SEC. 1 International Conventions – these protocols are about civil aviation safeguards in hijacking and acts of unlawful interference to civil aviation. The Chicago Convention - participated in by 52 nation in November 1944 at Chicago, USA, paved the way for the formation of the International Civil aviation Organization (ICAO) purpose to ensure the safe and orderly growth of international civil aviation throughout the world. The Tokyo Convention - also know as the Convention on Offense and Certain Other Acts Committed on Board an Aircraft, sign in Tokyo Japan on September 14 1963 and came into force on 4 December 1969. Ratified by 124 states, including Philippines. ▪ The Hague Convention -also know as the Convention For the Suppression of Unlawful Seizure of Aircraft, sign in Hague, Netherlands on 16 Dec 1970 and came force on 14 Dec 1971. Ratified by 129 states including Philippines. Signature state to make hijacking punishable. ▪ The Montreal Convention -also know as the Convention For the Suppression of Unlawful Acts against the Safety of Civil Aviation. Signature state were obligated to enact laws covering all acts of unlawful interference with civil aviation and provide severe penalties for any violation. ▪ National Legislations Republic Act 6975 -airport authorities, is task to: a. secure all the country's airport against terroristic acts. b. exercise operational control and c. enforce all laws and regulation relative to air travel protection and safety. SEC 2. Standard Aviation Screening Procedure. -prevent the introduction of firearm weapons and other dangerous device by use of metal detectors, x-rays , or manual search. The following are the standard inspection/screening device: a. Walk Through(gate type metal detector) b. Handle-held Metal Detectors c. X-Ray Device d. Frisking ▪ Rule 24. INTERNAL SECURITY OPERATIONS SEC 1. General Mandate. The PNP is mandate by law to support the AFP internal security operation(ISO). SEC 2. The PNP in a Support Role. a. conduct sustained law enforcement action against Dissident Terrorists. b. collect intelligence information on DT activities; c. conduct investigation and protection of ISO- related cases. SEC 3. The PNP in an Active Role. a. Conduct search and destroy operation agaist DT strongholds and concentrations. b. Construct intelligence operation. c. Conduct civil-military operations to dismantle the political machinery of the CPP NPA in the area. ▪ SEC 4. Defensive Position. a. Continuously remind all PNP personnel to be extra vigilant and security conscious in their day-to-day activities and during troop movements. b. Vigorously implement added security measures in all Police Stations and Police Community Precincts. c. Conduct sustained inspection of the operational readiness of PNP field units/stations. d. Always keep in mind the modus operandi, strategies and tactics being practiced/employed by the CTM and other threat groups. e. Enhance the establishment of Advance Security Control Points (ASCPs) to control the ingress and egress of people in Police Stations. ▪ RULE 25. BOMB, BOMB THREAT AND BOMB INCIDENT EMERGENCY RESPONSE PROCEDURES SEC. First Responder’s Procedure on Bomb Threat a. Upon receipt of the information: 1. Determine the exact location of the establishment under threat. 2. Conduct a bomb search. 3. Proceed immediately to the scene. 4. Alert Explosives Ordnance Demolition Team (EODT) for bomb search mission and emergency readiness before going departure. 5. Notify Higher Headquarters of development. ▪ b. Upon arrival at the scene: (1) Confirm the reported bomb threat and notify EODT on the need to conduct a bomb sweep; (2) Conduct or cause a search for suspicious device/s together with persons familiar with the location; and (3) Unless a bomb is found, personnel may not order an evacuation of the affected area, but may inform the person in-charge of the property of the need to evacuate ▪ C. Do not touch, tamper with or disarm any suspected device. ▪ D . If a suspected device is discovered, cause the evacuation of people in the affected area to a distance of at least 300 meters away, and maintain security for the protection of life and property ▪ E. isolate suspected device; ▪ F. Report discovery of suspected device; ▪ G. Do not permit radio transmission within the area. ▪ H. Turn off all electricity and gas units within the premises/building; ▪ i. Secure the area and prevent people from approaching; ▪ J. Establish traffic c control; ▪ K. Summon ambulance and fi re trucks to the scene; ▪ L. Await the arrival of bomb disposal team; and ▪ M. Notify Higher Headquarters of the situation. ▪ First Responder’s Procedure in Case of Actual Bomb Explosion. A. Upon receipt of the report: (1) Identify exact location of the incident; (2) Alert EOD teams and direct them to proceed to the area; (3) Notify Higher Headquarters of the situation; (4) Request assistance of medical personnel; and (5) Proceed to the scene immediately. b. Upon arrival at the scene: (1) Cause immediate evacuation of the injured; (2) Direct occupants of the establishment to evacuate; ▪ c. Notify Higher Headquarters of the situation; d. Seal off location until EOD Team determines if a secondary device exists; e. Conduct rescue operations at the scene when necessary; f. Initiate immediate investigation if investigators have not yet arrived and determine the following: (a) Time of detonation/explosion; (b) Time when the call for bomb threat was received; and (c) Type of device. g. Submit incident report immediately; and h. Avoid issuing “speculative” press releases or statements. ▪ RULE 36. CYBERCRIME INCIDENT RESPONSE PROCEDURE ▪ Sec 1. Computer crime Response Defined - is the actual police intervention in a cybercrime incident where the acquisition of matters of evidentiary value is traceable within the computer’s hardware, software, and its network ▪ Sec 2. Do’s don't in computer crime response -when the computer is “OFF”, do not turn it “ON”. -when the computer is “ON”, do not turn it “OFF”, nor touch its mouse or its keyboard. ▪ -call for the computer incident Response team -if CIRT is not available, unplug the computer directly from the CPU -each unplug cable must be mark -only the computer forensic expert should search for the evidence -the computer hard disk should be duplicated by the forensic expert and the original is kept by the evidence custodian for future court presentation. Further search and analysis shall be undertaken using only the imaged disk.