledge they possess.
2. Threat Level (Potential Threats)
a. Primary targets are high-ranking military or police
officers, government officials, foreign ministries, other
VIPs and persons possessing sensitive information.
b. Secondary targets – those selected as alternative
terrorist targets to gain publicity.
c. Randomly selected targets – Military or police
personnel who are not off duty or engage in private
activities and become targets of opportunity.
Stages in preparation of Personnel Security Program
1. Planning – threat analysis and assessment of available
personnel security resources.
2. Personal security education procedures are adopted.
3. Awareness – periodic briefing, public info drive, printed
materials.
4. Education – education on terrorist tactics, sparrow opens
and the like.
56 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
5. Physical Security – encompasses protection of info,
material and people including perimeter installation. A
system of barrier placed between the potential intruder and
the material to be protected.
3. PREPARATION - this pro-active phase involves
organizing training and equipment personnel of the
organization. In general, military commanders and
officers of the PNP must organize, train and equip
special reaction, security and negotiation elements
and provide their immediate activation when the need
arises.

National Level Organization


NCCM – National Committee on Crisis Management - Serves
as the umbrella organization for crisis management. The primary concern is the
formulation of crisis management policies, integration of mil/pol to public efforts
towards the prevention and control of crisis. It is composed by:
1. PAFSECOM – Philippine Air Force Security Command
2. PNSWG – Philippine Navy Special Welfare Group
3. PASAG – Philippine Army Special Action Group
4. PNPSAG – Philippine National Police Special Action Group
RCAG – Regional Crisis Action Group
RCMOC – Regional Crisis Management Operation Center - the
point of all communications from the OSCP
OSCP – On-Scene Command Post
The OSCP shall establish within the crisis incident site. It is a post or
unit within a probable target to be headed by an on-scene commander (OSC)
whose responsibility is to take charge of every happening of a crisis incident
scene.

Composition of the OSCP


TACTICAL UNIT – composed of regular military or police placed
under the operational command of the OSC.
1. Reaction Element – Special action unit which are specially
organized, equipped and deployed in the region to hold special
operation in cases of crisis incident.
2. Security Element – military or police personnel task to protect the
area of perimeter security to prevent occurrence of unnecessary
incidents.

CRIMINAL SOCIOLOGY 57
2014 CRISIS MANAGEMENT
SUPPORT UNIT – It is a unit that provides the necessary
administrative, operational and logistic support of the OSC.
1. Intelligence Team – responsible for the collection and processing
of all information needed by the OSC.
2. Communication Team – responsible for insuring effective
communication between OSC and other units or sub-units.
3. Logistic Team – responsible for ensuring mess services, supplies
(clothing, equipment, transportation) and other logistic services.
4. Medical Team – responsible for all medical supplies and services
in cases of crisis incidents.
5. Fire Fighting Team – responsible for all services related to
extinguishing fires intentionally set by perpetrators or during the
result of operations.
6. Administrative Personnel – personnel assigned to OSC to keep
written records of events, in coming or outgoing communications.
7. Legal/Investigation Team – services of investigation,
preservation of evidence, documents and legal advice to the OSC.
NEGOTIATION UNIT – It is headed by a chief negotiator and composed of two
or more members. Their primary concern is to serve first life, prevent
destruction and pave the way for a peaceful resolution of crisis situations.

THE REACTIVE PHASE


When a crisis occurs despite the pro-active effort, the organization
concerned must be prepared to perform the crisis management in accordance
with their plan.
PERFORMANCE - It is the action stage, the implementation of the crisis
management contingency plan.
1. The Initial Action – the stage taken by the Initial Action Unit,
which is composed of police and military personnel immediately
organized into team to initially respond to take incident and begin
the containment effort. They are responsible for:
 maintain control of the situation
 report the matter to the RCAG through channels
 secure the scene by establishing perimeter security
 evacuate by standers if possible
 prevent escape of perpetrator
 take maximum control
2. The Action Stage - The action stage starts as soon as the tactical,
support unit and the negotiation unit arrived and are deployed. The

58 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
OSC discusses the incident with his commander and staff and
decides on the plans and actions to be taken.
 Negotiation – chief negotiator undertakes negotiation
as soon as he has been properly briefed and received
appropriate instruction from the OSC. He shall keep
the OSCP informed of the progress of negotiations
and shall take instructions only from the OSC. No
further negotiation shall be under take when the
tactical unit commander initiates tactical operations.
 Tactical Action – the tactical commander makes a
complete estimate of the crisis situation and plans his
courses of action upon arrival at the scene while
negotiation is in progress. He shall maintain and
continuous contact with the OSCP. He shall take over
authority on reaction element throughout the tactical
operations. He shall take instructions only from the
OSC and coordinate all support requirements with the
OSCP.
3. The Post Action Stage - This stage begin as soon as the
perpetrator surrendered, captured or neutralized. OSC shall
ensure that the following are accomplished:
 Protection of the incident scene
 Investigation of the incident preservation of evidence
 Documentation
 SS – witnesses, hostage, perpetrators and other key
participants of the incident.
 Recovered, documented, preserve evidences
 Pictorials, written reports
 Filing and prosecution of cases
 Damage Compensation and rehabilitation
He also initiates recommendation for the compensation and
provide assistance to civilian killed and injured during tactical operations. He
initiates recommendation for the rehabilitation, construction of damage or
essential infrastructures.
Training and re-training of unit personnel special units and
negotiators shall continue with their training to improve their proficiency and
enhance their readiness.

CRIMINAL SOCIOLOGY 59
2014 CRISIS MANAGEMENT
CONCERNS OF CRISIS MANAGEMENT

TERRORISM
Terrorism is …
 a threat or actual use of force or violence for political or
other purpose, to foster fear, insecurity, distrust, and unrest
among a specific group or the general population.
 “Violence for effect… not primarily, and sometimes not all for
the physical effect on the actual target, but rather for its
dramatic impact on an audience.”
 “The calculated use of violence or the threat of violence to
attain goals, often political or ideological in nature”.
 “Is violent criminal behavior designed to generate fear in the
community, or a substantial segment of it, for political
purposes.

Classification of Terrorist
1. National Terrorist - A terrorist who operates and aspires to
political power primarily within a single nation.
2. Transnational Terrorist - This is a terrorist who operates across
national borders, whose actions and political aspirations may affect
individual of more than one nationality.
3. International Terrorists - A terrorists who is controlled by, and
whose actions represent the national interest of a sovereign state.

MOTIVATION AND GROUP CLASSIFICATION


What causes a rational thinking human being to terrorize society?
Assuming that the terrorists think rationally (and most of them possess a high
degree of rationality), we must look to the terrorists motives if we are to
understand them, to think like them, and to ultimately them.
1. Minority Nationalistic Groups - groups fighting the majority of the
community where the support base will depend one ethnic,
religion, linguistic minorities at odd with the majority community.
2. Marxist Revolutionary Groups – here, the terrorists’ movement
is characterized by its possession of a coherent Marxist ideology
and of a long-term strategy for bringing about the socialistic
revolution.
3. Anarchist Group - True Anarchist are difficult to find since true
anarchy brings lawlessness and disorder, which is not a natural
state in which the human race exists.

60 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
4. Pathological Groups – problematic individuals who are grouped
together for some terrorist activities for emotional satisfaction.

TERRORISTS PROFILE (based on commonalties of international


terrorists)
1. under 30 years of age
2. action oriented - some are college educated
3. from affluent/middle-class
4. often trained in medical, legal, engineering, teaching professions
5. terrorism rarely full-time occupation
6. inward assurance of strength
7. paradoxically, basically lonely
8. believes he/she to be morally superior and in own mind is right
9. indifferent to suffering of his immediate victims
10. looks to colleagues for acceptance
11. wants respect from victims
12. willing to sacrifice self
13. seek publicity
14. believes violence is morally justified to support cause

Nature of Political Terrorist


1. It is a part of revolutionary strategy.
2. Manifest in acts on socially unacceptable means.
3. Symbolic target selection.
4. Creates psychological effects on population to change behavior
attitude.
5. It forces the government to take drastic measures.
6. Combines political and criminal terroristic tactics.

Aims of Political Terrorist


1. Influence, discredit and destroy present system.
2. To break down social structures.
3. Erode trust in established government.
4. Foster insecurity and fears.
5. Shows that the government is incapable of protecting the people.
6. Forces the government to overreact to use excessive measures or
force.
7. Destroy property.
8. Disrupt law and order
9. Propaganda
10. Create a ripe climate to revolution.
CRIMINAL SOCIOLOGY 61
2014 CRISIS MANAGEMENT
Common Characteristics of Terrorist
1. Promote fear
2. Main objective is publicity
3. Highly mobile
4. Fatalist – they can create destruction affecting the whole nation.
5. Undercover operations
6. Small groups mean security efficiency

Immediate Goals of Terrorist


1. Local, national, worldwide recognition for a cause.
2. They cause government reactions.
3. Harass, weaken, and embarrass government and government
forces.
4. Demonstrate power and threat credibility.
5. Obtain money and equipment.
6. Destruction of communication.
7. Prevent and delay executive decisions.
8. Cause strikes or prevent elections, free or prevent elections.
9. Satisfy vengeance.

Long Range Goals of Terrorist


1. Cause drastic changes in the government.
2. Turn the system favorable to their side.
3. Gain political recognition as a legal body representing an ethnic or
national group.

Cooperation among Terrorist


1. Sharing resources (logistic support)
2. Sharing expertise.
3. Sharing safe havens.
4. Participating in joint operations.

Organization of Terrorist Groups


The way terrorist group organized is determined by it’s the need of
security and the number of people in the group.
1. Larger Groups – less secured
2. Small Groups – high degree of security but limited to operational
capabilities.
As to group size, the large group can only succeed over a longer term
in a week political environment.

62 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
As to group security, government forces attempt to destroy terrorist
group or keep them in defensive position to discourage them from mobilizing
new to be extremely covert.

Terrorist Operation
1. Covert and well executed.
2. Carried out by specially well-trained and organized clandestine
elements.
3. Weapons – basic arms and explosives but continue to seek
advance weaponry.
4. Training – they are trained on subversion, weaponry, negotiation
practices and espionage.
5. Members of clandestine elements are of above average
intelligence.

Methods of Operations
1. They operate in small bands
2. They carry light automatic weapons, grenades, basic explosives,
ammunitions and communication equipment.
3. They mask their activities with the local populace.
4. Team includes assaults and security elements.
5. Leaders serve as negotiators.
6. They watch out for counter intelligence measures of the
government forces.
7. In hostage taking, hostages are usually separated in safe houses
to prevent communications and escape, planning, and intelligence
gathering.

Sequence of Terrorist Action


1. Pre-incident phase – reconnaissance mission, Rehearsal
 Often reconnaissance team, planners, perpetrators do not
meet.
 Communication is through intermediaries or by message
drop.
2. Initiative Phase – moves to their target covertly.
 they use false names, ID, passports
 they use separate routes
 weapons and other items are separately to pre-arrange
locations
3. Negotiation/Climax Phases

CRIMINAL SOCIOLOGY 63
2014 CRISIS MANAGEMENT
 they use negotiation to gain publicity.
 Negotiation- often requires inter-government negotiations at
the highest level.
 When government failed to give demands, they initiate more
terrorists
4. Post incident Phase
 they learn from their failures and success
 terrorist re-groups, criticize and give critique about the
operation.

TERRORIST TACTICS
BOMBING
Delivery to target is done through:
1. Vehicle Bomb-booby traps with attached devices
2. Laid Charges-bomb plates
3. Projected bombs-launched from riffles by a mortal device
4. Postal/mail bombs
Activation means:
1. Command activation by leads, pull wire or mechanism
2. Action by the subject/top pressure device, light sense
electric switch
3. Time delay clock/burning chemical delay
ARSON - This is use to destroy or to disrupt public utilities, political HQs and
industrial facilities.
HIJACKING - Hijacking and skyjacking are commonly used by terrorists. The
hijack supply, ammunitions, fuel cargoes, and vehicles to provide them to gain
entry to a close military area, skyjacking of commercial aircraft to gain publicity
or to ask demands.
ASSASSINATION - The oldest but the commonly used terrorist tactic where
targets are often police or military officials or political features and they always
claim responsibility of assassination.
AMBUSH - This is a well-planned, well thought-out, properly rehearsed and
precisely executed operation. The terrorist has time on his side and will spend
considerable time preparing for an operation. Terrorist have an advantage in
that they can choose the time and place of operation.
KIDNAPPING - Kidnapping for ransoms is the most common form of this tactic.
The victim is normally confined in a secret hideout and kidnappers make
material demands.
HOSTAGE TAKING - The hostage-taker confronts the authorities and openly
holds the victims for ransom. His demands are more than just material in

64 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
nature. Political concessions are the frequency demanded in exchange for the
hostage lives.
ROBBERIES/EXTORTIONS - Terrorist operations are expensive. To help
finance their activities, terrorists rob banks and armored vehicles carrying large
sums of cash. Bank robberies are also used as graduation exercises for
terrorist training programs and viewed as a tactical operation. The conduct
reconnaissance, plan escape routes and operates in the high degree of
efficiency and the progressive taxation scheme of the CPAA/NPA is a form of
extortion through coercion or use of force against the victim or his property.

TERRORIST TARGETS
1. MILITARY/POLICE
 command and control facilities
 logistic/storage facilities
 computer facilities
 explosives, sensitive weapons, arms and ammunition
depots
2. ENGINEERING AND ENERGY SYSTEM
 hydroelectric plants
 offshore oil rigs
 nuclear facility sites
 gas pipelines
 dams and electric power lines
3. COMMUNICATION AND SUPPLIES
 communication lines and facilities
 chemical storage sites
 dock facilities
 equipment warehouse
 computer facilities
4. TRANSPORTATION
 rail lines and cars
 bus depots
 airports and aircraft
 trucking and facilities
 shipyards and ships
 mainland routes and bridge
5. HUMAN
 members of the diplomatic crops
 government officials

CRIMINAL SOCIOLOGY 65
2014 CRISIS MANAGEMENT
 corporate executives
 police and military forces
 dependents/close relatives of the above
6. VULNERABILITIES - Vulnerabilities are the weaknesses the
installation security and high risk targets with in such installation.
These vulnerabilities are normally identified through security
surveys and inspections conducted periodically or on the spot
intelligence and security unit’s staffs.
The analysis of the threat to certain installation is based on information
with both static and dynamic dimensions.
 STATIC DIMENSIONS – terrain, nationality of population,
major industry in the area, location of installation, mission of
the installation
 DYNAMIC DIMENSIONS - assignment of personnel,
security measures used relations with civilian security,
demonstrations within post location
 DYNAMIC DIMENTIONS THAT ARE HARDLY
CONTROLLABLE – weather, activities of hostile groups,
economic conditions, local law enforcement, off post
demonstrations
The vulnerability of installations can be determined to some extent
through the consideration of the following factors:
 Installation characteristics and its attractiveness as a target
for the terrorist acts.
 status of training personnel
 availability of communications
 non-military law enforcement resources
 time and distance from military installation able to lend
assistance
 geographic region
 proximity to foreign borders
 access to installation
 terrain

HOSTAGE SITUATION
This is termed as crisis by the law enforcement officers and
behavioral professionals. This situation exist when one or more individuals are
held captive by other person or persons against their will for purposes of
demanding material things or due to behavioral maladies. Criminal type
hostage takers may direct their demand towards the government or to other
66 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
private individuals. Mentally or emotionally disturbed may take hostages out of
nothing or due to uncontrollable forces.
In dealing with hostage situations, the priorities are to 1) preserve
lives, 2) apprehend the captors, and 3) recover or protect properties.
Negotiators should be prepared for this kind of situation since it will take them a
long period of time to contain the situation. According to experts, a hostage
taking may last for an hour to more than forty hours. Hostage takers and
hostages and even the negotiators become tired and stressed out of the long
period of crisis intervention. Hostages become impatient waiting for their safe
release or rescue. With this, there is a great possibility of the birth of the
Stockholm’s Syndrome. This is characterized by transference of attention
between the captors and captives. The hostage towards his captors may
generate positive feelings.
Negotiators can have enough time to contain and isolate the
scene. The initial state of high emotion is given time to subside and rational
thinking to return. The lives of the hostages become more secure as the holder
realizes the value of their continued safety; and fatigue will set in and alertness
will fade.
It was research by experts that passage of time is in favor of the
hostages and to the negotiators. In the first hour of the situation, the hostage
taker is at rage and tension is at peak. As time passes mental, emotional and
physical fatigue will be increased and will operate against the hostage taker. As
this happen, the above-enumerated benefits of slowing time operate.

STAGES OF A HOSTAGE SITUATION


Alarm Stage - This stage is the most traumatic and dangerous. In
the alarm stage, the emotion of the hostage taker is exceedingly in its highest
peak, his rationalization and proper thinking is low, He may be extremely
aggressive in his reaction to any perceived threat. E.g. escape of hostages,
tactical assault, trickery etc.
In order for the perpetrator gain cooperation from the hostages, he
usually terrorizes the hostages into submission. At this stage he may also
inclined to inflict physical harm or even kill anyone who interferes with their
attempts. (Strentz, 1984, p. 190). The same is the situation in the part of the
hostages. Since no one knows when or does not want that they will be held
hostages. This is considered as a traumatic stage as they fear much for their
lives. From a peaceful situation, turns into a life and death situation ticking
every minute and the lives of the hostages depend on the hand of the hostage
taker. (Herman, 1995, p. 92). A person taken as hostage becomes impatient,
denial of reality sets in them, particularly when those they expect to help seem
to be doing nothing. In order to cope immediately with this agitated feeling, one
CRIMINAL SOCIOLOGY 67
2014 CRISIS MANAGEMENT
must put into place a will to survive since panic may cause over reaction in the
part of the hostage taker and diminishes the chances of survival. It is also
important that hostages should disregard any notion of being a hero. (Strentz,
1984, p. 196)
Crisis Stage - In this stage, when negotiation attempts are being
initiated by the crisis negotiator. Outrageous demands and unpredictable
emotion is marked or commonly noted in the hostage taker. There is still a
great deal of danger since hostage takers try to consolidate their positions. To
do these, they try to move their hostages to a safer ground area. On the part of
the captive, this is the most critical because this stage may predict the
remainder of the situation. Chances of survival may be enhanced or reduced
during this stage through the hostage –hostage taker interaction. It is
advisable that hostages must control their fear as it increases unpredictable
outburst of anger and violence on the captor. The hostage taker may
inconsistently enforce numerous demands and petty rules and this may result
to unsuccessful negotiation. In addition, the perpetrator seeks to destroy the
victim’s sense of autonomy by depriving him of his basic needs.
At this stage hostages may start to feel three (3) problems: 1)
Isolation, 2) Claustrophobia, and 3) Sense of time. Sense of time becomes
important on hostages who are hoping for rescue. This situation may also in
favor of the hostage taker as they earn compliance from their captives.
Accommodation Stage - This is distinguished by boredom, and
with moments of terror. Though is considered as the longest yet is the most
tranquil. In the crisis stage, and even in the alarm stage, hostages are
considering escape options but in the accommodation stage, their initiative and
planning are narrowed since captors has increased control over them. The
hostages’ sense of life preserving has increased and even tries to obey the
orders. Stockholm’s syndrome will likely to occur between the captors and the
victims. One looks into this phenomenon in the negative that one must say that
cooperation of hostages to the negotiator is constricted.
In the right manner, the hostages in good effect can make use of
this phenomenon. It lessens tension and openness is generated. It is advisable
that hostages must avoid political discussions as it accentuates differences
with captors and hostages. (Miron and Goldstein)
Resolution Stage - This is the stage when the hostage taker is
being stressed out or fatigued of the situation. He is seemingly losing interest
of the situation and lost most of his bargaining points. Tension between the
hostages, hostage taker and the crisis negotiator is notably low. It should be
regarded also that the crisis intervention techniques of the negotiation team
have increased. In this stage, reactions of the hostages are mixed either
blaming their captors or may become hostile and uncooperative to their
68 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
rescuers and even accusing them to be the responsible for the whole situation.
They might even appraise their captors for taking care (saving) their lives
though their captors placed them into a hell experience.
Released victims become paranoid and often experience post
trauma attacks after liberation. These may even last for a long period of time.
Such experience becomes part of their lives and haunts them from time to time
if not being properly treated. They, being a paranoid, continue to monitor their
captors if taken away from them or safely put behind bars.

THE HOSTAGE TAKER


It is a must that a police officer who first arrived at the scene has
the necessary skill to determine what type or personality of the hostage taker
is. This does not mean that he must diagnose the perpetrator. In assessing the
situation, one must be able to determine and know the two kinds of behavior:
 Instrumental behavior- those who are engaging in this kind
of behavior are having goals to obtain or to be fulfilled.
Generally, hostage takers of instrumental behavior are
criminal types and intervention usually needs bargaining.
E.g. barricaded criminals, or other organized crime groups.
 Expressive behavior- This kind of behavior is characterized
by their attempt to display power. Those who engage in this
kind are emotionally disturbed individuals. E.g. mentally
insane, etc.
In many hostage situations committed, statistics reveals that most
of those involve are mentally disturbed individuals and the remaining are
results of instrumental behaviors. According to research, twenty five (25%)
percent of all hostage situations are instigated by expressive acts. With this
data, it is important that we must learn the different types of hostage takers and
we will begin with the emotional aspect.

Mentally Disturbed
This group suffers from different kinds of psychological maladies.
They may or may not in touch with reality. A mentally disturbed individual may
be a loner, act in accordance with an non existing irresistible force, or on a
false belief or a stimuli (Cooper, 1981). Symptoms may include such things as
dramatic and sudden changes of behavior, loss of memory, mistreatment of a
loved one, a sudden, impulsive act of theft, extreme depression, or anxiety that
is out of proportion to the circumstances that appear to be causing the anxiety.
The individual may talk to himself of hear voices, or he may be
displaying dangerous behavior without any apparent reason. Mentally or

CRIMINAL SOCIOLOGY 69
2014 CRISIS MANAGEMENT
emotionally disturbed individual may be in a very docile mood for a while and
become extremely violent without any apparent cause (Adams).
A patrol officer is usually the first person to respond to a crisis
situation before the crisis team arrives. In some instances where Crisis
Management Teams (CMT) is not available, he usually starts and event
finalizes the job. Police officers are empowered to bring the mentally and
emotionally disturbed individuals to the psychiatrist for evaluation and
treatment.

Paranoid Schizophrenics
To begin with the different kinds of mental disorder, we must first
understand the different topics associated with this. Below are items of
information discussed in the book of Adams that serve as a guide to a police
officer who will respond to a hostage situation involving mentally disturbed.
Psychosis is a gross and persistent falsification of conventional
reality that leaves the person unable to manage conventional reality with any
degree of effectiveness. Psychosis has two major components.
Delusion is the faulty belief that is motivated primarily by the
individual’s needs and wishes and in fact, has no basis. Hallucination is
manifested in a visual image that is quite vivid and real to the individual who
experiences it.
Paranoia is a set of fixed delusional beliefs that are accompanied
by clear and orderly thinking outside the delusion system. Paranoia manifests
itself. A paranoid has been described as “vigilant suspicious, distrustful,
insecure, and chronically anxious”. There are two types of a paranoid individual
as:
The True paranoid or the Classical paranoid as psychologists
prefer, may be of high level of intelligence and so persuasive that he will
successfully recruit other persons to help him in his war against enemy.
Individual with Paranoid Reaction do not handle the problem in as much logic
or intelligence as the true paranoid.
Schizophrenia is a thinking disorder. Expert says that,
approximately 80 percent of the mentally ill of the population are schizophrenic.
There are subcategories of this kind of mental disorder, the catatonic state and
the hebephrenic state. Catatonic state is demonstrated by the patient’s rigidly
held position for some interminable period of time, while Hebephrenic state is
when the subject acts childlike and silly.
The signs and symptoms of the schizophrenic condition may
appear in three (3) different ways such as the following:

70 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
1. The subject’s language may be rambling and tangential; he
may make up meaningless rhymes, or echo anything he
hears;
2. The subject may show his split personality incongruent
between his expressed ideas and emotional responses. This
indicates that two thought operate simultaneously.
3. The subject may isolate or alienate himself from the rest of
the society and pull himself into his personal shell
(Schizotype personality).
Neurosis is suffered by a person if most likely to be observed in a
continuous state of anxiety. Erratic behavior would more than likely be
displayed by reaction to anxiety in the form of ego defense mechanism such as
rationalization, projection or displacement. The signs and symptoms are
shaking uncontrollably and depression without explanation.
In general, they are characterized by being out of touch with reality
and being recognized by their false belief. Hostage taking is done in order for
them to carry out plans from someone who compels them to do. Their routine
is to accomplish something but there is no accomplishment. Most of the
paranoid schizophrenics are in conflict and with difficulty in coping even in a
minimal stress situation.
Male paranoid may have problems with gender identity and
religious beliefs. It is so noted that frustration and conflict is involved. When
these two combines, severe anxiety will surface that makes a person so
sensitive and volatile. Lack of interpersonal trust, religious conviction, and
sexual dysfunction, persecutory beliefs about family or significant individuals or
even distrust to the negotiator or police may lie in the person’s behavior. This
variety of issues may cause the negotiation difficult and dangerous (1986).
The first thing a negotiator should do is to keep the dialogue at an
even pace. Since paranoid schizophrenics are out of touch with reality, it is a
must that the hostage taker should be kept calm enough to stay in touch with
reality while the negotiation process is going on. A good negotiation strategy is
suggested below:
1. Reduce anxiety at the same time create a problem solving
atmosphere
2. Do not trick the captor
3. Accept the statement as true but do not agree
4. Do not convince that he is wrong
5. Emphatic understanding is needed

CRIMINAL SOCIOLOGY 71
2014 CRISIS MANAGEMENT
Manic depressive personality
Depressed individuals are in an incapacitated mental state. He
may frequently know the hostages and the latter might be the cause of his
depression. Negative outlook in life, feeling unworthy, slow speech, suicidal
and unpredictable and extremely dangerous are the characteristics of this type
of mentally disturbed. To a one who is a suicidal type, he might inflict harm or
even kill one of the hostages and the police will be forced to shoot him (Strentz,
1984).
When dealing with this kind of mentally disturbed hostage taker,
the negotiator must be:
1. Firm and manipulative
2. Understanding and be supportive
3. Able to induce subject to talk about something positive

Inadequate personality
This is a type of person that displays attention-seeking behavior.
Hostage taking is his action to prove himself or his worth. During the
commission of the crime, he tends to delay his actions and be caught in
flagrante in order for him to prove himself (“I’ll show them”). His characteristics
are homicidal, loser complex, maybe fired from many jobs and are in touch with
reality. Though they are emotionally disturbed, yet they are apologetic to their
behavior (“I’m sorry but I have to do this to prove that I can be a good
worker…”).
The negotiator should be aware that those statements mean that
it’s either murder or physical harm to the hostages. It is but wise to present
problem solving alternatives so that the hostage taker will not feel that he has
failed again. The person needs acceptance and understanding. An initial action
is to offer promises that can be kept and do not allow relatives in the scene.

Anti-social personality
Those who belong to this kind of personality are repeatedly having
conflict with the people around them and notably having a deviant behavior
from groups, social values and or individuals. They defend their face from
embarrassment by blaming others in the form or rationalization. Anti-socials,
when takes hostages, are generally engages in expressive acts and they are
likely to dehumanize the hostages and this is an indication that they are
dangerous individuals.
According to Lanceley, antisocial individuals did not internalize
moral values yet they know the consequences of their acts and they are
therefore considered or more likely to become a foe. These hostage takers are
only concerned for themselves indicating egotism. Though they are aware of
72 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
the consequences of their acts, they feel no remorse and the negotiator must
be aware of this. At any time the hostage taker may consider his hostages as
burden and might harm or even end killing his hostages. A guideline of action
suggested is that the ego of the hostage taker is stimulated.
In this situation, the stimulus of this situation might be the hostages
and the negotiator must diverse the attention away from them. It is also
suggested that it is but wise not to refer or talk about hospitalization or
treatment during the crisis intervention as this might agitate the perpetrator if
they believe they might lose their freedom or is insinuated that they are crazy.
Since the hostage taker is a street and police wise, it is advisable not to use
trickery (Fusilier, 1981).

The estranged person


Domestic problem is the main cause why an estranged individual
takes hostages. The hostages are commonly known to him and mostly are his
family members. The hostage taker is experiencing from relationship
breakdown in his or her interpersonal relationships and hostage taking is
employed to compel the relationship to be maintained. The hostage taker at his
point is afraid of losing the significant others. In order to carry out hostage-
taking, alcohol and prohibited drugs are used to have the necessary courage
(Cooper, pp. 27-28). Knowledge in domestic intervention is essential when
dealing with this kind of volatile situation. The negotiator should be careful
when intervening on personal disputes as oral arguments between the hostage
and the hostage taker may occur.
The negotiator must be an emphatic listener and with good
responding skill. He must also be aware of the personal nature if the situation.
The negotiator should also have the ability to bar the denial of reality into
despair. The resolution is that the perpetrator needs to be shown a graceful
way out (Cooper, 1981).

Terrorists
Terrorism throughout the world has been alarming for the past
decades and even at present. Countries around the world have been facing
terrorism problems either local or international groups. In the United States
alone, it has been reported that there are local terrorists sowing fear, insecurity
and unrest amongst the people. They create chaos through assassinations,
bombing, arson and other forms of malicious destruction of properties. (CMD,
AFP/PNP)
Though global terrorism is seemingly increasing and alarming, the
international law enforcement community is trying its best to address to this

CRIMINAL SOCIOLOGY 73
2014 CRISIS MANAGEMENT
kind of problem. (The international police organizations, other law enforcement,
religious and civic organizations team up together in fighting these terrorists.)
Regardless of their cause, their terroristic activities are condoned
by most of the people.

Characteristics, Modus Operandi and Causes


In order for them to attain their goal, careful planning is involved.
They employ professional members [most of the planning team members are
educated enough on political matters] to outwit and deceive the authorities.
They also employ undercover agents and divide into groups.
Hostages are in serious jeopardy when their demands are not met
immediately or if the military pressure hovers them (i.e deployment of troops,
hovering choppers). The local police may not be able to meet the demands
immediately and only serve as perimeter security as they need government
attention. They use media to get attention from the government.
Since most of the longest running crisis situation involves political
terrorists, they want to negotiate directly to the Government and pay less
attention to the agents or crisis management teams. Terrorists also try to let
the government overreact n the situation so when worse come, they, the
hostages and the rights groups will turn ire and blames on the government.
The common question asked is what causes them to do such.
Evidently, hostage taking is their means to get the much-needed attention from
the government or private individuals just like other types of hostage takers. In
this way, the authorities will initiate actions to negotiate for the safe release of
the hostages on the fear that the latter will end killed or harmed.
On the issue on ransom, according to them are just demanded to
cover their expenses while hostages are at their custody, but in sense, will
serve as their resources to buy additional firepower or in the recruitment for
additional manpower in preparation for the anticipated military or police
pressures.
Just like other types of hostage takers, they need to be negotiated
with. The only difference is that a mentally deranged, inadequate and antisocial
personality needs more the help of mental health professionals and rapid
police response as the last resort to rescue hostages away from danger. While
on terrorist hostage takers, painstaking bargaining on social and political
demands is traditionally used. Government negotiators are utilized to the fullest
to negotiate and bargain issues with the kidnappers.

Barricaded Criminals
This type might be robbers cornered by the police while in the act
of committing their crime (i.e. bank robbers). Either barricaded in a building,
74 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
road block or on getaway cars. Hostages are may be employees, bystanders
or both caught in the process of escaping. The hostage taking is a
spontaneous reaction of the criminal when cornered. Some law enforcement
officers consider barricaded criminals as attention seekers, but others describe
then in the contrary as they avoid being identified. Their primary aim is to
escape safely taking with them the hostages as shield to prevent being shot by
the police. Usually barricaded criminals are engaged in instrumental acts as
they demand for material things such as getaway cars, firearms, money, and
safe escape.
Barricaded criminals may initiate bargaining negotiation as the
police closely monitor them. As earlier presented they might ask a safe conduct
pass for the release of the hostages, or they might ask for additional money or
getaway car and leave the hostages immediately. The negotiator, upon
gathering all the facts and assessment of the situation, including the mental
faculties, he may use his own discretion in the negotiation process, whether to
grant the demand or not

Prisoners
While most prisoners spend most of their time inside the
correctional institutions, some are concentrated on penal colonies under tight
guards and to those who are completely secluded inside their prison cells; they
are haunted by boredom, get tired and hostile. These may be due to the strict
implementation of house rules, favoritism and poor prison conditions (Lack of
recreational activities and inadequate facilities, poor structuring etc.).
These conditions may largely contribute to the occurrence of riots
and crisis [hostage taking] situations in our correctional institutions. Most
probably, the hostages are the prison authorities and staffs or even some of
the inmates. For some institutionalized individuals, hostage taking is their
means of effecting escape [hostages serve as their shield against assault of
authorities] to stay away from the harsh prison condition. Another group of
prisoner-hostage takers are those who do not consider escape but a rather
total improvement of the conditions and services of the prison institution.
Prisoners who initiate hostage taking may be involved on either
instrumental or expressive acts or both. Instrumental behavior involves those
situationally related, substantive and objective wants and commonly known as
the commodity goal of the hostage taker (Roloff and Jordan, 1992). An
example of this is the demand for prison condition as these are the causes of
the situation.
Additionally the first group almost has similar purpose to the
barricaded criminals as they inhibit instrumental acts or behaviors.

CRIMINAL SOCIOLOGY 75
2014 CRISIS MANAGEMENT
The negotiation approach in this situation based on the acts
involved is bargaining approach. They need to be bargained with at the
soonest possible time as the lives of the hostages are in great danger. This is
possible, as the hostage taker believes that the hostages are the main cause of
the problem.

NEGOTIATION MODELS in Crisis Situations


Whenever a crisis [hostage] situation is reported to the police or
other law enforcement professionals, the initial action being taken is the
activation of tactical assault or Initial Action team and the coordination of
trained crisis negotiators within their departments. In cases where the hostage
taking is initiated by a perpetrator, purely engaged in expressive acts, the
services of a mental health professional trained in crisis management is
indispensable. On cases of instrumental behaviors, tactical assault teams are
mobilized to contain and isolate the area and on standby when worst come
along as the negotiator/s enter the situation. However, the services of mental
health professionals are sought since most of hostage takers with instrumental
behaviors are partially engaged in expressive acts.
In assessing a crisis situation, one must understand and be able to
determine the two kinds of behavior. Firstly, Instrumental behavior refers to
actions on the part of the perpetrators and negotiators that facilitate some
types of substantive outcome in terms of instrumental issues (situationally
related, substantive and objective wants of each party). Additionally, those who
are engaging in this kind of behavior are having goals to obtain or to be
fulfilled. Generally, hostage takers of instrumental behavior are criminal types
and intervention usually needs bargaining. E.g. barricaded criminals, or other
organized crime groups. Expressive kind of behavior on the other hand refers
to various forms of perpetrator’s and negotiator’s behavior that serves to
communicate the power or significance of the individual and his/her emotional
state. Simply, it involves the behavior of the perpetrator (Hammer and Rogan).
This is characterized by the hostage takers attempt to display power. Those
who engage in this kind are mostly emotionally disturbed individuals. E.g.
mentally insane, etc. Over the years there are approaches used by negotiators
and are devised to suit to these kinds of behavior or acts.
Bargaining Negotiation Approach - Earlier discussed were the
two types of acts. Bargaining negotiation approach is the model that negotiator
employ whenever instrumental issues come along way. In this approach,
negotiation is viewed in terms of an exchange or distribution of resources. This
approach is derived to the social exchange theory of Roloff, (1981), which
accordingly has two premises:

76 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
1. Conflicts involve people who are interdependent which
means that each party cannot accomplish each own goals
without agreement from each party, and
2. Such conflicts involve rewards and costs from each other
This Social Exchange Theory is obviously focused in the
exchange of objects during the negotiation. In order that the negotiation is
successful, some authors of crisis management books claimed that the
communication approach involve the exchange of one set of resources for
others or known as bargaining.
Bargaining is a powerful tool to resolve a conflict provided that the
hostage takers focus on instrumental concerns or issues that is negotiable.
They are more likely to engage with the hostage negotiator in order to bargain
and resolve the crisis.
Van Zandt, Rogan and Hammer reviewed and made critique on
this approach and notes: “the type of situation law enforcement usually
encounter, often fall in several ways to match the requirements of instrumental
negotiation approach.”
First, crisis negotiation situation is not typically like others, more
common forms of instrumental dominated bargaining where the assumption is
that, the parties come with well thought out proposals and are willing to a
bargaining process. Crisis [hostage] situations involve high levels of anxiety
and uncertainty. They are characterized by a pronounced level of emotional
excitation precipitated by the hostage takers motives and enhanced police
response. Majority of hostage crisis occurs as a result of the mental and
emotional inability of the hostage takers to cope with life stressors. This
produces a situation where normative rational actor bargaining is generally
absent and its place exist an explosive dangerous and volatile set of interaction
dynamics where emotional excitation and relationship issues (e.g. control,
power, trust, liking and face) play a critical role.
Over all, the particular features of crisis situation discussed above
suggest that negotiators often face interaction dynamics that may not fully
explained by the instrumentality focused bargaining approach.
Expressive Negotiation Approach - This approach is mainly
focused on the emotional state of the hostage taker as a powerful tool to
resolving of crisis situation. Expressive negotiation approach came to existence
with the use of psychology, human relations theory and research. Both assume
that the nature and quality of interpersonal relationships play a large role in
resolving a conflict. The three (3) assumptions of the expressive negotiation
model are:

CRIMINAL SOCIOLOGY 77
2014 CRISIS MANAGEMENT
1. Hostage has no instrumental value. This explains that the
hostage is a tool or device used in gathering audiences or
attracting attention (attention-seeking behavior) to the
hostage taker. The hostage taker may initiate a crisis to
demonstrate his ability to control others.
2. Both interactants have the interest to prevent the escalation
of the situation into violence or death. The hostage taker has
some minimal level of awareness that when he kills his
hostages, he will later suffer the consequences.
3. Hostage taker and negotiators are confronted with high level
of emotional excitation. Increased emotional arousal
prepares the perpetrator from reacting with fight or flight
response rather than a problem-solving mode.
In this approach, negotiators must be knowledgeable on ‘crisis
intervention therapy’; listening skills as it contributes a lot in decreasing anxiety
and a problem solving can emerge later during the negotiation process.
(Schlossberg, 1979, Van Zandt, Rogan and Hammer, 1998). In addition,
relationship development and confidence building strategies are viewed as
critical to resolution of crisis [hostage] incidents. The negotiator must have
enough training in listening, paraphrasing, and self-disclosure, open ended
questioning to reduce perpetrator’s anxiety.
Under intense stress, the Stockholm syndrome may likely to occur.
This phenomenon has been carefully studied and recorded by psychologists.
The impact of the incident stress on negotiator’s psychological well-being.
More so on unsuccessful negotiations. Negotiators should also deserve
attention like professional help. Explications of emotional and personality
disorders and their impact on crisis negotiation. Most of the hostage situations
are committed by paranoids, depressed, antisocial and inadequate personality
typologies. Hostage negotiations depend on the psychological characteristics
of the hostage taker and the identification of the effective communication
strategies when negotiating with perpetrators who exhibit behavioral patterns
consistent with specific mental and emotional disorders. This model of
negotiation is used to lessen the perpetrator’s emotional tension to give way for
a rational problem-solving atmosphere. (Hammer and Rogan)
Communication-based negotiation approach - This approach is
founded on an interactive assessment if the crisis [hostage] situation as it
unfolds and is created through the interaction of the negotiator and the
perpetrator. Therefore, communication based approach is an interactive
process wherein negotiators and hostage takers react to each message
behavior.

78 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
In fundamental communications theory, communications is
composed of content and relational dimensions. Content dimension of
communication represents the instrumental focus of person’s message, while
the latter conveys the expressive features (as trust, power, and respect). There
are three (3) interaction concerns relative to the communication-based
negotiation approach, which may tend to escalate or deescalate the conflict.
(Hammer and Rogan)
1. Instrumental concerns; Hammer and Rogan notes:
“Instrumental message behavior arises in crisis negotiation
as the hostage takers and the negotiators bargain with one
another regarding with the incompatibility of their objective
concerns.” In this concern, there are two broad types of
issues involved, the substantive issues and non-substantive
issues or the situationally related and the situationally
unrelated respectively
2. Relational concerns - Relational message behavior
denotes when an individual’s concern is more on the nature
of the relationship to other individual. There are three (3)
core elements that represent relational message behavior.
 Power- this concerns the degree of agreement
between the two interactants along a
dominance-submission dimension.
 Trust- revolve around the degree to which each
party is willing to accept the premise that no one
shall be hurt or no act shall be detrimental to
self.
 Affiliation- refers to belongingness and
acceptance between the perpetrator and the
negotiator (respect, liking and caring for the
well-being).
3. Identity concerns - Identity concerns refers to an
individual’s concern for self-presentation, reputation or face.
These are then important to both parties.
According to Tajfel’s Social Identity Theory as discussed by
Hammer and Rogan, personal and social identities are the two dimensions of a
person’s self-image and are best to be known by the negotiator when dealing
with conflict situation, noted as:
‘Personal identity is based on an individual’s unique perception of
his or her own attributes’ (The person perceives himself either
weak, strong, or intelligent).Hammer and Rogan also suggested
that a suicidal’s emphasis is on personal identity concerns, and
CRIMINAL SOCIOLOGY 79
2014 CRISIS MANAGEMENT
‘…social identity consists of those characteristics and their
emotional significance that is attached to one’s membership in
social groups...’ (Nationality, gender, ethnicity, social group/cult).
Rogan and Hammer further discussed that face message behavior
varies along three (3) dimensions and the first denotes the locus of a
communicator’s interest (is the face message directed to one’s self or to
other?); Face valence is the second dimension, a behavior either to attack or
honor face. Finally, ‘face-honoring entails a dimension which relates to whether
the message behavior functions to proactively protect against potential future
threats to face or to retroactively restore perceived loss of face’.
When these three (3) dimensions are combined together, there are
six (6) types of face message behavior being produced:
1. Defend Self’s Face - This behavior is self-honoring and self-
directed messages. More often, the hostage taker uses this when
he is asked about the condition of the hostages and replied… (“I
don’t know but I think they’re all OK! “)
2. Attack Self’s Face - Is a behavior that tends to attack or is
directed to one’s self. The statement, (“I know this is my entire
fault…”) Fits to this behavior. The perpetrator directs criticism or
attacks to him when he fell remorse of his act and this usually
occur during the accommodation stage.
3. Restore Self’s Face - This is used to restore one’s
face/reputation. (“I’m not as crazy as you think…”) A hostage taker
with psychological maladies uses this face message behavior to
restore his reputation.
4. Restore Other’s Face - A face message behavior that is directed
towards the other party. (“You’re such an intelligent guy…”) or (”
You’ve got a lot of people who cares about you…”) the negotiator
tries to restore the perpetrators face by attempting to gain
cooperation and lessen the latter’s psychological burden.
5. Defend Other’s Face - Known as the traditional message
behavior utilized to protect other’s face from future attack or loss. (“
I know you can overcome these odds in your life…”). The
negotiator should defend the perpetrator and not the hostages to
increase sense of worth of the perpetrator.
6. Attack Other’s Face - This represents the traditional, more limited
view of face attack behaviors. (“These people cause me to do
this…”) When a negotiator shifts the blame to others, it does not
really mean that hostages are not prime importance. It is more
likely that the hostage taker fell sense of understanding and
belongingness. However, if the hostage taker is the one who uses
80 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
this, he is trying to imply that the main causes of the situation are
the people involved [hostages].

THE STOCKHOLM SYNDROME


In the event of hostage crisis, the Stockholm syndrome will likely
to occur. This phenomenon is referred to as the process of transference in
which the hostages begin to identify their captors and the following may occur:
1. Positive feelings from the hostages to the captors
2. Negative feelings toward the authorities by both hostages and
captors
3. Positive feelings returned by the captors to the hostages
This phenomenon got its name after one of the hostages in an
aborted bank robbery in Sweden fell in love with the perpetrator (Strentz,
1994). In some instances, hostages may even help the perpetrator
consummate the crime either by providing cover fire during the escape process
or actually joining the heist or become an instant member of the group.
Stockholm syndrome with operates when there is an extended
period of time, not being isolated from one’s captor and the positive contact
between the hostages and the hostage taker (Fuselier, 1981).
Variety of issues may possibly cause the occurrence of this
phenomenon such as:
1. Pity- In the case of mentally disturbed individuals, hostages may
pity them, as they believe these individuals need professional help.
The hostages may offer advises (i.e. not advisable) or even
instruct the police not to launch a tactical assault against the
defenseless and sick hostage taker.
2. Personal feelings- the hostage may feel affection towards the
hostage more when the hostage is female, with pleasing
personality and cooperative.
3. Indoctrination- barricaded political terrorists tend to indoctrinate
their hostages to force them agree and believe with their stand or
political ideology. It is not so surprising that a son of a slain scout
ranger sergeant in Mindanao joined his Abu Sayyaf captors during
the siege in 2000.
4. Poor inaction of the authorities- the hostages in the alarm and
crisis stages of hostage taking want to be speedily rescued before
they will be killed or harmed.
In a crisis [hostage] situation, negotiators consider staling of time
the number one rule in dealing with hostage crisis. On scene negotiators stale
time to decrease tension among themselves and the hostage taker. This might

CRIMINAL SOCIOLOGY 81
2014 CRISIS MANAGEMENT
be misinterpreted by the hostages as they feel neglected. They will end up
sympathizing with their captors and uncooperative to their rescuers.
It should be corrected that providing assistance to the hostage
taker not a conclusion that Stockholm syndrome has occurred. Hostages may
carry the moneybag or the clerk opens the vault due to continue threat of the
hostage taker.
As Stockholm syndrome continue to develop among the hostages
and their captors, the latter will make increase awareness of the safety of the
hostages for fear of losing a shield. The negotiators and the hostages however
may benefit from this phenomenon since the safety of the hostages is
increased. This happens during the accommodation period as hostages may
tend to obey every command of their captors and the latter will decrease or
lessen the degree of security, control and the introduction of physical harm
among the hostages.

REACTIVE MEASURES IN HOSTAGE TAKING INCIDENTS

OPERATIONAL PREMISES OR AREA


Principal Participants: First responding officers, Field supervisors, Threat
Management Force Commander, Tactical Unit Commander
Duties and Functions
a. First Responding Officers:
 proceed to the scene discreetly
 do not return fire except:
 when loss of life is imminent
 when hostage-taker is visible, armed, identifiable and no
 third party will be caught in the crossfire.
 contain the suspect-condor or isolate the area
 request assistance
 evacuate-care of critically injured persons if any
 retain witnesses- gather information
 attempt to communicate their telephone, megaphone or
other means
 deploy responding officers
 Develop required police information-initial report of situation
 keep headquarters/station informed-periodic assessment
 of situation relayed from time to time
b. Field officers
 assumes command upon reaching scene
 evaluate situation
82 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
 prescribed containment procedures until the TMF arrives
c. TMF Commanders
 establishment command post
 coordinate/direct Commander of Tactical Unit Team
 plans/promulgate aggressive operational activities if
required.
d. Tactical Unit Commander
 ensure that suspect is under constant surveillance
 maintain well-planned assault operation, upon order

OPERATIONAL PROCEDURES
1. Stabilization and Containment
 Establish Rapport: get to know the suspect
 Operational Activities -clear area/scene of pedestrians,
required innocent persons to evacuate-this can be done,
throughout non-verbal language, gather information about
the suspect
 submit initial report
 request for additional resources, if needed
2. Consolidation and negotiation
Negotiation and qualities
 civilian volunteer preferred depending upon the call of
incident
 demonstrate sympathy without being emotionally
involved
 ability to accept tension between conflicting views
 maintaining self-control
 possess moral courage and integrity
 patient and good listener
 should not be a decision maker
 possess certain language skills or background which
will lend
 insight into the psycho of the hostage taker
 knowledge in psychology of aggressive human
behavior
 ability to give minor rewards
 ability to withhold rewards

CRIMINAL SOCIOLOGY 83
2014 CRISIS MANAGEMENT
Steps in Negotiation
 On Initial contact - avoid hostile or antagonistic
approach, introduce yourself-don’t use title or rank,
sell yourself-sincere and honest, instill trust and
confidence, minimize tension soonest
 Development - drawing a psycho profile or hostage
taker, reinforce relationship establishment at initial
contact
 Alternative steps
 Climax stage
 Termination

RULES AND PROCEDURES ON NEGOTIATION


1. Stabilize and contain the situation
2. Select the right time to make contact with the hostage-taker
3. Take time when negotiating, allow hostage-taker to speak
4. Don’t offer the hostage-taker anything. What he will ask for will be
part of the negotiation
5. Avoid directing frequent attention to the victim when talking to the
hostage-taker
6. Do not call them hostages. Be as honest as possible; avoid tricks;
be sincere
7. Never dismiss any request from the hostage-taker as trivial or
unimportant
8. Never say “No”, soften the demands
9. Never set a deadline; try not to accept a deadline
10. Do not make alternate suggestion not agreed upon in the
negotiation
11. Do not introduce outsiders (non-law enforcement officers) into the
negotiation process, unless their presence is extremely necessary
in the solution of the crisis; provide that they shall be properly
advised on the do’s and don’ts of hostage negotiation
12. Do not allow any exchange of hostage, unless extremely
necessary; in particular, do not exchange a negotiator for a
hostage
13. Avoid negotiating face-to-face if possible
14. Law enforcement officers without proper training shall not be
allowed to participate in hostage negotiations; and
15. Never introduce ranks/possessions.

84 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
KIDNAPPING FOR RANSOM
KIDNAP FOR RANSOM is a criminal act, particularly described as
the unlawful taking and carrying away a person by force or fraud and against
his will, or in any manner depriving him of his liberty for the purpose of extorting
ransom as payment for the release. KIDNAP FOR RANSOM is a common term
used describes a specific criminal act under ART. 267 of the RPC entitled
“Kidnapping and serious illegal detention.”
KIDNAPPING, in general, poses a serious threat to the peace and order
condition of the country. Focus of concern, however, falls on so-called kidnap
for ransom case, because they exist a heavy tall not only on their victims and
the victim’s families, but also on society as a whole. This is so because kidnap
for ransom is by nature a syndicated crime perpetrated by professional
criminals groups capable of planning their nefarious trade that even a single
gruesome act of kidnapping expertly pulled by them could prove very alarming
to the public.

COMMON MODUS OPERANDI USED IN KFR


1. A kidnap group initially scouts or a potential victim through an
informer or spotter.
2. An informer or spotter could be a gang member or outsider whose
participation is to locate targets for the group.
3. After the would-be victim has been spotted, the kidnap group
conducts a thorough study on his background and his daily routine
movements/activities.
4. Customary route taken by the would-be victim is particularly
observed.
5. After careful surveillance and planning, they would kidnap the
victim at an opportune time.
6. The victim is them brought in a pre-designated area, usually
outside urban places where the victim is held in captivity ransom
for his release is being negotiated.

HOW DOES KIDNAPPERS ABDUCT THEIR VICTIMS?


How facilitate the kidnapping for the victim, a gang member is
sometimes made to seek employment with would-be victim’s family, either as a
diver or as household help. In coordinate with an inside man, the group
snatches the victim at an opportune from the public. Although the manner of
accosting the victim varies from one kidnap group to another, the most
common method of approach used by kidnap groups is by blocking the kidnap
victim’s car by using a military or police-like vehicle, sometimes with siren. At
least one of the kidnappers is in complete military or police uniform and armed
CRIMINAL SOCIOLOGY 85
2014 CRISIS MANAGEMENT
with a long automatic weapon. The victim is intercepted and accosted with
alleged traffic violations.

HOW ARE RANSOM NEGOTIATIONS UNDERTAKEN?


1. Ransom negotiations are later affected through various means of
communications. The most common is through telephone.
2. The kidnappers will call up the relatives of the victim and demands
for a ransom for the release of the victim.
3. An almost hysterical victim is sometimes made to speak over the
telephone and appealed to his bewildered relatives whose
tendency to cooperate blindly with the kidnappers.
4. The kidnappers then indicate the amount, normally in cash
payable on a date and a place specified set by them.
5. Threats on the life of the victim are also relayed to the one
contacted in case term of the ransom one not met which include,
among others, non-disclosure of the case to police authorities.

WHAT ARE THE BASIC OBJECTIVES OF THE SPECIAL UNITS OF THE


PNP IN DEALING WITH KIDNAP-FOR-RANSOM?
By priority, the basic objectives of the PNP Special Unit handling
kidnap-for-ransom cases are the following:
1. To insure safety of the hostage or victim is a paramount
consideration that takes precedence over all others. Utmost care is
therefore exercised in the conduct of rescue operations.
2. To understand and minimize the mental anguish and agony of the
victim’s family and friends.
3. To achieve the early liberation/salvation of the hostage/victim.
4. To insure successful cases against suspected kidnappers.
5. To ensure successful case building and prosecution of cases
against suspected kidnappers.
6. To prepare for any similar eventually that may ultimately endanger
the preservation of internal peace and order.

MOST IMPORTANT ROLE OF THE CITIZENS IN THE FIGHT AGAINST


KIDNAP-FOR-RANSOM.
The role of the citizens especially the families and relatives of
kidnap Victims is to report immediately any kidnapping incident to police
authorities. Aside from this, they should extend their outmost cooperation to the
police not only in the rescue of the victim but also in the effective prosecution of
the suspect as well as in the efforts to locate, identify and arrest kidnap gang
members who remain at large.
86 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
TIPS TO BE UNDERT AKEN TO PREVENT ANY KIDNAPPING OR
ABDUCTION
If you believe that you or members of your family are potential
targets of kidnap-for-ransom groups, the most logical thing to do is to be
SECURITY CONSCIOUS always in your person and in your day to day
activities.
The following preventive measures are hereby suggested:
1. Develop a security system in your residence and in your place of
work
2. Be very selective in hiring your employees or your household help.
It is suggested that you let a trusted person secure the necessary
police clearances for them and check their background.
3. Watch out and report to the police questionable presence of
persons loitering near your home or office.
4. While on board your car, be very observant. If you notice you are
being followed or observed by doubtful characters, taken note of
the vehicle’s description, especially the plate number. If you have
seen the faces/appearances of the persons failing you, try to
remember their descriptions.
5. In your daily trips from home to office or school and back, try not to
develop a pattern. Do not establish definite schedules and routes
in addition, avoid routes that are deserted.
6. If you are accosted or intercepted along the roadway for alleged
traffic violation and asked to pull over by questionable persons,
stop only in a place where there is a policeman or there are other
persons around.

BEST THING TO DO WHEN YOU RECEIVE A KIDNAP NOTICE/CALL


If you receive a kidnap note:
Be calm, don’t panic,
Make written record of the delivery person’s description
Take note of other circumstances of the delivery (time, manner, etc.)
Preserve the note for submission to the police.
During the call:
Try to signal someone else to listen on an extension.
Keep caller on line as long as possible.
Do not antagonize the kidnappers.
Give kidnappers a code word for whatever identification.
Ask for Victim’s name, Where and when seized, Victim’s code name

CRIMINAL SOCIOLOGY 87
2014 CRISIS MANAGEMENT
After the call:
Make a written record of the Caller’s age/sex, Mental state (your assessment),
Peculiarity of speech (lips, accent), Exact words used
Try to take note of background noises and the audibility to telephone reception,
which may reveal the place where kidnappers is calling.

ASSASSINATION
It is the murder of prominent citizens particularly a head of a state
or high official in government or the killing an important person by violent
means, usually from political or religious motives.

What are the basic causes of assassination?


1. Revolutionary Causes – Groups and individuals who become
fanatic in their desires to change an existing government or to
establish a new government often resort to violence by means of
assassination.
2. Economic Causes – In some cases assassination are motivated
by beliefs that the victim is responsible for bad economic financial
conditions affecting the nation, a particular group of people, the
assassin or his family.
3. Ideological Causes- Some assassination are motivated by beliefs
that the intending victim is impairing the principle of the assassin
and his associates.
4. Psychological Causes – Mental derangement, fanaticism, or
emotional instability are motivated factors in most, if not all,
assassination. One or more of these conditions are usually present
in addition to of the other basic causes of assassination.
5. Personal Causes - Revenge, jealousy, hate, and rage or strictly
personal drives have motivated personal Causes of assassination.
6. Mercenary Causes – Some assassinations have been committed
for a monetary reward. There is frequently a distinct difference
between the basic causes of an assassination and the motives
given by the assassins.

Objectives of VIP Protection


1. To protect the lives of personalities, important citizens and their
country.
2. To protect those personalities from illegal pressure being put upon
them, such as terrorism, threats and blackmail.
3. To prevent insult on their honor-embarrassment to protected
persons, his government / country.
88 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
Basic Concepts of Protection
Protection is a buffer set-up thrown around a dignitary who will
either prevent an attack or absorb the shock to such an extent that the results
will not be tragic. It must strive to protect the dignitary wherever he is located
but must always be able to move him to a safer area if the need should arise.
Absolute protection is seldom possible. Therefore, the protective forces should
always try to operate in such a manner that any attempted attack will have the
smallest possible chance to succeed. Every element of protection must be
thoroughly planed in advance and every act of movement of the dignitary and
the protective detail must be scrutinized to make sure it is not playing into the
hands of some attackers. Protection must be surprised proof and flexible
enough to instantly respond to any emergency.
There are usually advance clues of a planned attack and the
protective system must secure this intelligence from all possible sources
resources and recognize the signs of danger.

METHODS OF ACTION USED BY THE ADVERSARY


1. Physical Assault – The inflicting of physical injury, with the aim of
disabling the object of the attack, such as murder wounding and
trashing.
2. Threats – The objectives of threats is to frighten the person and
bring about a change of policy. The adversary may use
anonymous letters; radio broadcast and in the adversary happens
to be from a foreign country, he will have additional means at his
disposal, such as the local press, international forum or
assemblies.
3. Insult and Humiliation – The adversary tries to ridicule the VIP in
the eyes of the people, and will use different means in order to
achieve these objectives.

INITIAL ASSESSMENT FOR DIGNITARY PROTECTION


Plan for protective operations to include a complete evaluation of
the dignitary’s level of threat exposure of possible attackers and the
vulnerabilities of the protected. Develop Intelligence profiling, likely scenarios
and the protector’s environment and routes of travel and security measures
already in place. Finally, the identification, selection, and implication of
protective countermeasures shall be undertaken.

CRIMINAL SOCIOLOGY 89
2014 CRISIS MANAGEMENT
PROTECTION OF VERY IMPORTANT PERSONS (V.I.P.) IS BASED ON
SEVEN DIFFERENT METHODS
1. Physical Protection – This refers to the protection of the VIP and
the installation he uses through the physical presence of his
guards.
2. Secrecy – Information about the VIP, which might be important to
the adversary, will be kept from him.
3. Deception – The publishing of deceptive information concerning
the actions of the VIP.
4. Control – Control over the persons coming into the contact with
the VIP over the object sent to him.
5. Intelligence – The gathering of the adversary’s intentions as to as
assault upon the VIP.
6. Instruction – The VIP and his Colleagues have to coach as to the
necessary precautionary measures.
7. Neutralization of Suspects – Neutralization of people who are
suspected of trying to liquidate the VIP. A good system of
protection will use all of the above mentioned methods. It is not
always necessary to use them at the same time, but generally, it
will be necessary to employ most of them in order to ensure and
efficient protection.

PROTECTION PROCEDURES AND PRINCIPLES


As recognized by most police agencies, absolute and complete
protection against assassination of a dignitary is seldom possible. The goal is
to minimize the chances of success of any contemplated attack. The privacy of
the dignitary must be considered, and under no circumstances should he be
embarrassed. Despite this, protection must be provided against hazards
caused by personal designs, accidents or negligence. Procedures are
unknown to the public. Every phase of security must be carefully planned in
advance. Pertinent factors considered in this planning include; importance of
the protected persons, political attitude of the local population, distances
involved, means of transportation, and duration of the security mission.
Physical protections consist of a series of protective cordons, each
compelled in it. These defensive rings maybe composed of security personnel,
physical barriers, or a combination of both. An example of this type of security
is the protection established around a house from the third echelon of
protection. The depth of the protective forces and the degree of security
established will be governed by the factors considered in the planning stage.

90 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
Security planning should be flexible. Weather conditions and
mechanical failures (including failure if lighting) are two ever-present potential
hazards. The unexpected arrival of a large number of visitors is another
situation frequently encountered. Last minute changes in the schedule of
events occur on occasion. The security must be sufficient trained to cover
these and many more eventualities.
Central direction and unity of effort are of special importance
because of the nature of this assignment. The officer-in-charge should be
designated with full responsibility for all phases of the security mission. Close
coordination must be established with all local military, police and civilian
authority. The security’s responsibility for each phase must be clearly defined.
Arrangements should be made for the local civilian police to control local
inhabitants. All available intelligence channels should be utilized for information
of potential danger areas.

USE OF SECURITY PLAN


An excellent format for preparation of a protective plan is the
standard operation plan used by the police. The requirements of the plan which
are coordination or liaison, the itinerary defense area, personnel and
equipment requirements post designation, cooperation, communication, public
relations, and miscellaneous emergency information, can all be logically
included in the normal five paragraphs of the operational plan.
The plan should be on writing and procedures in sufficient copies,
so that it can be staffed with those officers with whom coordination is
necessary. Only key personnel needed to provide a complete protection are
given an orientation on the events of the plan and should be familiar with the
whole operation. Each participant commits the requirement of his specific
mission to memory. For this reason, the plan contains detailed instruction for
each post and mission. The instruction should be simple to understand and
easy to execute. The length of the plan will depend upon the size of the
mission to be performed. The itinerary consists of one or more men stationed
or in fixed post. Police should know the identity in the party of protected official.
The attitude of the protected official must be estimated by the police officer. In
most instances the presence of security personnel, is unpleasant to the
dignitary. This is understandable in view of lack of privacy. The security
personnel must be aware of this natural reaction, actually anticipate it, and they
observe adherence to strict policies of non-irritating conduct.
In the initial planning stages, all potential embarrassments should
be avoided. It is normally a good policy to avoid direct contact with the dignitary
on details of arrangements. The Officer-in-Charge should coordinate with the
member of the official party who is designated for this purpose. When a
CRIMINAL SOCIOLOGY 91
2014 CRISIS MANAGEMENT
important person ignores the measure which have been taken for his
protection, security officers continue to perform their duties as directed. When
appropriate, they offer suggestion tactfully. The chief of the escort acts
exercises enforcement power over the security of an important person only
when necessary with caution and diplomacy. Any violation of the security
measures for important persons is brought to the attention of the chief of the
escort or guard. The security police officer insures that the guards comply with
every detail of their instructions. Restriction on the circulation of individuals
should be strictly enforced. Before any person is allowed to approach the
important person of his effects, he is checked. The security detail should not
enter into conversation between the dignitary and other individuals. Information
should be given only when solicited. In all dealings with the protected person
and his associates never volunteer for uncalled for personal favors. Deliberate
attempts to ingratiate themselves only serve to degrade the security mission
and result in an undesirable relationship if the official or members of his party is
bothered. Security personnel should react accordingly. The protected person
should set the standards of the relationship. In the absence of such standard
actions of the security detail should be formal.

THE USE OF WEAPONS


There is always the danger of undue alarm due to accidental
discharges, and the injury of innocent persons, when weapons are carried. All
personnel should carry a holstered sidearm of at least .38 or 9mm caliber.
Automatic pistol should contain a fully loaded magazine with a round in the
chamber and the safe on. In certain areas, when attackers are made in force
by armed mobs, the appropriate weapon or machine gun can be used. The
machine gun is also used when attacks are made from vehicles, and when the
attackers are behind shields or barricades. Riot or shotguns should be
available when the attack is made in a congested area where there is danger
of injuring innocent people if long-range weapons are used. They are also
effective against mobs using “Banzai” type of attacks. The use of police
nightsticks and tear gas will break up and confuse the crowd, making their
movement by the protective force easier.

CROWD CONTROL
The protective personnel should understand the principles of
crowd control. They should not show prejudice, sympathy, or become involved
in the grievances of the crowd. When force is necessary, the protective force
should move with speed and surprise. At the first sign of disorder all leaders
should be apprehended. The real troublemakers are usually to the rear of the
crowd. Protective forces should not be fooled or deterred by mob leaders who
92 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
arouse and use women and children in front ranks to shield themselves from
aggressive action by the protective personnel. The crowd’s retreat should
never be hindered, it should be moved in the direction where there is no space
to disperse.

AREAS AND BUILDING SURVEY


All areas to be occupied or visited by the protected person should
be surveyed in advance. The procedure to be prescribed for building inspection
is complete and thorough. In many instances, the dignitary is a state visitor of
the visitor of the nation; on other occasions he may be the houseguest of other
high-ranking government officials. At times, he may stay in hotel occupied by
numerous other guests. Certainly, all the inspection listed in this section is
feasible. The Officer-in Charge and his advance party use common sense of
sound judgment in establishing the best security possible under existing
circumstances. In some instances, the advance party can facilitate security
measures by arranging for a separate floor or wing of a hotel as a billet for the
party. Normally, billeting arrangements are included in the itinerary prior to the
start of the security detail. Proper building inspection entails a thorough
examination from roof to basement. Blueprints of the building should be
obtained. Rooms and hallways are measured visually and compared with the
dimensions indicated in the building plan to locate any hidden passage or
alcoves. Each room is examined systematically. Walls, ceilings, are mentally
divided in to three-foot squares and each square minutely examined for cracks,
evidence of recent repairs, or any unnatural appearance. Suspicious areas
should be examined satisfactory by reliance on operating or maintenance
personnel. All furniture are carefully examined, all doors opened and drawers
are removed as check for concealed compartments. All wires leading into or
leaving the various rooms are traced and all devices connected with them
identified. Heating radiators, plumbing, pipes and similar equipment are
carefully examined for dummy installations. All locks and locking mechanisms
are inspected. After the inspection is completed, the room or building is
secured until used.

PROTECTIVE TECHNIQUES
PROTECTION WHILE RIDING IN VEHICLES – The selection of
security trained driver and the type of vehicles to be used should be given
thought, then a closed car provided with greater concealment and therefore
better protection for the dignitary recommended. Route survey should be
conducted in advance before actual travel and protective details should be
equipped with radio communication processing encoding-decoding
“scrambling” capabilities. All auto motive equipment should be excellent
CRIMINAL SOCIOLOGY 93
2014 CRISIS MANAGEMENT
mechanical condition and should be regularly inspected for signs of tampering
and bullet proof if possible. The driver should be well trained and reliable.
Vehicles must be secured at all times during security missions. Escort vehicles
should precede the protected vehicle. The security vehicle should follow the
protected vehicle as closely as possible consistent with driving safety. An
advance car should precede the convoy by approximately one-half kilometer to
observe hazards and reports on unusual conditions. A reserve vehicle should
follow the convoy as a short distance from the rear for use in emergency. The
escort follow-up and all security vehicles should maintain radio contact.
Whenever possible, a member of the security detail is placed in the protected
person’s vehicle. In extreme conditions, when greater security is necessary,
one or two dummy vehicles, carrying individuals who are similar in appearance
to the protected person, may be included in the convoy. Fixed post and
bridges, underpass, and traffic stops must be secured when deemed
necessary. An alternate route should be arranged for emergency requirements.
Unless indicated by competent security the convoy will confirm with the local
traffic regulations. Evaluation of such situation is made to determine the degree
of security, which is practical and necessary.
TRAVEL BY TRAIN – Generally, the greatest potential security
hazard exists at the points where the escorted person boards or leaves the
train. Usually this is a congested area with numerous individuals carrying all
sorts of bags, packages, and containers. In the study of assassination
techniques, the large number of attempts in this location is not worthy. When
possible the area should be closed to the public or the dignitary’s party, it
should be attached to the rear of the train where feasible. The members of the
security detail should be in control of all entrances of the car. When the train is
stopped, they assume position covering all avenues of approach to the car. If
the protected person leaves the train for a temporary period constant security
should be maintained on the train until the protected person returns and the
train departs. Prior coordination should be made with railway officials for exact
scheduling of stop en route. Railroad security and local police at scheduled
stops can be contracted for standby assistance. When deemed necessary
advance and rear guard train may be placed on the other cars of the train,
seated among passengers, as an additional safeguard.
TRAVEL BY AIR – Normally, a special plane is placed for
transporting the dignitary and his official party. The technical safety factors,
such as clearance of operating personnel and control of flight, are
responsibilities of the operating agency when performed by military forces. The
most dangerous periods, as in train, movements are boarding and departure
times. All structures offering observation of the boarding shall be adequately
secured either by closing of when not used or by strategic placement of
94 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
security detail. When a large crowd is expected for takeoff ceremonies,
barricades and uniformed military or police force in sufficient numbers should
be included in the planning. The plane designated for the important person
should be kept away from contact with the plane. When the designation is
another base, advance arrangements should be made with the Air Force Office
for additional security and transportation is normally scheduled for the
important person and his party. It should not be forgotten however, that
arrangements must be made for the accompanying security personnel.
TRAVEL BY SMALL WATERCRAFT – When planning for a
cruise, the boats selected should be of types and sizes capable of withstanding
weather and surf conditions that may be encountered. A thorough inspection of
the boat designated for the protected person should be made in conjunction
with responsible ship personnel. The inspection is primarily for unauthorized
persons stowing away for any suspicious objects or packages. An additional
check should be made for adequate lifesaving and emergency facilities.
Security personnel should be alert for either crafts approaching the dignitaries’
boat. When feasible, arrangements should be made for a boat to follow the
protected person’s boat.
PROTECTION WHILE WALKING – One of the best protective
measures is varying the selection of walking times and routes. The security
detail accompanying the dignitary should be positioned to cover all avenue of
access, additional security personnel should cruise in the immediate vicinity.
Local police agencies can be of special value in adding background security in
these instances.
PROTECTION AT PUBLIC ASSEMBLIES – A careful search and
inspection of the area should be made at the time protection is established. A
physical defense zone should be set up immediately around the dignitary, and
additional concentric defense area should be added to the greatest possible
extent. Protection in the defense zone is provided by protective personnel,
permanent or temporary type barricades, and a combination of the above
techniques. Screening points to admit passage of authorized persons and
materials should be established. Observant and inconspicuous personnel
should be patrolled among the crowd. Maximum use should be made of
security aid such as flood and spot lights, communications, emergency
equipment, special weapons, locks, barricaded areas, and helmet proof
equipment, and materials.
PROTECTION WHILE IN A RESIDENCE – The protective detail
should occupy at least one protective ring. At least two additional areas should
be established in the outer perimeter. There must be a pass system for the
staff and frequent visitors. Food suppliers should be checked and food
selection and handling should be controlled, Mail and packages should be
CRIMINAL SOCIOLOGY 95
2014 CRISIS MANAGEMENT
fluoroscope. Periodic inspection should be done on premises for safety
hazards, lethal devices such as bombs, traps and sufficiency of security
equipment. Adequate communication should be maintained, and all possible
emergency situations should be considered.

PLANNING CONSIDERATIONS
The nature of the Assassin - The assassin is a discontented
individual who decides to kill the person whom he thinks is responsible for his
difficulties. He attempts to gain advantage by the use of surprise. A well-trained
protective force that he is likely to be caught does not discourage him.
Assassins do not have distinct features. They are not concerned about death.
Many of them suffer from mental disorders. A mentally unbalanced person is
not necessarily stupid and as a matter of fact they can be ingenious.
Assassination of VIP normally features the following:
1. The location of victim at a given time will be known in
advance by the assassin.
2. The assassin with his weapon will choose a position giving
him access to his victim.
3. The protection detail will be attracted by some diversionary
interest or otherwise inattentive.
Break down of planning
BEFORE: Plan must be extensive and thorough as follows: Plan
should be in writing. Plan should be specific-complete for each post and for
each person involved. Plan should be simple to understand and easy to
execute. Plan should be carefully read and committed to memory. Coordination
among the different agencies must be laid out. Details and schedule of activity
contemplated should be in advance. Define and establish the defense area.
Number of personnel should be determined. The accessory equipment should
be itemized and the distribution shown. Means of communication
DURING: Protective force should function as a team. The aim
should be that nothing occurs that might jeopardize the safety of the VIP.
AFTER: Summarize things that happened in the operations.
Evaluate individual performance; bring out the weak points and suggestions for
improvements. Encourage individual members to discuss their particular
assignments. Encourage group discussions. Central summarization with
outlook on succeeding operations.

96 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
BOMBING
(Incident Awareness)
IS BOMBING A SERIOUUS SOCIAL PROBLEM? Bombing is a
very serious social problem as when a bomb explodes, casualties and
destruction of property is very essential. When bomb incidents occur, people
are affected directly and indirectly. Work stoppage (evacuation), tension, fear
or panic is felt by the people within the area. Even if a person is not directly
affected, just hearing or reading the news about such incidents can make him
apprehensive. Also, some people could take the chance, as leverage to scare
or threaten would be victims for some reasons like extortion or just for pranks.
Bomb incidents include bomb threats and actual bombings. It can happen
anywhere and anytime. With the recent advancement of science and modern
day technology, bombs becomes more sophisticated, smaller in sizes, easy to
handle, easy to plant, easier to transport but with more devastating effect.
The tactics common to terror groups is bombing. Of all terrorists
incidents recorded. 70% were attributed to terrorist’s bomb. The bomb is a
popular weapon because it is cheap to produce, easy to make, has variable
uses and is difficult to detect and trace after the event. Investigations have
revealed that the targets for “terrorists bombing” are not selected at random.
The modus operandi for selecting the target and planting the explosives
appears to follow this pattern: The target is selected because of political or
personal gain to the terrorists. It is then kept under surveillance to determine
the entrances and exits most used.
Reconnaissance of the building is made to locate an area where a
bomb can be concealed, do the most damage and here the bomber is least
likely to be observed. A test or dry run of the plan is often made. After the dry
run and at a pre-determined time, the building is infiltrated by the bomber to
deliver the explosive or incendiary device. The device maybe partially pre-set
prior to planting. If it is fully set and charged, it is simple matter for one or two
of the group to plant the device in a pre-selected concealed area. This can be
accomplished in a minimum of time. If the device is not fully set and charged,
one member may act as lookout while others arm and place the device. Most
devices used for the destruction of property are usually of the time delay type.
These devices can be set for detonation to allow sufficient time for the bomber
to be at a considerable distance away before the bomb threat call is made or
the device is detonated.

HOW TO PREPARE (against Bombing)


The terrorists have developed their plan of attack and the following
procedures are suggested to business and industry for coping with the bomb
threats and actual bombings. Contact the police, fire department and other
CRIMINAL SOCIOLOGY 97
2014 CRISIS MANAGEMENT
local government agencies to determine whether any has a bomb disposal unit.
Under what condition is the bomb disposal unit available? What is their
telephone numbers? How can you obtain the services of the bomb disposal
unit in the event of a bomb threat? Will they said unit assist in the physical
search of the building or ill they only disarm or remove the explosive device.
Establish strict procedures for control and inspection on packages and material
entering critical areas. Develop positive means of identifying and controlling
personnel who are authorized to access to critical areas. Arrange if possible, to
have police, fire representatives with members of your staff, inspect the
building for areas where explosives are likely to be concealed. This may be
accomplished by reviewing the floor plan of the building. During inspection, you
should keep particular attention to rest rooms, storage, crawl areas, trash bins,
main switches, etc. It can give you an idea where a time delayed explosive
device or incendiary device may be concealed. All security and maintenance
personnel should be alert to suspicious looking or unfamiliar persons or
objects. Instruct security and maintenance personnel to makes periodic checks
of all rest rooms, stairways and other areas of the building to assure that
unauthorized personnel are not hiding or conducting surveillance of the area.
You should assure adequate protection for classified documents, proprietary
information and other records essential to the operation of your business. A
well planted, properly charged device could, upon detonation, destroy those
records needed in day to day operation. Instruct all personnel especially those
at the telephone switchboard in what to do if a bomb threat call is received.
As a minimum, every telephone operator or receptionist should be
trained to respond calmly to a bomb threat call. To assist these individuals, a
bomb threat checklist should be kept nearby. In addition, it is always desirable
that more than one person listen in on the call. To do this, have a covert
signaling system to a second reception room. A clam response to the bomb
threat could result in getting additional information. This is especially true if the
caller wishes to avoid injuries or deaths. If told that the building is occupied and
cannot be evacuated in time, the bomber may be willing to give more specific
information on the bomb location. Organize and train an evacuation unit
consisting of key management personnel. The organization and training of this
unit must be coordinated with other tenants of the building.

COUNTER BOMB INCIDENTS


PHYSICAL SECURITY PLAN - Physical security measures taken
for the protection of property, personnel, material, facilities and installation
against unauthorized entry, trespass, damage, sabotage or other illegal or
criminal act. It deals with the prevention and is designed to protect against not
only bombing incidents, but a full range of possible attacks. Particular attention
98 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
must be given to the third pre-requisite because this is the one area which a
law enforcing organization has the greatest opportunity to deter a bomb
incident. If adequate preventive measures and physical security precautions
are established; the opportunity to obtain explosive and emplace bombs will be
reduced. In addition, an effective bomb threat plan and well-rehearsed
procedures for handling bomb threats and incidents will reduce the chances of
a bomb being successfully detonated.

COUNTER MEASURES AGAINST SABOTAGE BY EXPLOSIVE/


INCENDIARY ARE;
1. PHYSICAL SECURITY EDUCATION
2. USE OF EFFICIENT SECURITY FORCE
3. IDENTIFICATION AND MOVEMENT CONTROL
4. USE OF PHYSICAL SECURITY AIDS
5. DESIGNATION OR RESTRICTED AREAS
6. SEARCHES OF INCOMING VEHICLES
7. EMERGENCY PLANNING
8. GOOD HOUSEKEEPING
BOMB INCIDENT PLAN- A plan providing detailed procedures to be
implemented when a bombing attack is executed or threatened. Elements of
this plan are;
AUTHORITY AND CONTROL
1. WHO WILL IS INCHARGED OF THE INCIDENT?
2. WHERE WILL CONTROL CENTER IS LOCATED?
3. HOW WILL CRITICAL DECISIONS BE MADE?
4. WHO WILL MAN THE CONTROL CENTER?
5. WHAT PRIMARY AND ALTERNATE COMMUNICATION
SYSTEM WILL BE DURING THE INCIDENT?
THREAT EVALUATION
1. CHARACTERISTICS OF THE THREATENER SUCH AS AGE,
ETHNIC GROUPING, AND PHYSICAL AND MENTAL
CONDITION
2. BACKGROUND NOISES (TELEPHONE THREAT) THAT GIVE
INDICATIONS OF CALLER LOCATION.
3. TARGET IDENTIFICATION, DID THE THREAT INDICATE A
VALID TARGET?
4. TECHNOLOGY; IS THE DEVICE DESCRIBED TECHNICALLY
LOGICAL AND POSSIBLE?
5. ANALYSIS OF RECENT LOCAL BOMBING ACTIVITY. IF THE
EVELUATION OF THE THREAT INDICATES THAT THE THREAT
IS VALID, ACTION IS REQUIRED TO MAINTAIN SAFETY OF
CRIMINAL SOCIOLOGY 99
2014 CRISIS MANAGEMENT
PERSONNEL. SECONDARY CONSIDERATION IS GIVEN TO
DAMAGE REDUCTION.

EVACUATION
A number of factors may influence the decision whether or not to
evacuate. Threat assessment is the primary consideration. Also, the most likely
place for a device to be located is on the exterior of the building. Evacuation to
the outside of the building may increase the danger to personnel. The second
most likely places to conceal a device are those areas of accessibility to the
public, i. e., hallways, lobbies, and restrooms. Evacuation of personnel through
public areas may increase the hazard. Secondary assembly points should be
established in the event the device is located at/near the primary assembly
point.
An alternative to total evacuation is partial evacuation, which is effective
when the threat indicates the specific location of the device. Partial evacuation
requires a high degree of planning. Should a device be located, the area
around the item as well as the floors above and below the suspected item
should be evacuated immediately.

SEARCH PROCEDURES
1. WHAT WILL BE SEARCHED?
2. WHAT SEARCH TECHNIQUES WILL BE EMPLOYED?
3. WHO WILL SEARCH?
The search must be thorough, systematic, and quick. The bomb
threat plan should include floor diagrams and room search cards. These
expedite search, prevent duplication of effort, and prevent areas from being
overlooked. The building search should start simultaneously at four places; the
exterior search, public search area, the detailed room search, and the garage
search. The search starts at the lowest part of the building, i.e. basement,
garage, or bottom floor. As the exterior search and public area search teams
complete their tasks, they will supplement the detailed room search teams in
progress. Two-person teams have proven most effective in searching must
areas. Exceptions would be for search or very large areas such as parking
garages and auditoriums.
Except for the most unusual circumstances for VIP and or
presidential technical security measures, eod/bomb squad and military/police
will not be used to search for reported explosive device in community areas,
building and offices. Rather, such searches must be conducted by designated
individuals familiar to the area and its contents. If an unusual item is found, eod
is to neutralize and evacuate the device for disposal. Law enforcement

100 CRIMINAL SOCIOLOGY


CRISIS MANAGEMENT 2014
personnel are to be employed around the threatened area to control traffic and
provide other regulatory service.

DAMAGE REDUCTION
Damage control techniques include standby of fire and medical
services; disconnection of gas, fuel, and electrical power; evacuation of
personnel; and venting by opening doors and windows to minimize blast
damage, and use of blast attenuation techniques.

REMOVAL
Removal of an improvised explosive device or a suspect item is an
eod function. Under certain conditions where evacuation is impossible or bomb
disposal personnel are not available, it may be necessary for someone to take
steps to remove the ied to an exterior holding area or to neutralize the device.
It must be understood that these procedures should be used ONLY AS A LAST
RESORT AND ONLY ON THE APPROVAL OF THE SENIOR OFFICIALS IN-
CHARGE.

DETONATION
If a detonation occurs, it may be necessary to organize rescue
teams, first-aid personnel, and the site security personnel. Likewise course of
action taken must be done such as:
1. secure and control access to the compound/and or building
2. control and extinguish fires
3. search area for secondary explosive device
4. supply immediate first-aid, remove dead and injured from
the area
5. secure entire blast scene, including area suspected or
known to be the point of detonation
6. minimize disruption of the blast scene pending investigation.
Do not move or remove any evidence debris, bomb
components.
7. Photograph area including known or suspected point of
destruction
8. If building is safe to enter, shake down area to ensure all
classified materials

BOMB THREAT
It is a message delivered by any means, warning or claiming the
presence of one or more bombs. A bomb threat may or may not specify the
location of a bomb. It may or may not include the time of detonation/ignition. It
CRIMINAL SOCIOLOGY 101
2014 CRISIS MANAGEMENT
may or may not contain an ultimatum related to the detonation/ignition or
concealment of the bomb. Reasonable explanations for receiving a bomb
threat:
1. The caller has definitive knowledge or belief that an explosive or
incendiary device has been or will be placed in an area and wants
to minimize personal injury or property damage.
2. The caller wants to create an atmosphere of anxiety and panic
which will in turn, possibly result in a disruption of normal activities
at the target area.
3. The caller wants to bring about or amplify a lack of confidence in
the existing leadership or programs.
4. Each threat received through any means of communication, should
be treated as real and must be thoroughly evaluated to safeguard
life and property. The following procedures apply to recipients of
the threat;

Telephone calls
1. A checklist of guidelines should be readily accessible (telephone
bomb threat report form)
2. Keep the caller on line as long as possible. Ask him to repeat the
message. Record every word spoken by the person.
3. If the caller does not indicate the location of the bomb or the time
of the possible detonation, you should ask him for this information.
4. Inform the caller that the building is occupied and the detonation of
a bomb could result in death or serious injury to many innocent
people.
5. Pay particular attention to peculiar background noises such as
motors running, background music and any other noises which
may give clue as to the location of the caller.
6. Listen closely to voice (male/female), voice quality (calm/excited),
accents and speech impediments, immediately after the caller
hangs up, you should report to the person designated by
management to receive such information. Since the law
enforcement personnel will want to talk first hand with the person
who received the call, he/she must remain available until they
arrive.
7. Report the information immediately to the police/fire/bomb squad
and other appropriate agencies or counter-action.

102 CRIMINAL SOCIOLOGY


CRISIS MANAGEMENT 2014
Handwritten/ typed notes
Save all materials, including any envelope or container. Once the
message is recognized as a bomb threat, further unnecessary handling must
be avoided. Every possible effort must be made to retain evidence, such as
fingerprints, handwriting r type writing, paper and postal marks which are
essential to tracing the threat and identifying the writer. While written messages
are usually associated with generalized threats and extortion attempts, a
written warning of a specific device may occasionally be received. It should
never be ignored. With the growing use of voice print identification techniques
to identify and convict telephone callers, there will be an increase in the use of
written warnings and calls t third parties.

Person to Person (Indirect)


Notify your supervisor immediately. Keep the person making the
threat or indicating knowledge of a threat under surveillance until relieved by
your supervisor. Take note of the age, height, and weight, sex color of eyes,
hair, skin, clothing, and unusual characteristics such as lameness, twitching or
any peculiarities of the person under surveillance. Observe for other personal
defects. If the person leaves the scene, take note of the transportation used,
such as bus, taxi or car, note the make, model, color, plate number and
marking of the vehicles used. Pinpointing the exact location of the bomb must
be the primary concern. The following procedures apply when the location of
the bomb is known:
1. Inform immediately your supervisor or officer
2. Coordinate with the nearest police4 unit on how t avail the services
of the bomb squad
3. Alert fire station and medics
4. Cordon the area.

BOMB IDENTIFICATION AND DETECTION


Usually, bombs that are used for terroristic purposes are disguised
and are contained in any of the following:
GIFT WRAPPED PACKAGES, BISCUIT CANS, FRUIT
COCKTAIL BASKETS, ATTACHE CASE/SUIT CASE, LUNCH
BOXES, LAUNDRY BAGS, SHOPPING BAGS, ENVELOPE,
BOOKS, CLUTCH BAGS, LETTERS, TRASH BOXES, GARBAGE
CANS, LADIES BAGS, CAR/BOXES, CARTONS,

HOW TO DETERMINE IF BOMB EXISTS


1. By using visual inspection without the use of any instrument or
apparatus or touching the suspected object.
CRIMINAL SOCIOLOGY 103
2014 CRISIS MANAGEMENT
2. Visualize the suspected object at a distance t see if there is any
relation or connection to its surroundings. If none, take a closer
look to see if there is or there are protruding wires or gadgets;
3. check without touching if the suspected object emits smell of gas
or commonly smelled chemicals;
4. check if the presence of the suspected object in the area is
unusual or strange;
5. be quiet and listen if there is a tic-tac sound of a clock

LOCATION OF BOMBS
1. The location of the bomb at the target site is usually determined by
three criteria:
2. The location must be accessible to entrances.
3. The location must be accessible to exits, but isolated enough for
the bomber to conduct his mission.
4. The location would also be as place where the most structural
damage to the building would occur.

WHAT TO DO IF THE SUSPECTED BOMB IS LOCATED


Discovery of what appears to be suspicious material as a result of
telephoned information or accidental discovery, calls for action on the part o
the individual only to a limited extent. Evacuate the personnel to at least 300
feet away from the building/bomb. Turn off the electrical and gas units. N
attempts should be made to move, alter, open or examine the article. Above
all “Don’t panic”. Once it has been determined that explosive items on
inspected package exist and while awaiting for the arrival of eod/bomb squad
personnel, start the protective works by utilizing minimum number of person for
reason of safety such as VENTING – which is the opening of doors and
windows to minimize the blast effect; BUTTRESSING – which is sandbagging
adjacent walls to prevent blast and shock damage to adjacent rooms and
BAFFLING – which is the placing of sandbags around the bomb to minimize
blast fragment damage.

METHODS OF DELIVERY - Mail, Planted (booby trapped), Thrown, Projected,


Delivered by agents

WHAT TO DO WHEN BOMB EXPLODED - Alert personnel for possible


additional bombs, secure bombing scene and evacuate the injured, leave
obviously dead personnel, when fire occurs after explosion, assist in putting off
the fire and collect and preserve evidence.

104 CRIMINAL SOCIOLOGY


CRISIS MANAGEMENT 2014
DON’T’S IN HANDLING SUSPECTED BOMB PACKAGE
1. Do not attempt to open the package.
2. Do not submerge in water due to conductivity f electric circuit and
the possibility of violent reaction of chemical.
3. Do not indiscriminately shake or jar suspected package due to the
possibility of disturbing the trigger mechanism.
4. Do not puncture or cut the box with metallic object as the
possibility of an electronic probe may be employed.
5. Do not cut string or unwrap package due to the possibility of
pressure release type devices
6. Do not accept identification markings on any suspected packages
as legitimate
7. Do not allow radio transmission near the vicinity f suspected
package, explosion may occur due to static electricity by
transmitter.
8. Do not pass metallic tools or things over or near the vicinity of
suspected package until identification f contents are made due to
magnetic device present
9. Do not switch on lights or any electrical switches just to light up the
area
10. Do not use siren of police, fire or ambulance in the area.
11. Do not use photoflash in the immediate area
12. Do not underestimate the size of the package like a pack of
cigarette or a lighter; it could be a powerful explosive. Above all,
do not panic.

THREE CHARACTERISTICS OF A BOMBER


ON PSYCHOLOGY
 Several forms of bombings are attractive to the radical mind.
 Bombing historically is linked to anarchy and classical
revolution
 Bombing is a symbol of extreme frustration
 Satisfying feeling of conspiracy, danger, action, drama and
finally group excitement
 Disassociation psychologically from any resulting death or
injury
AS TO TECHNOLOGY
 Commercial explosive materials are not necessary to
construct effective bombs.

CRIMINAL SOCIOLOGY 105


2014 CRISIS MANAGEMENT
 Underground literatures and legitimate publications are
available
 Contrary to popular beliefs, colleges of high school students
taking up chemistry subjects have the capability of making
bombs.
AS TO SECURITY
 Successful bombings destroy the kind of evidence that can
lead to conviction of bombers.
 Fingerprints, bloodstains and tool marks offer no threat to
the careful bombers.
 Eyewitnesses and incriminating evidence are frequently not
available in bombing scene.

BOMBER SKILL LEVEL MOTIVATING FACTORS OF A


BOMBER
Amateur Experimentation
Semi-professional Vandalism
Professional Ideological perception
Emotional release
Profit

SPECIAL WEAPONS AND TACTICS (SWAT): Tactical Crisis Management


Tactical Crisis Management
SWAT Teams
SWAT teams are highly trained police units. A unit is a small group
within a larger group. SWAT stands for Special Weapons and Tactics. Tactics
are actions aimed at solving problems. SWAT team members are weapons
and tactics specialists. A specialist is a person trained for a particular job.
SWAT team members use their special weapons, tactics, and training to
protect the public. They handle police emergencies. An emergency is a sudden
and risky situation. Police send SWAT teams to any kinds of police
emergencies. The emergencies often involve one or more heavenly armed
suspects. A suspect is a person believed to have committed a crime. SWAT
teams work on hostage situations. A hostage is a person held against his or
her will. SWAT teams perform many jobs. They come to robberies that are in
progress. They help guard government officials. They help stop terrorists. A
terrorist is a person who tries to get what he or she wants by threatening or
harming others. SWAT teams also patrol high-crime areas.

106 CRIMINAL SOCIOLOGY


CRISIS MANAGEMENT 2014
SWAT Team Names
SWAT teams can be part of city, county or state law enforcement
agencies. A law enforcement agency is an office or department that makes
sure people obey laws. Police department and sheriff’s departments are
examples of law enforcement agencies. Law enforcement agencies use
different names for their SWAT teams. The names include Emergency Service
Unit and Emergency Response Team. They also include Mobile emergency
Response Group and Equipment (MERGE) and Tactical Response Team.

SWAT Team Beginnings


The New York Police Department (NYPD) had one of the earliest
specially trained police units. In the mid-1880s, the NYPD set up small units of
police officers. The department called these units strong-arm squads. The
squads fought criminal gangs. Police clubs were their only weapons. By the
1920s, criminal gangs had grown in size and power. The gangs bought
handguns, rifles and submachine guns. A submachine gun is a light gun that
fires rapidly. The criminal gangs fought one another on New York City streets.
Many innocent people died. In 1925, the NYPD formed the Emergency Service
Unit (ESU). The department also formed the Gunman’s Squad as part of the
unit. The squad included 60 heavily armed police officers. The officers had
handguns, rifles and submachine guns. They worked on cases involving
criminal gangs. They patrolled the city in green trucks. Other large police
departments formed early SWAT team units. These units also worked to stop
criminal gangs.

Growth and Change


The Gunman’s Squad is a good example of how the early SWAT
teams grew and changed. This squad became the Mobile Security Unit (MSU)
in the late 1940s the new unit larger than the old unit. It continued to fight
criminal gang activity. The MSU changed in the late 1960s. More people lived
in New York City. The number of murders and robberies increased. The MSU
formed the Stakeout Squad to fight the increase in crime. The NYPD’s best
police officers joined the Stakeout Squad. Each member was a skilled police
officer and marksman. A marksman is a person skilled and aiming and
shooting gun. The Stakeout Squad work on difficult cases. It helped the NYPD
lower the number of murders in the city. In the 1970s, Stakeout Squad officers
learned new skills. They learned anti-terrorist tactics and special weapons
skills. Officers also learned how to rescue hostages. The skills helped them
fight terrorists. In the 1980s, the squad was taken over by the Emergency
Service Unit. Today, this unit controls all NYPD SWAT operations.

CRIMINAL SOCIOLOGY 107


2014 CRISIS MANAGEMENT
The LAPD SWAT TEAM
The Los Angeles Police Department (LAPD) changed law
enforcement around the country in the 1960s. Los Angeles police officers
found themselves outgunned by criminals. The criminals had powerful
weapons. So the LAPD formed a specially trained and armed police unit to
protect people. The LAPD named the unit the Special Weapons and Tactics
(SWAT) team. Team members received special weapons training. They also
learned how to handle police emergencies. The team was very successful.
Other police and sheriff’s departments saw the success of the Los Angeles
Police Department’s SWAT team. Many departments formed their own SWAT
teams. Today, special training centers in the United States train and organize
many SWAT teams. The centers teach SWAT team members tactics and
weapons skills.

SWAT Team Officers


There are more than 17,000 police departments in the United
States. Many have either full-time or part-time SWAT teams. Many SWAT team
officers work more than 40 hours each week. Most officers are on call 24 hours
a day. On call means ready to work at any time. SWAT team officers perform
hard and risky work. They risk their lives each time they go out on a police
emergency. Police officers are not ordered to join SWAT teams. Instead, they
volunteer. Volunteer means to offer to do a job.

Training
SWAT team officers receive special training. Large police
departments usually conduct their own training. Officers in small units receive
SWAT training from large units and from training centers. The federal
government also trains large and small SWAT teams. The FBI operates an
advanced training school at Quantico, Virginia. The U.S. Army and U.S. Marine
Corps also conduct training classes. During training, officers learn through
classes and field work. Officers learn about different weapons and practice
using them. Officers also receive other training. Many officers learn advanced
first aid. First aid is early medical help. Some officers learn to be
sharpshooters. A sharpshooter is a marksman skilled at hitting small or distant
targets. Some officers learn to handle and use tear gas. Tear gas is a gas that
causes a painful burning feeling in the eyes and lungs. Tear gases disable
suspects. Other officers learn communication skills. Communication is the
sharing of information. Communication allows officers to calm suspects by
talking to them.

108 CRIMINAL SOCIOLOGY


CRISIS MANAGEMENT 2014
Special Teams
Most SWAT teams include three kinds of smaller specialized
teams. They include negotiator teams, containment teams, and entry teams.
Each team performs a different kind of job. Sometimes only one specialized
team works on an emergency. Other times, all three teams work together.

Negotiator Teams
Negotiators are communication experts. They listen and talk to
suspects during police emergencies. Negotiators use words to reason with
suspects and solve problems. They often work on hostage situations. They try
to convince suspects to free their hostages and surrender. Surrender means to
give up peacefully. Negotiators have to be calm. They must think carefully
about each word they say. They do not want to upset a suspect. This could
cause a suspect to harm hostages. Negotiators may spend hours talking with
suspects. Sometimes they use phones and talk from a safe distance. Other
times they talk with suspects in person. In these cases, suspects will often talk
only if negotiators do not have weapons.

Containment Teams
Containment teams control and contain crime scenes. Contain
means to hold in. they make sure innocent people do not become involved in
situation. They also make sure that suspects do not escape. Containment
officers make observations and report what they see to their leaders.
Sometimes they have to shoot at suspects. Containment officers take different
positions at a crime scene. They choose locations that help them see what is
happening. Some may crouch on rooftops. Some may stand in doorways.
Others may take positions behind cars. Containment officers are patient. They
control their emotions while under pressure. Containment officers also think
carefully before they shoot. Careless shots could not hurt innocent people or
lead to deadly shoot-outs.

Entry Teams
Entry teams enter and search buildings. Their job is of find and
captures suspects in the buildings. They also try to locate and rescue
hostages. Sometimes entry team officers must secure crime scenes. This
means they prevent suspects from harming others or killing themselves. Entry
team officers also prevent suspects from escaping or destroying evidence.
Evidence is facts or objects that help prove guilt. Entry team officers can break
through locked or barricaded entrances quickly. Barricaded means blocked.
The officers use tools to break windows and push through doors. Quick entries
allow officers to catch suspects off guard. This makes entry operations safer.
CRIMINAL SOCIOLOGY 109
2014 CRISIS MANAGEMENT
SWAT TEAMS OPERATIONS
All swat teams try to resolve police emergencies as quickly and
safely as possible. They want to capture suspects without harming the public,
hostages, or the suspects. SWAT teams work carefully during their operations
to reduce chances of harm or death. SWAT teams use different tactics to
reach these goals. They try peaceful tactics first.
Peaceful Tactics
Waiting is one peaceful tactics SWAT teams use. SWAT teams
sometimes wait for hours before they take more forceful action. Waiting gives
suspects a chance to think about what they are doing. SWAT teams try to
resolve police emergencies with peaceful tactics. It also suspects time to think
about what may happen to them. Sometimes suspects surrender after they
have time to think. Persuasion and negotiation are other tactics SWAT team’s
use. Persuasion is trying to change a person’s mind. Negotiation is talking to
reach an agreement. The goal of these tactics is to talk suspects into
surrendering without harming others. Many times, SWAT teams use other
tactics in combination with persuasion and negotiation. For example, teams
may cut the heat or air. They may constantly ring doorbells or call suspects on
the phone. These tactics make the suspects nervous. Sometimes they make
criminals more willing to surrender.

Forceful Tactics
SWAT teams change their tactics if more force is needed. They
use forceful tactics when negotiation and persuasion tactics fail. They also use
forceful tactics if the lives of hostages and officers are in danger. Forceful
tactics include the use of tear gas. Forceful tactics include using tear gas,
storming buildings, and attacking with sharpshooters. Tear gas is the least
forceful of these tactics.

Tear Gas
SWAT team officers often use tear gas as their first forceful tactic.
Officers shoot cans of tear gas through windows and doorways with tear gas
guns. The tear gas makes suspects’ eyes burn and swell. The suspects have
a hard time breathing in rooms filled with the tear gas. Tear gas often disables
suspects. This allows officers to arrest suspects safely. Other times, tear gas
forces suspects to surrender.

Entering a Building
Sometimes officers must enter buildings to try to capture suspects.
Entry teams meet at a staging area before entering a building. A staging area
is a safe area near a building that officers plant to enter. Entry team members
110 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
check their equipment and weapons at staging areas. They also go over their
plans for entry. Next, the entry teams enter buildings. They must often break
through barricaded doors and windows. Once inside, officers search rooms
and hallways. They search until they locate suspects and hostages. Entry
team officers try to capture and disarm suspects. Disarm means to take away
a person’s weapons. Many times suspects surrender when they see entry
teams. Sometimes suspects shoot at the officers. The officers shoot back.
Entry team officers often turn captured suspects over to arrest teams. Arrest
teams arrest captured suspects. They make sure nothing goes wrong during
arrest. They may also help hostages out of buildings.

Sharp shooting Teams


Sharpshooters may have to shoot suspects. This may become
necessary if suspects try to harm hostages, officers, or innocent bystanders.
Sharpshooters may receive orders to shoot suspects in these situations. Many
SWAT units have sharp shooting teams. Each team includes two officers.
One officer works as an observer. The other works a sharpshooter.

Sharp shooting Team Operations


Sharp shooting teams choose locations that give them clear views
of suspects. Both members examine crime scenes from their location.
Observers provide information about suspects to sharpshooters and SWAT
team leader. The information includes descriptions of suspects, their weapons,
and their positions in buildings. Observers’ information helps sharpshooters
make sure they do not shoot at innocent people. Sharpshooters stay calm and
keep their weapons aimed at suspects. Orders to shoot a suspect can come at
any time during an operation.

Special Weapons
SWAT team officers use special weapons. Many of the weapons
are powerful guns. At crime scenes, the weapons help the officers protect
themselves and capture suspects. But SWAT team members do not use their
weapons unless peaceful tactics fail. Different weapons are useful in different
situations. Some weapons are useful in short-range situations. Other
weapons are useful in long-ranger situations.

Stun Guns and Rubber Bullets


Sometime SWAT team officers use impact weapons. Impact
weapons disable suspects. SWAT team officer use powerful weapons.
Sometimes SWAT team officers use submachine guns. Without killing them.
These weapons fire rubber or plastic bullets. Using impact weapons reduces
CRIMINAL SOCIOLOGY 111
2014 CRISIS MANAGEMENT
the risk of harm to hostages and the public. Sometimes officers use stun guns.
A stun gun is a device that delivers an electric shock. The shock stuns
suspects.

Semi – automatic Handguns


Most SWAT team officers carry semi – automatic handguns. A
semi – automatic handgun is a powerful gun that fires bullets quickly. These
handguns are short –range weapons. They work best for targets within 25
yards (23 meters). Semi – automatic handguns hold 14 to 17 rounds in each
magazine. A round is a bullet. A magazine is a metal or plastic case that fits
inside a gun. Magazines allow officers to reload their handgun quickly.

Shotguns
Sometime SWAT team officers use shotguns. A shotgun is a
powerful gun with a long barrel. Shotguns are mainly short-range weapons.
They may be single-shot or semi-automatic weapons. Shotguns fire large
bullets called shells. SWAT teams often use the Benelli M3 Super 90 shotgun.
This shotgun is a semi-automatic. It holds up to seven shells stored in a
magazine.

Submachine Guns
SWAT teams use submachine guns during shootouts with heavily
armed suspects. Submachine guns fire rapidly but are not easy to aim. SWAT
team submachine guns can fire single or multiple rounds. They fire multiple
rounds in short and long burst. A short burst is a quick series of two or three
rounds. A long burst is a quick series of four to eight rounds. Many SWAT
teams use the Heckler and Koch MP-5 submachine gun. Most MP-5 can fire
30 shots in just two seconds.

Standard Rifle
SWAT teams use different rifles in different situations. Rifle gives
officers dependable aim, firepower, and range. The M-16 is the standard
SWAT team rifle. The M-16 is light. This makes it easy to carry and use. The
M-16 has a dependable range of 50 to 200 yards (46 to 183 meters). Each
magazine for the M-16 holds up to 30 rounds. These features make the rifle
useful in many situations.

High-Powered Rifles
SWAT team officers use high-powered rifles for long-distance
shooting. Containment officers and sharpshooters use high – powered rifles to
improve their shots. High-powered rifles fire high-powered rounds. They are
112 CRIMINAL SOCIOLOGY
CRISIS MANAGEMENT 2014
large rifles with long barrels. They have telescopes on them. A telescope is an
instrument that makes distant objects seems larger and closer. Telescopes
help sharpshooters aim their rifles. High-powered rifles have ranges up to
several hundred yards. Fifty-caliber rifles are the largest high-powered rifles
SWAT teams use. These rifles weigh up to 40 pounds (18 kilograms) and are
at least five feet (1.5 meters) long. The rifles shoot rounds powerful enough to
punch through metal and concrete. Officers use these rifles to shoot at
suspects inside buildings.

Equipment and Dogs


SWAT team officers use different kinds of equipment. The
equipment ranges from clothing to helicopters. Officers also work with police
dogs. The dogs and equipment help make SWAT team operations easier and
safer.

Uniforms
Many SWAT team officers wear black or dark blue uniforms.
During operations, the uniforms help SWAT team officers identify each other.
Sometimes SWAT team officers wear camouflage uniforms. Camouflage
uniforms have coloring that makes officers blend in with their surroundings.
Many camouflage uniforms are green and brown. These uniforms help officers
stay hidden from suspects.

Armored Vests and Shields


All SWAT team officers wear armored vest. Armor is a protective
covering. Armored vests can protect officers from gunshots. Officers wear two
kinds of armored vests. One kind fits over uniforms. The other kind fits over
uniforms. The other kind fits under uniforms. Entry team officers often use
armored shields in addition to their armored vests. The shields are made of
lightweight armor. They provide added protection against gunshots and small
explosions.

Goggles and Gas Masks


Many SWAT team officers wear goggles. Goggles are protective
glasses that fit tightly around the upper face and eyes. They protect officers’
eyes from dirt, dust, and smoke. Some SWAT teams use night vision goggles.
Night vision goggles let SWAT team officers see in the dark. The goggles are
useful during night operations or inside dark buildings. SWAT team officers
wear gas masks when they use tear gas. A gas mask keeps a person from
breathing gas. Gas masks help entry team’s work in areas where tear gas is
present.
CRIMINAL SOCIOLOGY 113
2014 CRISIS MANAGEMENT

Entry Tools
Entry team officers often need tools to get into barricaded
buildings. Basic tools include ropes and ladders. Tools can also include
battering rams, sledgehammers, and axes. A battering ram is a heavy metal
tube. Officers use battering rams to force open doors. Entry teams recently
started using small amounts of explosives. The explosives can blow holes in
doors and walls. But the explosives present little danger to SWAT team
members and suspects.

Helicopters
Some SWAT teams use helicopter. Helicopters carry SWAT
teams to emergencies located in hard to reach places like rooftops. Helicopters
also let officers examine crime scenes from the air. This helps them plan their
operations.

Walkie Talkies and Telephone


Communications is important to SWAT team officers. Officers
often use walkie talkies. Walkie talkies are small two-way radios. Officers use
walkie talkies to tell each other what is happening during operations.
Sometimes SWAT teams use telephones to talk with suspects. Telephones
also let team member speak to other people during operations.

Swat Team Dogs


Many large SWAT teams use police dogs. Police dogs work with
some SWAT officer as K-9 teams. K-9 is short for canine. Canine means dog.
Most police dogs are German shepherds. Police dogs help officers find
suspects. The dogs follow suspects’ scents to the suspects’ hiding places.
Police dogs also chase and stop escaping suspects. They often stop suspects
by biting the suspects’ arms and legs.

Facing the Risks


SWAT team duty is challenging and risky work. Officers risk death
each time they work on a police emergency. Many officers volunteer for SWAT
team duty because they like challenge and excitement. But most SWAT team
officers volunteer because they want to protect the public.

114 CRIMINAL SOCIOLOGY

You might also like