0% found this document useful (0 votes)
25 views19 pages

Introduction To Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views19 pages

Introduction To Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19

Presented by:

RAMIL LADYONG SACULLES


Police Superintendent DSC
The need for exercising extreme
care in the use and handling of any
classified matter is very important. The
unauthorized disclosure of official
information have a serious consequence
ranging from administrative
embarrassment to endangering the
security not only the PNP, but also the
Government or a country as a whole
The protection of all classified information,
material and equipment from disclosure to
unauthorized person; the protection of
police, military defenses and other vital
gov’t installations from damages and
destruction.

Measure taken by a unit to protect itself


against espionage, sabotage, subversion
allowing the unit freedom of action in order
to provide the unit with the necessary
flexibility to accomplish its mission
Security is a command responsibility. It is the duty of
all commanders to assure themselves of the
competence, integrity and loyalty of personnel
belonging to a unit. Effective security is dependent
on the training, character, and loyalty of personnel
having access to classified matters.

The security of classified matters should be the primary


concern of everyone in the gov’t service and should
be emphasized to be discreet in the use and
handling of an information obtained in an official
capacity

The security of a command is the primary tasks of CI


personnel
The “Art of War” by Sun Tsu described the SPY
is the most important element of war.
Practically every country has its own
espionage system and made general
development of professional techniques of
espionage .

The hazards to security are acts or omissions


of individual or conditions which may
conducives to breaches of insecurity and to
consequent compromises, loss or damages
to facilities or classified documents and
information.
It is a system of barriers placed between the
installation and documents and the would be
intruders which includes the ff:

a. Physical Security Barriers such as:


1. Human
2. Animal
3. Natural
4. Energy
b. Fire Prevention Equipments and plans
c. Security Survey and Inspections
SURVEY - is an investigation that will establish
security procedures and system to protect
installations against espionage, sabotage
and subversive activities.

INSPECTION - is a check of how well existing


security measures and regulations are being
carried out within a command. These may
include investigation of alleged or suspected
security violations.
The measures concerning classified matters being handled only by
authorized personnel. The Scope covers the ff:

a. Personal hazards to Security

1. Faith – it can be a questionable virtue when trusting too


much to others. Remember every spy is trained to deceived
people .

2. Conceit – the desire to satisfy the ego or impress someone.


Remember that agents are trained to flatter people or to make
good impression so as to get easily the information they want .

3. Enthusiasm and Pride – these are the common causes of


indiscretion

4. Ignorance - great number of personnel compromised vital


info simply because they do not realized its value and
importance
b. Security education
1. Personnel forms the weakest link in the security chain.

2. Training make pers security concious and realized the


value of security.

3. necessary for the practice of the NTK concepts for


those who have access to vital info.

c. Security orientation and indoctrination – this is to ensure


the personnel employed at not security risk.
PSI includes all measures designed to prevent unsuitable individuals
of doubtful loyalty to the RP from gaining access to classified
matters, to prevent appmt, employment or retention as
employees of such individual.

GENERAL POLICY:

No person shall be entitled to security clearance solely by virtue of


his grade of position or knowledge, or possession of classified
matters. The person must meet the ff standard:
a. Unquestionable loyalty, integrity and trustworthiness.
b. Excellent character with such habits and association as
to cast no doubt upon their discretion or good judgment in the
handling of classified matters.
1. Jealousy
2. Ideological tendencies
3. Material gain
4. Blackmail
5. Increase personal prestige
6. Close relative in foreign countries
7. Weakness in character
8. Addiction to drugs
9. Revenge
It protects and conceals the PNP methods of operation, sources of
information and personnel.

PRINCIPLES OF OPSEC
a. Keep the mission secret.
b. Establish and maintain exact timetable of action to be taken.
c. Base the plan on factual information
d. Carefully evaluate the risks that must be assumed to accomplish the
mission.
e. Consider every factor no matter how minor from the standpoint of its
possible effect on the mission.
f. Blend effectively with the local environment.
g. Neither prejudice nor enthusiasm should interfere with the process
of careful judgment and decision.
h. The oplan must provide a “way out “ of the worst possible disaster.
i. The oplan should be as simple as possible.
Compromise is the greatest threat to OPSEC and take place when the
intel personalities, operations, and operational techniques are
disclosed or identified. Compromise destroys the effectiveness of
the collection efforts and oplan.

COMMON CAUSES OF COMPROMISE:


When the operation of an intel orgn is not properly covered or when any
of the members wittingly or unwittingly betrays itself with unusual
behaviors.

1. When a person with knowledge of an intel orgn or any of


its members decides to give info to the enemy target for reason of
revenge, rewards or safety.

2. Compromise can be effected actively in the course of


routine control activities conducted by the enemy.

3. Compromise can be through passive innocent bystanders.


a. The inability to keep secret.
b. Tension resulting from lack of normal human contacts
for a period of time.
c. Limited ability to live a double life.
d. Tendency to do things in an easy way
e. Patterns of activity
f. Limited ability to be objective
g. Fear
h. Physical limitation
i. Limitation of mental ability

ELEMENTS OF OPSEC
1. Element of surprise
2. Element of conspiracy
3. Proper operational planning
PRINCIPLES OF DOSEC

1. Problems of IO are comparatively greater due to


relatively large volume of classified materials but also
the sensitivity of the information.

2. Measures are connected to guide and protect the


handling, marking/classification, transmission,
reproduction, storage and destruction of classified
matters.

3. In tactical situation, the unit commander’s security


problem are greatly increase.
It is any recorded information regardless of its physical form
and characteristics that includes:

a. Written matter (handwritten or printed)


b. Drawn or engraved matter
c. Sound and voice recordings
d. Printed photos (exposed or printed films )
e. Reproduction of the foregoing

CLASSIFICATIONS/ MARKINGS OF DOCUMENT


a. Top Secret
b. Secret
c. Confidential
d. Restricted
a. Establish control and safeguards each type of documents
b. To determine the level of accessibility

TRANSMISSION METHODS:
1. Direct contact
2. Couriers appointed by the agencies
- postal service
- transportation media
- electronic or radiographic messages

DESTRUCTION METHODS:
1. Shredding
2. Burning
3. Pulping
PRINCIPLES OF COMSEC
a. Security hazards are inherent in electronic device because transmission
Can be intercepted, overheard and recorded.
b. Personnel commit more security violations over the telephone than
through actual loss of documents .
c. Communication between agents in the field must be protected otherwise
the entire operation of a unit may be compromised.

LAYERS OF SECURITY:

1. Perimeter control – security barriers or checkpoint at the outermost


layers
2. Area Access Control - control measures to prevent person inside the
premises.
3. Control of the operation area - regulatory procedures must be establish
prior entry into the oprns room
4. Control of COMMO area - Final security regulations
HAVE
A NICE DAY

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy