Sunteți pe pagina 1din 17

INDUSTRIAL SECURITY MANAGEMENT stations or fire stations and when activated it

immediately notifies said personnel and when


activated it immediately notifies said personnel
Access list - An authenticated registry given to for prompt response. This system is prone to
security of personnel given to security allowing false alarm and is considered unpopular.
entry to a compound or installation natural or However, banks and other vital establishments
man-made. are fitted with such devices for response in
cases where the alarm is activated.
Advance Party – Refers to a group of protective
personnel tasked to conduct surveys and Background Investigation – A check made on
inspection on the area of visit, performs an individual usually seeking employment
coordination and make the required through subject records in the police files,
arrangement of visit of a VIP or Principal to a educational institutions, place of residence, and
particular area. former employees.

Agency Manager – Is automatically the chief Bank Security – Is the protection resulting from
security director who shall be responsible for the the application of various measures which
entire operation and administration/management safeguards cash and assets which is in storage
of the security agency. He shall be directly in transit and during transaction.
responsible to the agency operator/owner/ Barriers – Any structure of physical device
Board of Directors. capable of restricting, deterring or delaying
Alertness – A desirable quality of a security illegal access to an installation natural or man-
guard as it determines his effectiveness; it must made.
be therefore developed by anyone desiring to Barrier Maintenance – The regular inspection
become a watchman. It means spotting the of fencing barrier and protective walls by
intruders, violators and unusual incidents. It may security guard.
be attained by vigilance, watchfulness
dedication and diligence. Buffer Zone – Refers to an area which
separates a VIP from an attack.
Amateur Swindler – As distinguished from a
professional swindler who does resort to fraud or Casual Pilferer – One who steals primarily
scam for living. because of irresistible urge to take a company
property when an unexpected opportunity
Armored Car Security – It is the protection presents itself and has minute or little chance of
resulting from the application of various methods detection.
which safeguards cash and other valuable
transits. Central Station Systems – The type of alarm
system utilizes a station located outside the
Assassination – Refers to the treacherous compound. When the alarm is sounded, the
killing of a protected person. security immediately calls the attention of law
Asset Protection Program – It is the sum-total enforcement units and fire teams as the case
of protect scheme encompassing the entire may be. The alarm panel system is located
security spectrum, design to eliminate reduce or outside the facility but manned by company
control threats hazards risk or dangers to personnel.
company assets. Change Key – A key to a single back within a
Automatic Sprinkler System – Attached to the system of locks in an installation.
ceilings and roof and activated when there is a Character – The sum of traits that have been
sudden increase in temperature. Water is impressed by nature education and habit upon
directed where it is needed. the individual.
Auxiliary System – Alarm system where the
circuit is directly linked to the local police
Clear Zone – Unobstructed area should be temptation or entrusted with secrets of value to
maintained on both sides of the perimeter the industry or to the government, cave must be
barrier. exercised in the selection of personnel.

Close in Security – Also known as personal CSG – Civil Security Group.


security composed of two or three men assigned
to a VIP. Cylinder Locks – Usually installed at home,
also called a night latch and is operated by a key
Combination Lock – For installation in safe and on the outside and a knob on the inside.
bank vaults, it can have an intricate system of at
least 1 million possible combination consisting of Debriefing – Serves to place the person on
more than six dials; it affords the maximum special notice on his continuing responsibility to
delay in terms of efficiency. protect classified information which he has
knowledge of.
Communications Security – The protection
resulting from the application of various Defense Ring – Arrangement of protective
measured which prevent or delay the energy or personnel and or physical barriers in a
unauthorized person in gaining information concentrate circle to detect, negate potential
through communications. This includes assassins.
transmissions, cryptographic and physical Deluge System – It is similar to a dry pipe
security. system however, it is designed to direct the flow
Company Guard Forces – A security guard of water in a specified direction.
recruited and employed by the company. Those Destination Security – Refers to the security
hired will be in the company payroll and are personnel of the place of stop or rest, included in
usually entitled to the same benefits received by the security function of the advance party.
other employees. At times, organic personnel as
guards get special allowance for uniforms and Dial Alarm System – Dial alarm system – this
are even gratuitously given special privileges for system automatic dials the number of personnel
uniforms and meal allowance. in cases of breach of security. It utilized phone
lines thru fiber optics and inexpensive alarm
Confidence - Is a state of being sure, a state of system which is easy to install and operate.
mind, free from doubt, or misgiving. These
attributes include faith in oneself, and in hid Disc Tumbler Lock – It contains one or more
abilities, which is attained by job knowledge. A pieces of metal of different heights known are
state of trust. tumblers, which intercepts bolt and prevents it
being moved until the tumblers are raised or
Confidential – Spoken or written in secret. released by action. It is usually installed in cars
Controlled Areas – Are those section and zone and would afford delay of at least 5 to 10 mins.
where access is restricted as to entrance or Doctrine – refers the set of principles, dogma,
movement by all but authorized personnel and guidelines or policy which is ought to be
vehicles. It should additionally marked by a observed.
fence or other barrier, and access to it should be
limited to as a few guests as possible. Document – an official paper, certificates
anything written that gives information or
Cost of Security Protection – Principle which supplies evidence.
states that it is not economical to spend an
exorbitant or excessive amount on plant security Document and Information Security – is the
when the return on such investment is only a sum total of all policies, regulations, doctrines,
fraction of the amount. practices, enforces to safeguard the contents
and integrity of any classified information of
Critical Clearance – In these businesses in document from compromise or loss.
which money or other valuable objectives are
handled by employees is otherwise subjected to
Document Security – protection of documents File Room - A storage facility constructed
classified papers and vital records from loss, lighter than a vault but bigger in capacity it is
access to unauthorized persons, damages, theft installed as part of the building which holds up to
and compromise though proper storage and 10,000 cubic meters of essentials items. At least
procedures. in 12 feet in height, with enough ventilation and
fire proof at least 1 hour.
Doppler Effect – a phenomenon that causes
frequency shift in an object located in area Fire Hydrant – A mechanical device
permeated by radio frequency radio signals. strategically located in an installation or street
where a fire hose is connected that water with
Dry Pipe System – a system for fire safety pressure will be available to extinguish fire.
which is activated when the head is ruptured the
pressurized air escapes and water directed to Floodlights – It projects lights in a concentrated
pipes. beam. It is ideal to use in illumination of
buildings, fences, perimeter areas, and
Dry Run – practical test or exercise of plan to boundaries.
test its effectives and operational readiness.
Fresnel Light – A type of radiance which
Duress Code – a type of code system so that projects wide beam illumination in long and
security personnel when forced by armed men narrow horizontal strips, approximately 180
to enter an installation can give alarm by used of degrees in the horizontal plane and 15 to 30
certain words in casual conversation with other degrees in the vertical plane.
personnel in the installation.
Frisking – This is the pot down inspection of the
Electro Magnetic Lock – The doors are closed passenger’s buddy for weapons, explosive or
by magnetism and plates are operated by other dangerous substances which may be
means of electricity. When the power is on and concealed. This is done through manual frisking
the door is locked, it can resist a pressure of or with the use of hand-held metal detectors.
more than 1000 lbs.
Government Guard Forces – A security guard
Emergency Flashlight Supply – An extra stock recruited and employed by the government.
of flashlight batteries and bulb always on hand. They are assigned to guard government
Energy Barrier- Usually electrical or electronic installation and other government assets. They
devices used to provide assistance to guard are entitled to all benefits received by other
personnel. government employee, and under the control
and supervision of Civil Service Commission.
Entrance Conference – A conference or dialog
between the survey team and management Grand master Key – A key that will open
official of a plant before security survey is everything in a system involving two or more
conducted. master key groups.

Ethical Standard – Ethics moral belief or codes Guard Control Station – This is normally
which are common to a group or profession. provided at main perimeter entrance to secure
areas located out of doors, in manned by guard
Exclusion Area – Is used only for handling and on a fulltime basis.
storage of high value cargo and classified
documents. The number of people authorized to Hazard – Any act or condition which maybe
enter this area should be strictly limited, and the conclusive to breaches of security and resulting
area should be under surveillance at all times. in subsequent compromise, loss, damage, injury
or death.
Fences – An independent structure designed to
control physical and or visual access between Hotel Security – Is the protection resulting from
outside areas. the application of various measures, of assets,
guests, personnel and other properties in a
hotel.
Human Barrier – Refers to guards, office and with any person or a group of person for the
shop workers, and the like who stand between purpose of organizing a branch unit or
the intruder and the matter to be protected. subsidiary under separate control and
ownership.
Human Hazard- An act or condition caused by
humans which affects the safe operation of a Lever Lock – Similar in design with this tumbler
facility. They include sabotage, theft, pilferage, lock, it is commonly installed in safe deposit
and espionage. boxes and is deemed pick proof since it can be
operated by utilizing combination means of dial.
Industrial Security – Form of physical security
involving industrials plants and business License to Operate – A document issued by
enterprises which includes the safe guarding of the chief, Philippine National Police or his duly
personnel, properties and operation. authorized representative authorizing a person
to engage in the occupation, calling or
Information – Refers to any form of employment as security guard or detective or a
communicated knowledge. judicial person to establish, engage, direct,
Initial Interview – The first contact with security manage or operate an individual or a private
and should be formally conducted. It’s purpose detective agency/company security force after
is to impart security concern, it’s importance to payment of the prescribed dues or fees.
the company and the penalties that would result Limited Area – Locale, part or section within the
to violation of company rules, regulations and controlled area where a greater degree of
security measures. security is required.
Inner Ring – Refers to areas immediately Local Alarm System – Once the security has
outside the principal’s door or close-in to the been breached, the siren is sounded or a light
principal if outside. flashes in remote stations located in the
Inquiry – It is process of determining the loyalty, immediate vicinity of the installation. It would
honesty, integrity, and reputation etc., of afford response of personnel to the areas
particular applicant or employer. wherein intruders were able to penetrate.

Inside Perimeter – A line protection adjacent to Local Alarm by Chance System – This is
protected area passing through points of similar in function with local alarms but the
possible entry into the area, such as doors, response would depend on persons who are
windows, skylights, panels or other point of alerted within the immediate vicinity of the place
access. where intrusion was committed, hence it gives
no predictable response.
Inspection – Refers to follow-up surveys.
Lock and Key Record – Written account
Installation Security – Security of a building provided for all company pad locks, to which
and facilities by use of towers and posts with they are issued or where they are installed and
guards, protective lighting and alarm systems, the name of the person and department who
and the use of fence with top guards barbed carried or controls the keys for various locks.
wires.
Lock and Key Storage – Placed under the
Insubordination – Refers to refusal to carry out control of the security personnel it is a safe and
the lawful and legitimate orders of his superiors. secured cabinet where duplicate or reserve
locks and keys are kept.
Integrity – Uprightness in character, soundness
of moral principles, freedom from moral Loyalty – Faithful allegiance to the Philippine
delinquencies. Government and it’s duly constituted authorities.
Kabit System – Unauthorized and illegal Master Key – A key that is capable of opening
practice of agency operators which operate, series of locks. Master keys should have no
promote or enter into an agreement of “merger” markings that will identify them as such. They
should be issued only to personnel especially PADPAO – Philippine Association of Detective
designated by management, and the list of and Protective Agency Operators.
holders of these keys should be frequently
reviewed to determine the continuing necessity Padlock – Is a detachable lock having a sliding
for the individuals having them. hasp which passes through a staple ring and
secures fixtures and other storage containers.
Middle Ring – Refers to inside quarters,
residence or office covering all stairways and Pass Exchange System – Procedure in which
elevators. a person exchanges one color coded pass at the
entranced to the controlled area for another
Moral – Distinctive identifying qualities which which carries a different color specifying the
serve as an index to the essential or intrinsic limitations of authorization. Upon leaving the
native of a person. person surrenders the controlled area badge in
exchange for the basic authorization
Multiple Pass System – Provides extra identification. In this system, the badge never
measures of security by requiring that an leaves the controlled area,thus reducing the
exchange take place at the entrance to each possibility of switching forging or alteration.
restricted area within the controlled area.
Perimeter Barrier – A medium or structure
Natural Barriers – Are those natural features which defines as the physical limits of an
constructed by men that tend to delay the installations, or area to restrict or impede access
intruder, whether or not constructed with that thereto.
specific purpose in mind.
Perimeter Lighting – Usually referred to as a
Natural Hazards – Caused by natural protective lighting to completely a part of
phenomena which results in damage, standard system in security when fence and
disturbance and problems o the normal guards are employed. There are four
functions. These include floods, earthquakes, considerations that will influence the
lightning storms, typhoons, and volcanic effectiveness of protective lightning. These are
eruption. brightness, silhouette, seeing contrast and
Non- Critical Clearance – Those plants not shadow elimination. Darkness is an ally of
vitally concerned with questioned of security on potential intruders and must be approximately
in securing employees with a high degree of assesses to limit hiding places.
honesty and integrity, the employment Personal Security – It is the protection of
application should be relatively simple. personnel especially ranking officials from any
One Thousand - The maximum number of harm, kidnap and other acts. Also known as VIP
security guards that an agency/company guard Security.
forces may employ to include it’s branches. Personnel Security – Is the sum of procedures
Operational security – Involves the protection followed, inquires conducted and criteria, to
of processes, formulas patents and other determine the work suitably of a particular
industrial and manufacturing activities from applicant or the retention or transfer of particular
espionage, infiltration, and lose compromise, of employee.
photocopying. Personnel Security Investigation – Is an
Outer Ring – Refers to sidewalks, stationed in inquiry in the character, reputation, discretion,
front of quarters residence or office covering all integrity, morals and loyalty of an individual in
entrances. order to determine a person’s suitability for
appointment or access to classified matter.
Outside Perimeter – The line protection
surrounding, but somewhat removed from a Peterman – Term used in England for locks
protected area such as a fence. pickers, safe crackers, and penetrates or
restricted rooms or area.
Physical Barrier – Any physical means to owned and operated by the company and
impede, delay, or prevent instruction into a response is assured with the least time of delay.
protected area.
Protective Alarms – Are devices and
Physical Security – Part of security concerned contrivance installed inside and outside a facility
with the physical measures designed to or buildings to compliment and provide
safeguard personnel to prevent unauthorized additional security measure and operates to
access to equipment, facilities, materials, advertise entry into sensitive and protected
documents, and to protect them from espionage, areas. It signals and alerts the security
sabotage damage or theft. The broadest branch personnel to intrusions within the compound.
of security, defined as a system of barriers The alarm is activated in cases of tampering into
placed between the matters protected and the the circuitry or activated upon intrusion.
potential intruder.
Protective Cabinets – Referred to as the final
Private Security – He operates on a covert type line of defense, it is a high security stirage area
of mission on a specific confidential order issued where papers, plans, cash and other negotiable
by his agency. Any person who does detective instruments are kept.
work for hire, reward or commission, other than
members of the Philippines, guards of Bureau of Protective Operations – Refers to those
Corrections, provincial guards or members of activities designed or intended to provide
the Philippine National Police or of any other law physical protection of VIP from all hazards.
enforcement agency of the Government. R.A 5487 (AS AMENDED) – Otherwise known
Private Security Agency – Any person as Private Security Agency Law, this enacted
association, partnership, form or private legislation governs the operations, and activities,
corporation, who contracts, recruits, trains, qualifications, duties and licensing of security
furnishes or posts any security guard, to do its guards, watchmen and private detectives. In
functions or solicit individuals, business firms, or short, it is the intention of this law is towards
private, public, or government-owned or professionalism of the security services in order
controlled corporations to engage his/its service to upgrade the level of security protection.
or those of his/its security guards, for hire, Refresher Conference – It reminds individuals
commission or compensation thru subscription of their job responsibility. It also serves as a
or as a consultant/ trainor to any private or forum to resolve security problem and explain
public corporation whose business or new rules and regulations.
transaction involve national security or interest
like the operation and or management or Regular Inventory – Periodical accounting of all
domestic or ocean vessels, airplanes, tools and equipment charged out to departments
helicopters, seaports, airports, heliports, landing or reaming on hand in supply.
strips etc. or as consultant or any security
Relative Criticality – Importance of a firm or
related matter, or to provide highly specialized
installation with reference to the national
security detective and investigation services like
economy or security.
gangway security, catering security passenger
profiling, baggage examination, providing Relative Vulnerability – Susceptibility of a plant
security on board vessels or aircraft, or other damage, loss or destruction due to various
security needs that the PNP SAGSD may hazards, natural or manmade.
approve.
Remote Station System – A structure where
Promptness – Punctually when reporting for the alarm signal is transmitted to a remote
duty or always being on time. location manned and operated by a dependent
party or police department.
Proprietary Alarm System – This is an alarm
technique wherein the panel or station is located
inside the premises of the compound. It is fully
Reporting of Duty – Checking in at the Security Alarm System – Combination of
beginning of his shift and take down in writing compatible intrusion and detection device so
any special orders for the day. arranged and wired as to support one another.

Reputation – Opinion or estimation in which Security Cabinet – Added protection of


one is generally held. It is what a person is important vital papers, data, special
reported to be whereas character is what a correspondence, cash and other essential
person is. documents, such as vault, safe and file room.

Residence Security – Protection assigned in Security Education – The exposure and


them place the VIP resides or live. teaching of employees on security and its
relevance of the building structure used to keep
Return Tools at End Shift – It is the practice in and protect cash, documents and negotiable
some plants that all tools and equipment used instrument.
during the shift is checked back into the tool crib
at the end of their shift. Security Education Program – A program
given to employees of an installation by lecture
Route Security – Refers to personnel assigned and other means pertaining to measures and
by the roads, avenue, boulevards where the VIP safeguard to be taken to protect the interest of
will pass en route to his destination. the installation for loss, damage, sabotage,
Safe – It is a metallic container used primary for pilferage, and other criminal acts.
safekeeping of documents and small items, It Security Guard – Is any natural person, not a
should be at least 750 lbs. in weigh or anchored member of the regular police force or the AFP
to the building of lighter. The walls should be at who acts as watchman.
least one inch thick and the door 1 ½ inch thick.
Security Guard Forces – A group of forces of
SAGSD – Security Agencies and Guards men selected trained or organized into functional
Supervision Division. group for the purpose of protecting operation
Search Lights - Are incandescent lamps which process those disruptions which impede
are highly focused and utilized to pinpoint efficiency or halt operation at a particular plant,
possible threat areas. facility, institution or special activity.

Secrecy - The state of being surreptitious. The Security Hazard – Is any act or conditions
ability to keep or restrict confidential matters. which may result in the compromise of
information, loss of life, or destruction of
Security – Protection of any type pf crime to property or disruption of the objective of the
safeguard life and assets by various method and installation.
device.
Security Lighting – The providing of sufficient
Security Agency Service – A guard hired by illumination to areas during hours of darkness to
company belonging to a private Licensure ensure visibility and to act as to deterrent to th4e
Security Guard agency is in a contracted basis. intruders.
The agency supplies the number of guard
needed to carry out the security duties and Security Planning – Is a corporate and
functions required. This would include executive responsibility. It involves knowing the
supervision as part of the force, or if the force is objectives of the security and the means and the
small, supervision may be accomplished by method to reach these objectives or goal must
schedule visits of uniformed supervisors are then involve.
paid by the agency. The agency usually makes Security Promotion – It is a positive effort to
contact with the firm of facility. Law will do by the sell security or make the employees more
24 hours duty by thru guards on an 8 hours tour involved in the implementation of security
of duty. Duties of agency guards are similar to measures.
that of the other company guard.
Security Reminders – It is commonly Trade Secret – May consist of any formula,
manifested in office memorandum, device, pattern or compilation of information
announcement, posters placed at strategic which is used in one’s business and gives the
areas within the company. user advantage over competitors who do not
utilize or know it. Proprietary information and
Security Supervisor – Is charged with directing intellectual property are similar to trade secrets.
the work and observing the behavioral
performance of the guard under his Training Conference – It is normally held in the
command/unit. training period. Conducted for at least a period
of four hours, its concern is to reiterate to
Security Survey – Is the process of conducting employees that security is an additional burden
an exhaustive physical examination and through imposed on them as part of the company.
inspection of all operation system and procedure
of facility. (Security Risk Analysis/Assessment) Transmission Security – The component of
communication security designed to protect
Single Pass System – Technique wherein the transmission firm interruptions, traffic, and
badge or pass coded for authorization to enter analysis and initiative deception.
specific areas is issued to an employee who
keeps it in is possession until his authorization is Two Hundred – The minimum number of
charge or until he terminates. security guards that a private security agency
may employ.
Special Interview – It is conducted with the aide
of senior company officials to facilitate Utility Openings – Sewers air intakes, exhaust
compliance by means of example. tunnels and other utility opening which penetrate
the barrier and which have cross sectional area
Storage System – The Third Line of Defense of ninety-six inches or more should be protected
which may be utilized by means of safes, vaults by bars, grills, providing protection to that portion
or file-rooms. of the perimeter barrier.
Structural Barriers – These impediments are Vaults – It is a heavenly constructed fire
features constructed by men that tend to delay resistance storage facility installed four inches
the intruder, whether or not constructed with that higher than the floor and part of the building
specific purpose in mind. structure. The door of vaults should be at least 6
Systematic Pilferer – One who steals primarily inches thick. The vault wall, ceiling, floor should
because of irresistible urge due to an be reinforced by concrete at least 12inch thick. It
unexpected opportunity and has title chance of is normally moisture and condensation resistant
detection. with electrical conduits which should not exceed
1 ½ inch in diameter. Standard size vaults can
Teaching Skill – The ability to communicate store up t0 5,000 cubic feet and fire resistant of
and impart the basic knowledge and awareness at least 6 hours.
to subordinates.
VIP – Refers to executives, any ranking official
Technical Mastery – The ability required for of the national government, foreign dignitaries,
supervisors to possess and knowledge that are or other important persons who due to their
necessary for his post. positions are accorded or provided with security.
Top Guard – Is an additional overhang or VIP Security – Involves the protection of top
barbed wire placed on vertical perimeter fences ranking official of the government visiting
facing upward and outward with a 45degree persons of illustrious standing and foreign
angle with three to four strands of barbed wires, dignitaries.
6 inches apart and must be stalled on the
supporting arms. Warded Lock – Simplest form of lock which
uses a bolt containing a notch called talon. The
Towers – Guard tower are house like structures bolt is removed backward or forward by
above perimeter barriers. engaging a key in the talon. It offers little degree
of security and is merely used to afford one for Assimilate – To be absorbed into the system of
obtaining privacy. a foreign society.

Watchmen – Considered more passive as the Assumptions – Accepting some things as a


term implies, they are to observe something and being factual although not entirely thus proven.
make periodic reports and sound the alarm if
any unusual condition or incident develops. Audio Surveillance – Checking on persons by
listening thru wire tapping or use of electronic
eavesdropping equipment to pick up
conversations of persons and their associates.
Police Intelligence
Bag Man – One who collects illicit or illegal
Accommodation Address – Is the forwarding money such as ransom in kidnapping, delivering
address of agent’s mail packages other bribe money thru middleman.
communications.
Bigot List – A registry of names of all persons
Active Measures – Operations intended to with authorized access to sensitive information.
influence or otherwise affect other nation’s This ensures that all certified personnel reading
policies. Active measure, both overt and covert sensitive document have a true “need to know:
consist of a broad range of activities including which regard to the information contained
manipulation or control of the media, written or therein.
oral dis information, clandestine radio
broadcasting and other related activities. Bird – Slang for an informer.

AFP – Armed Forces of the Philippines Black Bag Operations – In this covert
maneuvers, agent illegally entered offices of
After Mission Report – Account submitted targeted individuals and/or organizations, and
immediately upon completion of mission by an photographed information found in their records.
undercover agent. This practice was used by the FBI from 1942
Agent – A person who is engages in spying or until 1967. Director Hoover in July 1966 ordered
in support of those who do, or who seeks to the practice discontinued and he again restated
detect them. And whose primary objective is to his position in January 1967.
obtain information pertaining to processes, BSIS – British Secret Intelligence Service
activities, movements or operations of others.
Bug – A surveillance device which requires a
Agitator – A person or group of person whose communications channel. A “bug” usually
mission is to cause discontent among the involves a radio transmitter, in which the user
population. can pick up the data from poorly configured
Agriprof – A person or group of persons tasked wireless computer networks or tune in to the
to agitate and spread propaganda among the radio emissions of a computer monitor.
population usually for a certain cause. BW – Biological Warfare, involves the use of
Analysis – Shifting and isolating elements diseases to debilitate population, food or
which have significance in light of the mission. livestock.

Anthrax – Single celled bacterial organism BWC – Biological Weapons Convention which
capable of forming spores. Used as a biological prohibits developing, producing and stockpiling
weapon producing pneumonia like symptoms. bacteriological and toxin weapons.

Anti- Terrorism – Defensive measures used to CBI – (complete background investigation) –


reduce vulnerability to terrorist acts. Detailed check on an individual’s activity from
the town a person was born and life 15 years
Area of Operations – Aspect of the operational ago.
environment exclusive of the military forces
involved.
CCTV – Closed-circuit television with which the Collections Agency – Is an individual
picture is viewed or recorded, but not organization or a unit that knows and exploits to
broadcasted. It was initially designed as a source of information.
means of security for banks. Today it has
developed to the point where it is simple and Combat Intelligence – Refers to the
inexpensive enough to be used in home security intelligence utilized in designing plans and
systems, and for everyday surveillance. conducting tactical and administrative
operations. It includes knowledge of the enemy
CIA – Central Intelligence Agency (USA) characteristics of operations used in the
Federal body responsible for the evaluation and planning and conduct of tactical operations.
dissemination of foreign intelligence within
government. COMINT – Communication Intelligence.

Cipher – A code or secret message which takes Communication – The process by which
the form of an innocent text. information is exchanged and understood by two
or more persons, usually with the intent to
CIS – Commonwealth of Independent States, motivate or influence others.
established on 1991 following the disintegration
of the Soviet Union. There are 12 member Communication Systems – The imparting or
states namely: Armenia, Azerbaijan, Belarus, exchange of information or data by electronic or
Kazakhstan, Moldova, Russia, Tajikistan, other means.
Turkmenistan, Kyrgyzstan, Ukraine, Uzbekistan Community Relation Program – Program that
and Georgia. evaluates public attitudes identifies the mission
Clandestine Activities – Action used to of organization with public interest and executes
accomplish intelligence, counter intelligence and a program of action to earn public understanding
other similar activities, sponsored or conducted and acceptance.
by government, all departments in such a way to Confidential – Document information or
guarantee secrecy or concealment. material wherein the unauthorized disclosure of
Clandestine Operation – An operation which while not endangering national security
conducted in secrecy, but with no effort to would be prejudicial to interest or prestige of the
disguise its nature. nation.

Classified Matters – Information in any form, Confidential Informer – A person who secretly
which in the interest of national security, must be provides information with the understanding that
safeguard in the manner and to the extent his identity will nit be divulged and that he will be
required by its importance. compensated either in money or favor.

Clipping Service – Publications of local and Counter Insurgency – Aspect of intelligence


foreign news cut and posted with captions. devoted to destroy the effectiveness if inimical
enemy intelligence activities to protect
Close Tail – Is one in which extreme pre- information from espionage, individual against
cautions are taken against losing the subject. subversion and installation or material against
sabotage. Military, paramilitary, political,
COINTELPRO – Counter Intelligence Program economic, psychological and civic actions taken
was a program of the United States Federal by the government to defeat subversive
Bureau of Investigation aimed to investigating insurgency.
and disrupting dissident political organizations
within the United States. Counter Intelligence – Activities concerned
with identifying and countering the threat to
Collation – Refers to the process of organizing security post by hostile intelligence services or
raw data into usable form grouping of similar organizations or by individuals engage in
items of information. espionage, sabotage or subversion.
Counter Subversion – Aspect of counter Dead Drop Spike – It is concealment device
intelligence designed to detect, destroy, similar to a microcache which have been used
neutralize or prevent subversive activities since the late 1960s to hide money, maps,
through identification, exploitation, penetration, documents, microfilm, and other mildew-proof
manipulation, deception and depression of and can be shoved into the ground or placed in
individuals, groups or organizations conducted a shallow stream to be retrieved at a later time.
or suspected of conducting subversive activities.
Debriefing – An interview with personnel from a
Counter Surveillance – Reliant on good mission or captivity to get information of
information security planning, good information particular interest.
security planning. Protecting information is the
first stage of counter-surveillance. Deception – An attempt to mislead another
generally as to its capabilities and intention to
Counter Terrorism – Offensive measures taken confuse enemy about one’s plan and intension.
to respond to terrorist acts.
Decoy Vehicle – In a convoy deployments it is
Cover – It is the exchange forging and an identical vehicle with that of the vehicle
screening, of person’s real personality, things, where the principal may be located, it usually
events and places. tails or fronts the principal’s vehicle.

Cover Operative – Spies who enjoys diplomatic Deduction – Formulation of a conclusion from a
immunity. theory which was tested and considered valid.

Covert Intelligence – Information gathering Defector – A person who turns away or against
which are clandestine in nature. his allegiance to the government.

Covert Operations – Operations which are so Defector in Place- Person who turns himself
planed and executed as to conceal the identity against the government but not physically
of or permit plausible denied by the sponsor or deserted his country.
concealment of the identity of sponsor.
Demented – A quick personality, bothered
Criminal Intelligence – Information of information.
knowledge about person or organization
engaged in illegal activities. Departmental Intelligence - Intelligence
needed by a government in order to execute its
Criminality – Relating to crime and the degree mission or discharge its responsibilities.
thereof.
DES – Data Encryption Standard. DES was
Crypt – Something that is concealed or hidden. based on LUCIFER, and makes use of the
computer binary code consisting of 0’s and 1’s
Cryptography – Art and Science of making, (see computer). Each unit is called a bit. DES
devising and protecting codes and ciphers. transforms 6-4 bit message into 64-bit segment
CSIS – Canadian Security Intelligence Service, of cipher-text, using a 56-bit key. Each user
set uo in 1984 under the Canada Security randomly selects a key and reveals it only to
Intelligence service Act. those persons authorized to see the protected
data. The actual message is encoded and
CW – Chemical Warfare. decoded automatically by electronic devices
attached to the sending and receiving
Dead Drop - A dead drop or dead letter box, is
computers.
a location used to secretly pass items between
two people, without requiring them to meet. DIA - Defense Intelligence Agency – U.S.A
Spies have been known to use dead drops,
using various techniques to hide the items and DIS – Defense Intelligence Staff – BRITAIN
to signal that the drop has been made.
Dissemination – The distribution of information Farm – Central Intelligence Agency training
or intelligence products in written, oral or graphic facility.
form to intelligence customers.
False Flag – Refers to covert or clandestine
DND – Department of National Defense – PHIL. operations conducted by governments,
companies, corporations or other organizations,
Document Intelligence – Assembling, which are designed to appear as if they are
analyzing and disseminating information about being carried out by other entities. The name is
those individual or groups whose interest is the derived from the military concept of flying false
overthrow of a democratic country. colors; that is, flying the flag of a country other
Drop – Is a convenient secure and unsuspecting than one’s own.
place to live a note or small package where an Fear – Afraid of law violated and their criminal
item can be handed to an agent. associates.
Duress Code – A type of coded system is used Financial Capability – The state of funding or
as internal defense which uses certain word in monetary ability of a country, company,
casual conversation alarming the personnel organization or any private person which may be
concern. inferred form income tax returns professional
Economic Intelligence – Deals with the fee, assets and liabilities.
extended utilization of the natural and human Fixed Surveillance – Residence, place or=f
resources and the industrial potential of the work, place frequented or visited.
nation.
Flowcharting – A technique used in data
ELINT – Electronic Intelligence. description, which visualizes event or commodity
Escort Vehicle – In a convoy deployment, it is flow over a given period.
usually located at the front and back of the Foreign Internal Defense – Participation by
group. civilian and military government agencies in any
Espionage – It is the practice of spying on other of the action program taken by another
countries, places or facilities in the course of government to free and protect its society and
systematic gathering information in secret. The sovereignty.
very nature of data sought is inimical to the Front Group – Movements organized to
survival or interest of a nation, organization or promote a cause of insurgent group.
company.
FTO – Foreign Terrorist Organization.
Ethnic Extremism – Small minority groups who
falsely use their ethnicity for selfish political Gain – To obtain privilege inside the cell.
gains.
Geographical Intelligence – Is the evaluation
Evaluation – Appraisal of information with of environmental factors which in any way
regards to its accuracy. influence the courses of action of a nation.

Evaluation rating – Each item is indicated by General Principles – Are fundamental guides to
standard evaluation system the reliability of actions, broad statement of truth from which
source and agency is shown by letter and others is derived.
accuracy is manifested in number.
Geneva and Hague Conventions – Laws
Eye – A slang term for a person conducting governing warfare and the engagement thereof.
surveillance on a specific person.
GOST – The soviet and Russian government
Family Background – It includes the name, standard symmetric key block cipher. GOST has
background, residences, reputation of the a 64-bit block size and a key length of 256 bits.
parents including the siblings. Its S-boxes can be secret, and they contain
about 512 bits of secret information, so the Informative Communication – Pertaining to up
effective key size can be increased to 768 bits; and down and lateral flow of communication
however, a chosen-key attack can recover the necessary for administrative effectiveness or the
contents of the S-boxes in approximately 232 smooth flow of information.
encryptions.
Insurgency – A condition arising from a revolt
GPS – Global Positioning System or insurrection against a duly constituted
government, which falls short of a civil war. It is
Gratitude – Information is given as an an organized movement aim at the overthrow of
expression of appreciation to a police officer. a constituted government through the use of
Gray Propaganda – A misinformation wherein subversion and armed conflict.
the source is clear but the desire result is Integration – Hypothesis developed and
indirect. considered valid as a result of such activity. It is
Guerilla Warfare – Irregular combat waged the process of combining the information
independently by small insurrectionist bodies. isolated in analysis and known element to form
logical theory or picture.
Hackers – Refers to persons breaking into a
computer system. Intelligence Community – Conglomeration of
all intelligence units and agencies in a country
HUMINT – Human Source Intelligence. composed of civilians, military and quasi-military
organizations.
IAEA – International Atomic Energy Agency.
Intelligence Journal – A chronological log of
ICT – International Center for Terrorism.
activities.
IMINT – Imagery Intelligence.
INTERPOL – An acronym for the International
Industrial Intelligence – Is the gathering Criminal Police Organization (ICPO). Where
information about product manufacturing member countries assist one another in the
technique, processes from manufacturing pursuit of suspected criminals and terrorist.
formulas that cannot and can be used of value
Interpretation – Result of critical judgement
or advantage.
involving three factors namely analysis,
Infiltration – Is the penetration of an agent to an integration and deduction. It is the determination
intelligence target either in the land, air, or sea, of the significance of the intelligence data in
either through mechanical or electronic devices. relation to other data at hand.

Informants – Is an individual of confidential Internal Defense – The full of measures taken


basis with the understanding that his identity will by a government is free and protect its own
not be mistaken. society from subversion, lawlessness and
insurgency.
Information – Is a communicated knowledge, a
raw data or unprocessed intelli8gence. It is the IPP – Internationally Protected Persons.
bloodline of intelligence.
ISAFP – Intelligence Service, Armed Forces of
Information Procurement Division – A the Philippines.
component of the central intelligence service
ISTAR – Intelligence, Surveillance, Target
which is divided into the intelligence proper,
Acquisition, and Reconnaissance.
secret intelligence and intelligence operations
unit. Kill Zone – A point or specific areas where a
possible attack to a principal or VIP may be
Information Technology – The hardware,
executed.
software, telecommunications, data base
management, and other technologies used to
store, process and distribute information.
Leap Frog – Variation of tailing which NOC – Non Official Cover is a term used in
concentrate on the subject and guards the espionage (particularly by the CIA) for agents or
surveilant and the subject. operatives who assume covert roles in
organizations without ties to the government for
Legislative Records – Registry of law making which they work. Such agents or operatives are
bodies (House of Congress, Senate City, typically abbreviated in espionage lingo as a
provincial boards) NOC (pronounced “knock”)
Line Intelligence – Any processed information NPT – Nuclear Non-Proliferation Treaty.
coming from open and covert sources that affect
police agencies, operations and harmony with NSC – National Security Council.
the community and other government agencies.
Objectives – Specific results an expertise seeks
Link Analysis – A technique used to show the to achieve in pursuing its basic mission.
relationship between individuals and
organizations by means of visual graphic design. OIR – Other Intelligence Requirements –
additional information.
Loose Surveillance – On and off continuous
close shadowing of the subject. Order of Battle – Intelligence list containing the
main or primary threat to a nation’s security and
Loose Tail – Casual observation of the subject peace and order.
in which general impression of the subject’s
habit and associates is determined. Ordinary Informer – Usually gives but expects
in return favor or money.
Low Intensity Conflicts – A limited political-
military struggle to achieve political, social, Organization – Is the arrangement of person
economic or psychological objectives confined in with a common purpose. It is the division and
geographic area. unification of effort toward the same goal or
policy.
LUCIFER – Developed in the early 1970’s it is a
crypto-system that used both substitution and Organized Crimes – Is a combination of two or
transposition. more persons for the purpose of establishing by
terror, threat, intimidation or conception in the
MILINT or MI – Military Intelligence city or municipality or any community of either
monopoly or criminal activities in a field that
Military Intelligence – Refers to the use of provides continuing financial support.
processed information in formulating military
plans, programs and policies. OSCINT – Open Source Intelligence.

Mission Order – Duty slip in which all personnel Operations – It performs the line functions,
on undercover operations shall carry at all times establishment of contracts, recruitment of
it must be duly approved by their immediate informers/informants, execution of intelligence
supervisors and filled appropriately with their plans.
respected offices.
Overt Intelligence – Processed information
National Intelligence – Covers the broad produced openly.
aspects of national policy and national security.
It is concern to more than one dependent and Para Military Focus – Force that the distinct
transcends exclusives interest of a single from the regular armed forces of any country but
department or agency. resemble them in organization, equipment,
training or mission.
Nerve Agent – A chemical agent that interferes
with the central nervous system. PBI – Partial background investigation for record
and employment check.
NICA – National Intelligence Coordinating
Council. Peace Time Contingency – Politically sensitive
military operations normally characterize by the
short term rapid projections or employment of Principle of Objectives – Intelligence must be
forces in condition short of conventional war. based on the decision makers own plans and
intentions as much as on considerations of the
Personal Circumstances – Includes the name, intelligence target themselves.
date of birth, place of birth, age, city and
provincial address, civil status, and the like Processing – A step by which the intelligence is
pertaining to the target ort subjects. transformed from raw facts or materials to
intelligence data.
PHOTINT – Photographic Intelligence.
Propaganda – Psychological techniques
Planning – Is a process of developing a designed to alter control opinions, ideas and
method, procedure or an arrangement of parts values.
to achieve a defined objective more easily.
Psychological Operation – Planned activity in
PLO – Palestinian Liberation Organization. peace and war directed towards enemy, friendly
PNP – Philippine National Police. and neutral audiences in order to create an
attitudes behavior favorable to the achievement
Police Intelligence – It is the gathering of of political and military objective. Psychological
information regarding the activities of the warfare which encompasses: Political, Military,
criminal and their law violators for the purpose of Economic, Ideological, Information activities.
effecting their arrest obtained evidence of their
activities and for stalling their plans to commit Psychological Warfare – The planned use of
crime. propaganda and other psychological actions
having the primary purpose of influencing the
Police Intelligence Operations – It includes opinions, emotions, attitudes and behavior of the
discovery, identification, activity, surveillance, hostile groups to support the achievement of
liaisons, programs, informant management. national objectives.
Police Intelligence Process – Refers to the Psychological Warfare Consolidation –
cyclical steps followed from intelligence planning Operations directed towards populations in the
to the dissemination of processed information. friendly rear areas on the territory occupied by
friendly force. Use to facilitate military operation
Political Intelligence – Deals with their
and promote maximum cooperation.
structure of government, the electrocute,
national policies and foreign relations of Public Record Sources – Spring of information
governmental organizations, public order and from government institution (e.g. hospital, public
safety, subversion, intelligence and security libraries, civil service, police stations, NBI,
organizations. different bureaus, AFP, intelligence organization
and other offices.)
Principal Vehicle – In a convey deployment it is
the object of protection where the VIP may be Rabbit – Refers to the subject or person being
located. followed in a surveillance operation.
Private Sources – Business establishments as RADINT – Radar Intelligence.
spring of information (e.g. telecom, leading
companies, insurance companies, hotels and Recon Vehicle – Also known as a counter
restaurants) attack vehicle in a convoy deployment it fronts
the principal’s vehicle to neutralize all possible
Principle of Communication – Intelligence is threats.
adequate to their needs, it must be
communicated to all the decision maker in Recording – Act of reducing of information to
manner that they will understand and in form writing.
that will permit the most effective use. Reform Motive – Repenting for wrong and
wants to set a straight record.
Rehabilitation – Restoration of a normal life by Secret – Document information or material
specially training programs, also restoration to wherein the unauthorized disclosure of which
former privileges when training is satisfactory endangers national security cause serious injury
when training is satisfactory completed. to the interest or prestige of the nation or nay
governmental activity or would be great
Research – Systematic investigation in order to advantage to a foreign nation.
establish facts and research conclusions; an
endeavor to discover new, or a subject, or topic Shadowing or Tailing – The act of following
by a course of critical investigation. person (overtly or covertly).

Restricted – Document information or material Sociological Intelligence – Interest centers


other than top secret or confidential which with the study of population and manpower or
should not be published or communicated to demography, national characteristics labor,
augment except for official purpose. public opinion and public welfare.

Revenge – A motive induced by grudge to get Strategic Intelligence – Refers to the process
even with by giving false, bogus and of gathering information designed to disturb and
exaggerated information to law enforcers which disrupt enemies state of finances and destroy
is detrimental to the interest of another. the stability and foundation of its organization.
Knowledge pertaining to the capabilities,
Rough Shadowing – Criminal is aware that ha vulnerabilities and probable courses of action of
is being tailed, witness that should be protected. foreign nation.
Sabotage – A willful and malicious destruction Subject – Is a person or place or obj3ect being
of natural processes and functions of a plant, surveyed or watched.
installation or premises.
Subversion – An organized and systematic
Saboteur - A person or group of person to carry conspiracy designed to discredit and overthrow
out sabotage act. duly constituted authorities.
Safe House – Is a place or building enclosed Subversive – Agitators, propagandist,
mobile or apartment where police undercover infiltrators, organizers, front group mobs, paper
and operatives meet for purpose of the briefing organization, activities, terrorists and saboteurs.
or plainly to report.
Subversive Activities – Activities designed to
Sarin – A G-series nerve agent (gas) disrupt or even overthrow ruling parties or
Scientific Intelligence – Deals with the government.
progress of scientific research and development Subversive Intelligence – Assembling
as it affects a nation potential. analyzing and dissembling information about
Security Clearance – An administrative or those individual or groups whose interest is the
directorial determination that an individual is overthrow of a democratic country.
eligible from a security standpoint for access to Supervisory – Overseeing of administrative
a classified matter of specific category. work and not supervising operating units.
Shield Vehicle – A heavily armored vehicle Surveilant – Is a person or group who does the
located at the side of the principal’s vehicle. surveillance works.
SIGINT – Signals Intelligence extracted from Surveillance – Is the discreet observation of
various types of communication. places, person, and vehicle for the purpose of
Snippet – Fragment of information. information concerning the activities of the target
on the subject.
Security Intelligence – Investigation of actual
or theoretical violation of espionage laws with a Tactical Intelligence – Targets criminal activity
purpose of apprehending violator. considered to be of immediate importance to law
enforcement units. It furnishes the police about Transportation and Telecommunication
an individual, organization, and their type of Intelligence – It is concerned with operations
activities. and facilities of transportation system.

Targets – Person, places and organizations, Undercover Assignment – It is a strategy


which are objects of police interest due to their wherein a member of a police organization joins
criminal activities. the underworld for the purpose of obtaining
evidence or gathering of information against the
Target Selection – First phase in the process of criminals and criminal organization.
identifying criminals and subversive elements. It
involves utility, probability of success, required Utility – Refers to the type of criminal activity,
resources and objectives. amount and frequency of criminal activity and its
impact.
Technical Intelligence – Concerns the foreign
technical developments, which have practical White Propaganda – Open activity to clear out
military application and the practical government image.
performance, capabilities and limitations of
materials and installation used by foreign military WMD – Weapons of Mass Destruction.
forces.

Telecommunication Intelligence – Is
concerned with operations and facilities of long
distance communication media including
telegraph, telephone, radio, satellite, television
and other electronic communications.

Terrorism – A crime committed by any person


who perpetrate an act punishable under any of
the following provisions of the Revised Penal
Code which are as follows: Piracy in General or
Mutiny in the High Seas or in the Philippine
Waters; Rebellion or Insurrection; Coup D’ Etat,
Murder, Kidnapping or serious Illegal Detention;
or under the Law on Arson (PD 1613); Toxic
Substances and Hazardous and Nuclear Waste
Control Act of 1990 (RA 6969); Atomic Energy
Regulatory and Liability Act of 1968. (RA 5207);
Anti Hijacking Law (RA 6235); Anti Piracy and
Anti Robbery Law of 1974 (PD 532) and; Decree
Codifying on Illegal and Unlawful Possession,
Manufacture, Dealing in, Acquisition and
Disposition of Firearms Ammunitions or
Explosives (PD 1866) thereby sowing and
creating a condition of widespread and
extraordinary fear and panic among the
populace in order to coerce the government to
give into an unlawful demand.

Top Secret – Certain document information or


material wherein the security and defense
aspects of which are paramount and which
unauthorized disclosure would cause
exceptionally great damage to the nation.

S-ar putea să vă placă și