Anda di halaman 1dari 12

Rule 23.

AVIATION SECRITY CONVENTION


SEC. 1 International Conventions
– these protocols are about civil aviation safeguards in hijacking and acts of
unlawful interference to civil aviation.
The Chicago Convention
- participated in by 52 nation in November 1944 at Chicago, USA, paved the way
for the formation of the International Civil aviation Organization (ICAO) purpose to
ensure the safe and orderly growth of international civil aviation throughout the
world.
The Tokyo Convention
- also know as the Convention on Offense and Certain Other Acts Committed on
Board an Aircraft, sign in Tokyo Japan on September 14 1963 and came into
force on 4 December 1969. Ratified by 124 states, including Philippines.
▪ The Hague Convention
-also know as the Convention For the Suppression of Unlawful
Seizure of Aircraft, sign in Hague, Netherlands on 16 Dec 1970
and came force on 14 Dec 1971. Ratified by 129 states
including Philippines. Signature state to make hijacking punishable.
▪ The Montreal Convention
-also know as the Convention For the Suppression of Unlawful
Acts against the Safety of Civil Aviation. Signature state were
obligated to enact laws covering all acts of unlawful interference
with civil aviation and provide severe penalties for any violation.
▪ National Legislations Republic Act 6975 -airport authorities, is task
to: a. secure all the country's airport against terroristic acts.
b. exercise operational control and c. enforce all laws and
regulation relative to air travel protection and safety.
SEC 2. Standard Aviation Screening Procedure.
-prevent the introduction of firearm weapons and other dangerous
device by use of metal detectors, x-rays , or manual search.
The following are the standard inspection/screening device:
a. Walk Through(gate type metal detector)
b. Handle-held Metal Detectors
c. X-Ray Device
d. Frisking
▪ Rule 24. INTERNAL SECURITY OPERATIONS
SEC 1. General Mandate. The PNP is mandate by law to support the AFP
internal security operation(ISO).
SEC 2. The PNP in a Support Role.
a. conduct sustained law enforcement action against Dissident Terrorists.
b. collect intelligence information on DT activities;
c. conduct investigation and protection of ISO- related cases.
SEC 3. The PNP in an Active Role.
a. Conduct search and destroy operation agaist DT strongholds and
concentrations.
b. Construct intelligence operation.
c. Conduct civil-military operations to dismantle the political machinery
of the CPP NPA in the area.
▪ SEC 4. Defensive Position.
a. Continuously remind all PNP personnel to be extra vigilant and
security conscious in their day-to-day activities and during troop
movements.
b. Vigorously implement added security measures in all Police
Stations and Police Community Precincts.
c. Conduct sustained inspection of the operational readiness of PNP
field units/stations.
d. Always keep in mind the modus operandi, strategies and tactics
being practiced/employed by the CTM and other threat groups.
e. Enhance the establishment of Advance Security Control Points
(ASCPs) to control the ingress and egress of people in Police Stations.
▪ RULE 25. BOMB, BOMB THREAT AND BOMB INCIDENT
EMERGENCY RESPONSE PROCEDURES
SEC. First Responder’s Procedure on Bomb Threat
a. Upon receipt of the information:
1. Determine the exact location of the establishment under threat.
2. Conduct a bomb search.
3. Proceed immediately to the scene.
4. Alert Explosives Ordnance Demolition Team (EODT) for bomb
search mission and emergency readiness before going departure.
5. Notify Higher Headquarters of development.
▪ b. Upon arrival at the scene:
(1) Confirm the reported bomb threat and notify EODT on the need
to conduct a bomb sweep;
(2) Conduct or cause a search for suspicious device/s together with
persons familiar with the location; and
(3) Unless a bomb is found, personnel may not order an evacuation
of the affected area, but may inform the person in-charge of the
property of the need to evacuate
▪ C. Do not touch, tamper with or disarm any suspected device.
▪ D . If a suspected device is discovered, cause the evacuation of
people in the affected area to a distance of at least 300 meters away,
and maintain security for the protection of life and property
▪ E. isolate suspected device;
▪ F. Report discovery of suspected device;
▪ G. Do not permit radio transmission within the area.
▪ H. Turn off all electricity and gas units within the premises/building;
▪ i. Secure the area and prevent people from approaching;
▪ J. Establish traffic c control;
▪ K. Summon ambulance and fi re trucks to the scene;
▪ L. Await the arrival of bomb disposal team; and
▪ M. Notify Higher Headquarters of the situation.
▪ First Responder’s Procedure in Case of Actual Bomb Explosion.
A. Upon receipt of the report:
(1) Identify exact location of the incident;
(2) Alert EOD teams and direct them to proceed to the area;
(3) Notify Higher Headquarters of the situation;
(4) Request assistance of medical personnel; and
(5) Proceed to the scene immediately.
b. Upon arrival at the scene:
(1) Cause immediate evacuation of the injured;
(2) Direct occupants of the establishment to evacuate;
▪ c. Notify Higher Headquarters of the situation;
d. Seal off location until EOD Team determines if a secondary device
exists;
e. Conduct rescue operations at the scene when necessary;
f. Initiate immediate investigation if investigators have not yet
arrived and
determine the following:
(a) Time of detonation/explosion;
(b) Time when the call for bomb threat was received; and
(c) Type of device.
g. Submit incident report immediately; and
h. Avoid issuing “speculative” press releases or statements.
▪ RULE 36. CYBERCRIME INCIDENT RESPONSE PROCEDURE
▪ Sec 1. Computer crime Response Defined
- is the actual police intervention in a cybercrime incident where the
acquisition of matters of evidentiary value is traceable within the
computer’s hardware, software, and its network
▪ Sec 2. Do’s don't in computer crime response
-when the computer is “OFF”, do not turn it “ON”.
-when the computer is “ON”, do not turn it “OFF”, nor touch its mouse
or its keyboard.
▪ -call for the computer incident Response team
-if CIRT is not available, unplug the computer directly from the CPU
-each unplug cable must be mark
-only the computer forensic expert should search for the evidence
-the computer hard disk should be duplicated by the forensic expert
and the original is kept by the evidence custodian for future court
presentation. Further search and analysis shall be undertaken using
only the imaged disk.

Anda mungkin juga menyukai